Key-private proxy re-encryption under LWE


Autoria(s): Aono, Yoshinori; Boyen, Xavier; Phong, Le Trieu; Wang, Lihua
Data(s)

2013

Resumo

Proxy re-encryption (PRE) is a highly useful cryptographic primitive whereby Alice and Bob can endow a proxy with the capacity to change ciphertext recipients from Alice to Bob, without the proxy itself being able to decrypt, thereby providing delegation of decryption authority. Key-private PRE (KP-PRE) specifies an additional level of confidentiality, requiring pseudo-random proxy keys that leak no information on the identity of the delegators and delegatees. In this paper, we propose a CPA-secure PK-PRE scheme in the standard model (which we then transform into a CCA-secure scheme in the random oracle model). Both schemes enjoy highly desirable properties such as uni-directionality and multi-hop delegation. Unlike (the few) prior constructions of PRE and KP-PRE that typically rely on bilinear maps under ad hoc assumptions, security of our construction is based on the hardness of the standard Learning-With-Errors (LWE) problem, itself reducible from worst-case lattice hard problems that are conjectured immune to quantum cryptanalysis, or “post-quantum”. Of independent interest, we further examine the practical hardness of the LWE assumption, using Kannan’s exhaustive search algorithm coupling with pruning techniques. This leads to state-of-the-art parameters not only for our scheme, but also for a number of other primitives based on LWE published the literature.

Identificador

http://eprints.qut.edu.au/68721/

Publicador

Springer International Publishing

Relação

DOI:10.1007/978-3-319-03515-4_1

Aono, Yoshinori, Boyen, Xavier, Phong, Le Trieu, & Wang, Lihua (2013) Key-private proxy re-encryption under LWE. Lecture Notes in Computer Science : Progress in Cryptology – INDOCRYPT 2013, 8250, pp. 1-18.

Direitos

Copyright 2013 Springer

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Palavras-Chave #Proxy re-encryption #Learning with errors #Key privacy #Chosen ciphertext security #LWE practical hardness
Tipo

Journal Article