Proxy Re-Encryption Based on Homomorphic Encryption

被引:8
|
作者
Bellafqira, Reda [1 ]
Coatrieux, Gouenou [1 ]
Bouslimi, Dalel [1 ]
Quellec, Gwenole [2 ]
Cozic, Michel [3 ]
机构
[1] IMT Atlantique, Brest, France
[2] INSERM, Brest, France
[3] MED e COM, Plougastel Daoulas, France
关键词
Security confidentiality; Processing of encrypted data; Homomorphic proxy re-encryption; CRYPTOSYSTEM;
D O I
10.1145/3134600.3134616
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose an homomorphic proxy re-encryption scheme (HPRE) that allows different users to share data they outsourced homomorphically encrypted using their respective public keys with the possibility by next to process such data remotely. Its originality stands on a solution we propose so as to compute the difference of data encrypted with Damgard-Jurik cryptosystem. It takes also advantage of a secure combined linear congruential generator that we implemented in the Damgard-Jurik encrypted domain. Basically, in our HPRE scheme, the two users, the delegator and the delegate, ask the cloud server to generate an encrypted noise based on a secret key, both users previously agreed on. Based on our solution to compute the difference in Damgard-Jurik encrypted domain, the cloud computes in clear the differences in-between the encrypted noise and the encrypted data of the delegator, obtaining thus blinded data. In order the delegate gets access to the data, the cloud just has to encrypt these differences using the delegate's public key and then removes the noise. This solution doesn't need extra communication between the cloud and the delegator. Our HPRE was implemented in the case of the sharing of uncompressed images stored in the cloud showing good time computation performance, it is unidirectional and collusion-resistant. Nevertheless, it is not limited to images and can be used with any kinds of data.
引用
收藏
页码:154 / 161
页数:8
相关论文
共 50 条
  • [1] A Homomorphic Proxy Re-encryption from Lattices
    Ma, Chunguang
    Li, Juyan
    Ouyang, Weiping
    [J]. PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 353 - 372
  • [2] Homomorphic Proxy Re-Encryption and Multiparty Cloud Computing
    Liu, Shu-Guang
    Zhang, Wei
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 222 - 225
  • [3] Multi-key Homomorphic Proxy Re-Encryption
    Yasuda, Satoshi
    Koseki, Yoshihiro
    Hiromasa, Ryo
    Kawai, Yutaka
    [J]. INFORMATION SECURITY (ISC 2018), 2018, 11060 : 328 - 346
  • [4] Proxy Re-encryption with Unforgeable Re-encryption Keys
    Guo, Hui
    Zhang, Zhenfeng
    Zhang, Jiang
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 20 - 33
  • [5] File Matching Based on Secure Authentication and Proxy Homomorphic Re-encryption
    Yu, Bin
    Zhang, Chen
    Li, Weihong
    [J]. ICMLC 2019: 2019 11TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING, 2019, : 472 - 476
  • [6] A BGN-Type Homomorphic Proxy Re-Encryption Scheme
    Liu, Shu-Guang
    Zhang, Wei
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 226 - 229
  • [7] Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption
    Luo, Fucai
    Al-Kuwari, Saif
    Susilo, Willy
    Duong, Dung Hoang
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) : 2398 - 2408
  • [8] Distributed Proxy Re-Encryption Protocol for Secure Multiparty Computation with Fully Homomorphic Encryption
    Demir, Busranur Bulbul
    Altilar, Deniz Turgay
    [J]. 2024 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING, BLACKSEACOM 2024, 2024, : 199 - 204
  • [9] ID-Based Multireceiver Homomorphic Proxy Re-Encryption in Federated Learning
    Fan, Chun-, I
    Hsu, Ya-Wen
    Shie, Cheng-Han
    Tseng, Yi-Fan
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2022, 18 (04)
  • [10] Proxy re-encryption systems for identity-based encryption
    Matsuo, Toshihiko
    [J]. Pairing-Based Cryptography - Pairing 2007, 2007, 4575 : 247 - 267