Attribute-based proxy re-encryption from standard lattices

被引:3
|
作者
Luo, Fucai [1 ]
Al-Kuwari, Saif [1 ,2 ]
Wang, Fuqun [3 ,4 ]
Chen, Kefei [3 ,4 ]
机构
[1] Hamad Bin Khalifa Univ, Coll Sci & Engn, Ar Rayyan, Qatar
[2] Qatar Univ, Kindi Comp Res Ctr, Doha, Qatar
[3] Hangzhou Normal Univ, Dept Math, Hangzhou, Peoples R China
[4] Westone Cryptol Res Ctr, Beijing, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Attribute-based encryption; Proxy re-encryption; Key-policy; Attribute-based proxy re-encryption; Learning with errors;
D O I
10.1016/j.tcs.2021.02.036
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Attribute-based proxy re-encryption (ABPRE), which combines the notions of proxy re-encryption (PRE) and attribute-based encryption (ABE), allows a semi-trusted proxy to transform a ciphertext under a particular access-policy into a ciphertext under another access policy, without revealing any information about the underlying plaintext. This primitive is very useful in some applications, where encrypted data needs to be stored in untrusted environments, such as cloud storage. In its key-policy flavor, the secret key is associated with an access policy that specifies which type of ciphertexts can be decrypted by that key, where ciphertexts are marked with different sets of attributes. However, all existing key-policy attribute-based proxy re-encryption (KP-ABPRE) schemes are based on classical number-theoretic assumptions, which are vulnerable to quantum attacks. This paper proposes the first KP-ABPRE scheme based on the learning with errors (LWE) problem, which is widely believed to be quantum-resistant. Our scheme is multi-hop, supports polynomial-depth policy circuits and has short private keys, where the size of the keys is dependent only on the depth of the supported policy circuits. In addition, we prove that our scheme is CPA secure in the selective security model, based on the LWE assumption. (C) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页码:52 / 62
页数:11
相关论文
共 50 条
  • [41] Weighted Attribute-Based Proxy Re-Encryption Scheme with Distributed Multi-Authority Attributes
    Yi, Wenlong
    Wang, Chuang
    Kuzmin, Sergey
    Gerasimov, Igor
    Cheng, Xiangping
    [J]. SENSORS, 2024, 24 (15)
  • [42] New Identity Based Proxy Re-Encryption Scheme from Lattices
    Liqiang Wu
    Xiaoyuan Yang
    Minqing Zhang
    Longfei Liu
    [J]. China Communications, 2019, 16 (10) : 174 - 190
  • [43] Verifiable and hybrid attribute-based proxy re-encryption for flexible data sharing in cloud storage
    Sun, Lixue
    Xu, Chunxiang
    Zeng, Fugeng
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2024, 193
  • [44] A Blockchain-Based Efficient and Verifiable Attribute-Based Proxy Re-Encryption Cloud Sharing Scheme
    Feng, Tao
    Wang, Dewei
    Gong, Renbin
    [J]. INFORMATION, 2023, 14 (05)
  • [45] Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model
    Liu, Ximeng
    Ma, Jianfeng
    Xiong, Jinbo
    Li, Qi
    Zhang, Tao
    Zhu, Hui
    [J]. IET INFORMATION SECURITY, 2014, 8 (04) : 217 - 223
  • [46] Chosen-ciphertext secure multi-use unidirectional attribute-based proxy re-encryption
    Li, Juanjuan
    Liu, Zhenhua
    Zu, Longhui
    [J]. 2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 96 - 103
  • [47] Searchable Attribute-Based Proxy Re-encryption: Keyword Privacy, Verifiable Expressive Search, and Outsourced Decryption
    Bera S.
    Rao Y.S.
    [J]. SN Computer Science, 5 (5)
  • [48] A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds
    Liang, Kaitai
    Fang, Liming
    Wong, Duncan S.
    Susilo, Willy
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08): : 2004 - 2027
  • [49] dAPRE:Efficient and Reliable Attribute-Based Proxy Re-Encryption Using DAG for Data Sharing in IoT
    Li, Xiaoxiao
    Xie, Yong
    Wang, Hui
    Su, Xing
    Li, Haifeng
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 584 - 596
  • [50] A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing
    Liang, Kaitai
    Au, Man Ho
    Liu, Joseph K.
    Susilo, Willy
    Wong, Duncan S.
    Yang, Guomin
    Yu, Yong
    Yang, Anjia
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 52 : 95 - 108