Resplittable threshold multi-broker proxy re-encryption scheme from lattices
Two different encryption schemes and Lagrange polynomial were used to construct a resplittable threshold multi-broker proxy re-encryption scheme on the lattice,namely the encryption in the ciphertext input and output side was different from the encryption in the re-encryption side which make the bou...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2017-05-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017109/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539527162724352 |
---|---|
author | Ju-yan LI Chun-guang MA Qian ZHAO |
author_facet | Ju-yan LI Chun-guang MA Qian ZHAO |
author_sort | Ju-yan LI |
collection | DOAJ |
description | Two different encryption schemes and Lagrange polynomial were used to construct a resplittable threshold multi-broker proxy re-encryption scheme on the lattice,namely the encryption in the ciphertext input and output side was different from the encryption in the re-encryption side which make the bound of noise was more relaxed.Threshold multi proxy not only ensure the safety of re-encryption key,but also ensure re-encryption scheme can still work even if the individual proxy could not provide normal services.The scheme is proven IND-UniRTPRE-CPA secure. |
format | Article |
id | doaj-art-9eb26987305b4fddae4526888c0b6bee |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2017-05-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-9eb26987305b4fddae4526888c0b6bee2025-01-14T07:12:26ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-05-013815716459710481Resplittable threshold multi-broker proxy re-encryption scheme from latticesJu-yan LIChun-guang MAQian ZHAOTwo different encryption schemes and Lagrange polynomial were used to construct a resplittable threshold multi-broker proxy re-encryption scheme on the lattice,namely the encryption in the ciphertext input and output side was different from the encryption in the re-encryption side which make the bound of noise was more relaxed.Threshold multi proxy not only ensure the safety of re-encryption key,but also ensure re-encryption scheme can still work even if the individual proxy could not provide normal services.The scheme is proven IND-UniRTPRE-CPA secure.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017109/proxy re-encryptionthreshold multi-proxylearning with errorIND-UniRTPRE-CPA secure |
spellingShingle | Ju-yan LI Chun-guang MA Qian ZHAO Resplittable threshold multi-broker proxy re-encryption scheme from lattices Tongxin xuebao proxy re-encryption threshold multi-proxy learning with error IND-UniRTPRE-CPA secure |
title | Resplittable threshold multi-broker proxy re-encryption scheme from lattices |
title_full | Resplittable threshold multi-broker proxy re-encryption scheme from lattices |
title_fullStr | Resplittable threshold multi-broker proxy re-encryption scheme from lattices |
title_full_unstemmed | Resplittable threshold multi-broker proxy re-encryption scheme from lattices |
title_short | Resplittable threshold multi-broker proxy re-encryption scheme from lattices |
title_sort | resplittable threshold multi broker proxy re encryption scheme from lattices |
topic | proxy re-encryption threshold multi-proxy learning with error IND-UniRTPRE-CPA secure |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017109/ |
work_keys_str_mv | AT juyanli resplittablethresholdmultibrokerproxyreencryptionschemefromlattices AT chunguangma resplittablethresholdmultibrokerproxyreencryptionschemefromlattices AT qianzhao resplittablethresholdmultibrokerproxyreencryptionschemefromlattices |