Full Text:   <1594>

CLC number: 

On-line Access: 2020-11-16

Received: 2020-07-21

Revision Accepted: 2020-10-08

Crosschecked: 0000-00-00

Cited: 0

Clicked: 2931

Citations:  Bibtex RefMan EndNote GB/T7714

-   Go to

Article info.
Open peer comments

Journal of Zhejiang University SCIENCE C 1998 Vol.-1 No.-1 P.

http://doi.org/10.1631/FITEE.2000366


Identity-based threshold proxy re-encryption scheme from lattices and its applications


Author(s):  Li-qiang WU, Yi-liang HAN, Xiao-yuan YANG, Min-qing ZHANG

Affiliation(s):  Key Laboratory of Network and Information Security, Engineering University of Chinese Armed Police Force, Xi’ more

Corresponding email(s):   latticewj@163.com, hanyil@163.com

Key Words:  Post-quantum cryptography, Threshold proxy re-encryption, Lattices, Robustness, Decentralization


Li-qiang WU, Yi-liang HAN, Xiao-yuan YANG, Min-qing ZHANG. Identity-based threshold proxy re-encryption scheme from lattices and its applications[J]. Frontiers of Information Technology & Electronic Engineering, 1998, -1(-1): .

@article{title="Identity-based threshold proxy re-encryption scheme from lattices and its applications",
author="Li-qiang WU, Yi-liang HAN, Xiao-yuan YANG, Min-qing ZHANG",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="-1",
number="-1",
pages="",
year="1998",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.2000366"
}

%0 Journal Article
%T Identity-based threshold proxy re-encryption scheme from lattices and its applications
%A Li-qiang WU
%A Yi-liang HAN
%A Xiao-yuan YANG
%A Min-qing ZHANG
%J Journal of Zhejiang University SCIENCE C
%V -1
%N -1
%P
%@ 2095-9184
%D 1998
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.2000366

TY - JOUR
T1 - Identity-based threshold proxy re-encryption scheme from lattices and its applications
A1 - Li-qiang WU
A1 - Yi-liang HAN
A1 - Xiao-yuan YANG
A1 - Min-qing ZHANG
J0 - Journal of Zhejiang University Science C
VL - -1
IS - -1
SP -
EP -
%@ 2095-9184
Y1 - 1998
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.2000366


Abstract: 
threshold proxy re-encryption (TPRE) can prevent collusion between a single proxy and a delegatee to convert arbitrary files against the wishes of the delegator through multiple proxies, and also provide normal services even when certain proxy servers are paralyzed or damaged. A non-interactive Identity-Based threshold proxy re-encryption (IB-TPRE) scheme over lattices is proposed by extending the concept of TPRE to the identity-based setting, which removes the public key certificates. To accomplish this scheme, Shamir’s secret sharing is employed twice, which not only effectively hides the delegator’s private key information, but also decentralizes the proxy power by splitting the re-encryption key. robustness is the ability for a combiner to detect a misbehaving proxy server that has sent an invalid decryption share, which is achieved by using lattice-based fully homomorphic signatures, which make the whole scheme thoroughly capable of resisting quantum attacks, even after they begin. The security of the proposed scheme can be reduced to a decisional learning with errors (LWE) hardness assumption in the standard model. Two typical application scenarios, including a file-sharing system based on a Blockchain network and a robust key escrow system with threshold multiple key escrow agents, are presented.

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - Journal of Zhejiang University-SCIENCE