Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme

被引:5
|
作者
Tang, Yongli [1 ]
Jin, Minglu [1 ]
Meng, Hui [1 ]
Yang, Li [1 ]
Zheng, Chengfu [1 ]
机构
[1] Henan Polytech Univ, Coll Software, Jiaozuo 454000, Peoples R China
关键词
proxy re-encryption; homomorphic signature; learning with errors; re-encryption verifiable;
D O I
10.3390/e25050822
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
There are mostly semi-honest agents in cloud computing, so agents may perform unreliable calculations during the actual execution process. In this paper, an attribute-based verifiable conditional proxy re-encryption (AB-VCPRE) scheme using a homomorphic signature is proposed to solve the problem that the current attribute-based conditional proxy re-encryption (AB-CPRE) algorithm cannot detect the illegal behavior of the agent. The scheme implements robustness, that is the re-encryption ciphertext, can be verified by the verification server, showing that the received ciphertext is correctly converted by the agent from the original ciphertext, thus, meaning that illegal activities of agents can be effectively detected. In addition, the article demonstrates the reliability of the constructed AB-VCPRE scheme validation in the standard model, and proves that the scheme satisfies CPA security in the selective security model based on the learning with errors (LWE) assumption.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
    Zhang, Kejun
    Wang, Wenbin
    Xu, Shaofei
    Yu, Xinying
    Wang, Jun
    Li, Pengcheng
    Qian, Rong
    Tongxin Xuebao/Journal on Communications, 2024, 45 (09): : 244 - 257
  • [32] A Blockchain-Based Proxy Re-Encryption Scheme with Conditional Privacy Protection and Auditability
    Chen, Guo
    Peng, Weijun
    Wu, Jing
    Fang, Youxuan
    Ye, Keke
    Xin, Yanshuang
    CHINA COMMUNICATIONS, 2024, 21 (07) : 267 - 277
  • [33] Lattice-based Fuzzy Conditional Proxy Re-encryption
    Li, BaoHong
    Xu, JieFei
    Liu, YanZhi
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (05): : 1379 - 1385
  • [34] Chosen-ciphertext secure multi-use unidirectional attribute-based proxy re-encryption
    Li, Juanjuan
    Liu, Zhenhua
    Zu, Longhui
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 96 - 103
  • [35] dAPRE:Efficient and Reliable Attribute-Based Proxy Re-Encryption Using DAG for Data Sharing in IoT
    Li, Xiaoxiao
    Xie, Yong
    Wang, Hui
    Su, Xing
    Li, Haifeng
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 584 - 596
  • [36] A Searchable Hierarchical Conditional Proxy Re-Encryption Scheme for Cloud Storage Services
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chen, Chin-Ling
    Chiu, Shih-Ting
    INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (03): : 289 - 299
  • [37] An Authenticated Keyword Searchable Conditional Proxy Re-encryption Scheme in Cloud Services
    Sharma, Sumit
    Swarnakar, Ashutosh
    Babu, Ch Jayanth
    Padmavathy, R.
    Kumar, Rakesh
    PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020), 2020,
  • [38] A Multi-Conditional Proxy Broadcast Re-Encryption Scheme for Sensor Networks
    Li, Pang
    Zhu, Lifeng
    Gupta, Brij B.
    Jha, Sunil Kumar
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 65 (03): : 2079 - 2090
  • [39] Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme
    Singh, Kunwar
    Rangan, C. Pandu
    Banerjee, A. K.
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 564 - 575
  • [40] Two-layer Ciphertext-Policy Attribute-Based Proxy Re-encryption for Supporting PHR Delegation
    Wungpornpaiboon, G.
    Vasupongayya, S.
    2015 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2015, : 302 - 307