Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme

被引:5
|
作者
Tang, Yongli [1 ]
Jin, Minglu [1 ]
Meng, Hui [1 ]
Yang, Li [1 ]
Zheng, Chengfu [1 ]
机构
[1] Henan Polytech Univ, Coll Software, Jiaozuo 454000, Peoples R China
关键词
proxy re-encryption; homomorphic signature; learning with errors; re-encryption verifiable;
D O I
10.3390/e25050822
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
There are mostly semi-honest agents in cloud computing, so agents may perform unreliable calculations during the actual execution process. In this paper, an attribute-based verifiable conditional proxy re-encryption (AB-VCPRE) scheme using a homomorphic signature is proposed to solve the problem that the current attribute-based conditional proxy re-encryption (AB-CPRE) algorithm cannot detect the illegal behavior of the agent. The scheme implements robustness, that is the re-encryption ciphertext, can be verified by the verification server, showing that the received ciphertext is correctly converted by the agent from the original ciphertext, thus, meaning that illegal activities of agents can be effectively detected. In addition, the article demonstrates the reliability of the constructed AB-VCPRE scheme validation in the standard model, and proves that the scheme satisfies CPA security in the selective security model based on the learning with errors (LWE) assumption.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] Attribute-based Proxy Re-encryption Method for Revocation in Cloud Data Storage
    Yasumura, Yoshiko
    Imabayashi, Hiroki
    Yamana, Hayato
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 4858 - 4860
  • [32] A new conditional proxy re-encryption scheme based on secret sharing
    Lan, C.-H. (lanzhourm@163.com), 1600, Science Press (36):
  • [33] Certificateless Threshold-Based Conditional Proxy Re-Encryption Scheme
    Li Z.
    Zhang L.
    Zhao H.
    Wei Z.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2023, 46 (01): : 44 - 49+83
  • [34] Time-based attribute-based proxy re-encryption with decryption key update
    Zhao, Feixiang
    Weng, Jian
    Xie, Wenli
    Hou, Lin
    Li, Ming
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (12) : 4099 - 4129
  • [35] Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services
    Hou, Jinqiu
    Peng, Changgen
    Tan, Weijie
    Ding, Hongfa
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 138 (01): : 917 - 938
  • [36] Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating
    Naruse, Takeru
    Mohri, Masami
    Shiraishi, Yoshiaki
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2015, 5
  • [37] Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds
    Ge, Chunpeng
    Susilo, Willy
    Liu, Zhe
    Baek, Joonsang
    Luo, Xiapu
    Fang, Liming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (02) : 949 - 960
  • [38] Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption
    Feng, Xinyu
    Li, Cong
    Li, Dan
    Fang, Yuejian
    Shen, Qingni
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 192 - 204
  • [39] Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs
    Zengpeng Li
    Vishal Sharma
    Chunguang Ma
    Chunpeng Ge
    Willy Susilo
    Science China Information Sciences, 2021, 64
  • [40] A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles
    Ge, Chunpeng
    Susilo, Willy
    Wang, Jiandong
    Huang, Zhiqiu
    Fang, Liming
    Ren, Yongjun
    COMPUTER JOURNAL, 2016, 59 (07): : 970 - 982