Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme

被引:0
|
作者
Singh, Kunwar [1 ]
Rangan, C. Pandu [2 ]
Banerjee, A. K. [3 ]
机构
[1] NIT Trichy, Dept Comp Sci & Engn, Tiruchirappalli, Tamil Nadu, India
[2] IIT Madras, Dept Comp Sci & Engn, Madras, Tamil Nadu, India
[3] NIT Trichy, Dept Math, Tiruchirappalli, India
关键词
Lattice; Proxy Re-encryption (PRE); Learning With Error (LWE);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At Eurocrypt 1998, Blaze, Bleumer and Strauss [8] presented a new primitive called Proxy Re-Encryption (PRE). PRE is a public key encryption which allows a semi trusted proxy to alter a ciphertext for Alice (delegator) into a ciphertext for Bob (delegatee) without knowing the message. To the best of our knowledge there does not exist any lattice based identity based unidirection PRE scheme. In this paper, we have costructed lattice based identity based unidirection PRE scheme. Our scheme is noninteractive. In this scheme, we have used Micciancio and Peikert's strong trapdoor [16] for lattices which is simple, efficient and easy to implement than [3].
引用
收藏
页码:76 / +
页数:3
相关论文
共 50 条
  • [21] Efficient Identity-based Proxy Re-encryption on Lattice in the Standard Model
    Jiang Mingming
    Guo Yuyan
    Yu Lei
    Song Wangan
    Wei Shimin
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (01) : 61 - 66
  • [22] Hierarchical Identity Role based proxy re-encryption scheme for cloud computing
    Nirmala, V
    Shanmugalakshmi, R.
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2013,
  • [23] Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
    Shao, Jun
    Cao, Zhenfu
    INFORMATION SCIENCES, 2012, 206 : 83 - 95
  • [24] Identity Based Broadcast Encryption Based on One to Many Identity Based Proxy Re-encryption
    Wang, Xu An
    Yang, Xiaoyuan
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 1, 2009, : 47 - 50
  • [25] Improved collusion-resistant unidirectional proxy re-encryption scheme from lattice
    Wang, Xuyang
    Hu, Aiqun
    Fang, Hao
    IET INFORMATION SECURITY, 2020, 14 (03) : 342 - 351
  • [26] Identity-Based Conditional Proxy Re-Encryption
    Zhou Dehua
    Chen Kefei
    Liu Shengli
    Zheng Dong
    CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (01): : 61 - 66
  • [27] Identity-based Conditional Proxy Re-encryption
    Shao, Jun
    Wei, Guiyi
    Ling, Yun
    Xie, Mande
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [28] Group-Based Proxy Re-encryption Scheme
    Ma, Chunbo
    Ao, Jun
    EMERGING INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, 5754 : 1025 - 1034
  • [29] An Improved Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme
    Wang, Changji
    Fang, Jian
    Li, Yuan
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 14 - 26
  • [30] Efficient Unidirectional Proxy Re-Encryption
    Chow, Sherman S. M.
    Weng, Jian
    Yang, Yanjiang
    Deng, Robert H.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 316 - +