A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing
The homomorphic proxy re-encryption scheme combines the characteristics of a homomorphic encryption scheme and proxy re-encryption scheme. The proxy can not only convert a ciphertext of the delegator into a ciphertext of the delegatee, but also can homomorphically calculate the original ciphertext a...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-01-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/21/1/288 |
_version_ | 1797542443059511296 |
---|---|
author | Juyan Li Zhiqi Qiao Kejia Zhang Chen Cui |
author_facet | Juyan Li Zhiqi Qiao Kejia Zhang Chen Cui |
author_sort | Juyan Li |
collection | DOAJ |
description | The homomorphic proxy re-encryption scheme combines the characteristics of a homomorphic encryption scheme and proxy re-encryption scheme. The proxy can not only convert a ciphertext of the delegator into a ciphertext of the delegatee, but also can homomorphically calculate the original ciphertext and re-encryption ciphertext belonging to the same user, so it is especially suitable for cloud computing. Yin et al. put forward the concept of a strong collusion attack on a proxy re-encryption scheme, and carried out a strong collusion attack on the scheme through an example. The existing homomorphic proxy re-encryption schemes use key switching algorithms to generate re-encryption keys, so it can not resist strong collusion attack. In this paper, we construct the first lattice-based homomorphic proxy re-encryption scheme with strong anti-collusion (HPRE-SAC). Firstly, algorithm TrapGen is used to generate an encryption key and trapdoor, then trapdoor sampling is used to generate a decryption key and re-encryption key, respectively. Finally, in order to ensure the homomorphism of ciphertext, a key switching algorithm is only used to generate the evaluation key. Compared with the existing homomorphic proxy re-encryption schemes, our HPRE-SAC scheme not only can resist strong collusion attacks, but also has smaller parameters. |
first_indexed | 2024-03-10T13:29:37Z |
format | Article |
id | doaj.art-02a440e91b77463dba74aa5642b4fc09 |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-03-10T13:29:37Z |
publishDate | 2021-01-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-02a440e91b77463dba74aa5642b4fc092023-11-21T08:04:40ZengMDPI AGSensors1424-82202021-01-0121128810.3390/s21010288A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud ComputingJuyan Li0Zhiqi Qiao1Kejia Zhang2Chen Cui3College of Data Science and Technology, Heilongjiang University, Harbin 150080, ChinaCollege of Data Science and Technology, Heilongjiang University, Harbin 150080, ChinaCollege of Data Science and Technology, Heilongjiang University, Harbin 150080, ChinaCollege of Data Science and Technology, Heilongjiang University, Harbin 150080, ChinaThe homomorphic proxy re-encryption scheme combines the characteristics of a homomorphic encryption scheme and proxy re-encryption scheme. The proxy can not only convert a ciphertext of the delegator into a ciphertext of the delegatee, but also can homomorphically calculate the original ciphertext and re-encryption ciphertext belonging to the same user, so it is especially suitable for cloud computing. Yin et al. put forward the concept of a strong collusion attack on a proxy re-encryption scheme, and carried out a strong collusion attack on the scheme through an example. The existing homomorphic proxy re-encryption schemes use key switching algorithms to generate re-encryption keys, so it can not resist strong collusion attack. In this paper, we construct the first lattice-based homomorphic proxy re-encryption scheme with strong anti-collusion (HPRE-SAC). Firstly, algorithm TrapGen is used to generate an encryption key and trapdoor, then trapdoor sampling is used to generate a decryption key and re-encryption key, respectively. Finally, in order to ensure the homomorphism of ciphertext, a key switching algorithm is only used to generate the evaluation key. Compared with the existing homomorphic proxy re-encryption schemes, our HPRE-SAC scheme not only can resist strong collusion attacks, but also has smaller parameters.https://www.mdpi.com/1424-8220/21/1/288LWEhomomorphic proxy re-encryptionstrong anti-collusionkey switchingtrapdoor samplingcloud computing |
spellingShingle | Juyan Li Zhiqi Qiao Kejia Zhang Chen Cui A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing Sensors LWE homomorphic proxy re-encryption strong anti-collusion key switching trapdoor sampling cloud computing |
title | A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing |
title_full | A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing |
title_fullStr | A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing |
title_full_unstemmed | A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing |
title_short | A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing |
title_sort | lattice based homomorphic proxy re encryption scheme with strong anti collusion for cloud computing |
topic | LWE homomorphic proxy re-encryption strong anti-collusion key switching trapdoor sampling cloud computing |
url | https://www.mdpi.com/1424-8220/21/1/288 |
work_keys_str_mv | AT juyanli alatticebasedhomomorphicproxyreencryptionschemewithstronganticollusionforcloudcomputing AT zhiqiqiao alatticebasedhomomorphicproxyreencryptionschemewithstronganticollusionforcloudcomputing AT kejiazhang alatticebasedhomomorphicproxyreencryptionschemewithstronganticollusionforcloudcomputing AT chencui alatticebasedhomomorphicproxyreencryptionschemewithstronganticollusionforcloudcomputing AT juyanli latticebasedhomomorphicproxyreencryptionschemewithstronganticollusionforcloudcomputing AT zhiqiqiao latticebasedhomomorphicproxyreencryptionschemewithstronganticollusionforcloudcomputing AT kejiazhang latticebasedhomomorphicproxyreencryptionschemewithstronganticollusionforcloudcomputing AT chencui latticebasedhomomorphicproxyreencryptionschemewithstronganticollusionforcloudcomputing |