Paper
11 October 2023 Collusion resistant identity-based proxy re-encryption scheme on lattice
Xiaohong Deng, Hua Xie, Weizhi Xiong
Author Affiliations +
Proceedings Volume 12800, Sixth International Conference on Computer Information Science and Application Technology (CISAT 2023); 128001N (2023) https://doi.org/10.1117/12.3004124
Event: 6th International Conference on Computer Information Science and Application Technology (CISAT 2023), 2023, Hangzhou, China
Abstract
Proxy re-encryption plays an important role for data security in cloud computing and big data, but the traditional re-encryption scheme based on the classical number theory problem cannot resist quantum attack, and the lattice-based cryptosystem has been proved to have the ability to resist quantum attack, so the lattice-based re-encryption scheme has always been a research hotspot. In view of the problem that collusion-resistance and multi-hop cannot be satisfied at the same time in existing schemes, this paper proposes a new identity-based proxy re-encryption scheme on lattice. Firstly, the scheme uses trapdoors as private keys to achieve one-way anti-collusion. In addition, we construct a variant of Learning with Errors (LWE), which uses a convert algorithm to transform the user matrix and replace the vector with a uniform matrix, so that the scheme can meet the requirements of multi-hop and encrypt multiple bits of messages at one time. Theoretical analysis and experimental simulation prove that the security of the new scheme can be reduced to a decision LWE problem, which can reach the IND-sID-CPA security in the standard model and can improve the encryption efficiency while ensuring the security.
(2023) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Xiaohong Deng, Hua Xie, and Weizhi Xiong "Collusion resistant identity-based proxy re-encryption scheme on lattice", Proc. SPIE 12800, Sixth International Conference on Computer Information Science and Application Technology (CISAT 2023), 128001N (11 October 2023); https://doi.org/10.1117/12.3004124
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer security

Quantum security

Resistance

Quantum encryption

Symmetric-key encryption

Cloud computing

Quantum computing

Back to Top