Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme

被引:5
|
作者
Tang, Yongli [1 ]
Jin, Minglu [1 ]
Meng, Hui [1 ]
Yang, Li [1 ]
Zheng, Chengfu [1 ]
机构
[1] Henan Polytech Univ, Coll Software, Jiaozuo 454000, Peoples R China
关键词
proxy re-encryption; homomorphic signature; learning with errors; re-encryption verifiable;
D O I
10.3390/e25050822
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
There are mostly semi-honest agents in cloud computing, so agents may perform unreliable calculations during the actual execution process. In this paper, an attribute-based verifiable conditional proxy re-encryption (AB-VCPRE) scheme using a homomorphic signature is proposed to solve the problem that the current attribute-based conditional proxy re-encryption (AB-CPRE) algorithm cannot detect the illegal behavior of the agent. The scheme implements robustness, that is the re-encryption ciphertext, can be verified by the verification server, showing that the received ciphertext is correctly converted by the agent from the original ciphertext, thus, meaning that illegal activities of agents can be effectively detected. In addition, the article demonstrates the reliability of the constructed AB-VCPRE scheme validation in the standard model, and proves that the scheme satisfies CPA security in the selective security model based on the learning with errors (LWE) assumption.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] HRA-secure attribute-based threshold proxy re-encryption from lattices
    Zhao, Feixiang
    Weng, Jian
    Xie, Wenli
    Li, Ming
    Weng, Jiasi
    INFORMATION SCIENCES, 2024, 655
  • [22] Fuzzy conditional proxy re-encryption
    Fang LiMing
    Wang JianDong
    Ge ChunPeng
    Ren YongJun
    SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (05) : 1 - 13
  • [23] Hierarchical conditional proxy re-encryption
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    COMPUTER STANDARDS & INTERFACES, 2012, 34 (04) : 380 - 389
  • [24] Fuzzy conditional proxy re-encryption
    LiMing Fang
    JianDong Wang
    ChunPeng Ge
    YongJun Ren
    Science China Information Sciences, 2013, 56 : 1 - 13
  • [25] Conditional Proxy Broadcast Re-Encryption
    Chu, Cheng-Kang
    Weng, Jian
    Chow, Sherman S. M.
    Zhou, Jianying
    Deng, Robert H.
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 327 - +
  • [26] Fuzzy conditional proxy re-encryption
    FANG LiMing
    WANG JianDong
    GE ChunPeng
    REN YongJun
    ScienceChina(InformationSciences), 2013, 56 (05) : 211 - 223
  • [27] Blockchain-Based Digital Rights Management Scheme via Multiauthority Ciphertext-Policy Attribute-Based Encryption and Proxy Re-Encryption
    Gao, Juntao
    Yu, Haiyong
    Zhu, Xiuqin
    Li, Xuelian
    IEEE SYSTEMS JOURNAL, 2021, 15 (04): : 5233 - 5244
  • [28] Proxy Impersonation Safe Conditional Proxy Re-Encryption
    Gandhi, Dheeraj
    Rangan, Pandu
    Selvi, Sharmila Deva
    Vivek, Sree
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2013), 2013, : 33 - 44
  • [29] Certificate-Based Conditional Proxy Re-Encryption
    Li, Jiguo
    Zhao, Xuexia
    Zhang, Yichen
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 299 - 310
  • [30] A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud
    Chen, Zhanwen
    Chen, Jiageng
    Meng, Weizhi
    2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, : 569 - 576