Collusion-Resistant Identity-based Proxy Re-Encryption: Lattice-based Constructions in Standard Model

11/16/2020
by   Priyanka Dutta, et al.
0

The concept of proxy re-encryption (PRE) dates back to the work of Blaze, Bleumer, and Strauss in 1998. PRE offers delegation of decryption rights, i.e., it securely enables the re-encryption of ciphertexts from one key to another, without relying on trusted parties. PRE allows a semi-trusted third party termed as a “proxy" to securely divert encrypted files of user A (delegator) to user B (delegatee) without revealing any information about the underlying files to the proxy. To eliminate the necessity of having a costly certificate verification process, Green and Ateniese introduced an identity-based PRE (IB-PRE). The potential applicability of IB-PRE sprung up a long line of intensive research from its first instantiation. Unfortunately, till today, there is no collusion-Resistant unidirectional IB-PRE secure in the standard model, which can withstand quantum attack. In this paper, we present the first concrete constructions of collusion-Resistant unidirectional IB-PRE, for both selective and adaptive identity, which are secure in standard model based on the hardness of learning with error problem.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/14/2020

Lattice-based Unidirectional IBPRE Secure in Standard Model

Proxy re-encryption (PRE) securely enables the re-encryption of cipherte...
research
05/07/2020

Lattice-based public key encryption with equality test in standard model, revisited

Public key encryption with equality test (PKEET) allows testing whether ...
research
05/09/2020

Lattice-based public key encryption with equality test supporting flexible authorization in standard model

Public key encryption with equality test (PKEET) supports to check wheth...
research
01/24/2018

Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation

Efficient user revocation is a necessary but challenging problem in many...
research
05/16/2018

reclaimID: Secure, Self-Sovereign Identities using Name Systems and Attribute-Based Encryption

In this paper we present reclaimID: An architecture that allows users to...
research
11/13/2022

OpenPGP Email Forwarding Via Diverted Elliptic Curve Diffie-Hellman Key Exchanges

An offline OpenPGP user might want to forward part or all of their email...
research
07/03/2023

Patient-centric health data sovereignty: an approach using Proxy re-encryption

The exponential growth in the digitisation of services implies the handl...

Please sign up or login with your details

Forgot password? Click here to reset