• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Identity Based Proxy Re-encryption Scheme under LWE

Vol. 11, No.12, December 31, 2017
10.3837/tiis.2017.12.023, Download Paper (Free):

Abstract

The proxy re-encryption allows an intermediate proxy to convert a ciphertext for Alice into a ciphertext for Bob without seeing the original message and leaking out relevant information. Unlike many prior identity based proxy re-encryption schemes which are based on the number theoretic assumptions such as large integer factorization and discrete logarithm problem. In this paper, we first propose a novel identity based proxy re-encryption scheme which is based on the hardness of standard Learning With Error(LWE) problem and is CPA secure in the standard model. This scheme can be reduced to the worst-case lattice hard problem that is able to resist attacks from quantum algorithm. The key step in our construction is that the challenger how to answer the private query under a known trapdoor matrix. Our scheme enjoys properties of the non-interactivity, unidirectionality, anonymous and so on. In this paper, we utilize primitives include G-trapdoor for lattice and sample algorithms to realize simple and efficient re-encryption.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang and Zheng Ping, "Identity Based Proxy Re-encryption Scheme under LWE," KSII Transactions on Internet and Information Systems, vol. 11, no. 12, pp. 6116-6132, 2017. DOI: 10.3837/tiis.2017.12.023

[ACM Style]
Yin, W., Wen, Q., Li, W., Zhang, H., and Ping, Z. 2017. Identity Based Proxy Re-encryption Scheme under LWE. KSII Transactions on Internet and Information Systems, 11, 12, (2017), 6116-6132. DOI: 10.3837/tiis.2017.12.023