Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Lattice Homomorphic Proxy Re-encryption Method Against Strong Collusion Attacks

A proxy re-encryption and collusion attack technology, applied in the field of information security, can solve problems such as being unable to resist strong collusion attacks, and achieve the effect of saving interaction overhead and ensuring homomorphism

Active Publication Date: 2022-05-06
HEILONGJIANG UNIV
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The re-encryption key constructed by the key exchange technology uses the data user's public key to encrypt the data owner's private key, so when the data user and the cloud service provider conspire, the data user can use their own private key to re-encrypt The key is decrypted to obtain the sum of the data user's private key and the decryption noise, which is an approximation of the private key, so it cannot resist strong collusion attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Lattice Homomorphic Proxy Re-encryption Method Against Strong Collusion Attacks
  • A Lattice Homomorphic Proxy Re-encryption Method Against Strong Collusion Attacks
  • A Lattice Homomorphic Proxy Re-encryption Method Against Strong Collusion Attacks

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0039] according to figure 1 As shown, the present invention provides a lattice-based homomorphic proxy re-encryption method against strong collusion attacks, specifically:

[0040] A lattice-based homomorphic proxy re-encryption method against strong collusion attacks, comprising the following steps:

[0041] Step 1: According to the input security parameters, randomly select vectors to generate system public parameters;

[0042] The step 1 is specifically:

[0043] According to the input security parameter k, select the prime number q, the n-dimensional vector set on the remaining class modulo q A vector chosen uniformly at random on The set of residual classes modulo q The Gaussian distribution χ on , the arithmetic circuit f of depth L, the output system public parameters

[0044] Step 2: According to the public parameters of the system, the public key, private key and homomorphic computing key are respectively generated by users, and the users include data owner...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is a grid-based homomorphic proxy re-encryption method against strong collusion attack. The present invention relates to the technical field of information security. The present invention utilizes lattice-based trapdoor technology to generate re-encryption keys to resist strong collusion attacks, and then uses key exchange technology to construct re-encryption ciphertexts with homomorphic properties, thereby constructing a re-encryption key against Lattice homomorphic proxy re-encryption method for strong collusion attack, suitable for more complex cloud sharing environment. The present invention avoids that the traditional anti-proxy re-encryption method divides the ciphertext into two layers, one layer is the original ciphertext used to protect data, and the other layer is the re-encrypted ciphertext used for sharing, and the two layers are stored independently, requiring to interact. The proxy re-encryption method of the present invention only involves one layer of ciphertext, does not need to process the ciphertext in layers, and saves interaction overhead.

Description

technical field [0001] The invention relates to the technical field of information security, and relates to a grid-based homomorphic proxy re-encryption method against strong collusion attacks. Background technique [0002] Proxy Re-Encryption (PRE) is especially suitable for data cloud sharing. In a cloud sharing system, due to the limitation of terminal storage space, users will store data in the cloud. Once the data is out of the user's control, it will bring about data security issues, so users generally encrypt the data and store it in the cloud. When the data owner wants to share the data stored in the cloud with another user (data user), the data owner can use his private key and the data user's public key to generate a re-encryption key and send it to the cloud service business. The cloud service provider can use the re-encryption key to convert the ciphertext of the data owner into the re-encryption ciphertext of the data user. During this process, the cloud serv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/40H04L67/1097
CPCH04L9/008H04L63/0442H04L63/0478H04L67/1097
Inventor 李菊雁崔晨唐锦萍张爽乔芷琪
Owner HEILONGJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products