Movatterモバイル変換


[0]ホーム

URL:


Next Article in Journal
Entropy of Financial Time Series Due to the Shock of War
Next Article in Special Issue
A Framework for Analyzing Fraud Risk Warning and Interference Effects by Fusing Multivariate Heterogeneous Data: A Bayesian Belief Network
Previous Article in Journal
TSFN: A Novel Malicious Traffic Classification Method Using BERT and LSTM
Previous Article in Special Issue
Personalized Privacy Assistant: Identity Construction and Privacy in the Internet of Things
 
 
Search for Articles:
Title / Keyword
Author / Affiliation / Email
Journal
Article Type
 
 
Section
Special Issue
Volume
Issue
Number
Page
 
Logical OperatorOperator
Search Text
Search Type
 
add_circle_outline
remove_circle_outline
 
 
Journals
Entropy
Volume 25
Issue 5
10.3390/e25050822
Font Type:
ArialGeorgiaVerdana
Font Size:
AaAaAa
Line Spacing:
Column Width:
Background:
Article

Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme

College of Software, Henan Polytechnic University, Jiaozuo 454000, China
*
Author to whom correspondence should be addressed.
Entropy2023,25(5), 822;https://doi.org/10.3390/e25050822
Submission received: 15 March 2023 /Revised: 12 May 2023 /Accepted: 18 May 2023 /Published: 19 May 2023
(This article belongs to the Special IssueInformation Security and Privacy: From IoT to IoV)

Abstract

:
There are mostly semi-honest agents in cloud computing, so agents may perform unreliable calculations during the actual execution process. In this paper, an attribute-based verifiable conditional proxy re-encryption (AB-VCPRE) scheme using a homomorphic signature is proposed to solve the problem that the current attribute-based conditional proxy re-encryption (AB-CPRE) algorithm cannot detect the illegal behavior of the agent. The scheme implements robustness, that is the re-encryption ciphertext, can be verified by the verification server, showing that the received ciphertext is correctly converted by the agent from the original ciphertext, thus, meaning that illegal activities of agents can be effectively detected. In addition, the article demonstrates the reliability of the constructed AB-VCPRE scheme validation in the standard model, and proves that the scheme satisfies CPA security in the selective security model based on the learning with errors (LWE) assumption.

    1. Introduction

    As a new resource sharing in the field of information, cloud computing is constantly changing people’s lives. As an important technology in cloud computing, cloud storage is used to organize a series of different types of network storage devices to facilitate data sharing. To ensure the confidentiality of data, before being uploaded to a cloud server, user data are encrypted, however, this poses difficulties in sharing data between different users. When dealing with a significant quantity of data recipients, general encryption algorithms can significantly increase the computational and communication expenses incurred by the data owner. Proxy re-encryption (PRE) effectively solves this problem.
    In 1998, Blaze et al. [1] first introduced the concept of PRE at the Euromonitor Conference. PRE is a data cipher conversion in cloud computing, which ensures both user data security and flexible access and sharing of data. However, in the traditional PRE system, it is usually one delegator that corresponds to another delegator, that is, a one-to-one model; this implies that only one client’s message can be re-encrypted at a time, necessitating a large amount of communication overhead and computation expense, which is contrary to the initial aim of cloud computing customers wanting to save money. In 2007, GREEN et al. [2] simplified the public key certificate authentication process by proposing an encryption scheme based on user identity information instead of a public key. However, the encryption process is specific to particular users and requires explicit information about the recipient. In 2009, JIAN et al. [3] suggested a strategy for conditional PRE (CPRE) based on identity proxy re-encryption. By designing a conditional ciphertext conversion method, the ciphertext can only be converted when the ciphertext meets the set conditions, enabling the assignment of partial decryption rights, but it is still in the form of a one-to-one assignment between the authorizer and the authorized person, which not only severely restricts users’ ability to selectively share data with other users at a fine-grained level, but it also has the problems of high communication costs and high computational overhead when a large number of users need to access that shared data, as well as wasting a large amount of local memory space to hold a large number of decryption keys.
    Being a novel cryptographic technique that differs from conventional public key cryptography, attribute-based encryption (ABE) [4] is ideally suited for resolving data confidentiality protection and access control of ciphertext problems in cloud storage applications [5]. ABE technology can provide an effective one-to-many, fine-grained ciphertext access control solution for cloud storage data security. AB-CPRE schemes have been presented that demonstrate the advantages and properties of ABE and CPRE. However, the existing AB-PRE schemes and AB-CPRE schemes are mostly based on constructs such as linear mappings or discrete logarithmic puzzles [6,7]. Due to the advent of quantum computers, the security of traditional number theory puzzles is threatened and these schemes will become insecure. To solve this problem, a lattice cipher is proposed. It is believed that lattice-based cryptography can resist quantum attacks and has high computational efficiency. Therefore, lattice-based public key cryptography schemes have attracted wide attention in recent years.
    However, all the AB-CPRE schemes [8,9,10] that are currently in use are semi-trusted agents, so they may perform unreliable calculations, which bring security problems to data sharing. Most AB-CPRE efforts focus on data privacy and access control without considering re-encryption authentication, which can lead to incorrect results for users.
    Therefore, it is of interest to ensure that the re-encryption ciphertext is converted correctly from the original ciphertext. In a homomorphic encryption algorithm, the user can perform some kind of secure proxy calculation with the untrusted remote server. In this process, the server cannot see any private information. The homomorphic signature algorithm supports the signature operation consistent with the message, and the generated signature does not disclose any information related to the data set, which can meet the security requirements in the cloud environment, and is very suitable for the sensor network, network coding, and other message operation scenarios to ensure information security. This paper introduces homomorphic signature techniques in AB-CPRE, provides a verification mechanism for re-encryption performed by a verification server, and proposes a verifiable PRE scheme.
    Our main contributions in this article are as follows:
    • An AB-VCPRE scheme based on LWE is proposed. The scheme ensures by verification that the re-encryption ciphertext is correctly converted from the encryption ciphertext;
    • Fine-grained access control is implemented. In combination with fully homomorphic encryption, the delegation policy supports any polynomial-depth boolean circuit;
    • Robustness is achieved. The scheme uses a validation algorithm to achieve robustness. Forged or incorrectly shared ciphertexts can be detected by validating the re-encryption ciphertext with a validation server;
    • The scheme satisfies CPA security. The ciphertext in our scheme needs to be signed and verified using an unforgeable homomorphic signature. This paper demonstrates that the constructed AB-VCPRE scheme is CPA security based on a LWE problem.
    The rest of the paper is organized into seven sections. InSection 2, the related studies are described. InSection 3, the relevant definitions are introduced. InSection 4 andSection 5, we state the details of the scheme and the security analysis.Section 6 presents the efficiency analysis. The last section is a summary of the paper.

    2. Related Work

    Liang et al. [7] present an AB-PRE cryptographic primitive based on the augmented decisional bilinear Diffie–Hellman (DBDH) problem combining ABE and PRE for the first time, which empowers users to authorize in an access control environment. Li et al. [11] propose a proxy re-encryption scheme for a re-splitable threshold multi-agent, which is different from the encryption scheme on the ciphertext input and output plane and the re-encryption surface, which means the noise boundary has a wider range of choices and can ensure the security of the re-encryption key. Nunez et al. [12] propose a typical threshold proxy re-encryption scheme, which is based on a DBDH assumption, vulnerable to quantum attacks. Luo et al. [13] construct a standard lattice multi-hop AB-PRE scheme, which supports circuit access, has a short key, the key size is dependent on the depth of the circuit policy, and satisfies CPA security requirements based on the LWE problem in the selection security model. However, these PRE schemes may not show sufficient flexibility and practicality when the data owner wishes to select some but not all of the data for dissemination to certain users. Weng et al. [3] proposed a CPRE scheme where only those that satisfy the conditions can be re-encrypted, but it can only be applied to simple keyword-based conditions and will be limited in practical applications. Then, Yang et al. [8] propose a ciphertext policy-based AB-CPRE scheme, which supports a fine-grained decryption delegation. The ciphertext in the scheme is related to the access policy while the re-encryption key is related to the attributes, and the ciphertext can be re-encrypted only when the access policy satisfies the attributes. Huang et al. [14] propose PRECISE, which combines AB-CPRE with IBBE to support fine-grained re-encryption conditions for IBBE ciphertexts. Yao et al. [15] combine ciphertext authorization, key update, and ciphertext evolution to propose an improved revocable, identity-based ciphertext evolution conditional proxy re-encryption scheme for secure and efficient cloud data sharing.
    The universal CPRE algorithm cannot ensure the cloud server’s integrity during the re-encryption procedure, while the homomorphic signature algorithm has unforgettable security and privacy, which can effectively verify the honesty of the proxy during the re-encryption. Therefore, this paper uses a homomorphic signature algorithm to propose a PRE scheme with encryption validating on the lattice, which can effectively detect the illegal behavior of the proxy and provide a guarantee for the safe sharing of data.

    3. Preliminaries

    3.1. Lattice

    Definition 1 (lattice).
    The lattice is a linear combination of group b1,b2,,bn’s linearly independent vectors’ nmn integer coefficients in m-dimensional Euclidean space Rm, which is defined as:
    LB=i=1nxibi:xi,i=1,,n.
    Lemma 1
    ([16]).Take integer q3, m6nlogq, σm2ωlogm, there exists a PPT algorithm TrapGen1n,1m,q that generates a matrix Aqn×m and a trapdoor TAm×m for the lattice qA, i.e.,there is ATA=0modq, such that the distribution statistics satisfied by the matrix A are close to a uniform distribution on qn×m, and ||T˜A||Onlogq holds by an absolute margin.
    Lemma 2
    ([17]).Let q>2 and m>n+1logq+ωlogn. Select three uniform matrices D1,1m×k, Eqn×m,and Fqn×k at random for some polynomials with k=kn. Distribution E,ED,DTr and E,F,DTr are statistically indistinguishable for any vector rqm.
    LWE is a difficult problem under lattice. Regev [18] first proposed this in 2005 and proved that the average case is just as difficult to solve for several standard cells.
    Definition 2 (LWE).
    Given positive integer n, integer mn and q2, choosing uniform random matrix Aqn×m and vector sqn, vector eχm follows the error distribution. Given A,ATs+e, the LWE problem is to find s with non-negligible probability.
    Definition 3 (Small integer solutions problem, SIS).
    Let the defining parameters be β, q is a prime number, given positive integers m and n, select a matrix Aqn×m at random, solve for a non-zero vector of integers zm\0 with ||z||β. In 1996, Ajtai presented the SIS problem in the literature [16]. The homomorphic signature used for robustness in the paper is based on the SIS problem.

    3.2. Related Functions and Tools

    3.2.1. Functions of Bits and Power2

    According to the article [19], decomposing the vector into the form of an inner product can effectively control the error range of the vector. The following describes how to decompose vectors into bit representations.
    For anyxN, letx=i=0g12iximodq,xi0,1N. Output vectorBitx=x0,x1,,xg10,11×Ng, whereg=logq. For anyy=y1|y2||yN×, whereyi is a column vector, output matrix
    Power2(y)=y1y2y2y12y22y2g1y12g1y22g1yqNg×.
    It can be verified that for anyq, there isBitx,Power2y=x,yq1×.

    3.2.2. Discrete Gaussian Distribution

    For integer vectorscm,σ>0, the discrete Gaussian distribution on the m-dimensional latticeΛ is:
    D,σ,cx=ρσ,cxρσ,c=ρσ,cxxρσ,cx,xm.
    Lemma 3
    ([17]).Let q2, B is a matrix over qn×m and m>n. Let TB is the base of qB, σ||T˜B||ωlog2m. For uqn, there are:
    • Set the rank of Bqn×m is n, Eqn×m, R1,1m×m, σ||T˜B||ωlog2m.Let F=B|BR+Eqn×2m, PPT algorithms SampleBasisLeftB,BR+E,TB,σ, where TB is the base of qB, output a short base TFqF statistical distribution to ψσ2m×2m ;
    • SamplePreB,TB,σ,u: There is trapdoor TB of lattice qB, the real number σ||T˜B||ωlogn, for any vector uqn, a PPT algorithm SamplePreB,TB,σ,u capable of generating a vector e from a distribution that is statistically close to Dm,σx, satisfying Be=umodq;
    • Let the rank of Gqn×m be n, Bqn×m, a low-dimensional matrix S1,1m×m, a trapdoor for the lattice qG, and σ||T˜E||||R||ωlog2m. PPT algorithm SampleBasisRightB,G,S,TG,σ output a short base TB|BS+GqB|BS+G with a statistical distribution close to Ψσ2m×2m.

    3.3. Key Homomorphism

    By embedding algorithmic circuits in LWE matrices, Boneh et al. suggested an ABE approach for algorithmic circuits in their paper [20], and the method was used in many LWE-based structures, for example, predicate encryption [21], constraint PRFs [22], watermarks for PRFs [23], etc.
    Definition 4.
    For any positive integer k, d, a g of depthd boolean circuit, defining families of functions Fk,d=g:0,1k0,1.
    Lemma 4
    (Fully homomorphic encryption [20,24]).Given parameters t, h, k, d, q, χ, where χ is a B-bounded noise distribution, h is a security parameter, htlogq. For any matrices B1,B2,,Bqt×h, any boolean circuit g:0,1k0,1 for any depthd, x0,1k, matrix GZqn×m, vector sqt, eiχh for ik, if pi=xiG+BiTs+ei,ik,
    • Evalpkg,B1,Bk: Taking a circuit g, k matrices Biik as input, outputs a matrix Bg;
    • Evalctg,xi,pi,Biik: Given a circuit g, k matrices Biik, a vector x0,1k and k vectors p1,,pk, outputs a vector pg, satisfying pg=Bg+gxGTs+eg, where Bg=Evalpkg,B1,,Bk, ||eg||Bh1+hd with all but negligible probability;
    • Evalsimg,Si,xiik,A: On input a circuit g, a vector x0,1k, k matrices Sii[k], a matrix Aqt×h, outputs a matrix Sg satisfying ASggx=Bg, where ||Sg||220h1+hd<1+hd+1 with all but negligible probability.

    3.4. Homomorphic Signature

    A homomorphic signature is a valid signature that permits any entity to conduct a sequence of operations on the original message and its signature without the signing private key.
    Definition 5 (Homomorphic signature).
    The probabilistic polynomial-time algorithm KG,Sign,SignEval,Verify is included in the following tuple is the homomorphic signature (HS) scheme:
    • HS.KG(p,d,N): Take a safety parameter p, a circuit depth d,and a message length N as input, output a signature private key hssk and a verification key hsvk;
    • HS.Signhssk,M: Accept as inputs the message M requiring signature and hssk, output the signature σ;
    • HS.SEval(g,σ): Take an evaluation circuit g:0,1N0,1 and signature σ as input, output a homomorphic calculation signature σ;
    • HS.Verify(hsvk,y,g,σ*): Take hsvk, a message y, a circuit g and a signature σ, the verification algorithm either accepts the signature (outputs 1) or rejects it (outputs 0).
    Correctness. On inputp,d,N,HS.KG(p,d,N)hsvk, hssk,M0, 1N,HS.Sign(hssk,M)σ, any circuitg:0, 1N0, 1 with a depthd,gMy, the equation below holds:
    PrHS.Verifyhsvk,y,g,HS.SEvalg,σ=1=1.

    3.5. Robustness

    A key component of the AB-VCPRE design is robustness. The fundamental tenet is that by re-encryption key sharing, an adversary cannot create ciphertext that is falsely obtained yet can be correctly authenticated. The following gameExptARb describes the robustness of the AB-VCPRE scheme.
    During the guessing phase, the adversary outputs the appropriate ciphertextCT satisfiesVerfyhsvk,CT=1 whileSetup,KeyGen query,ReKeyGen query, andReEnc query interact as specified in Definition 6.
    The adversary’s advantage is characterized asAdvARb=PrExptARbλ=1 .

    4. The Model of AB-VCPRE with Re-Encryption Verification

    4.1. Scheme Definition

    An AB-VCPRE scheme consists of seven algorithms. The specific flow chart is shown inFigure 1. In comparison to the standard AB-VCPRE, a verification method calledReEncVer is added to check for an honest transformation of the ciphertext. TheReEncVer algorithm is publicly verifiable because all that is required are the original ciphertext and the corresponding re-encryption ciphertext.
    • Setup(n): Input security parametern, output public parameterspp;
    • KeyGen(pp,α): Givenpp, output the public/private key pairpkα,skα for userα;
    • Encpp,pkα,μ,x: Takingpp,pkα, plaintextμ, and an attribute vectorx as input, output a related ciphertextCTα withx;
    • Dec(pp,skα,CTα): Takingpp,skα, andCTα as input, output a messageμ;
    • ReKeyGenpp,skα,pkβ,f: Inputpp,skα of userα,pkβ of userβ, and a control policy/functionf, returns the re-encryption keyRKα,fβ related tof and the corresponding signature, outputs the re-encryption verification keyVKαβ from userα to userβ;
    • ReEncpp,RKα,fβ,CTα: Withpp,pkα of userα,CTα associated withx, andRKα,fβ as input. Whenfx=0 remains constant, output the converted ciphertextCTβ, otherwise output;
    • ReEncVerVKαβ,CTα,CTβ: If the original ciphertext’s conversion to the re-encryption ciphertext is performed correctly, the output of the authentication algorithm is valid, otherwise output (invalid ciphertext).
    Correctness. In an AB-VCPRE scheme, correctness has the following two requirements:
    • Decryption correctness.
    For security parameter n, attribute vectorsx=xiil, messageμ0,1m, the equations below hold
    Dec(pp,skα,Encpp,pkα,μ,x)=μ;
    Decpp,skβ,ReEncpp,RKα,fβ,CTα=μ,
    where the decryption error is negligible.
    2.
    Verification correctness.
    Verification correctness is satisfied using an AB-VCPRE scheme. We have the probabilityPrReEncVer(VKαβ,CTα,CTβ)=1=1 if all converted ciphertextsCTβ are produced by the re-encryption keysRKα,fβ andReEnc(pp,RKα,fβ,CTα).
    Entropy 25 00822 g001 550
    Figure 1. Flow chart of AB-VCPRE.
    Figure 1. Flow chart of AB-VCPRE.
    Entropy 25 00822 g001

    4.2. Security Model

    Definition 6.
    To demonstrate the CPA security of the AB-VCPRE scheme, the game between challenger C and adversary A is used.
    Init. Before seeing the public parameterpp, adversaryA declares a vector of attributesx.
    Setup. Initialize the public parameterspp in ChallengerC and use theKeyGen algorithm to obtainskθ,pkθ, and transmitpp andpkθ toA.
    Query phase 1.A chooses some queries as the following:
    • KeyGen queryOKeyGen:A performs a key query.C runsKeyGenpp,β to produce thepkβ,skβ;
    • ReKeyGen queryOReKeyGen:C runsReKeyGenpp,skα,pkβ,f to providerkα,fβ whenC receives a re-encryption key query, wherefx=0 andpkβ=KeyGenpp,β. AndC responds with verification key by running algorithmHS.KeyGen(n,dhs,N);
    • ReEnc query OReEnc:A sendsCTα, x, f toC wherexx andfx=0,C computes a re-encryption keyrkα,fβ as inOReKeyGen and returns a re-encrypted ciphertextCTβ by runningReEncpp,RKα,fβ,CTα.
    Challenge phase.A chooses two messages of the same lengthμ0 andμ1(μ0μ1),C executivesCTEncpp,pkθ,x,μb, whereb0,1, and gives back the original ciphertext fromCT toA.
    Query phase 2. Similar to phase 1,A keeps asking the query.
    Guess.b0,1 is guessed byA, and ifb=b, the game winner isA.
    The benefits ofA are described asPrb=b=1/2+negln.

    5. Our Scheme

    5.1. Our Scheme Composition

    Using the LWE difficulty problem as a basis and the homomorphic signature algorithm, this paper proposes an AB-VCPRE scheme.
    • Setupn
    Let security parametersnZ, wherem6nlogq,q/4Bm+1Od.
    Central agency generates random security parameters primeq, an error sampling algorithmχ for B-bounded distributions,Bnωlogn. The boolean circuit’s maximum depth isd, the number of attributes is, and the Gaussian parameter isσ,σ=ωm+1d+1ωlogm ;
    Create the corresponding trapdoor matrixTAαqm×m and the matrixAαqn×m by running algorithmTrapGen1n,1m,q;
    Select uniform matricesB1,,Bqn×m with random.
    Output public parameterspp:=Bii,χ,χ.
    2.
    KeyGenpp,α
    Randomly select a matrixDαqn×m, and runRαSamplePreAα,Tα,Dα,σ, such thatAαRα=Dα.
    Outputpkα=(Aα,Dα),skα=(Rα,Tα).
    3.
    Enc(pp,pkα,μ,x)
    Given the plaintextμ0,1m, attribute vectorsx0,1, wherex=xii. Select random vectorssqn, error vectorse1,e2χm;
    Computecc=(c1,c2):
    c1=AαTs+e1,c2=DαTs+e2+q/2μ.;
    ca should be set to ifx is null or none. Or else randomly choose uniform matricesSi1,1m×m at random, calculate
    ca=ci=(xiG+Bi)Ts+SiTe1iqm.
    Output ciphertextCTα:=(cc,ca);
    4.
    Dec(pp,skα,CTα)
    Inputskα=(Rα,Tα),CTα=(cc,ca).
    Computeμ^=c2+RαTc1. Setμi=1 forim if|q/2μ^i|<q/4, or else setμi=0.
    Outputμ0,1m;
    5.
    ReKeyGen(pp,skα,pkβ,f)
    Inputpkβ=(Aβ,Dβ),skα=(Tα,Rα),pp=Bii,χ,χ, a policyfF.d.
    Randomly selected matricesE1χ2km×n,E2,E3χ2km×m,s is the Gaussian parameter, ands=ω(m+1d+3/2).
    LetBf=Evalpk(f,B1,,B),F=(Aα|Bf)n×2m. RunningTα,fSampleBasisLeft(Aα,Bf,Tα,s). Generate the basicTα,f forF.
    Execute algorithmSamplePre(F,Tα,f,Dα,σ) to produceRα,f, in order to obtainFRα,f=Dα, of whichRα,f2m×m. Compute the re-encryption key:
    Q=E1Aβ+E2E1Dβ+E3+Power2q(Rα,f)0m×mIm×mq(2km+m)×2m;
    Creating the verification key using algorithmHS.KeyGen(n,dhs,N) and signature private key(hsvk,hssk), parse each line ofQ aswiq2m(1i2mk+m), then use the signature algorithm to signwi asσi=HS.Sign(hssk,wi);
    To validate the signature, publishhsvk. DeliverQ and the associated signatureRKα,fβ=Q,σi(1i2mk+m) across a secure channel to the proxy server;
    6.
    ReEnc(pp,RKα,fβ,CTα) 
    Inputpp=Bii,χ,χ,RKα,fβ=Q,CTα=(cc,ca).
    Output iff(x)0 orca=, or elsec3=Evalct(f,xi,Bi,pii),c˜1,3=(c1;c3). The proxy performs the ciphertext conversion(c1T|c2T)=c˜1,3T|c2TQ;
    The valuation circuit isgCα(Q)=c˜1,3T|c2TQ, and the evaluation algorithm from HS creates a signatureσαβ=HS.SignEval(gCα,σi(1i2mk+m)).
    OutputCTβ=cc=(c1,c2),ca=,σαβ as converted ciphertext;
    7.
    ReEncVer(hsvk,CTα,CTβ)
    Input verification keyhsvk, original ciphertextCTα=(cc=(c1,c2),σβ), converted ciphertextCTβ=(cc=(c1,c2),σαβ).
    Verification algorithm outputHS.Verify(hsvk,gCα,cc,σαβ).
    Figure 2 depicts the new AB-VCPRE scheme’s workflow. If Bob wants to share Alice’s content stored on the cloud server, first KGC generates a public key and private key for Alice and Bob and sends the keys to them. Then, Alice generates the re-encryption key and original ciphertext, which are sent to the cloud server and executes the re-encryption algorithm. The cloud server delivers both the original and the re-encryption ciphertext to the authentication server after the re-encryption operation is finished. The authentication server verifies the algorithm for re-encryption. If the verification algorithm outputs 1, the authentication server sends Bob the ciphertext, Bob recovers the message by decrypting the ciphertext matching to it, otherwise output.

    5.2. Correctness and Parameters

    5.2.1. The Correctness of the Original Ciphertext

    With the private keyRα, the original ciphertext can be decrypted.
    μ^=c2+RαTc1=DαTs+e2+q/2μ+RαTAαTs+e1=e2+e1Rαnoise+q/2μ.
    Only if the errore2+e1Rα does not exceedq/4 the decryption algorithm is able to correctly recover the plaintextμ. In fact,||e2+e1Rα||mB+mmσBB1+mOdq/4.

    5.2.2. Correctness of Conversion Ciphertext

    After passing one conversion, the corresponding conversion cipher is decrypted as follows:
    (c1T|c2T)=c˜1,3T|c2T·Q=c˜1,3T|c2T·E1Aβ+E2E1Dβ+E3+Power2q(Rα,f)0m×mIm×m=c˜1,3T·E1Aβ+E2|c˜1,3T·E1Dβ+E3+Power2q(Rα,f)+c2T=c˜1,3T·E1Aβ+E2|c˜1,3T·E1Dβ+E3+c˜1,3T·Power2q(Rα,f)+DαsT+e2T+q/2μT=c˜1,3T·E1Aβ+E2|c˜1,3T·E1Dβ+E3+e1T|efTRα,f+e2T+q/2μT
    WhereAβ andDβ are the userβ‘s public keys,||E1||2kmB,||E2||2kmB,||E3||2kmB with overwhelming probability. By the theorem we have:
    c˜1,3TPower2q(Rα,f)=c1;c3TRα,f=c1T|c3TRα,f=sTA+e1T|sTfxG+Bf+efTRα,f=sTA+e1T|sTBf+efTRα,f=sTAα|Bf+e1T|efTRα,f=sTDα+e1T|efTRα,f
    whereRα,f2mσ,||ef||Bmm+1d with overwhelming probability.
    The conversion ciphertext is decrypted by the private keyRβ.
    c1T|c2TRβI=c˜1,3TE1Aβ+E2Rβ+c˜1,3TE1Dβ+E3+e1T|efTRα,f+e2T+q/2μT=c˜1,3TE2Rβ+c˜1,3TE3+e1T|efTRα,f+e2Tnoise+q/2μT
    where:
    ||c˜1,3TE2Rβ+c˜1,3TE3+e1T|efTRα,f+e2T||2km2mσB+2kmmB+2mmm+1dσB+mBBm+1Odq/4
    with overwhelming probability. Therefore, the value ofμ can be decrypted correctly, i.e., the transformed ciphertext can be decrypted correctly.
    In fact, the algorithm can only obtain single-hop, because inReEnc, we setca=, which means that the re-encryption ciphertext cannot be encrypted again. This design is our first work and we will investigate this problem and extend it to multi-hop schemes in future work.

    5.2.3. Correctness of Ciphertext Verification

    In the HS scheme, the re-encryption verifiability is carried out using the algorithmHS.Verify. InABVCPRE.ReEncpp,RKα,fβ,CTα, input the ciphertextCTα and the re-encryption keyRKα,fβ, usinggCα(Q)=Bitsq(c1;c3)T|c2TQ as a valuation circuit, re-encryption key as circuit input,(c1T|c2T)=Bitsq(c1;c3)T|c2TQ can be seen as some computation at the message level and inσαβ=HS.SignEval(gCα,σi(1i2mk+m)), with signatureσi(1i2mk+m) as input, and it can be interpreted as a computation of the signature level. Ifσαβ is in fact the outcome of an honest computation based onHS.SignEval(gCα,σi(1i2mk+m))=σαβ, the concept of correctness for homomorphic signature schemes holds. ThenHS.Verify(hsvk,gCα,cc,σαβ) can pass the verification and the verification algorithm’s accuracy is demonstrated.

    5.3. Security

    Theorem 1 (Security).
    The scheme we construct is CPA security under LWEn,q,χ assumption.
    Proof of Theorem 1.
    A game-based approach is used in this proof. A challengerC can be built to resolve the LWE presumption if it is possible for an adversaryA to breach the CPA’s security.
    Game 0: In the original CPA attack paradigm described inSection 3, this is a true game betweenA andC.
    Game 1: Same as game 0, but with a change in the way the common matrixBii is generated. On receipt ofx,C generates uniformly random small parametric matricesS1,,S1,1m×m, calculateBi=ASixiG wherei. □
    Lemma 5.
    Game 0 is statistically indistinguishable from game 1.
    Proof of Lemma 5.
    In game 0,Bii is a random uniform matrix onqn×m. In the challenge query,Sii is the construction of the generated challenge ciphertextc random matrix. However, in game 1,eχm serves as the error vector andSi is used to generateBi andc. By Lemma 2, the distributionA,ASii,e andA,Aii,e are statistically equivalent for anyAiiqn×m. Hence, no statistically significant difference exists between the common matrixBii in games 0 and 1. This shows that there is no statistically significant difference between games 0 and 1. □
    Game 2: ChallengerC randomly selectsAθ onqn×m with no trapdoor and utilizes theTrapGen to produceB and its trapdoorTB.
    KeyGen queryOKeyGen.A performs a key query.C runKeyGenpp,β to produce thepkθ,skθ, outputpkβ toA.
    ReKeyGen queryOReKeyGen. When adversaryA interrogatesOReKeyGenpkα,pkβ,f to makefx0, challengerC executesEvalsim of Lemma 4 to create a re-encryption key.
    • pp=Bii,χ,pkβ=Aβ,Dβ, policyfF,d, setBf=Evalpkf,B1,,B, a policyF=Aθ|Bfn×2m;
    • RunSfEvalsimf,Si,xii,A to makeASffxG=Bf. It follows from the definition ofEvalsim that there is||Sf||2<1+md+1;
    • C executiveSampleBasisRightAθ,G,Sf,TG,s to generate short basicTθ,f ofAθ|Bf. RunSamplePreF,Tθ,f,Dθ,σ to produceRθ,f2m×m, hence, an equalsFRθ,f=Dθ;
    • Whenfx0, letR¯α,f=Power2qRα,f, matrixE1χ2km×n,E2,E3χ2km×m, create the matrix
    Q=E1Aβ+E2E1Dβ+E3+Power2q(R¯θ,f)0m×mIm×mq(2km+m)×2m;
    5.
    Whenfx=0, letR¯α,f=Power2qRα,f, matrixE1χ2km×n,E2,E3χ2km×m, select a random uniform distribution matrixMq2km×m, create the matrix
    Q=E1Aβ+E2M+R¯θ,f)0m×mIm×mq(2km+m)×2m.
    ThenA send the challengerC some re-encryption verification questions, who will then carry out the operation honestly and report the results to the adversaryA.
    ReEnc queryOReEnc.C outputReEncpp,CTα,RKθ,fβ.
    Lemma 6.
    Game 1 is computationally indistinguishable from game 2.
    Proof of Lemma 6.
    The technique employed to generate the re-encryption key differs between games 1 and 2. Whenfx=0 hold, here is the re-encryption key:
    rkθ,fβ=E1Aβ+E2E1Dβ+E3+R¯θ,f0m×mIm×min Game 1E1Aβ+E2M+R¯θ,f)0m×mIm×min Game 2
    Corollary 1.
    By applying the standard mixing parameters, the ensuing distributions cannot be distinguished computationally. Otherwise, there is a useful algorithm for resolving the LWEn,q,χ problem.
     1.
    D,DY+F and D,V, where Dqn×m, Yχm×, Fχn×, Vqn×;
     2.
    (D,K,DY+F,KY+F) and (D,K,DY+F,KY+F), where D,Kqn×m,Y,Y,F,Fχn×m;
     3.
    (D,{DYi+Fi}i[t]) and (D,{Vi}i[t]), where Dqn×m, Yiχn×m, Fiχn×, Viqn× for i[t], t=poly(n).
    By Corollary 1, under the LWE assumption, it is evident that game 1 and game 2 are computationally indistinguishable.
    Additionally, the private key creation mechanism is undetected from game 1 to game 2, and the produced private key continues to satisfyAαRα=Dα, while the re-encryption key is selected from the uniform distribution, which is similar to the standard LWE distribution. Furthermore, because homomorphic signatures are non-negligible, the adversary in the CPA game cannot offer an invalid ciphertext to pass re-encryption verification, that is, re-encryption verification provides no auxiliary capacity to the adversary.
    On the other side, to demonstrate it, ifA succeeds in the re-encryption verifiability game, then by interacting with challengerC, the simulatorS can break the homomorphic signature’s unforgeability.
    The verification keyhsvk is first acquired by the simulatorS fromC. The re-encryption keyRKθ,fβ is then chosen by adversaryA as the one it wants to assault, and the simulator s is providedRKθ,fβ byA. To create the signature,S asks the messageRKθ,fβ for a homomorphic signature to obtainσi1i2mk+m and then gives it back toA. The challengerC then calculatesHS.Verifyhsvk,gCα,cc,σθβ wheneverA outputs a false re-encryption ciphertextCTβ=cc=c1,c2,ca=,σθβ after the simulatorS has parsed it, wheregCα is an evaluation circuit converted from the original ciphertext.
    IfA wins the verifiability of re-encryption, the forgery ofA‘s signatureσθβ can passHS.Verify, which also counts as a valid homomorphic signature. Therefore, breaking the unforgeability of the homomorphic signature provides the same advantage as breaking the re-encryption verifiability of the AB-VCPRE scheme. When all of the aforementioned factors are considered, game 1 and game 2 are similar from the standpoint of the adversary. □
    Game 3: Similar to game 2, except that the challenge cipherCT=(c1, c2)2m×1 given to the opponent is no longer honestly generated, but chosen evenly and randomly in2m×1. Due to the fact that the challenge cipher is a random factor in the cipher space, it is independent ofμ0 andμ1, so there is zero advantage to theA in this game.
    Lemma 7.
    Game 2 is statistically indistinguishable from game 3.
    Proof of Lemma 7.
    IfA distinguishes game 2 from game 3 with a non-negligible advantage, then there is a simulatorS that can use the information acquired byA to resolve theLWEn,q,χ problem. □
    LWE instance. The simulatorS requests the LWE prophesy device to acquire an LWE instanceY,bqn×2m×q2m, possiblyY,b is a truly random distribution orb=YTs+e is a pseudo-random distribution of noiseeχm from the LWE.
    Public parameters. LetAθ|Dθ:=Y, sample a uniform matrixDθqn×m to generate a randomly identified public keyAθqn×m, select random matricesS1,,S1,1m×m, and letBi=AθSixiG fori. Then the common matrixpp=({Bi=AθSixiG}i[], χ), public keypk:=Aθ,Dθ.
    Queries. As with game 2,B answers all ofA‘s queries.
    Challenge ciphertext. Generate challenge cipher via LWE instance
    c1;c2:=z; 
    c11T||cT=c1TS1||S.
    The answer toA is then returned. In this case, the distribution of the challenge cipher is the same as that of game 2.
    z=c1;c2=YTs+e=Aθ|DθTs+e1;e2
    whereYqn×2m,sqn,eχ2m.
    Challenge ciphertext:
    c1=AθTs+e1,c2=DθTs+e2+q/2μ;
    ca=ci=(xiG+Bi)Ts+(Si)Te1i.
    Then throughBi=AθSixiG, there is
    c11T||cT=sTAθS1+e1TS1||sTAθS+e1TS=sTAθ+e1TS1||S.
    Statistically, the challenge ciphertext is indistinguishable in the alternative scenario ifY andz are chosen consistently, according to the leftover hash lemma [25].
    Output. The simulatorS outputsA‘s guess afterA predicts whether it interacts with game 2 or game 3.S can solve theLWEn,q,2m,χ problem with the same probability ifA can distinguish between games 2 and 3. However, theLWEn,q,2m,χ problem is mysterious, so game 3 cannot be won byA.
    The Proof of Theorem 1 is completed by considering game 0 to game 3.
    Theorem 2 (Robustness).
    The new AB-VCPRE scheme fulfills robustness if the homomorphic signature ΠHS satisfies unforgeability.
    Proof of Theorem 2.
    Using a randomly selected evaluation circuit, a dishonest proxy server is able to obtain an invalid re-encryption ciphertext share and corresponding signature. However, the original ciphertext should describe the right evaluation circuit. When the correct evaluation circuit diverges from the forgery, verification fails, allowing the proxy server to convert the data truthfully.
    Homomorphic signatures can be used to demonstrate the robustness of the new scheme. IfA can defeat the game outlined in Definition 6, then by collaborating withC in the homomorphic signature security model, it is able to build a simulatorS that compromises the homomorphic signatures’ unforgeability. Here is the procedure.
    A picks the re-encryption key it wishes to attack once the simulatorS receives the challengerC‘s verification keyhsvk. WhenA sends simulatorS a forged re-encryption ciphertext shareCTβ=cc=c1,c2,ca=,σθβ,S processes it to obtainhsvk,cc=c1,c2,gCα,σθβ and submits it to an oracle as a forged homomorphic signature.
    IfA succeeds in the robustness game, thenCTβReEncpp,RKθ,fβ,CTθ, butHS.Verifyhsvk,cc=1, this also means thatHS.Verifyhsvk,gCα,cc,σθβ was able to pass the verification, so the simulatorS successfully forged an illegal signature, which will be submitted to oracle later. This indicates that the homomorphic signature algorithm’s unforgeability has been compromised.
    Thus, if the homomorphic signature algorithmΠHS meets the requirement for unforgeability, the signature is considered unforgeable. The new AB-VCPRE is capable of achieving robustness. □
    Theorem 3 (Weak collusion resistance).
    The new AB-VCPRE scheme can realize weak collusion resistance, if the LWE problem is difficult.
    Proof of Theorem 3.
    Weak collusion resistance is that when an agent with a re-encryption key colludes with a trustee with a re-encryption key, the agent obtains only an approximate result, not an exact result.
    The re-encryption key isE1Aβ+E2 andE1Dβ+E3+Power2q(Rα,f), which can be further expressed as
    AβDβ,E1AβDβ+E2E3+Power2qRα,f
    This is a standard LWE distribution that is not different from unified distribution, nor can anyone obtain any useful information about private keys. After collusion, Bob encrypted the above equation with his private keyRβ and gotE2Rβ+E3+Power2qRα,f. As the noise generated during re-encryption is very low, the encryption message can be well restored byE2Rβ+E3+Power2qRα,f. Therefore, in the case of collusion, the private key seems to have all been compromised. However, this is not the case. We can restore an equivalent private key, but this equivalent private key is different from the original private key. We provide the following two explanations. On the one hand, any data that can initially be decrypted bySKα can be easily re-encrypted and read by an enemy who possesses bothRKα,fβ andSKβ. On the other hand, they are unable to determine the delegator’s precise private keySKα from the equation above. Although Power2 is an easy-to-reverse feature, because it contains some noise fromE2Rβ+E3, you cannot obtain an exact private key from the first n-line ofE2Rβ+E3+Power2qRα,f. Therefore, the method proposed in this project has weak collusion resistance. □

    6. Efficiency Analysis

    Paper [15] proposed a CPRE algorithm based on DBDH, which supports fine-grained authorization and collision resistance security, however, it cannot achieve robustness. Paper [11] and paper [12] are PRE schemes with verification, both of which are robust and the method for achieving robustness is zero-knowledge proof with a decisional discrete logarithm tool, but are not as low complexity as the schemes in this paper. In addition, paper [12] is based on discrete logarithmic constructions and is not resistant to quantum attacks. Although paper [11] is a scheme using lattice construction, which seems to be resistant to quantum attacks, the robustness verification tool is a decisional discrete logarithm, so in general the scheme is not resistant to quantum attacks.Table 1 demonstrates that the approach presented in this paper is not only robust to proxy re-encryption but also simple to implement and resistant to quantum attacks.
    InTable 2, the efficiency of the scheme is analyzed through plaintext space, size of ciphertext, size of re-encryption key, encryption complexity, re-encryption complexity, and robustness verification complexity.q represents an integer on modulo q.Tp,Te,Ts,Tv, andTm denote the computation of pairing, modular exponentiation, signature, ciphertext verification, and multiplication operation, respectively.Th,TGVP, respectively, represent the time spent for the hash function and the GVP algorithm.Table 2 demonstrates that the computational complexity of the literature [15] is worse than that of the proposed scheme, and is not robust. In terms of robustness verification complexity, when a boolean circuit evaluates the original signature, homomorphic signature computation is a boolean operation that is more straightforward and effective. Here, we choose the linear homomorphic signature scheme based on the difficult problem of SIS on the lattice proposed in paper [26] for comparison. Compared with the scheme [12], the proposed scheme has better re-encryption complexity, encryption complexity, and robustness verification complexity. Compared with the scheme [11], the proposed scheme in this paper only needs to pay some extra cost to encrypt the message vector, and the robustness verification complexity is lower.

    7. Conclusions

    By using homomorphic signatures, this paper proposes an AB-VCPRE scheme, which solves the problem of being unable to detect illegal proxy behavior in traditional PRE schemes. The scheme is robust enough to allow proxy servers that have sent invalid transformed ciphertext shares to be detected. In terms of security, the scheme is CPA security based on a LWE problem and is resistant to quantum attacks. In terms of efficiency, the scheme has advantages in re-encryption and robustness verification computational efficiency. In addition, there is some room for improvement in the performance of our solutions, and constructing a multi-hopping PRE scheme will be the focus of our next work.

    Author Contributions

    Conceptualization, Y.T., M.J. and H.M.; methodology, M.J. and H.M.; validation, M.J., Y.T. and H.M.; formal analysis, M.J. and L.Y.; writing—original draft preparation, M.J.; writing—review and editing, H.M., C.Z. and L.Y.; supervision, H.M. and C.Z.; funding acquisition, Y.T. All authors have read and agreed to the published version of the manuscript.

    Funding

    This research is partially supported by the Henan Key Laboratory of Network Cryptography Technology (LNCT2022-A11) and the Shaanxi Key Laboratory of Information Communication Network and Security (ICNS202006).

    Institutional Review Board Statement

    Not applicable.

    Informed Consent Statement

    Not applicable.

    Data Availability Statement

    Not applicable.

    Conflicts of Interest

    The authors declare no conflict of interest.

    References

    1. Blaze, M.; Bleumer, G.; Strauss, M. Divertible protocols and atomic proxy cryptography. In Proceedings of the Advances in Cryptology—EUROCRYPT’98: International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, 31 May–4 June 1998; pp. 127–144. [Google Scholar] [CrossRef]
    2. Green, M.; Ateniese, G. Identity-based proxy re-encryption. In Proceedings of the Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, 5–8 June 2007; pp. 288–306. [Google Scholar] [CrossRef]
    3. Weng, J.; Deng, R.H.; Ding, X.; Chu, C.-K.; Lai, J. Conditional proxy re-encryption secure against chosen-ciphertext attack. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia, 10–12 March 2009; pp. 322–332. [Google Scholar] [CrossRef]
    4. Sahai, A.; Waters, B. Fuzzy identity-based encryption. In Proceedings of the Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 24–26 May 2005; pp. 457–473. [Google Scholar] [CrossRef]
    5. Zamite, J.; Domingos, D.; Silva, M.J.; Santos, C. Group-based discretionary access control in health related repositories.J. Inf. Technol. Res. JITR2014,7, 78–94. [Google Scholar] [CrossRef]
    6. Zhao, J.; Feng, D.; Zhang, Z. Attribute-based conditional proxy re-encryption with chosen-ciphertext security. In Proceedings of the 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, Miami, FL, USA, 6–10 December 2010; pp. 1–6. [Google Scholar] [CrossRef]
    7. Liang, X.; Cao, Z.; Lin, H.; Shao, J. Attribute based proxy re-encryption with delegating capabilities. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia, 10–12 March 2009; pp. 276–286. [Google Scholar] [CrossRef]
    8. Yang, Y.; Lu, H.; Weng, J.; Zhang, Y.; Sakurai, K. Fine-grained conditional proxy re-encryption and application. In Proceedings of the Provable Security: 8th International Conference, ProvSec 2014, Hong Kong, China, 9–10 October 2014; pp. 206–222. [Google Scholar] [CrossRef]
    9. Mao, X.; Li, X.; Wu, X.; Wang, C.; Lai, J. Anonymous attribute-based conditional proxy re-encryption. In Proceedings of the Network and System Security: 12th International Conference, NSS 2018, Hong Kong, China, 27–29 August 2018; pp. 95–110. [Google Scholar] [CrossRef]
    10. Ge, C.; Susilo, W.; Wang, J.; Huang, Z.; Fang, L.; Ren, Y. A key-policy attribute-based proxy re-encryption without random oracles.Comput. J.2016,59, 970–982. [Google Scholar] [CrossRef]
    11. Li, J.; Ma, C.; Zhao, Q. Resplittable threshold multi-broker proxy re-encryption scheme from lattices.J. Commun.2017,38, 157–164. [Google Scholar]
    12. Nunez, D.Umbral: A Threshold Proxy Re-Encryption Scheme; NuCypher Inc. and NICS Lab, University of Malaga: Málaga, Spain, 2018. [Google Scholar]
    13. Luo, F.; Al-Kuwari, S.; Wang, F.; Chen, K. Attribute-based proxy re-encryption from standard lattices.Theor. Comput. Sci.2021,865, 52–62. [Google Scholar] [CrossRef]
    14. Huang, Q.; Yang, Y.; Fu, J. PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks.Future Gener. Comput. Syst.2018,86, 1523–1533. [Google Scholar] [CrossRef]
    15. Yao, S.; Dayot, R.V.J.; Kim, H.-J.; Ra, I.-H. A novel revocable and identity-based conditional proxy re-encryption scheme with ciphertext evolution for secure cloud data sharing.IEEE Access2021,9, 42801–42816. [Google Scholar] [CrossRef]
    16. Ajtai, M. Generating hard instances of lattice problems. In Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, Philadelphia, PA, USA, 22–24 May 1996; pp. 99–108. [Google Scholar] [CrossRef]
    17. Agrawal, S.; Boneh, D.; Boyen, X. Efficient lattice (h) ibe in the standard model. In Proceedings of the Eurocrypt 2010, Berlin, Heidelberg, 30 May–3 June 2010; pp. 553–572. [Google Scholar]
    18. Regev, O. On lattices, learning with errors, random linear codes, and cryptography.J. ACM JACM2009,56, 1–40. [Google Scholar] [CrossRef]
    19. Aono, Y.; Boyen, X.; Phong, L.T.; Wang, L. Key-private proxy re-encryption under LWE. In Proceedings of the Progress in Cryptology–INDOCRYPT 2013: 14th International Conference on Cryptology in India, Mumbai, India, 7–10 December 2013; pp. 1–18. [Google Scholar] [CrossRef]
    20. Boneh, D.; Gentry, C.; Gorbunov, S.; Halevi, S.; Nikolaenko, V.; Segev, G.; Vaikuntanathan, V.; Vinayagamurthy, D. Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. In Proceedings of the Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, 11–15 May 2014; pp. 533–556. [Google Scholar] [CrossRef]
    21. Gorbunov, S.; Vaikuntanathan, V.; Wee, H. Predicate encryption for circuits from LWE. In Proceedings of the Advances in Cryptology—CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, 16–20 August 2015; pp. 503–523. [Google Scholar] [CrossRef]
    22. Brakerski, Z.; Vaikuntanathan, V. Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions: Or: How to Secretly Embed a Circuit in Your PRF. In Proceedings of the Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, 23–25 March 2015; pp. 1–30. [Google Scholar] [CrossRef]
    23. Kim, S.; Wu, D.J. Watermarking PRFs from lattices: Stronger security via extractable PRFs. In Proceedings of the Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, 18–22 August 2019; pp. 335–366. [Google Scholar] [CrossRef]
    24. Liang, X.; Weng, J.; Yang, A.; Yao, L.; Jiang, Z.; Wu, Z. Attribute-based conditional proxy re-encryption in the standard model under LWE. In Proceedings of the Computer Security–ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, 4–8 October 2021; pp. 147–168. [Google Scholar] [CrossRef]
    25. Håstad, J.; Impagliazzo, R.; Levin, L.A.; Luby, M. A pseudorandom generator from any one-way function.SIAM J. Comput.1999,28, 1364–1396. [Google Scholar] [CrossRef]
    26. Deng, Y. A Linearly Homomorphic Signature Scheme on Lattice.Henan Sci.2015,33, 1346–1351. [Google Scholar]
    Entropy 25 00822 g002 550
    Figure 2. The workflow of AB-VCPRE.
    Figure 2. The workflow of AB-VCPRE.
    Entropy 25 00822 g002
    Table
    Table 1. Comparison of related work.
    Table 1. Comparison of related work.
    Construction
    Tool
    Resisting
    Quantum Attack
    RobustnessMethod for
    Robustness
    Tool for
    Robustness
    Scheme [15]DBDHNoNoNoneNone
    Scheme [12]Discrete logarithmNoYeszero-knowledge proofDecisional discrete logarithm
    Scheme [11]LatticeNoYeszero-knowledge proofDecisional discrete logarithm
    Our schemeLatticeYesYesHomomorphic signatureLattice
    Table
    Table 2. Computational and communication complexity comparison.
    Table 2. Computational and communication complexity comparison.
    MessageSize of CiphertextSize of Re-Encryption KeyEncryption ComplexityRe-Encryption ComplexityVerification
    Complexity
    Scheme [15]{0,1}8q8qTp+8Te+Ts2Tp+Te+TvNone
    Scheme [12]{0,1}m4q6q3Te+Tm3Te+Tm2Te+Th
    Scheme [11]{0,1}n+1qnm+1n+1q2Tm2Tmnm+1n+1Te
    Our scheme{0,1}m+2mq4k+2m2q5Tm3Tm+TsTh+TGVP
    Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

    © 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).

    Share and Cite

    MDPI and ACS Style

    Tang, Y.; Jin, M.; Meng, H.; Yang, L.; Zheng, C. Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme.Entropy2023,25, 822. https://doi.org/10.3390/e25050822

    AMA Style

    Tang Y, Jin M, Meng H, Yang L, Zheng C. Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme.Entropy. 2023; 25(5):822. https://doi.org/10.3390/e25050822

    Chicago/Turabian Style

    Tang, Yongli, Minglu Jin, Hui Meng, Li Yang, and Chengfu Zheng. 2023. "Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme"Entropy 25, no. 5: 822. https://doi.org/10.3390/e25050822

    APA Style

    Tang, Y., Jin, M., Meng, H., Yang, L., & Zheng, C. (2023). Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme.Entropy,25(5), 822. https://doi.org/10.3390/e25050822

    Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further detailshere.

    Article Metrics

    No
    No

    Article Access Statistics

    For more information on the journal statistics, clickhere.
    Multiple requests from the same IP address are counted as one view.
    Entropy, EISSN 1099-4300, Published by MDPI
    RSSContent Alert

    Further Information

    Article Processing Charges Pay an Invoice Open Access Policy Contact MDPI Jobs at MDPI

    Guidelines

    For Authors For Reviewers For Editors For Librarians For Publishers For Societies For Conference Organizers

    MDPI Initiatives

    Sciforum MDPI Books Preprints.org Scilit SciProfiles Encyclopedia JAMS Proceedings Series

    Follow MDPI

    LinkedIn Facebook X
    MDPI

    Subscribe to receive issue release notifications and newsletters from MDPI journals

    © 1996-2025 MDPI (Basel, Switzerland) unless otherwise stated
    Terms and Conditions Privacy Policy
    We use cookies on our website to ensure you get the best experience.
    Read more about our cookieshere.
    Accept
    Back to TopTop
    [8]ページ先頭

    ©2009-2025 Movatter.jp