Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices
نویسندگان
چکیده
To protect the privacy of cloud data, encryption before uploading provides a solution. However, searching for target data in ciphertext takes effort. Therefore, searchable has become an important research topic. On other hand, since advancement quantum computers will lead to crisis cracking traditional algorithms, it is necessary design schemes that can resist attacks. we propose multi-keyword identity-based proxy re-encryption scheme from lattices. In addition resisting attacks, proposed uses several cryptographic techniques improve efficiency. First, used reduce computation and transmission costs caused by certificates. Second, achieve purpose outsourced computing, allowing server users. Third, provide AND OR operators increase flexibility searchability. Moreover, access structure not based on linear secret sharing (LSSS), avoiding errors LSSS-based decryption or search results. Finally, also give formal security proof under decisional learning with assumption.
منابع مشابه
Proxy Re-encryption from Lattices
We propose a new unidirectional proxy re-encryption scheme based on lattices. Our construction is collusion-safe and does not require any trusted authority for the re-encryption key generation. We extend a recent trapdoor definition for a lattice of Micciancio and Peikert. Our proxy re-encryption scheme is provably CCA-1 secure in the selective model under the standard assumption.
متن کاملProxy Re-encryption from Lattices
We propose a new unidirectional proxy re-encryption scheme based on the hardness of the LWE problem. Our construction is collusionsafe and does not require any trusted authority for the re-encryption key generation. We extend a recent trapdoor definition for a lattice of Micciancio and Peikert. Our proxy re-encryption scheme is provably CCA-1 secure in the selective model under the LWE assumption.
متن کاملIdentity-Based Proxy Re-encryption
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in the public-key setting. In this paper, we address the problem of Identity-Based proxy re-encryption, where ciphertexts are transformed from one identity to another. Our schemes are compatible with curr...
متن کاملMulti-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
Article history: Received 2 September 2010 Received in revised form 29 February 2012 Accepted 4 April 2012 Available online 17 April 2012
متن کاملSearchable Keyword-Based Encryption
To solve the problem of searching on encrypted data, many keyword search schemes have been proposed in recent years. The goal of such schemes is to enable a user to give an untrusted storage server the ability only to test whether an encrypted document contains a few keywords without learning anything else about the document. In this paper, we are concerned with decrypting the searched results ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematics
سال: 2023
ISSN: ['2227-7390']
DOI: https://doi.org/10.3390/math11183830