Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
Abstract The concept of Proxy Re‐Encryption (PRE) was introduced by Blaze, Bleumer and Strauss at Eurocrypt in 1998. In this concept, a semi‐trusted proxy user acquires a re‐encryption key from the delegator. Then the proxy can easily convert the encrypted message under Alice's public key into...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2021-01-01
|
Series: | IET Information Security |
Subjects: | |
Online Access: | https://doi.org/10.1049/ise2.12000 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832558669291585536 |
---|---|
author | Kunwar Singh C. Pandu Rangan Samir Sheshank Richa Agrawal |
author_facet | Kunwar Singh C. Pandu Rangan Samir Sheshank Richa Agrawal |
author_sort | Kunwar Singh |
collection | DOAJ |
description | Abstract The concept of Proxy Re‐Encryption (PRE) was introduced by Blaze, Bleumer and Strauss at Eurocrypt in 1998. In this concept, a semi‐trusted proxy user acquires a re‐encryption key from the delegator. Then the proxy can easily convert the encrypted message under Alice's public key into an encrypted message under Bob's public key, without knowing the content of the message. For a unidirectional PRE, a master secret security (MSS) has been proposed as another security requirement by Ateniese et al. MSS provides security to the secret key of the delegator from computation by association with a malicious delegatee and dishonest proxy. In this study, first we have shown that Aono et al.'s scheme is not secure under the MSS model. Second, we have designed a unidirectional PRE scheme, based on Aono et al.'s study, and proved its security under the MSS model. In Table 2, we have shown that our scheme is more efficient in terms of computational and communication costs. Third, we have constructed a lattice‐based unidirectional PRE+ scheme, similar to the scheme proposed by Wang et al. In this scheme the encryptor itself works as the delegator. |
format | Article |
id | doaj-art-84e52ebdd8014991b5060de8c07199fa |
institution | Kabale University |
issn | 1751-8709 1751-8717 |
language | English |
publishDate | 2021-01-01 |
publisher | Wiley |
record_format | Article |
series | IET Information Security |
spelling | doaj-art-84e52ebdd8014991b5060de8c07199fa2025-02-03T01:31:55ZengWileyIET Information Security1751-87091751-87172021-01-0115111210.1049/ise2.12000Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemesKunwar Singh0C. Pandu Rangan1Samir Sheshank2Richa Agrawal3Computer Science and Engineering Department NIT Trichy Tiruchirappalli IndiaComputer Science and Engineering Department IIT Madras Madras IndiaComputer Science and Engineering Department NIT Trichy Tiruchirappalli IndiaComputer Science and Engineering Department MNNIT Allahabad IndiaAbstract The concept of Proxy Re‐Encryption (PRE) was introduced by Blaze, Bleumer and Strauss at Eurocrypt in 1998. In this concept, a semi‐trusted proxy user acquires a re‐encryption key from the delegator. Then the proxy can easily convert the encrypted message under Alice's public key into an encrypted message under Bob's public key, without knowing the content of the message. For a unidirectional PRE, a master secret security (MSS) has been proposed as another security requirement by Ateniese et al. MSS provides security to the secret key of the delegator from computation by association with a malicious delegatee and dishonest proxy. In this study, first we have shown that Aono et al.'s scheme is not secure under the MSS model. Second, we have designed a unidirectional PRE scheme, based on Aono et al.'s study, and proved its security under the MSS model. In Table 2, we have shown that our scheme is more efficient in terms of computational and communication costs. Third, we have constructed a lattice‐based unidirectional PRE+ scheme, similar to the scheme proposed by Wang et al. In this scheme the encryptor itself works as the delegator.https://doi.org/10.1049/ise2.12000public key cryptography |
spellingShingle | Kunwar Singh C. Pandu Rangan Samir Sheshank Richa Agrawal Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes IET Information Security public key cryptography |
title | Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes |
title_full | Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes |
title_fullStr | Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes |
title_full_unstemmed | Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes |
title_short | Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes |
title_sort | lattice based unidirectional proxy re encryption and proxy re encryption schemes |
topic | public key cryptography |
url | https://doi.org/10.1049/ise2.12000 |
work_keys_str_mv | AT kunwarsingh latticebasedunidirectionalproxyreencryptionandproxyreencryptionschemes AT cpandurangan latticebasedunidirectionalproxyreencryptionandproxyreencryptionschemes AT samirsheshank latticebasedunidirectionalproxyreencryptionandproxyreencryptionschemes AT richaagrawal latticebasedunidirectionalproxyreencryptionandproxyreencryptionschemes |