Resplittable threshold multi-broker proxy re-encryption scheme from lattices
Papers|更新时间:2024-06-05
|
Resplittable threshold multi-broker proxy re-encryption scheme from lattices
Journal on CommunicationsVol. 38, Issue 5, Pages: 157-164(2017)
作者机构:
1. 哈尔滨工程大学计算机科学与技术学院,黑龙江 哈尔滨 150001
2. 中国科学院信息工程研究所信息安全国家重点实验室,北京 100093
作者简介:
基金信息:
The National Natural Science Foundation of China(61472097);Specialized Research Fund for the Doctoral Program of Higher Education(20132304110017);The Open Fund of the State Key Lab of Information Security(2016-MS-10)
Two different encryption schemes and Lagrange polynomial were used to construct a resplittable threshold multi-broker proxy re-encryption scheme on the lattice
namely the encryption in the ciphertext input and output side was different from the encryption in the re-encryption side which make the bound of noise was more relaxed.Threshold multi proxy not only ensure the safety of re-encryption key
but also ensure re-encryption scheme can still work even if the individual proxy could not provide normal services.The scheme is proven IND-UniRTPRE-CPA secure.
关键词
Keywords
references
BLAZE M , BLEUMER G , STRAUSS M . Divertible protocols and atomic proxy cryptography [C ] // Advances in Cryptology — EUROCRYPT . 1998 : 127 - 144 .
XAGAWA K . Cryptography with lattices [D ] . Tokyo:Tokyo Institute of Technology , 2010 .
AONO Y , BOYEN X , PHONG T L , et al . Key-private proxy re-encryption under LWE [C ] // Progress in Cryptology -INDOCRYPT . 2013 : 1 - 18 .
SINGH K , PANDU R C , BANERJEE A K . Cryptanalysis of unidirectional proxy re-encryption scheme [C ] // Information and Communication Technology . 2014 : 564 - 575 .
NISHIMAK R , XAGAWA K . Key-private proxy re-encryption from lattices,revisited [J ] . IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences , 2015 ,E98-A( 1 ): 100 - 116 .
JIANG M M , HU Y P , WANG B C , et al . Lattice-based multi-use unidirectional proxy re-encryption [J ] . Security and Communication Networks , 2015 , 8 ( 18 ): 3796 - 3803 .
KIRSHANOVA E , . Proxy re-encryption from lattices [C ] // Public-Key Cryptography–PKC . 2014 : 77 - 94 .
ZHOU T P , YANG H B , YANG X Y , et al . A fully homomorphic proxy re-encryption scheme based on LWE [J ] . Journal of Sichuan University (Engineering Science Edition) , 2016 , 48 ( 1 ): 99 - 105 .
SINGH K C , RANGAN P , BANERJEE A K . Lattice based identity based unidirectional proxy re-encryption scheme [C ] // Security,Privacy,and Applied Cryptography Engineering . 2014 : 76 - 91 .
SU M , LI G Z , XIE R N , et al . Multi-element based on proxy re-encryption scheme for mobile cloud computing [J ] . Journal on Communications , 2015 , 36 ( 11 ): 73 - 79 .
REGEV O , . On lattices,learning with errors,random linear codes,and cryptography [C ] // The 37th annual ACM Symposium on Theory of Computing . 2005 : 84 - 93 .
LINDNER R , PEIKERT C . Better key sizes (and attacks) for LWE-based encryption [C ] // Topics in Cryptology–CT-RSA . 2011 : 319 - 339 .
GENTRY C , HALEVI S , VAIKUNTANATHAN V . A simple BGN-type cryptosystem from LWE [C ] // Advances in Cryptology–Eurocrypt . 2010 : 506 - 522 .
DESMEDT Y , YAIR F Y . Threshold cryptosystems [C ] // Proceedings of Advances in Cryptology-CRYPTO . 1989 : 307 - 315 .
HANAOKA G , KAWAI Y , KUNIHIRO N , et al . Generic construction of chosen ciphertext secure proxy re-encryption [C ] // Cryptographers’ Track at the RSA Conference . 2012 : 349 - 364 .
SINGH K C , RANGAN P , BANERJEE A K . Lattice-based identity-based resplittable threshold public key encryption scheme [J ] . International Journal of Computer Mathematics , 2016 , 93 ( 2 ): 289 - 307 .
LOU S M , CAO Z F . Identity-based proxy re-encryption with threshold multi-proxy [J ] . Journal of Natural Science of Heilongjiang University , 2010 , 27 ( 2 ): 151 - 156 .
GENTRY C , SAHAIY A , WATERS B . Homomorphic encryption from learning with errors:conceptually-simpler,asymptotically-faster,Attribute-based [C ] // Advances in Cryptology-Crypto . 2013 : 75 - 92 .