Attribute-based proxy re-encryption from standard lattices

被引:3
|
作者
Luo, Fucai [1 ]
Al-Kuwari, Saif [1 ,2 ]
Wang, Fuqun [3 ,4 ]
Chen, Kefei [3 ,4 ]
机构
[1] Hamad Bin Khalifa Univ, Coll Sci & Engn, Ar Rayyan, Qatar
[2] Qatar Univ, Kindi Comp Res Ctr, Doha, Qatar
[3] Hangzhou Normal Univ, Dept Math, Hangzhou, Peoples R China
[4] Westone Cryptol Res Ctr, Beijing, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Attribute-based encryption; Proxy re-encryption; Key-policy; Attribute-based proxy re-encryption; Learning with errors;
D O I
10.1016/j.tcs.2021.02.036
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attribute-based proxy re-encryption (ABPRE), which combines the notions of proxy re-encryption (PRE) and attribute-based encryption (ABE), allows a semi-trusted proxy to transform a ciphertext under a particular access-policy into a ciphertext under another access policy, without revealing any information about the underlying plaintext. This primitive is very useful in some applications, where encrypted data needs to be stored in untrusted environments, such as cloud storage. In its key-policy flavor, the secret key is associated with an access policy that specifies which type of ciphertexts can be decrypted by that key, where ciphertexts are marked with different sets of attributes. However, all existing key-policy attribute-based proxy re-encryption (KP-ABPRE) schemes are based on classical number-theoretic assumptions, which are vulnerable to quantum attacks. This paper proposes the first KP-ABPRE scheme based on the learning with errors (LWE) problem, which is widely believed to be quantum-resistant. Our scheme is multi-hop, supports polynomial-depth policy circuits and has short private keys, where the size of the keys is dependent only on the depth of the supported policy circuits. In addition, we prove that our scheme is CPA secure in the selective security model, based on the LWE assumption. (C) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页码:52 / 62
页数:11
相关论文
共 50 条
  • [1] Revocable attribute-based proxy re-encryption
    Luo, Fucai
    Al-Kuwari, Saif
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2021, 15 (01) : 465 - 482
  • [2] HRA-secure attribute-based threshold proxy re-encryption from lattices
    Zhao, Feixiang
    Weng, Jian
    Xie, Wenli
    Li, Ming
    Weng, Jiasi
    [J]. INFORMATION SCIENCES, 2024, 655
  • [3] Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption
    Mizuno, Takeo
    Doi, Hiroshi
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 288 - +
  • [4] Attribute-Based Proxy Re-Encryption with Keyword Search
    Shi, Yanfeng
    Liu, Jiqiang
    Han, Zhen
    Zheng, Qingji
    Zhang, Rui
    Qiu, Shuo
    [J]. PLOS ONE, 2014, 9 (12):
  • [5] Anonymous Attribute-Based Conditional Proxy Re-encryption
    Mao, Xianping
    Li, Xuefeng
    Wu, Xiaochuan
    Wang, Chuansheng
    Lai, Junzuo
    [J]. NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 95 - 110
  • [6] Attribute-Based Proxy Re-Encryption with Dynamic Membership
    Fan, Chun-I
    Wu, Chien-Nan
    Chen, Chun-Hung
    Tseng, Yi-Fan
    Feng, Cheng-Chun
    [J]. 2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 26 - 32
  • [7] Ciphertext Policy Attribute-Based Proxy Re-encryption
    Luo, Song
    Hu, Jianbin
    Chen, Zhong
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 401 - +
  • [8] Attribute-Based Conditional Proxy Re-encryption in the Standard Model Under LWE
    Liang, Xiaojian
    Weng, Jian
    Yang, Anjia
    Yao, Lisha
    Jiang, Zike
    Wu, Zhenghao
    [J]. COMPUTER SECURITY - ESORICS 2021, PT II, 2021, 12973 : 147 - 168
  • [9] Attribute-Based Keyword Search with Proxy Re-Encryption in the Cloud
    Chen, Yanli
    Hu, Yuanyuan
    Zhu, Minhui
    Yang, Geng
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2018, E101B (08) : 1798 - 1808
  • [10] Attribute-Based Re-Encryption Scheme in the Standard Model
    GUO Shanqing1
    2. State Key Laboratory of Novel Software Technology
    [J]. Wuhan University Journal of Natural Sciences, 2008, (05) : 621 - 625