z-logo
open-access-imgOpen Access
Improved collusion‐resistant unidirectional proxy re‐encryption scheme from lattice
Author(s) -
Wang Xuyang,
Hu Aiqun,
Fang Hao
Publication year - 2020
Publication title -
iet information security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 34
eISSN - 1751-8717
pISSN - 1751-8709
DOI - 10.1049/iet-ifs.2018.5246
Subject(s) - proxy re encryption , collusion , ciphertext , computer science , plaintext , computer security , encryption , plaintext aware encryption , proxy (statistics) , computer network , theoretical computer science , attribute based encryption , public key cryptography , business , industrial organization , machine learning
Proxy re‐encryption (PRE) is a promising cryptographic structure for pervasive data sharing in cloud‐based social networks, which enables a semi‐trusted proxy to convert a ciphertext for Alice into a ciphertext for Bob without seeing the corresponding plaintext. Since the proxy is semi‐trust, a PRE scheme which can resist the collusion attack will be of great practical value. Jiang et al . in 2015 and Kim and Jeong in 2016 have proposed collusion‐resistant PRE (CR‐PRE) schemes from the lattice by a similar technique, respectively. However, through the analysis of their schemes, the authors find that both of them have defects in the construction of the re‐encryption key, which will lead to the re‐encryption ciphertext cannot be decrypted or decrypted error with high probability. In this study, the authors first point out the defects in the work of Jiang et al . 's work and Kim and Jeong's work and propose an improved collusion‐resistant unidirectional PRE scheme from lattice, based on learning with errors problems. In addition to solving the defects, CR‐PRE still has many useful properties similar to the previous schemes, such as unidirectional, collusion resistant, chosen‐plaintext attack secure and so on.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here