Lattice-based Unidirectional IBPRE Secure in Standard Model

05/14/2020
by   Priyanka Dutta, et al.
0

Proxy re-encryption (PRE) securely enables the re-encryption of ciphertexts from one key to another, without relying on trusted parties, i.e., it offers delegation of decryption rights. PRE allows a semi-trusted third party termed as a "proxy" to securely divert encrypted files of user A (delegator) to user B (delegatee) without revealing any information about the underlying files to the proxy. To eliminate the necessity of having a costly certificate verification process, Green and Ateniese introduced an identity-based PRE (IB-PRE). The potential applicability of IB-PRE leads to intensive research from its first instantiation. Unfortunately, till today, there is no unidirectional IB-PRE secure in the standard model, which can withstand quantum attack. In this paper, we provide, for the first time, a concrete construction of unidirectional IB-PRE which is secure in standard model based on the hardness of learning with error problem. Our technique is to use the novel trapdoor delegation technique of Micciancio and Peikert. The way we use trapdoor delegation technique may prove useful for functionalities other than proxy re-encryption as well.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/16/2020

Collusion-Resistant Identity-based Proxy Re-Encryption: Lattice-based Constructions in Standard Model

The concept of proxy re-encryption (PRE) dates back to the work of Blaze...
research
05/07/2020

Lattice-based public key encryption with equality test in standard model, revisited

Public key encryption with equality test (PKEET) allows testing whether ...
research
11/13/2022

OpenPGP Email Forwarding Via Diverted Elliptic Curve Diffie-Hellman Key Exchanges

An offline OpenPGP user might want to forward part or all of their email...
research
07/13/2020

Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption

Puncturable encryption (PE), proposed by Green and Miers at IEEE S P 2...
research
08/29/2019

Key-Aggregate Searchable Encryption, Revisited: Formal Foundations for Cloud Applications, and Their Implementation

In the use of a cloud storage, sharing of data with efficient access con...
research
07/03/2023

Patient-centric health data sovereignty: an approach using Proxy re-encryption

The exponential growth in the digitisation of services implies the handl...
research
08/23/2019

Bi-Homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption

We define a pseudorandom function (PRF) F: K×X→Y to be bi-homomorphic wh...

Please sign up or login with your details

Forgot password? Click here to reset