Lattice-based Fuzzy Conditional Proxy Re-encryption

被引:2
|
作者
Li, BaoHong [1 ]
Xu, JieFei [1 ]
Liu, YanZhi [1 ]
机构
[1] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian, Shaanxi, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2019年 / 20卷 / 05期
关键词
Proxy re-encryption; Lattice-based cryptography; Fine-grained control; Decryption delegation;
D O I
10.3966/160792642019092005006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As an extension to conditional proxy re-encryption, fuzzy conditional proxy re-encryption allows for a proxy to re-encrypt a ciphertext only if it satisfies some t-out-of-d threshold condition. Therefore, it is more desirable in some applications where fine-grained control of the decryption delegation is required. In this paper, we construct the first lattice-based fuzzy conditional proxy re-encryption scheme as a post-quantum alternative to this primitive. In our construction, original ciphertexts and re-encryption ciphertexts have the same form, thus only one decryption algorithm is needed for both kinds of ciphertexts. We formalize its security model and prove that it is selective secure under the LWE assumption.
引用
收藏
页码:1379 / 1385
页数:7
相关论文
共 50 条
  • [21] Lattice-Based HRA-secure Attribute-Based Proxy Re-Encryption in Standard Model
    Susilo, Willy
    Dutta, Priyanka
    Duong, Dung Hoang
    Roy, Partha Sarathi
    COMPUTER SECURITY - ESORICS 2021, PT II, 2021, 12973 : 169 - 191
  • [22] Anonymous Attribute-Based Conditional Proxy Re-encryption
    Mao, Xianping
    Li, Xuefeng
    Wu, Xiaochuan
    Wang, Chuansheng
    Lai, Junzuo
    NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 95 - 110
  • [23] Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
    Yan, Xixi
    Zhang, Jing
    Cheng, Pengyu
    CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 83 (01): : 1399 - 1414
  • [24] Collusion-resistant identity-based Proxy Re-encryption: Lattice-based constructions in Standard Model
    Dutta, Priyanka
    Susilo, Willy
    Duong, Dung Hoang
    Roy, Partha Sarathi
    THEORETICAL COMPUTER SCIENCE, 2021, 871 : 16 - 29
  • [25] Accelerating Lattice Based Proxy Re-encryption Schemes on GPUs
    Sahu, Gyana
    Rohloff, Kurt
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2020, 2020, 12579 : 613 - 632
  • [26] A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing
    Li, Juyan
    Qiao, Zhiqi
    Zhang, Kejia
    Cui, Chen
    SENSORS, 2021, 21 (01) : 1 - 20
  • [27] Proxy Re-Encryption Based on Homomorphic Encryption
    Bellafqira, Reda
    Coatrieux, Gouenou
    Bouslimi, Dalel
    Quellec, Gwenole
    Cozic, Michel
    33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 154 - 161
  • [28] A new conditional proxy re-encryption scheme based on secret sharing
    Lan, C.-H. (lanzhourm@163.com), 1600, Science Press (36):
  • [29] Certificateless Threshold-Based Conditional Proxy Re-Encryption Scheme
    Li Z.
    Zhang L.
    Zhao H.
    Wei Z.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2023, 46 (01): : 44 - 49+83
  • [30] Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme
    Singh, Kunwar
    Rangan, C. Pandu
    Banerjee, A. K.
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, 2014, 8804 : 76 - +