Resplittable threshold multi-broker proxy re-encryption scheme from lattices

Two different encryption schemes and Lagrange polynomial were used to construct a resplittable threshold multi-broker proxy re-encryption scheme on the lattice,namely the encryption in the ciphertext input and output side was different from the encryption in the re-encryption side which make the bou...

Full description

Saved in:
Bibliographic Details
Main Authors: Ju-yan LI, Chun-guang MA, Qian ZHAO
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2017-05-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017109/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539527162724352
author Ju-yan LI
Chun-guang MA
Qian ZHAO
author_facet Ju-yan LI
Chun-guang MA
Qian ZHAO
author_sort Ju-yan LI
collection DOAJ
description Two different encryption schemes and Lagrange polynomial were used to construct a resplittable threshold multi-broker proxy re-encryption scheme on the lattice,namely the encryption in the ciphertext input and output side was different from the encryption in the re-encryption side which make the bound of noise was more relaxed.Threshold multi proxy not only ensure the safety of re-encryption key,but also ensure re-encryption scheme can still work even if the individual proxy could not provide normal services.The scheme is proven IND-UniRTPRE-CPA secure.
format Article
id doaj-art-9eb26987305b4fddae4526888c0b6bee
institution Kabale University
issn 1000-436X
language zho
publishDate 2017-05-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-9eb26987305b4fddae4526888c0b6bee2025-01-14T07:12:26ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-05-013815716459710481Resplittable threshold multi-broker proxy re-encryption scheme from latticesJu-yan LIChun-guang MAQian ZHAOTwo different encryption schemes and Lagrange polynomial were used to construct a resplittable threshold multi-broker proxy re-encryption scheme on the lattice,namely the encryption in the ciphertext input and output side was different from the encryption in the re-encryption side which make the bound of noise was more relaxed.Threshold multi proxy not only ensure the safety of re-encryption key,but also ensure re-encryption scheme can still work even if the individual proxy could not provide normal services.The scheme is proven IND-UniRTPRE-CPA secure.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017109/proxy re-encryptionthreshold multi-proxylearning with errorIND-UniRTPRE-CPA secure
spellingShingle Ju-yan LI
Chun-guang MA
Qian ZHAO
Resplittable threshold multi-broker proxy re-encryption scheme from lattices
Tongxin xuebao
proxy re-encryption
threshold multi-proxy
learning with error
IND-UniRTPRE-CPA secure
title Resplittable threshold multi-broker proxy re-encryption scheme from lattices
title_full Resplittable threshold multi-broker proxy re-encryption scheme from lattices
title_fullStr Resplittable threshold multi-broker proxy re-encryption scheme from lattices
title_full_unstemmed Resplittable threshold multi-broker proxy re-encryption scheme from lattices
title_short Resplittable threshold multi-broker proxy re-encryption scheme from lattices
title_sort resplittable threshold multi broker proxy re encryption scheme from lattices
topic proxy re-encryption
threshold multi-proxy
learning with error
IND-UniRTPRE-CPA secure
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017109/
work_keys_str_mv AT juyanli resplittablethresholdmultibrokerproxyreencryptionschemefromlattices
AT chunguangma resplittablethresholdmultibrokerproxyreencryptionschemefromlattices
AT qianzhao resplittablethresholdmultibrokerproxyreencryptionschemefromlattices