Unlock instant, AI-driven research and patent intelligence for your innovation.

Lattice-based homomorphic proxy re-encryption method capable of resisting strong collusion attack

A proxy re-encryption and collusion attack technology, applied in the field of information security, can solve problems such as being unable to resist strong collusion attacks, and achieve the effect of saving interaction costs

Active Publication Date: 2020-12-29
HEILONGJIANG UNIV
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The re-encryption key constructed by the key exchange technology uses the data user's public key to encrypt the data owner's private key, so when the data user and the cloud service provider conspire, the data user can use their own private key to re-encrypt The key is decrypted to obtain the sum of the data user's private key and the decryption noise, which is an approximation of the private key, so it cannot resist strong collusion attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lattice-based homomorphic proxy re-encryption method capable of resisting strong collusion attack
  • Lattice-based homomorphic proxy re-encryption method capable of resisting strong collusion attack
  • Lattice-based homomorphic proxy re-encryption method capable of resisting strong collusion attack

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0040] according to figure 1 As shown, the present invention provides a lattice-based homomorphic proxy re-encryption method against strong collusion attacks, specifically:

[0041] A lattice-based homomorphic proxy re-encryption method against strong collusion attacks, comprising the following steps:

[0042] Step 1: According to the input security parameters, randomly select vectors to generate system public parameters;

[0043] The step 1 is specifically:

[0044] According to the input security parameter k, select the prime number q, the n-dimensional vector set on the remaining class modulo q A vector chosen uniformly at random on The set of residual classes modulo q The Gaussian distribution χ on , the arithmetic circuit f of depth L, the output system public parameters

[0045] Step 2: According to the public parameters of the system, the public key, private key and homomorphic computing key are respectively generated by users, and the users include data owner...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a lattice-based homomorphic proxy re-encryption method capable of resisting strong collusion attack. The invention relates to the technical field of information security, a lattice-based trap door technology is utilized to generate a re-encryption key so as to resist the strong collusion attack, and then a key exchange technology is utilized to construct a re-encryption ciphertext with homomorphic property, thus the lattice-based homomorphic proxy re-encryption method capable of resisting strong collusion attack is developed, so as to be suitable for a more complex cloud sharing environment. According to the lattice-based homomorphic proxy re-encryption method, the problem that a ciphertext is divided into two layers by a traditional anti-proxy re-encryption method, one layer is an original ciphertext used for protecting data, the other layer is a re-encryption ciphertext used for sharing, and the two layers are independently stored and need to be interacted isavoided. The proxy re-encryption method provided by the invention only relates to one layer of ciphertext, does not need to perform hierarchical processing on the ciphertext, and saves the interaction overhead.

Description

technical field [0001] The invention relates to the technical field of information security, and relates to a grid-based homomorphic proxy re-encryption method against strong collusion attacks. Background technique [0002] Proxy Re-Encryption (PRE) is especially suitable for data cloud sharing. In a cloud sharing system, due to the limitation of terminal storage space, users will store data in the cloud. Once the data is out of the user's control, it will bring about data security issues, so users generally encrypt the data and store it in the cloud. When the data owner wants to share the data stored in the cloud with another user (data user), the data owner can use his private key and the data user's public key to generate a re-encryption key and send it to the cloud service business. The cloud service provider can use the re-encryption key to convert the ciphertext of the data owner into the re-encryption ciphertext of the data user. During this process, the cloud serv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L29/06H04L29/08
CPCH04L9/008H04L63/0442H04L63/0478H04L67/1097
Inventor 李菊雁崔晨唐锦萍张爽乔芷琪
Owner HEILONGJIANG UNIV