A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing

The homomorphic proxy re-encryption scheme combines the characteristics of a homomorphic encryption scheme and proxy re-encryption scheme. The proxy can not only convert a ciphertext of the delegator into a ciphertext of the delegatee, but also can homomorphically calculate the original ciphertext a...

Full description

Bibliographic Details
Main Authors: Juyan Li, Zhiqi Qiao, Kejia Zhang, Chen Cui
Format: Article
Language:English
Published: MDPI AG 2021-01-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/21/1/288
_version_ 1797542443059511296
author Juyan Li
Zhiqi Qiao
Kejia Zhang
Chen Cui
author_facet Juyan Li
Zhiqi Qiao
Kejia Zhang
Chen Cui
author_sort Juyan Li
collection DOAJ
description The homomorphic proxy re-encryption scheme combines the characteristics of a homomorphic encryption scheme and proxy re-encryption scheme. The proxy can not only convert a ciphertext of the delegator into a ciphertext of the delegatee, but also can homomorphically calculate the original ciphertext and re-encryption ciphertext belonging to the same user, so it is especially suitable for cloud computing. Yin et al. put forward the concept of a strong collusion attack on a proxy re-encryption scheme, and carried out a strong collusion attack on the scheme through an example. The existing homomorphic proxy re-encryption schemes use key switching algorithms to generate re-encryption keys, so it can not resist strong collusion attack. In this paper, we construct the first lattice-based homomorphic proxy re-encryption scheme with strong anti-collusion (HPRE-SAC). Firstly, algorithm TrapGen is used to generate an encryption key and trapdoor, then trapdoor sampling is used to generate a decryption key and re-encryption key, respectively. Finally, in order to ensure the homomorphism of ciphertext, a key switching algorithm is only used to generate the evaluation key. Compared with the existing homomorphic proxy re-encryption schemes, our HPRE-SAC scheme not only can resist strong collusion attacks, but also has smaller parameters.
first_indexed 2024-03-10T13:29:37Z
format Article
id doaj.art-02a440e91b77463dba74aa5642b4fc09
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-10T13:29:37Z
publishDate 2021-01-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-02a440e91b77463dba74aa5642b4fc092023-11-21T08:04:40ZengMDPI AGSensors1424-82202021-01-0121128810.3390/s21010288A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud ComputingJuyan Li0Zhiqi Qiao1Kejia Zhang2Chen Cui3College of Data Science and Technology, Heilongjiang University, Harbin 150080, ChinaCollege of Data Science and Technology, Heilongjiang University, Harbin 150080, ChinaCollege of Data Science and Technology, Heilongjiang University, Harbin 150080, ChinaCollege of Data Science and Technology, Heilongjiang University, Harbin 150080, ChinaThe homomorphic proxy re-encryption scheme combines the characteristics of a homomorphic encryption scheme and proxy re-encryption scheme. The proxy can not only convert a ciphertext of the delegator into a ciphertext of the delegatee, but also can homomorphically calculate the original ciphertext and re-encryption ciphertext belonging to the same user, so it is especially suitable for cloud computing. Yin et al. put forward the concept of a strong collusion attack on a proxy re-encryption scheme, and carried out a strong collusion attack on the scheme through an example. The existing homomorphic proxy re-encryption schemes use key switching algorithms to generate re-encryption keys, so it can not resist strong collusion attack. In this paper, we construct the first lattice-based homomorphic proxy re-encryption scheme with strong anti-collusion (HPRE-SAC). Firstly, algorithm TrapGen is used to generate an encryption key and trapdoor, then trapdoor sampling is used to generate a decryption key and re-encryption key, respectively. Finally, in order to ensure the homomorphism of ciphertext, a key switching algorithm is only used to generate the evaluation key. Compared with the existing homomorphic proxy re-encryption schemes, our HPRE-SAC scheme not only can resist strong collusion attacks, but also has smaller parameters.https://www.mdpi.com/1424-8220/21/1/288LWEhomomorphic proxy re-encryptionstrong anti-collusionkey switchingtrapdoor samplingcloud computing
spellingShingle Juyan Li
Zhiqi Qiao
Kejia Zhang
Chen Cui
A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing
Sensors
LWE
homomorphic proxy re-encryption
strong anti-collusion
key switching
trapdoor sampling
cloud computing
title A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing
title_full A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing
title_fullStr A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing
title_full_unstemmed A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing
title_short A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing
title_sort lattice based homomorphic proxy re encryption scheme with strong anti collusion for cloud computing
topic LWE
homomorphic proxy re-encryption
strong anti-collusion
key switching
trapdoor sampling
cloud computing
url https://www.mdpi.com/1424-8220/21/1/288
work_keys_str_mv AT juyanli alatticebasedhomomorphicproxyreencryptionschemewithstronganticollusionforcloudcomputing
AT zhiqiqiao alatticebasedhomomorphicproxyreencryptionschemewithstronganticollusionforcloudcomputing
AT kejiazhang alatticebasedhomomorphicproxyreencryptionschemewithstronganticollusionforcloudcomputing
AT chencui alatticebasedhomomorphicproxyreencryptionschemewithstronganticollusionforcloudcomputing
AT juyanli latticebasedhomomorphicproxyreencryptionschemewithstronganticollusionforcloudcomputing
AT zhiqiqiao latticebasedhomomorphicproxyreencryptionschemewithstronganticollusionforcloudcomputing
AT kejiazhang latticebasedhomomorphicproxyreencryptionschemewithstronganticollusionforcloudcomputing
AT chencui latticebasedhomomorphicproxyreencryptionschemewithstronganticollusionforcloudcomputing