A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU
Tài liệu tham khảo
Xu, 2016, Conditional identity-based broadcast proxy re-encryption and its application to cloud email, IEEE Trans Comput, 65, 66, 10.1109/TC.2015.2417544
Kan, 2021, An identity-based proxy re-encryption for data deduplication in cloud, J Syst Archit, 121, 10.1016/j.sysarc.2021.102332
Agyekum, 2022, A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain, IEEE Syst J, 16, 1685, 10.1109/JSYST.2021.3076759
Li, 2022, Proxy re-encryption with equality test for secure data sharing in internet of things-based healthcare systems, Trans Emerg Telecommun Technol, 33
Liu, 2020, TCEMD: A trust cascading-based emergency message dissemination model in VANETs, IEEE Internet Things J, 7, 4028, 10.1109/JIOT.2019.2957520
Gentry, 2008, Trapdoors for hard lattices and new cryptographic constructions, 197
Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography. In: Advances in cryptology - EUROCRYPT ’98, international conference on the theory and application of cryptographic techniques, Espoo, Finland, May 31 - June 4, 1998 Proceeding, 1403: 127-144. http://dx.doi.org/10.1007/BFb0054122.
Ivan A, Dodis Y. Proxy cryptography revisited. In: Proceedings of the network and distributed system security symposium, NDSS 2003, San Diego, California, USA. https://www.ndss-symposium.org/ndss2003/proxy-cryptography-revisited.
Ateniese, 2006, Improved proxy re-encryption schemes with applications to secure distributed storage, ACM Trans Inf Syst Secur, 9, 1, 10.1145/1127345.1127346
Libert B, Vergnaud D. Unidirectional chosen-ciphertext secure proxy re-encryption. In: Public key cryptography - PKC 2008, 11th international workshop on practice and theory in public-key cryptogra- phy, Barcelona, Spain, March 9-12, 2008 Proceedings, 4939: 360-379. http://dx.doi.org/10.1007/978-3-540-78440-1_21.
Shao J, Cao Z. Cca-secure proxy re-encryption without pairings. In: Public key cryptography - PKC 2009, 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18-20, 2009 Proceedings, 5443: 357-376. http://dx.doi.org/10.1007/978-3-642-00468-1_20.
Shor, 1997, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM J Comput, 26, 1484, 10.1137/S0097539795293172
Xagawa, 2010
Aono Y, Boyen X, Phong LT et al. Key-private proxy re-encryption under LWE. In: Progress in cryptology - INDOCRYPT 2013-14th international conference on cryptology in India, Mumbai, India, December 7-10, 2013 Proceedings, 8250: 1-18. http://dx.doi.org/10.1007/978-3-319-03515-4_1.
Singh K, Rangan CP, Banerjee AK. Cryptanalysis of unidirectional proxy re-encryption scheme. In: Information and communication technology - second IFIP TC5/8 international conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014 Proceedings, 8407: 564-575. http://dx.doi.org/10.1007/978-3-642-55032-4_58.
Wang, 2020, Improved collusion-resistant unidirectional proxy re-encryption scheme from lattice, IET Inf Secur, 14, 342, 10.1049/iet-ifs.2018.5246
Hou, 2019, Efficient identity-based multi-bit proxy re-encryption over lattice in the standard model, J Inf Secur Appl, 47, 329
Dutta, 2021, Collusion-resistant identity-based proxy re-encryption: Lattice-based constructions in standard model, Theoret Comput Sci, 871, 16, 10.1016/j.tcs.2021.04.008
Liang X, Weng J, Yang A et al. Attribute-based conditional proxy re-encryption in the standard model under LWE. In: Computer security - ESORICS 2021-26th european symposium on research in computer security, Darmstadt, Germany, October 4-8, 2021 Proceedings, Part II, 12973: 147-168. http://dx.doi.org/10.1007/978-3-030-88428-4_8.
Hoffstein J, Pipher J, Silverman JH. NTRU: A ring-based public key cryptosystem. In: Algorithmic number theory, third international symposium, ANTS-III, Portland, Oregon, USA, June 21-25, 1998 Proceedings, 1423: 267-288. http://dx.doi.org/10.1007/BFb0054868.
Stehlé D, Steinfeld R. Making NTRU as secure as worst-case problems over ideal lattices. In: Advances in cryptology - EUROCRYPT 2011-30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15-19, 2011 Proceedings, 6632: 27-47. http://dx.doi.org/10.1007/978-3-642-20465-4_4.
Stehlé, 2013, Making ntruencrypt and ntrusign as secure as standard worst-case problems over ideal lattices, IACR Cryptol ePrint Arch, 4
Nuñez, 2015, Ntrureencrypt: An efficient proxy re-encryption scheme based on NTRU, 179
Seck M, Sow D. Bi-ntru encryption schemes: Two new secure variants of ntru. In: Algebra, codes and cryptology: first international conference, A2C 2019 in honor of prof mamadou sanghare, Dakar, Senegal, December 5–7, 2019 Proceedings 1, pp. 216–235. http://dx.doi.org/10.1007/978-3-030-36237-9_13.
Wang, 2021, Ntru-type proxy re-encryption scheme based on rlwe difficult assumption (in chinese), J Cryptol Res, 8, 909