Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes

Abstract The concept of Proxy Re‐Encryption (PRE) was introduced by Blaze, Bleumer and Strauss at Eurocrypt in 1998. In this concept, a semi‐trusted proxy user acquires a re‐encryption key from the delegator. Then the proxy can easily convert the encrypted message under Alice's public key into...

Full description

Saved in:
Bibliographic Details
Main Authors: Kunwar Singh, C. Pandu Rangan, Samir Sheshank, Richa Agrawal
Format: Article
Language:English
Published: Wiley 2021-01-01
Series:IET Information Security
Subjects:
Online Access:https://doi.org/10.1049/ise2.12000
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832558669291585536
author Kunwar Singh
C. Pandu Rangan
Samir Sheshank
Richa Agrawal
author_facet Kunwar Singh
C. Pandu Rangan
Samir Sheshank
Richa Agrawal
author_sort Kunwar Singh
collection DOAJ
description Abstract The concept of Proxy Re‐Encryption (PRE) was introduced by Blaze, Bleumer and Strauss at Eurocrypt in 1998. In this concept, a semi‐trusted proxy user acquires a re‐encryption key from the delegator. Then the proxy can easily convert the encrypted message under Alice's public key into an encrypted message under Bob's public key, without knowing the content of the message. For a unidirectional PRE, a master secret security (MSS) has been proposed as another security requirement by Ateniese et al. MSS provides security to the secret key of the delegator from computation by association with a malicious delegatee and dishonest proxy. In this study, first we have shown that Aono et al.'s scheme is not secure under the MSS model. Second, we have designed a unidirectional PRE scheme, based on Aono et al.'s study, and proved its security under the MSS model. In Table 2, we have shown that our scheme is more efficient in terms of computational and communication costs. Third, we have constructed a lattice‐based unidirectional PRE+ scheme, similar to the scheme proposed by Wang et al. In this scheme the encryptor itself works as the delegator.
format Article
id doaj-art-84e52ebdd8014991b5060de8c07199fa
institution Kabale University
issn 1751-8709
1751-8717
language English
publishDate 2021-01-01
publisher Wiley
record_format Article
series IET Information Security
spelling doaj-art-84e52ebdd8014991b5060de8c07199fa2025-02-03T01:31:55ZengWileyIET Information Security1751-87091751-87172021-01-0115111210.1049/ise2.12000Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemesKunwar Singh0C. Pandu Rangan1Samir Sheshank2Richa Agrawal3Computer Science and Engineering Department NIT Trichy Tiruchirappalli IndiaComputer Science and Engineering Department IIT Madras Madras IndiaComputer Science and Engineering Department NIT Trichy Tiruchirappalli IndiaComputer Science and Engineering Department MNNIT Allahabad IndiaAbstract The concept of Proxy Re‐Encryption (PRE) was introduced by Blaze, Bleumer and Strauss at Eurocrypt in 1998. In this concept, a semi‐trusted proxy user acquires a re‐encryption key from the delegator. Then the proxy can easily convert the encrypted message under Alice's public key into an encrypted message under Bob's public key, without knowing the content of the message. For a unidirectional PRE, a master secret security (MSS) has been proposed as another security requirement by Ateniese et al. MSS provides security to the secret key of the delegator from computation by association with a malicious delegatee and dishonest proxy. In this study, first we have shown that Aono et al.'s scheme is not secure under the MSS model. Second, we have designed a unidirectional PRE scheme, based on Aono et al.'s study, and proved its security under the MSS model. In Table 2, we have shown that our scheme is more efficient in terms of computational and communication costs. Third, we have constructed a lattice‐based unidirectional PRE+ scheme, similar to the scheme proposed by Wang et al. In this scheme the encryptor itself works as the delegator.https://doi.org/10.1049/ise2.12000public key cryptography
spellingShingle Kunwar Singh
C. Pandu Rangan
Samir Sheshank
Richa Agrawal
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
IET Information Security
public key cryptography
title Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
title_full Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
title_fullStr Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
title_full_unstemmed Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
title_short Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
title_sort lattice based unidirectional proxy re encryption and proxy re encryption schemes
topic public key cryptography
url https://doi.org/10.1049/ise2.12000
work_keys_str_mv AT kunwarsingh latticebasedunidirectionalproxyreencryptionandproxyreencryptionschemes
AT cpandurangan latticebasedunidirectionalproxyreencryptionandproxyreencryptionschemes
AT samirsheshank latticebasedunidirectionalproxyreencryptionandproxyreencryptionschemes
AT richaagrawal latticebasedunidirectionalproxyreencryptionandproxyreencryptionschemes