iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.3837/tiis.2017.12.023
Identity Based Proxy Re-encryption Scheme under LWE
  • KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Identity Based Proxy Re-encryption Scheme under LWE

Vol. 11, No. 12, December 30, 2017
10.3837/tiis.2017.12.023, Download Paper (Free):

Abstract

The proxy re-encryption allows an intermediate proxy to convert a ciphertext for Alice into a ciphertext for Bob without seeing the original message and leaking out relevant information. Unlike many prior identity based proxy re-encryption schemes which are based on the number theoretic assumptions such as large integer factorization and discrete logarithm problem. In this paper, we first propose a novel identity based proxy re-encryption scheme which is based on the hardness of standard Learning With Error(LWE) problem and is CPA secure in the standard model. This scheme can be reduced to the worst-case lattice hard problem that is able to resist attacks from quantum algorithm. The key step in our construction is that the challenger how to answer the private query under a known trapdoor matrix. Our scheme enjoys properties of the non-interactivity, unidirectionality, anonymous and so on. In this paper, we utilize primitives include G-trapdoor for lattice and sample algorithms to realize simple and efficient re-encryption.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
W. Yin, Q. Wen, W. Li, H. Zhang, Z. Ping, "Identity Based Proxy Re-encryption Scheme under LWE," KSII Transactions on Internet and Information Systems, vol. 11, no. 12, pp. 6116-6132, 2017. DOI: 10.3837/tiis.2017.12.023.

[ACM Style]
Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang, and Zheng Ping. 2017. Identity Based Proxy Re-encryption Scheme under LWE. KSII Transactions on Internet and Information Systems, 11, 12, (2017), 6116-6132. DOI: 10.3837/tiis.2017.12.023.

[BibTeX Style]
@article{tiis:21640, title="Identity Based Proxy Re-encryption Scheme under LWE", author="Wei Yin and Qiaoyan Wen and Wenmin Li and Hua Zhang and Zheng Ping and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2017.12.023}, volume={11}, number={12}, year="2017", month={December}, pages={6116-6132}}