Abstract
Proxy re-encryption (PRE) allows a semi-trusted proxy to turn Alice’s ciphertexts into Bob’s ciphertexts, however, the proxy cannot get the corresponding plaintexts. Because of the special property, PRE achieves good reliability and secrecy. Nevertheless, most of the proposed proxy re-encryption schemes are based on the number theoretic problem and their security are proved in the random oracle. Therefore, this paper constructs an efficient and novel identity-based multi-bit PRE scheme based on the learning with errors (LWE) assumption and can resist to quantum attack. What’s more, it is proved to be CPA secure in the standard model and has the properties of multi-use and bidirectional.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288–306. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-72738-5_19
Xu, P., Jiao, T., Wu, Q., et al.: Conditional identity-based broadcast proxy re-encryption and its application to cloud email. IEEE Trans. Comput. 65(1), 66–79 (2016)
Zhou, Y., Deng, H., Wu, Q., et al.: Identity-based proxy re-encryption version 2: making mobile access easy in cloud. Future Gener. Comput. Syst. 62, 128–139 (2016)
Ming-Fu, L.I., Chen, L.W.: A secure cloud data sharing scheme from identity-based proxy re-encryption. Nat. Sci. J. Xiangtan Univ. 39(03), 75–79 (2017)
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054122
Xagawa K.: Cryptography with lattices. Department of Mathematical and Computing Sciences, Tokyo Institute of Technology, Tokyo (2010)
Aono, Y., Boyen, X., Le, T.P., et al.: Key-private proxy re-encryption under LWE (2013)
Singh, K., Rangan, C.P., Banerjee, A.K.: Lattice based identity based unidirectional proxy re-encryption scheme. In: Chakraborty, R.S., Matyas, V., Schaumont, P. (eds.) SPACE 2014. LNCS, vol. 8804, pp. 76–91. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-12060-7_6
Yin, W., Wen, Q., Li, W., et al.: Identity based proxy re-encryption scheme under LWE. KSII Trans. Internet Inf. Syst. 11(12), 6116–6132 (2017)
Gentry, C., Peikert, C., Vaikuntanathan, V.: How to use a short basis: trapdoors for hard lattices and new cryptographic constructions. In: STOC 2008, vol. 14, no. 133, pp. 197–206. ACM (2010). https://doi.org/10.1145/1374376.1374407
Howe, J., Khalid, A., Rafferty, C., et al.: On practical discrete gaussian samplers for lattice-based cryptography. IEEE Trans. Comput. PP(99), 322–334 (2018)
Albrecht, M.R.: On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10211, pp. 103–129. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-56614-6_4
Jiang, M.M., Hu, Y.P., Wang, B.C., et al.: Lattice-based unidirectional proxy re-encryption. Secur. Commun. Netw. 8(18), 3796–3803 (2016)
Gentry, C., Halevi, S., Vaikuntanathan, V.: A simple BGN-type cryptosystem from LWE. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 506–522. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_26
Acknowledgement
We really acknowledge the financial support the Nature Science Foundation of Anhui Higher Education Institutions No. KJ2016A027, No. KJ2017ZD032, No. KJ2018A0398, Anhui Provincial Natural Science Foundation of China, No. 1708085QF154.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Hou, J., Jiang, M., Guo, Y., Song, W. (2018). Identity-Based Multi-bit Proxy Re-encryption Over Lattice in the Standard Model. In: Li, F., Takagi, T., Xu, C., Zhang, X. (eds) Frontiers in Cyber Security. FCS 2018. Communications in Computer and Information Science, vol 879. Springer, Singapore. https://doi.org/10.1007/978-981-13-3095-7_9
Download citation
DOI: https://doi.org/10.1007/978-981-13-3095-7_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3094-0
Online ISBN: 978-981-13-3095-7
eBook Packages: Computer ScienceComputer Science (R0)