Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme

被引:0
|
作者
Singh, Kunwar [1 ]
Rangan, C. Pandu [2 ]
Banerjee, A. K. [3 ]
机构
[1] NIT Trichy, Dept Comp Sci & Engn, Tiruchirappalli, Tamil Nadu, India
[2] IIT Madras, Dept Comp Sci & Engn, Madras, Tamil Nadu, India
[3] NIT Trichy, Dept Math, Tiruchirappalli, India
关键词
Lattice; Proxy Re-encryption (PRE); Learning With Error (LWE);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At Eurocrypt 1998, Blaze, Bleumer and Strauss [8] presented a new primitive called Proxy Re-Encryption (PRE). PRE is a public key encryption which allows a semi trusted proxy to alter a ciphertext for Alice (delegator) into a ciphertext for Bob (delegatee) without knowing the message. To the best of our knowledge there does not exist any lattice based identity based unidirection PRE scheme. In this paper, we have costructed lattice based identity based unidirection PRE scheme. Our scheme is noninteractive. In this scheme, we have used Micciancio and Peikert's strong trapdoor [16] for lattices which is simple, efficient and easy to implement than [3].
引用
收藏
页码:76 / +
页数:3
相关论文
共 50 条
  • [1] A Lattice-based Unidirectional Proxy Re-encryption
    Wang, Lewei
    Jiang, Mingming
    Guo, Yuyan
    Ge, Hui
    International Journal of Network Security, 2024, 26 (04) : 598 - 604
  • [2] Proxy Re-encryption Scheme Based on SK Identity Based Encryption
    Wang, Xu An
    Yang, Xiaoyuan
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 657 - 660
  • [3] Lattice-based unidirectional Proxy Re-Encryption and Proxy Re-Encryption+ schemes
    Singh, Kunwar
    Rangan, C. Pandu
    Sheshank, Samir
    Agrawal, Richa
    IET INFORMATION SECURITY, 2021, 15 (01) : 1 - 12
  • [4] On the Insecurity of an Identity Based Proxy Re-encryption Scheme
    Wang, Xu An
    Yang, Xiaoyuan
    FUNDAMENTA INFORMATICAE, 2010, 98 (2-3) : 277 - 281
  • [5] Group-based unidirectional proxy re-encryption scheme
    School of Information and Communication, Guilin University of Electronic and Technology, Guilin, Guangxi, 541004, China
    Inf. Technol. J., 2009, 1 (83-88):
  • [6] Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability
    Wang, Xiaolei
    Wang, Yang
    Wang, Mingqiang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 535 - 544
  • [7] Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction
    Dutta, Priyanka
    Susilo, Willy
    Duong, Dung Hoang
    Baek, Joonsang
    Roy, Partha Sarathi
    INFORMATION SECURITY APPLICATIONS, WISA 2020, 2020, 12583 : 245 - 257
  • [8] New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
    Lai, Jun-Zuo
    Zhu, Wen-Tao
    Deng, Robert H.
    Liu, Sheng-Li
    Kou, Wei-Dong
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (04) : 793 - 806
  • [9] New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
    赖俊祚
    朱文涛
    邓慧杰
    刘胜利
    寇卫东
    Journal of Computer Science & Technology, 2010, 25 (04) : 793 - 806
  • [10] New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
    Jun-Zuo Lai
    Wen-Tao Zhu
    Robert H. Deng
    Sheng-Li Liu
    Wei-Dong Kou
    Journal of Computer Science and Technology, 2010, 25 : 793 - 806