A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU

Journal of Information Security and Applications - Tập 78 - Trang 103604 - 2023
Nan Yang1,2,3, Youliang Tian1,3, Zhou Zhou1,3, Qijia Zhang1,3
1State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, 550025, Guizhou, China
2School of Mathematics and Statistics, Qiannan Normal University for Nationalities, Duyun 558000, Guizhou, China
3Guizhou Provincial Key Laboratory of Cryptography and Blockchain Technology, Guiyang 550025, Guizhou, China

Tài liệu tham khảo

Xu, 2016, Conditional identity-based broadcast proxy re-encryption and its application to cloud email, IEEE Trans Comput, 65, 66, 10.1109/TC.2015.2417544 Kan, 2021, An identity-based proxy re-encryption for data deduplication in cloud, J Syst Archit, 121, 10.1016/j.sysarc.2021.102332 Agyekum, 2022, A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain, IEEE Syst J, 16, 1685, 10.1109/JSYST.2021.3076759 Li, 2022, Proxy re-encryption with equality test for secure data sharing in internet of things-based healthcare systems, Trans Emerg Telecommun Technol, 33 Liu, 2020, TCEMD: A trust cascading-based emergency message dissemination model in VANETs, IEEE Internet Things J, 7, 4028, 10.1109/JIOT.2019.2957520 Gentry, 2008, Trapdoors for hard lattices and new cryptographic constructions, 197 Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography. In: Advances in cryptology - EUROCRYPT ’98, international conference on the theory and application of cryptographic techniques, Espoo, Finland, May 31 - June 4, 1998 Proceeding, 1403: 127-144. http://dx.doi.org/10.1007/BFb0054122. Ivan A, Dodis Y. Proxy cryptography revisited. In: Proceedings of the network and distributed system security symposium, NDSS 2003, San Diego, California, USA. https://www.ndss-symposium.org/ndss2003/proxy-cryptography-revisited. Ateniese, 2006, Improved proxy re-encryption schemes with applications to secure distributed storage, ACM Trans Inf Syst Secur, 9, 1, 10.1145/1127345.1127346 Libert B, Vergnaud D. Unidirectional chosen-ciphertext secure proxy re-encryption. In: Public key cryptography - PKC 2008, 11th international workshop on practice and theory in public-key cryptogra- phy, Barcelona, Spain, March 9-12, 2008 Proceedings, 4939: 360-379. http://dx.doi.org/10.1007/978-3-540-78440-1_21. Shao J, Cao Z. Cca-secure proxy re-encryption without pairings. In: Public key cryptography - PKC 2009, 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18-20, 2009 Proceedings, 5443: 357-376. http://dx.doi.org/10.1007/978-3-642-00468-1_20. Shor, 1997, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM J Comput, 26, 1484, 10.1137/S0097539795293172 Xagawa, 2010 Aono Y, Boyen X, Phong LT et al. Key-private proxy re-encryption under LWE. In: Progress in cryptology - INDOCRYPT 2013-14th international conference on cryptology in India, Mumbai, India, December 7-10, 2013 Proceedings, 8250: 1-18. http://dx.doi.org/10.1007/978-3-319-03515-4_1. Singh K, Rangan CP, Banerjee AK. Cryptanalysis of unidirectional proxy re-encryption scheme. In: Information and communication technology - second IFIP TC5/8 international conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014 Proceedings, 8407: 564-575. http://dx.doi.org/10.1007/978-3-642-55032-4_58. Wang, 2020, Improved collusion-resistant unidirectional proxy re-encryption scheme from lattice, IET Inf Secur, 14, 342, 10.1049/iet-ifs.2018.5246 Hou, 2019, Efficient identity-based multi-bit proxy re-encryption over lattice in the standard model, J Inf Secur Appl, 47, 329 Dutta, 2021, Collusion-resistant identity-based proxy re-encryption: Lattice-based constructions in standard model, Theoret Comput Sci, 871, 16, 10.1016/j.tcs.2021.04.008 Liang X, Weng J, Yang A et al. Attribute-based conditional proxy re-encryption in the standard model under LWE. In: Computer security - ESORICS 2021-26th european symposium on research in computer security, Darmstadt, Germany, October 4-8, 2021 Proceedings, Part II, 12973: 147-168. http://dx.doi.org/10.1007/978-3-030-88428-4_8. Hoffstein J, Pipher J, Silverman JH. NTRU: A ring-based public key cryptosystem. In: Algorithmic number theory, third international symposium, ANTS-III, Portland, Oregon, USA, June 21-25, 1998 Proceedings, 1423: 267-288. http://dx.doi.org/10.1007/BFb0054868. Stehlé D, Steinfeld R. Making NTRU as secure as worst-case problems over ideal lattices. In: Advances in cryptology - EUROCRYPT 2011-30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15-19, 2011 Proceedings, 6632: 27-47. http://dx.doi.org/10.1007/978-3-642-20465-4_4. Stehlé, 2013, Making ntruencrypt and ntrusign as secure as standard worst-case problems over ideal lattices, IACR Cryptol ePrint Arch, 4 Nuñez, 2015, Ntrureencrypt: An efficient proxy re-encryption scheme based on NTRU, 179 Seck M, Sow D. Bi-ntru encryption schemes: Two new secure variants of ntru. In: Algebra, codes and cryptology: first international conference, A2C 2019 in honor of prof mamadou sanghare, Dakar, Senegal, December 5–7, 2019 Proceedings 1, pp. 216–235. http://dx.doi.org/10.1007/978-3-030-36237-9_13. Wang, 2021, Ntru-type proxy re-encryption scheme based on rlwe difficult assumption (in chinese), J Cryptol Res, 8, 909