Skip to main content

Fine-Grained Access Control Proxy Re-encryption with HRA Security from Lattice

  • Conference paper
  • First Online:
Green, Pervasive, and Cloud Computing (GPC 2023)

Abstract

With the gradual formation of the cloud computing ecosystem, the value of cloud computing is becoming increasingly evident, and the accompanying information security issues have become core elements. The challenge lies in securely transmitting, computing, and sharing data in a cloud computing environment while keeping privacy. In this paper, we propose an access control proxy re-encryption scheme that supports inner product operations based on lattices in the standard model. First, the ciphertext is linked to the attributes, and condition for transition is associated with the re-encryption key. The proxy may re-encrypt ciphertext that meets attribute conditions instead of all ciphertext, thereby limiting the proxy’s conversion permissions. Furthermore, the user outputs the inner product value after decryption. Finally, honestly re-encryption attacks (HRA) security with increased CPA security is employed to better capture the target of proxy re-encryption. In addition, we propose a new method of hiding access policy, which uses differential privacy technology to perturb the attribute values to better safeguard the privacy of users.

Supported by the Natural Science Foundation of China (No. 62272124, No. 2022YFB2701400), Youth Science and Technology Talents Cultivating Object of Guizhou Province (No. QJHKY[2022]301), PhD Project of Guizhou Education University (No. 2021BS005) and the Postgraduate Innovation Program in Guizhou Province (No. YJSKYJJ[2021]028).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Agyekum, K.O.O., Xia, Q., Sifah, E.B., Cobblah, C.N.A., Xia, H., Gao, J.: A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain. IEEE Syst. J. 16(1), 1685–1696 (2022). https://doi.org/10.1109/JSYST.2021.3076759

    Article  Google Scholar 

  2. Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054122

    Chapter  Google Scholar 

  3. Cao, Y., Xu, S., Chen, X., He, Y., Jiang, S.: A forward-secure and efficient authentication protocol through lattice-based group signature in vanets scenarios. Comput. Netw. 214, 109149 (2022). https://doi.org/10.1016/j.comnet.2022.109149

    Article  Google Scholar 

  4. Chen, Z., Chen, J., Meng, W.: A new dynamic conditional proxy broadcast re-encryption scheme for cloud storage and sharing. In: 2020 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), pp. 569–576 (2020). https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00101

  5. Cohen, A.: What about bob? the inadequacy of CPA security for proxy reencryption. In: Lin, D., Sako, K. (eds.) PKC 2019. LNCS, vol. 11443, pp. 287–316. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17259-6_10

    Chapter  Google Scholar 

  6. Ge, C., Susilo, W., Baek, J., Liu, Z., Xia, J., Fang, L.: A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds. IEEE Trans. Dependable Secur. Comput. 19(5), 2907–2919 (2022). https://doi.org/10.1109/TDSC.2021.3076580

    Article  Google Scholar 

  7. Hörandner, F., Prünster, B.: Armored twins: Flexible privacy protection for digital twins through conditional proxy re-encryption and multi-party computation. In: di Vimercati, S.D.C., Samarati, P. (eds.) Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, 6-8 July 2021, pp. 149–160. SCITEPRESS (2021). https://doi.org/10.5220/0010543301490160

  8. Hua, N., Li, J., Zhang, K., Zhang, L.: A novel deterministic threshold proxy re-encryption scheme from lattices. Int. J. Inf. Secur. Priv. 16(1), 1–17 (2022). https://doi.org/10.4018/ijisp.310936

    Article  Google Scholar 

  9. Kumari, S., Singh, M., Singh, R., Tewari, H.: A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for iot devices. Comput. Netw. 217, 109327 (2022). https://doi.org/10.1016/j.comnet.2022.109327

    Article  Google Scholar 

  10. Li, W., Jin, C., Kumari, S., Xiong, H., Kumar, S.: Proxy re-encryption with equality test for secure data sharing in internet of things-based healthcare systems. Trans. Emerg. Telecommun. Technol. 33(10) (2022). https://doi.org/10.1002/ett.3986

  11. Liang, X., Weng, J., Yang, A., Yao, L., Jiang, Z., Wu, Z.: Attribute-based conditional proxy re-encryption in the standard model under LWE. In: Bertino, E., Shulman, H., Waidner, M. (eds.) ESORICS 2021. LNCS, vol. 12973, pp. 147–168. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-88428-4_8

    Chapter  Google Scholar 

  12. Luo, F., Al-Kuwari, S., Susilo, W., Duong, D.H.: Chosen-ciphertext secure homomorphic proxy re-encryption. IEEE Trans. Cloud Comput. 10(4), 2398–2408 (2022). https://doi.org/10.1109/TCC.2020.3042432

    Article  Google Scholar 

  13. Mao, X., Li, X., Wu, X., Wang, C., Lai, J.: Anonymous attribute-based conditional proxy re-encryption. In: Au, M.H., Yiu, S.M., Li, J., Luo, X., Wang, C., Castiglione, A., Kluczniak, K. (eds.) NSS 2018. LNCS, vol. 11058, pp. 95–110. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-02744-5_7

    Chapter  Google Scholar 

  14. Paul, A., Selvi, S.S.D., Rangan, C.P.: A provably secure conditional proxy re-encryption scheme without pairing. J. Internet Serv. Inf. Secur. 11(2), 1–21 (2021). https://doi.org/10.22667/JISIS.2021.05.31.001

  15. Susilo, W., Dutta, P., Duong, D.H., Roy, P.S.: Lattice-based HRA-secure attribute-based proxy re-encryption in standard model. In: Bertino, E., Shulman, H., Waidner, M. (eds.) ESORICS 2021. LNCS, vol. 12973, pp. 169–191. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-88428-4_9

    Chapter  Google Scholar 

  16. Wang, C., Han, Y., Duan, X., Guo, K.Y.: Hierarchical identity-based conditional proxy re-encryption scheme based RLWE and NTRU variant. In: Zeng, J., Qin, P., Jing, W., Song, X., Lu, Z. (eds.) ICPCSEE 2021. CCIS, vol. 1452, pp. 240–259. Springer, Singapore (2021). https://doi.org/10.1007/978-981-16-5943-0_20

    Chapter  Google Scholar 

  17. Wang, X., Wang, Y., Wang, M.: Lattice-based revocable identity-based proxy re-encryption with re-encryption verifiability. In: Wang, L., Segal, M., Chen, J., Qiu, T. (eds.) WASA 2022, Part I. LNCS, vol. 13471, pp. 535–544. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-19208-1_44

  18. Weng, J., Deng, R.H., Ding, X., Chu, C., Lai, J.: Conditional proxy re-encryption secure against chosen-ciphertext attack. In: Li, W., Susilo, W., Tupakula, U.K., Safavi-Naini, R., Varadharajan, V. (eds.) Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, 10–12 March 2009, pp. 322–332. ACM (2009). https://doi.org/10.1145/1533057.1533100

  19. Wu, L., Yang, X., Zhang, M., Wang, X.A.: IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability. J. Ambient. Intell. Humaniz. Comput. 13(1), 469–482 (2022). https://doi.org/10.1007/s12652-021-02911-9

    Article  Google Scholar 

  20. Yang, N., Tian, Y., et al.: Identity-based unidirectional collusion-resistant proxy re-encryption from u-lwe. Sec. Commun. Netw. 2023 (2023)

    Google Scholar 

  21. Yao, L., Weng, J., Wang, B.: Conditional attribute-based proxy re-encryption and its instantiation. Cryptology ePrint Archive (2022)

    Google Scholar 

  22. Zhao, J., Feng, D., Zhang, Z.: Attribute-based conditional proxy re-encryption with chosen-ciphertext security. In: Proceedings of the Global Communications Conference, GLOBECOM 2010, Miami, Florida, USA, 6–10 December 2010, pp. 1–6. IEEE (2010). https://doi.org/10.1109/GLOCOM.2010.5684045

Download references

Acknowledgements

The authors are willing to express our appreciation to the reviewers for their constructive comments which significantly enhanced the presentation of the study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Changgen Peng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hou, J., Peng, C., Tan, W., Zhong, C., Niu, K., Li, H. (2024). Fine-Grained Access Control Proxy Re-encryption with HRA Security from Lattice. In: Jin, H., Yu, Z., Yu, C., Zhou, X., Lu, Z., Song, X. (eds) Green, Pervasive, and Cloud Computing. GPC 2023. Lecture Notes in Computer Science, vol 14504. Springer, Singapore. https://doi.org/10.1007/978-981-99-9896-8_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-9896-8_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-9895-1

  • Online ISBN: 978-981-99-9896-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics