Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

HRA-Secure Proxy Re-encryption with Re-encryption Simulatability under Lwe in Standard Model

Version 1 : Received: 26 November 2023 / Approved: 28 November 2023 / Online: 28 November 2023 (10:22:47 CET)

How to cite: Wang, B.; Hou, L.; Yao, L.; Zhao, F.; Weng, J. HRA-Secure Proxy Re-encryption with Re-encryption Simulatability under Lwe in Standard Model. Preprints 2023, 2023111769. https://doi.org/10.20944/preprints202311.1769.v1 Wang, B.; Hou, L.; Yao, L.; Zhao, F.; Weng, J. HRA-Secure Proxy Re-encryption with Re-encryption Simulatability under Lwe in Standard Model. Preprints 2023, 2023111769. https://doi.org/10.20944/preprints202311.1769.v1

Abstract

Proxy re-encryption (PRE) is a momentous and widely used cryptographic technique. It enables a proxy to forward ciphertext without the need of decryption. PRE has received significant interest in applications like cloud computing, blockchain, and the Internet of Things. Despite its wide range of uses, PRE has also been subject to new security and privacy regulations. In PKC’19, Cohen $et~al.$~first drew attention to the weakness in PRE's security against chosen-plaintext attacks (CPA) and put up a more stringent security concept known as security against honest re-encryption attacks (HRA). Notably, Cohen provides a beneficial conclusion as well. It is proveded that PRE schemes with re-encryption simulatability property can be elevated from CPA to HRA security. It is also proved that CPA-secure PRE schemes with re-encryption simulatability property can be directly elevated to those satisfying HRA security. However, those PRE schemes with re-encryption simulatability are almost always based on pairings. In this study, to the best of our knowledge, we directly construct HRA-secure PRE with re-encryption simulatability for the first time based on the learning with errors (LWE) assumption, which was widely believed to be quantum-resistant. Based on the re-encryption key generation algorithm and the re-encryption algorithm construction method of the above scheme, we can modify attribute-based conditional proxy re-encryption (AB-CPRE) as well as the corresponding attribute-based proxy re-encryption (AB-PRE) algorithm to make them have re-encryption simulatability properties. Finally, by using this property, We boost the security of AB-CPRE scheme of ESORICS'21 from CPA to HRA and simplify the HRA-security proof for the AB-PRE of ESORICS'21.

Keywords

Proxy re-encryption; re-encryption simulatability; honest re-encryption attacks; learning with errors; quantum-resistant

Subject

Computer Science and Mathematics, Mathematics

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.