Skip to main content

Identity-Based Multi-bit Proxy Re-encryption Over Lattice in the Standard Model

  • Conference paper
  • First Online:
Frontiers in Cyber Security (FCS 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 879))

Included in the following conference series:

Abstract

Proxy re-encryption (PRE) allows a semi-trusted proxy to turn Alice’s ciphertexts into Bob’s ciphertexts, however, the proxy cannot get the corresponding plaintexts. Because of the special property, PRE achieves good reliability and secrecy. Nevertheless, most of the proposed proxy re-encryption schemes are based on the number theoretic problem and their security are proved in the random oracle. Therefore, this paper constructs an efficient and novel identity-based multi-bit PRE scheme based on the learning with errors (LWE) assumption and can resist to quantum attack. What’s more, it is proved to be CPA secure in the standard model and has the properties of multi-use and bidirectional.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288–306. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-72738-5_19

    Chapter  Google Scholar 

  2. Xu, P., Jiao, T., Wu, Q., et al.: Conditional identity-based broadcast proxy re-encryption and its application to cloud email. IEEE Trans. Comput. 65(1), 66–79 (2016)

    Article  MathSciNet  Google Scholar 

  3. Zhou, Y., Deng, H., Wu, Q., et al.: Identity-based proxy re-encryption version 2: making mobile access easy in cloud. Future Gener. Comput. Syst. 62, 128–139 (2016)

    Article  Google Scholar 

  4. Ming-Fu, L.I., Chen, L.W.: A secure cloud data sharing scheme from identity-based proxy re-encryption. Nat. Sci. J. Xiangtan Univ. 39(03), 75–79 (2017)

    MATH  Google Scholar 

  5. Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054122

    Chapter  Google Scholar 

  6. Xagawa K.: Cryptography with lattices. Department of Mathematical and Computing Sciences, Tokyo Institute of Technology, Tokyo (2010)

    Google Scholar 

  7. Aono, Y., Boyen, X., Le, T.P., et al.: Key-private proxy re-encryption under LWE (2013)

    Google Scholar 

  8. Singh, K., Rangan, C.P., Banerjee, A.K.: Lattice based identity based unidirectional proxy re-encryption scheme. In: Chakraborty, R.S., Matyas, V., Schaumont, P. (eds.) SPACE 2014. LNCS, vol. 8804, pp. 76–91. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-12060-7_6

    Chapter  Google Scholar 

  9. Yin, W., Wen, Q., Li, W., et al.: Identity based proxy re-encryption scheme under LWE. KSII Trans. Internet Inf. Syst. 11(12), 6116–6132 (2017)

    Google Scholar 

  10. Gentry, C., Peikert, C., Vaikuntanathan, V.: How to use a short basis: trapdoors for hard lattices and new cryptographic constructions. In: STOC 2008, vol. 14, no. 133, pp. 197–206. ACM (2010). https://doi.org/10.1145/1374376.1374407

  11. Howe, J., Khalid, A., Rafferty, C., et al.: On practical discrete gaussian samplers for lattice-based cryptography. IEEE Trans. Comput. PP(99), 322–334 (2018)

    Article  MathSciNet  Google Scholar 

  12. Albrecht, M.R.: On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10211, pp. 103–129. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-56614-6_4

    Chapter  Google Scholar 

  13. Jiang, M.M., Hu, Y.P., Wang, B.C., et al.: Lattice-based unidirectional proxy re-encryption. Secur. Commun. Netw. 8(18), 3796–3803 (2016)

    Article  Google Scholar 

  14. Gentry, C., Halevi, S., Vaikuntanathan, V.: A simple BGN-type cryptosystem from LWE. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 506–522. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_26

    Chapter  Google Scholar 

Download references

Acknowledgement

We really acknowledge the financial support the Nature Science Foundation of Anhui Higher Education Institutions No. KJ2016A027, No. KJ2017ZD032, No. KJ2018A0398, Anhui Provincial Natural Science Foundation of China, No. 1708085QF154.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mingming Jiang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hou, J., Jiang, M., Guo, Y., Song, W. (2018). Identity-Based Multi-bit Proxy Re-encryption Over Lattice in the Standard Model. In: Li, F., Takagi, T., Xu, C., Zhang, X. (eds) Frontiers in Cyber Security. FCS 2018. Communications in Computer and Information Science, vol 879. Springer, Singapore. https://doi.org/10.1007/978-981-13-3095-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-3095-7_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-3094-0

  • Online ISBN: 978-981-13-3095-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics