Lattice-based Fuzzy Conditional Proxy Re-encryption

被引:2
|
作者
Li, BaoHong [1 ]
Xu, JieFei [1 ]
Liu, YanZhi [1 ]
机构
[1] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian, Shaanxi, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2019年 / 20卷 / 05期
关键词
Proxy re-encryption; Lattice-based cryptography; Fine-grained control; Decryption delegation;
D O I
10.3966/160792642019092005006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As an extension to conditional proxy re-encryption, fuzzy conditional proxy re-encryption allows for a proxy to re-encrypt a ciphertext only if it satisfies some t-out-of-d threshold condition. Therefore, it is more desirable in some applications where fine-grained control of the decryption delegation is required. In this paper, we construct the first lattice-based fuzzy conditional proxy re-encryption scheme as a post-quantum alternative to this primitive. In our construction, original ciphertexts and re-encryption ciphertexts have the same form, thus only one decryption algorithm is needed for both kinds of ciphertexts. We formalize its security model and prove that it is selective secure under the LWE assumption.
引用
收藏
页码:1379 / 1385
页数:7
相关论文
共 50 条
  • [1] A Lattice-based Unidirectional Proxy Re-encryption
    Wang, Lewei
    Jiang, Mingming
    Guo, Yuyan
    Ge, Hui
    International Journal of Network Security, 2024, 26 (04) : 598 - 604
  • [2] Lattice-based unidirectional Proxy Re-Encryption and Proxy Re-Encryption+ schemes
    Singh, Kunwar
    Rangan, C. Pandu
    Sheshank, Samir
    Agrawal, Richa
    IET INFORMATION SECURITY, 2021, 15 (01) : 1 - 12
  • [3] Fuzzy conditional proxy re-encryption
    Fang LiMing
    Wang JianDong
    Ge ChunPeng
    Ren YongJun
    SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (05) : 1 - 13
  • [4] Fuzzy conditional proxy re-encryption
    FANG LiMing
    WANG JianDong
    GE ChunPeng
    REN YongJun
    ScienceChina(InformationSciences), 2013, 56 (05) : 211 - 223
  • [5] Fuzzy conditional proxy re-encryption
    LiMing Fang
    JianDong Wang
    ChunPeng Ge
    YongJun Ren
    Science China Information Sciences, 2013, 56 : 1 - 13
  • [6] Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability
    Wang, Xiaolei
    Wang, Yang
    Wang, Mingqiang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 535 - 544
  • [7] Lattice-based autonomous path proxy re-encryption in the standard model
    Wenli XIE
    Jian WENG
    Yao TONG
    Xiaojian LIANG
    Lisha YAO
    Feixiang ZHAO
    Science China(Information Sciences), 2023, 66 (10) : 184 - 195
  • [8] Lattice-based multi-use unidirectional proxy re-encryption
    Jiang, M. M.
    Hu, Y. P.
    Wang, B. C.
    Wang, F. H.
    Lai, Q. Q.
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3796 - 3803
  • [9] Lattice-based autonomous path proxy re-encryption in the standard model
    Xie, Wenli
    Weng, Jian
    Tong, Yao
    Liang, Xiaojian
    Yao, Lisha
    Zhao, Feixiang
    SCIENCE CHINA-INFORMATION SCIENCES, 2023, 66 (10)
  • [10] Lattice-based obfuscation for re-encryption functions
    Cheng, Rong
    Zhang, Fangguo
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (09) : 1648 - 1658