A Novel Lattice-Based CP-ABPRE Scheme for Cloud Sharing

被引:19
作者
Li, Juyan [1 ]
Ma, Chunguang [2 ,3 ]
Zhang, Kejia [1 ]
机构
[1] Heilongjiang Univ, Coll Data Sci & Technol, Harbin 150080, Heilongjiang, Peoples R China
[2] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Shandong, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
来源
SYMMETRY-BASEL | 2019年 / 11卷 / 10期
基金
黑龙江省自然科学基金; 中国国家自然科学基金;
关键词
LWE; proxy re-encryption; attribute-based encryption; cloud sharing; PROXY RE-ENCRYPTION;
D O I
10.3390/sym11101262
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The ciphertext-policy attribute-based proxy re-encryption (CP-ABPRE) scheme supports access control and can transform a ciphertext under an access policy to a ciphertext under another access policy without decrypting the ciphertexts, which is flexible and efficient for cloud sharing. The existing CP-ABPRE schemes are constructed by bilinear pairing or multi-linear maps which are fragile when the post-quantum future comes. This paper presents an efficient unidirectional single-hop CP-ABPRE scheme with small public parameters from a lattice. For the transformation between two access structures, they are required to be disjoint. This paper uses the trapdoor sampling technique to generate the decryption key and the re-encryption key in constructing the scheme, and uses the decompose vectors technique to produce the re-encrypted ciphertexts in order to control their noise. Finally, we extended the scheme to a unidirectional single-hop CP-ABPRE scheme with keyword search for searching the encrypted data. Both schemes were proved secure under the learning with errors assumption, which is widely believed to be secure in quantum computer attacks. To the best of our knowledge, our scheme is the first CP-ABPRE scheme based on the learning with errors assumption.
引用
收藏
页数:19
相关论文
共 32 条
[1]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
[2]   Generating Shorter Bases for Hard Random Lattices [J].
Alwen, Joel ;
Peikert, Chris .
THEORY OF COMPUTING SYSTEMS, 2011, 48 (03) :535-553
[3]  
[Anonymous], 2019, INT J NETW SECUR
[4]  
[Anonymous], 2010, THESIS
[5]  
Banerjee A., 2013, J INTERNET SERVICES, V3, P38
[6]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[7]   Supporting dynamic updates in storage clouds with the Akl-Taylor scheme [J].
Castiglione, Arcangelo ;
De Santis, Alfredo ;
Masucci, Barbara ;
Palmieri, Francesco ;
Huang, Xinyi ;
Castiglione, Aniello .
INFORMATION SCIENCES, 2017, 387 :56-74
[8]   On the Workflow Satisfiability Problem with Class-Independent Constraints for Hierarchical Organizations [J].
Crampton, Jason ;
Gagarin, Andrei ;
Gutin, Gregory ;
Jones, Mark ;
Wahlstrom, Magnus .
ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2016, 19 (03)
[9]   Secure password-based remote user authentication scheme against smart card security breach [J].
Wang, Ding ;
Ma, Chun-Guang ;
Zhang, Qi-Ming ;
Zhao, Sendong .
Journal of Networks, 2013, 8 (01) :148-155
[10]  
Ding Wang, 2012, Information Computing and Applications. Proceedings of the Third International Conference, ICICA 2012, P181, DOI 10.1007/978-3-642-34062-8_24