Journal on Communications ›› 2018, Vol. 39 ›› Issue (11): 129-137.doi: 10.11959/j.issn.1000-436x.2018239
• Papers • Previous Articles Next Articles
En ZHANG1,2(),Yaoyao PEI1,2,Jiao DU3
Revised:
2018-05-19
Online:
2018-11-01
Published:
2018-12-10
Supported by:
CLC Number:
En ZHANG,Yaoyao PEI,Jiao DU. RLWE-based ciphertext-policy attribute proxy re-encryption[J]. Journal on Communications, 2018, 39(11): 129-137.
[1] | BLAZE M , BLEUMER G , STRAUSS M . Divertible protocols and atomic proxy cryptography[C]// Advances in Cryptology EUROCRYPT. 1998: 127-144. |
[2] | IVAN A A , DODIS Y . Proxy cryptography revisited[C]// Network and Distributed System Security Symposium. 2003. |
[3] | ATENIESE G , FU K , GREEN M ,et al. Improved proxy re-encryption schemes with applications to secure distributed storage[J]. ACM Transactions on Information and System Security (TISSEC), 2006,9(1): 1-30. |
[4] | CANETTI R , HOHENBERGER S . Chosen-ciphertext secure proxy re-encryption[C]// The 14th ACM Conference on Computer and Communications Security. 2007: 185-194. |
[5] | LIBERT B , VERGNAUD D . Unidirectional chosen-ciphertext secure proxy re-encryption[C]// International Workshop on Public Key Cryptography. 2008: 360-379. |
[6] | SAHAI A , WATERS B . Fuzzy identity-based encryption[C]// International Conference on the Theory and Applications of Cryptographic Techniques. 2005: 457-473. |
[7] | GOYAL V , PANDEY O , SAHAI A ,et al. Attribute-based encryption for fine-grained access control of encrypted data[C]// The 13th ACM Conference on Computer and Communications Security. 2006: 89-98. |
[8] | BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// IEEE Symposium on Security and Privacy. 2007: 321-334. |
[9] | GREEN M , ATENIESE G . Identity-based proxy re-encryption[C]// Applied Cryptography and Network Security. 2007: 288-306. |
[10] | JIN C C , FENG X Y , SHEN Q N . Fully secure hidden ciphertext policy attribute-based encryption with short ciphertext size[C]// The 6th International Conference on Communication and Network Security. 2016: 91-98. |
[11] | LIANG X , CAO F Z , LIN H ,et al. Attribute based proxy re-encryption with delegating capabilities[C]// The 4th International Symposium on Information,Computer,and Communications Security. 2009: 276-286. |
[12] | WENG J , DENG R H , DING X ,et al. Conditional proxy re-encryption secure against chosen-ciphertext attack[C]// The 4th International Symposium on Information,Computer,and Communications Security. 2009: 322-332. |
[13] | LUO S , HU J , CHEN Z . Ciphertext policy attribute-based proxy re-encryption[C]// Information and Communications Security. 2010: 401-415. |
[14] | SEO H.J , KIM H . Attribute-based proxy re-encryption with a constant number of pairing operations[J]. Journal of Information and Communication Convergence Engineering, 2012,10(1): 53-60. |
[15] | WUNGPORNPAIBOON G , VASUPONGAYYA S . Two-layer ciphertext-policy attribute-based proxy re-encryption for supporting PHR delegation[C]// Computer Science and Engineering Conference. 2016: 1-6. |
[16] | LIANG K , FANG L , SUSILO W ,et al. A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security[C]// The 5th International Conference on Intelligent Networking and Collaborative Systems. 2013: 552-559. |
[17] | XU X L , ZHOU J L , WANG X H ,et al. Multi-authority proxy re-encryption based on CPABE for cloud storage systems[J]. Journal of Systems Engineering and Electronics, 2016,27(1): 211-223. |
[18] | REGEV O , . On lattices,learning with errors,random linear codes,and cryptography[C]// The 37th Annual ACM Symposium on Theory of Computing (STOC’05). 2005: 84-93. |
[19] | SHOR P W . Polynomial-time algorithms for prime factorizetion and discrete logarithms on a quantum computer[J]. SIAM Review, 1999,41(2): 303-332. |
[20] | AJTAI M , . Generating hard instances of lattice problems[C]// The 28th Annual ACM Symposium on Theory of Computing. 1996: 99-108. |
[21] | GENTRY C , PEIKERT C , VAIKUNTANATHAN V . Trapdoors for hard lattices and new cryptographic constructions[C]// The 40th Annual ACM Symposium on Theory of Computing. 2008: 197-206. |
[22] | AGRAWAL S , BOYEN X , VAIKUNTANATHAN V ,et al. Fuzzy identity based encryption from lattices[J]. IACR Cryptology ePrint Archive, 2011:414. |
[23] | BOYEN X . Attribute-based functional encryption on lattices[J]. Lecture Notes in Computer Science:Theory of Cryptography, 2013,7785: 122-142. |
[24] | DAN B , GENTRY C , GORBUNOV S ,et al. Fully key-homomorphic encryption,arithmetic circuit ABE and compact garbled circuits[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2014: 533-556. |
[25] | KIRSHANOVA E , . Proxy re-encryption from lattices[C]// Public Key Cryptography. 2014: 77-94. |
[26] | FAN X , LIU F H . Various proxy re-encryption schemes from lattices[J]. IACR Cryptology ePrint Archive, 2016:278. |
[27] | SINGH K , RANGAN C P , BANERJEE A K . Lattice based identity based proxy re-encryption scheme[J]. Journal of Internet Services and Infor- mation Security, 2013,3(3/4): 38-51. |
[28] | KIM K S , JEONG I R . Collusion-resistant unidirectional proxy re-encryption scheme from lattices[J]. Journal of Communications and Networks, 2016,18(1): 1-7. |
[29] | JIANG M M , HU Y P , WANG B C ,et al. Lattice-based multiuse unidirectional proxy re-encryption[J]. Security and Communication Networks, 2015,8(18): 3796-3803. |
[30] | ZHANG E , LI F , NIU B ,et al. Server-aided private set intersection based on reputation[J]. Information Sciences, 2017,387: 180-194. |
[31] | LI Z P , MA C G , WANG D ,et al. Toward proxy re-encryption from learning with errors in the exponent[C]// Trustcom/BigDataSE/ICESS. 2017: 683-690. |
[32] | LYUBASHEVSKY V , PEIKERT C , REGEV O . On ideal lattices and learning with errors over rings[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2010: 1-23. |
[33] | TAN S F , SAMSUDIN A . Lattice ciphertext-policy attribute-based encryption from ring-LWE[C]// International Symposium on Technology Management and Emerging Technologies. 2015: 258-262. |
[34] | 孙泽栋, 祝跃飞, 顾纯祥 ,等. 基于RLWE的密钥策略属性加密体制[J]. 通信学报, 2016,37(S1): 125-131. |
SUN Z D , ZHU Y F , GU C X ,et al. RLWE-based key-policy ABE scheme[J]. Journal on Communications, 2016,37(S1): 125-131. | |
[35] | 郑永辉, 康元基, 顾纯祥 ,等. 环上基于属性的全同态加密体制设计[J]. 通信学报, 2017,38(4): 55-63. |
ZHENG Y H , KANG Y J , GU C X ,et al. Attribute-based fully homomorphic encryption scheme over rings[J]. Journal on Communications, 2017,38(4): 55-63. | |
[36] | 张恩, 耿魁, 金伟 ,等. 抗隐蔽敌手的云外包秘密共享方案[J]. 通信学报, 2017,38(5): 57-65. |
ZHANG E , GENG K , JIN W ,et al. Cloud outsourcing secret sharing scheme against covert adversaries[J]. Journal on Communications, 2017,38(5): 57-65. | |
[37] | POLYAKOV Y , KURT R . Fast proxy re-encryption for publish/subscribe systems[J]. ACM Transactions on Privacy and Security, 2017,20(4): 1-31. |
[1] | Zuobin YING, Yuanping SI, Jianfeng MA, Ximeng LIU. Blockchain-based distributed EHR fine-grained traceability scheme [J]. Journal on Communications, 2021, 42(5): 205-215. |
[2] | Ruiqi LI, Chunfu JIA, Yafei WANG. Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application [J]. Journal on Communications, 2021, 42(3): 11-22. |
[3] | Xiaodong YANG, Wanting XI, Jiaqi WANG, Aijia CHEN, Caifen WANG. Electronic evidence sharing scheme of Internet of vehicles based on signcryption and blockchain [J]. Journal on Communications, 2021, 42(12): 236-246. |
[4] | Shufen NIU,Wenke LIU,Lixia CHEN,Caifen WANG,Xiaoni DU. Electronic medical record data sharing scheme based on searchable encryption via consortium blockchain [J]. Journal on Communications, 2020, 41(8): 204-214. |
[5] | Yingying LI,Jianfeng MA,Yinbin MIAO. Encrypted image retrieval in multi-key settings based on edge computing [J]. Journal on Communications, 2020, 41(4): 14-26. |
[6] | FENG Chaosheng,LUO Wangping,QIN Zhiguang,YUAN Ding,ZOU Liping. Attribute-based proxy re-encryption scheme with multiple features [J]. Journal on Communications, 2019, 40(6): 177-189. |
[7] | Mang SU,Yan YU,Bin WU,Anmin FU. Research on the programming language for proxy re-encryption [J]. Journal on Communications, 2018, 39(6): 89-97. |
[8] | Mang SU,Guozhen SHI,Anmin FU,Yan YU,Wei JIN. Proxy re-encryption based multi-factor access control scheme in cloud [J]. Journal on Communications, 2018, 39(2): 96-104. |
[9] | Fang QI,Yanmei LI,Zhe TANG. Revocable and traceable key-policy attribute-based encryption scheme [J]. Journal on Communications, 2018, 39(11): 63-69. |
[10] | Lei ZHANG,Chun-guang MA,Song-tao YANG,Zeng-peng LI. CP-ABE based users collaborative privacy protection scheme for continuous query [J]. Journal on Communications, 2017, 38(9): 76-85. |
[11] | Ju-yan LI,Chun-guang MA,Qian ZHAO. Resplittable threshold multi-broker proxy re-encryption scheme from lattices [J]. Journal on Communications, 2017, 38(5): 157-164. |
[12] | Yong-hui ZHENG,Yuan-ji KANG,Chun-xiang GU,Hui DONG. Attribute-based fully homomorphic encryption scheme over rings [J]. Journal on Communications, 2017, 38(4): 55-63. |
[13] | Qi-ying WU,Jian-feng MA,Yin-bin MIAO,Jun-wei ZHANG,Li-min SHEN. Multi-owner accredited keyword search over encrypted data [J]. Journal on Communications, 2017, 38(11): 161-170. |
[14] | En-tao LUO,Guo-jun WANG,Shu-hong CHEN,Khan-butt PINIAL. Privacy preserving friend discovery cross domain scheme using re-encryption in mobile social networks [J]. Journal on Communications, 2017, 38(10): 81-93. |
[15] | Ze-dong SUN,Yue-fei ZHU,Chun-xiang GU,Yong-hui1 ZHENG. RLWE-based key-policy ABE scheme [J]. Journal on Communications, 2016, 37(Z1): 125-131. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|