RLWE-based ciphertext-policy attribute proxy re-encryption

To solve LWE-based proxy re-encryption schemes cannot achieve fine-grained access and low efficiency problem,a ciphertext-policy attribute-based proxy re-encryption scheme was proposed.The scheme based on linear secret sharing scheme,RLWE and attribute encryption could shorten the key size,reduce th...

Full description

Saved in:
Bibliographic Details
Main Authors: En ZHANG, Yaoyao PEI, Jiao DU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2018-11-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018239/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850097890059354112
author En ZHANG
Yaoyao PEI
Jiao DU
author_facet En ZHANG
Yaoyao PEI
Jiao DU
author_sort En ZHANG
collection DOAJ
description To solve LWE-based proxy re-encryption schemes cannot achieve fine-grained access and low efficiency problem,a ciphertext-policy attribute-based proxy re-encryption scheme was proposed.The scheme based on linear secret sharing scheme,RLWE and attribute encryption could shorten the key size,reduce the ciphertext space and improve the efficiency of encryption and decryption.At the same time,the linear secret sharing matrix was used as an access matrix to meet the requirements of authorized person fine-grained commissioning control and to resist the collusion between the agent and the authorized person.In addition,the proposed scheme is shown to be secure under the ring learning with errors assumption in the standard model.
format Article
id doaj-art-bcb47816fd4f4efda3bbee163f40abeb
institution DOAJ
issn 1000-436X
language zho
publishDate 2018-11-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-bcb47816fd4f4efda3bbee163f40abeb2025-08-20T02:40:51ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-11-013912913759721864RLWE-based ciphertext-policy attribute proxy re-encryptionEn ZHANGYaoyao PEIJiao DUTo solve LWE-based proxy re-encryption schemes cannot achieve fine-grained access and low efficiency problem,a ciphertext-policy attribute-based proxy re-encryption scheme was proposed.The scheme based on linear secret sharing scheme,RLWE and attribute encryption could shorten the key size,reduce the ciphertext space and improve the efficiency of encryption and decryption.At the same time,the linear secret sharing matrix was used as an access matrix to meet the requirements of authorized person fine-grained commissioning control and to resist the collusion between the agent and the authorized person.In addition,the proposed scheme is shown to be secure under the ring learning with errors assumption in the standard model.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018239/proxy re-encryptionRLWEattribute encryptionlinear secret sharing schemefine-grained access
spellingShingle En ZHANG
Yaoyao PEI
Jiao DU
RLWE-based ciphertext-policy attribute proxy re-encryption
Tongxin xuebao
proxy re-encryption
RLWE
attribute encryption
linear secret sharing scheme
fine-grained access
title RLWE-based ciphertext-policy attribute proxy re-encryption
title_full RLWE-based ciphertext-policy attribute proxy re-encryption
title_fullStr RLWE-based ciphertext-policy attribute proxy re-encryption
title_full_unstemmed RLWE-based ciphertext-policy attribute proxy re-encryption
title_short RLWE-based ciphertext-policy attribute proxy re-encryption
title_sort rlwe based ciphertext policy attribute proxy re encryption
topic proxy re-encryption
RLWE
attribute encryption
linear secret sharing scheme
fine-grained access
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018239/
work_keys_str_mv AT enzhang rlwebasedciphertextpolicyattributeproxyreencryption
AT yaoyaopei rlwebasedciphertextpolicyattributeproxyreencryption
AT jiaodu rlwebasedciphertextpolicyattributeproxyreencryption