Publishing Service

Polishing & Checking

Frontiers of Information Technology & Electronic Engineering

ISSN 2095-9184 (print), ISSN 2095-9230 (online)

Identity-based threshold proxy re-encryption scheme from lattices and its applications

Abstract: Threshold proxy re-encryption (TPRE) can prevent collusion between a single proxy and a delegatee from converting arbitrary files against the wishes of the delegator through multiple proxies, and can also provide normal services even when certain proxy servers are paralyzed or damaged. A non-interactive identity-based TPRE (IB-TPRE) scheme over lattices is proposed which removes the public key certificates. To accomplish this scheme, Shamir‘s secret sharing is employed twice, which not only effectively hides the delegator‘s private key information, but also decentralizes the proxy power by splitting the re-encryption key. Robustness means that a combiner can detect a misbehaving proxy server that has sent an invalid transformed ciphertext share. This property is achieved by lattice-based fully homomorphic signatures. As a result, the whole scheme is thoroughly capable of resisting quantum attacks even when they are available. The security of the proposed scheme is based on the decisional learning with error hardness assumption in the standard model. Two typical application scenarios, including a file-sharing system based on a blockchain network and a robust key escrow system with threshold cryptography, are presented.

Key words: Post-quantum cryptography; Threshold proxy re-encryption; Lattices; Robustness; Decentralization

Chinese Summary  <21> 格上基于身份的门限代理重加密方案及应用

吴立强1,韩益亮1,杨晓元1,2,张敏情1
1中国人民武装警察部队工程大学网络和信息安全重点实验室,中国西安市,710086
2西安电子科技大学计算机网络与信息安全教育部重点实验室,中国西安市,710071
摘要:门限代理重加密通过设置多个代理者,不仅能有效防止单个代理者和被授权者合谋,从而违背授权者的意愿随意转化任意文件,而且能在某些代理者瘫痪或者损毁的情况下仍然提供正常服务。本文提出一个格上非交互的基于身份门限代理重加密方案,无需公钥证书。在设计方案过程中,采用了两次Shamir的秘密共享方法,一方面有效隐藏了授权者的私钥信息,另一方面通过分割代理重加密密钥,实现了代理权限的去中心化。鲁棒性是指某个代理者如果提交了非法的密文转化密文份额,那么组合者会立刻识别出这个恶意的代理者。本文方案通过格上全同态签名实现了这一属性。因此,即使未来量子攻击变得可行,我们整个方案也能完全抵抗量子攻击。本文方案的安全性在标准模型下规约为判定性差错学习困难假设。最后,给出本文方案的两个典型应用场景,包括基于区块链的文件共享系统和基于门限密码学的鲁棒密钥托管系统。

关键词组:后量子密码;门限代理重加密;格;鲁棒性;去中心化


Share this article to: More

Go to Contents

References:

<Show All>

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





DOI:

10.1631/FITEE.2000366

CLC number:

TP309

Download Full Text:

Click Here

Downloaded:

7805

Download summary:

<Click Here> 

Downloaded:

530

Clicked:

6064

Cited:

0

On-line Access:

2022-02-28

Received:

2020-07-21

Revision Accepted:

2022-04-22

Crosschecked:

2020-10-08

Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952276; Fax: +86-571-87952331; E-mail: jzus@zju.edu.cn
Copyright © 2000~ Journal of Zhejiang University-SCIENCE