Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices

نویسندگان

چکیده

To protect the privacy of cloud data, encryption before uploading provides a solution. However, searching for target data in ciphertext takes effort. Therefore, searchable has become an important research topic. On other hand, since advancement quantum computers will lead to crisis cracking traditional algorithms, it is necessary design schemes that can resist attacks. we propose multi-keyword identity-based proxy re-encryption scheme from lattices. In addition resisting attacks, proposed uses several cryptographic techniques improve efficiency. First, used reduce computation and transmission costs caused by certificates. Second, achieve purpose outsourced computing, allowing server users. Third, provide AND OR operators increase flexibility searchability. Moreover, access structure not based on linear secret sharing (LSSS), avoiding errors LSSS-based decryption or search results. Finally, also give formal security proof under decisional learning with assumption.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proxy Re-encryption from Lattices

We propose a new unidirectional proxy re-encryption scheme based on lattices. Our construction is collusion-safe and does not require any trusted authority for the re-encryption key generation. We extend a recent trapdoor definition for a lattice of Micciancio and Peikert. Our proxy re-encryption scheme is provably CCA-1 secure in the selective model under the standard assumption.

متن کامل

Proxy Re-encryption from Lattices

We propose a new unidirectional proxy re-encryption scheme based on the hardness of the LWE problem. Our construction is collusionsafe and does not require any trusted authority for the re-encryption key generation. We extend a recent trapdoor definition for a lattice of Micciancio and Peikert. Our proxy re-encryption scheme is provably CCA-1 secure in the selective model under the LWE assumption.

متن کامل

Identity-Based Proxy Re-encryption

In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in the public-key setting. In this paper, we address the problem of Identity-Based proxy re-encryption, where ciphertexts are transformed from one identity to another. Our schemes are compatible with curr...

متن کامل

Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption

Article history: Received 2 September 2010 Received in revised form 29 February 2012 Accepted 4 April 2012 Available online 17 April 2012

متن کامل

Searchable Keyword-Based Encryption

To solve the problem of searching on encrypted data, many keyword search schemes have been proposed in recent years. The goal of such schemes is to enable a user to give an untrusted storage server the ability only to test whether an encrypted document contains a few keywords without learning anything else about the document. In this paper, we are concerned with decrypting the searched results ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mathematics

سال: 2023

ISSN: ['2227-7390']

DOI: https://doi.org/10.3390/math11183830