浏览全部资源
扫码关注微信
1. 哈尔滨工程大学计算机科学与技术学院,黑龙江 哈尔滨 150001
2. 中国科学院信息工程研究所信息安全国家重点实验室,北京 100093
[ "李菊雁(1983-),男,黑龙江虎林人,哈尔滨工程大学博士生,主要研究方向为密码学、网络与信息安全。" ]
[ "马春光(1974-),男,黑龙江双鸭山人,哈尔滨工程大学教授、博士生导师,主要研究方向为密码学、网络与信息安全。" ]
[ "赵乾(1993-),女,黑龙江双鸭山人,哈尔滨工程大学硕士生,主要研究方向为密码学、网络与信息安全。" ]
网络出版日期:2017-05,
纸质出版日期:2017-05-25
移动端阅览
李菊雁, 马春光, 赵乾. 格上可重新拆分的门限多代理者的代理重加密方案[J]. 通信学报, 2017,38(5):157-164.
Ju-yan LI, Chun-guang MA, Qian ZHAO. Resplittable threshold multi-broker proxy re-encryption scheme from lattices[J]. Journal on communications, 2017, 38(5): 157-164.
李菊雁, 马春光, 赵乾. 格上可重新拆分的门限多代理者的代理重加密方案[J]. 通信学报, 2017,38(5):157-164. DOI: 10.11959/j.issn.1000-436x.2017109.
Ju-yan LI, Chun-guang MA, Qian ZHAO. Resplittable threshold multi-broker proxy re-encryption scheme from lattices[J]. Journal on communications, 2017, 38(5): 157-164. DOI: 10.11959/j.issn.1000-436x.2017109.
在格上利用2个不同的加密方案及拉格朗日插值多项构造了一个可重新拆分的门限多代理者的代理重加密方案,即在密文输入输出面与重加密面的加密方案是不同的,这使噪音的界有更宽的选择范围。另外,门限多代理者不仅保证了重加密密钥的安全性,而且当个别代理不能提供正常服务时,重加密方案仍能正确工作。该方案证明是IND-UniRTPRE-CPA安全的。
Two different encryption schemes and Lagrange polynomial were used to construct a resplittable threshold multi-broker proxy re-encryption scheme on the lattice
namely the encryption in the ciphertext input and output side was different from the encryption in the re-encryption side which make the bound of noise was more relaxed.Threshold multi proxy not only ensure the safety of re-encryption key
but also ensure re-encryption scheme can still work even if the individual proxy could not provide normal services.The scheme is proven IND-UniRTPRE-CPA secure.
BLAZE M , BLEUMER G , STRAUSS M . Divertible protocols and atomic proxy cryptography [C ] // Advances in Cryptology — EUROCRYPT . 1998 : 127 - 144 .
XAGAWA K . Cryptography with lattices [D ] . Tokyo:Tokyo Institute of Technology , 2010 .
AONO Y , BOYEN X , PHONG T L , et al . Key-private proxy re-encryption under LWE [C ] // Progress in Cryptology -INDOCRYPT . 2013 : 1 - 18 .
SINGH K , PANDU R C , BANERJEE A K . Cryptanalysis of unidirectional proxy re-encryption scheme [C ] // Information and Communication Technology . 2014 : 564 - 575 .
NISHIMAK R , XAGAWA K . Key-private proxy re-encryption from lattices,revisited [J ] . IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences , 2015 ,E98-A( 1 ): 100 - 116 .
JIANG M M , HU Y P , WANG B C , et al . Lattice-based multi-use unidirectional proxy re-encryption [J ] . Security and Communication Networks , 2015 , 8 ( 18 ): 3796 - 3803 .
KIRSHANOVA E , . Proxy re-encryption from lattices [C ] // Public-Key Cryptography–PKC . 2014 : 77 - 94 .
周潭平 , 杨海滨 , 杨晓元 , 等 . 一个全同态代理加密方案 [J ] . 四川大学学报(工程科学版) , 2016 , 48 ( 1 ): 99 - 105 .
ZHOU T P , YANG H B , YANG X Y , et al . A fully homomorphic proxy re-encryption scheme based on LWE [J ] . Journal of Sichuan University (Engineering Science Edition) , 2016 , 48 ( 1 ): 99 - 105 .
SINGH K C , RANGAN P , BANERJEE A K . Lattice based identity based unidirectional proxy re-encryption scheme [C ] // Security,Privacy,and Applied Cryptography Engineering . 2014 : 76 - 91 .
苏铓 , 历国振 , 谢荣娜 , 等 . 面向移动云计算的多要素代理重加密方案 [J ] . 通信学报 , 2015 , 36 ( 11 ): 73 - 79 .
SU M , LI G Z , XIE R N , et al . Multi-element based on proxy re-encryption scheme for mobile cloud computing [J ] . Journal on Communications , 2015 , 36 ( 11 ): 73 - 79 .
REGEV O , . On lattices,learning with errors,random linear codes,and cryptography [C ] // The 37th annual ACM Symposium on Theory of Computing . 2005 : 84 - 93 .
LINDNER R , PEIKERT C . Better key sizes (and attacks) for LWE-based encryption [C ] // Topics in Cryptology–CT-RSA . 2011 : 319 - 339 .
GENTRY C , HALEVI S , VAIKUNTANATHAN V . A simple BGN-type cryptosystem from LWE [C ] // Advances in Cryptology–Eurocrypt . 2010 : 506 - 522 .
DESMEDT Y , YAIR F Y . Threshold cryptosystems [C ] // Proceedings of Advances in Cryptology-CRYPTO . 1989 : 307 - 315 .
HANAOKA G , KAWAI Y , KUNIHIRO N , et al . Generic construction of chosen ciphertext secure proxy re-encryption [C ] // Cryptographers’ Track at the RSA Conference . 2012 : 349 - 364 .
SINGH K C , RANGAN P , BANERJEE A K . Lattice-based identity-based resplittable threshold public key encryption scheme [J ] . International Journal of Computer Mathematics , 2016 , 93 ( 2 ): 289 - 307 .
楼圣铭 , 曹珍富 . 基于身份的门限多代理者的代理重加密方案 [J ] . 黑龙江大学自然科学学报 , 2010 , 27 ( 2 ): 151 - 156 .
LOU S M , CAO Z F . Identity-based proxy re-encryption with threshold multi-proxy [J ] . Journal of Natural Science of Heilongjiang University , 2010 , 27 ( 2 ): 151 - 156 .
GENTRY C , SAHAIY A , WATERS B . Homomorphic encryption from learning with errors:conceptually-simpler,asymptotically-faster,Attribute-based [C ] // Advances in Cryptology-Crypto . 2013 : 75 - 92 .
0
浏览量
1774
下载量
1
CSCD
关联资源
相关文章
相关作者
相关机构