Identity-Based Unidirectional Collusion-Resistant Proxy Re-Encryption from U-LWE

被引:2
作者
Yang, Nan [1 ,2 ]
Tian, Youliang [1 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[2] Qiannan Normal Univ Natl, Sch Math & Stat, Duyun 558000, Guizhou, Peoples R China
关键词
LATTICE;
D O I
10.1155/2023/3765934
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based proxy re-encryption (IB-PRE) converts the ciphertext encrypted under the delegator's identity to the one encrypted under the delegatee's identity through a semitrusted proxy without leaking delegator's private key and the underlying plaintext. At present, the security of most IB-PRE schemes relies on the hardness of the discrete logarithm solution or large integer decomposition and cannot resist attacks of the quantum algorithms. The majority of the IB-PRE schemes over lattice are secure only in the random oracle model. Aiming at such problems, the paper constructs a secure IB-PRE scheme over lattice in the standard model. In the scheme, the underlying encryption scheme proposed by Gentry et al. in EUROCRYPT 2010 is adopted to reduce the storage space of ciphertext. The proposed scheme is unidirectional collusion-resistant multihop and anonymous, and it is semantically secure against selective identity and chosen plaintext attack based on Decisional Learning With Errors with uniformly distributed errors (D-U-LWE) hard problem in the standard model.
引用
收藏
页数:9
相关论文
共 24 条
  • [1] Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
  • [2] Aono Yoshinori, 2013, Progress in Cryptology - INDOCRYPT 2013. 14th International Conference on Cryptology in India. Proceedings: LNCS 8250, P1, DOI 10.1007/978-3-319-03515-4_1
  • [3] Blaze M., 1998, LNCS
  • [4] Bonsai Trees, or How to Delegate a Lattice Basis
    Cash, David
    Hofheinz, Dennis
    Kiltz, Eike
    Peikert, Chris
    [J]. JOURNAL OF CRYPTOLOGY, 2012, 25 (04) : 601 - 639
  • [5] Döttling N, 2013, LECT NOTES COMPUT SC, V7881, P18, DOI 10.1007/978-3-642-38348-9_2
  • [6] Gentry C, 2008, ACM S THEORY COMPUT, P197
  • [7] Gentry C, 2010, LECT NOTES COMPUT SC, V6110, P506
  • [8] Green M, 2007, LECT NOTES COMPUT SC, V4521, P288
  • [9] Efficient identity-based multi-bit proxy re-encryption over lattice in the standard model
    Hou, Jinqiu
    Jiang, Mingming
    Guo, Yuyan
    Song, Wangan
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 : 329 - 334
  • [10] Lattice-based multi-use unidirectional proxy re-encryption
    Jiang, M. M.
    Hu, Y. P.
    Wang, B. C.
    Wang, F. H.
    Lai, Q. Q.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3796 - 3803