Abstract
This work presents the first attempt to build a feasible puncturable attribute-based proxy encryption from the lattice. Our system provides flexible and fine-grained access control. In this scheme, the private keys are punctured, allowing the decryption abilities to be revoked for specific messages or receivers and securing sensitive content even if the users’ present keys are compromised. As opposed to the traditional encryption scheme, the proposed technique has the advantage of allowing users to update their keys without requiring key re-issuance from the key generator. Also, it does not necessitate regular communication between the user and the key generation authority, nor does it necessitate deleting elements to remove current keys to generate fresh keys. We developed a new approach for embedding attribute-based keys and punctured keys. This was done in such a way that the secret key size is nearly the same as that of the original attribute-based encryption without a punctured key. Also, we demonstrate that our scheme is secure against a selected plaintext attack in the selective security model under the Learning With Errors (LWE) assumptions. Finally, we implemented our scheme and integrated it with ICN. The implantation results show that our scheme is practical.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Badsha, S., Khalil, I., Yi, X., Atiquzzaman, M.: Designing privacy-preserving protocols for content sharing and aggregation in content centric networking. IEEE Access 6, 42119–42130 (2018)
Blaze, M., Bleumer: Divertible protocols and atomic proxy cryptography, pp. 127–144 (1998)
Canetti, R., Raghuraman, S., Richelson, S., Vaikuntanathan, V.: Chosen-ciphertext secure fully homomorphic encryption. In: Fehr, S. (ed.) PKC 2017. LNCS, vol. 10175, pp. 213–240. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54388-7_8
Carzaniga, A., Rutherford, M., Wolf, A.: A routing scheme for content-based networking. IEEE INFOCOM 2004, vol. 2, pp. 918–928 (2004)
Cheriton, D., Gritter, M.: Triad: a scalable deployable nat-based internet architecture, July 2000
Cohen, A., Holmgren, J., Nishimaki, R., Vaikuntanathan, V., Wichs, D.: Watermarking cryptographic capabilities. SIAM J. Comput. 47(6), 2157–2202 (2018)
Simõcs da Silva, R., Donizetti Zorzo, S.: On the use of proxy re-encryption to control access to sensitive data on information centric networking. In: 2016 International Conference on Information Networking (ICOIN), pp. 7–12. IEEE (2016)
Dannewitz, C., Golic, J., Ohlman, B., Ahlgren, B.: Secure naming for a network of information. In: 2010 INFOCOM IEEE Conference on Computer Communications Workshops, pp. 1–6 (2010)
Diffie, W., Van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchanges. Des. Codes Cryptography 2, 107–125 (1992)
Fang, W., Xu, M., Zhu, C., Han, W., Zhang, W., Rodrigues, J.J.P.C.: Fetms: fast and efficient trust management scheme for information-centric networking in internet of things. IEEE Access 7, 13476–13485 (2019)
Fotiou, N., Nikander, P., Trossen, D., Polyzos, G.: Developing information networking further: From psirp to pursuit. In: BROADNETS (2010)
Fotiou, N., Polyzos, G.: Securing content sharing over ICN. In: 3rd ACM Conference Inf.-Centric Netw, pp. 176–185 (2016)
Fotiou, N., Polyzos, G.C.: Name-based security for information-centric networking architectures. MDPI, Future internet (2019)
Fotiou, N., Nikander, P., Trossen, D., Polyzos, G.: Developing information networking further: from psirp to pursuit 66, 1–13 (2010)
Gür, K.D., Polyakov, Y., Rohloff, K., Ryan, G.W., Sajjadpour, H., Savaş, E.: Practical applications of improved gaussian sampling for trapdoor lattices. IEEE Trans. Comput. 68(4), 570–584 (2019)
Green, M.D., Miers, I.: Forward secure asynchronous messaging from puncturable encryption. In: 2015 IEEE Symposium on Security and Privacy, pp. 305–320 (2015)
Guan, Z., Li, J., Zhu, L., Zhang, Z., Du, X., Guizani, M.: Toward delay-tolerant flexible data access control for smart grid with renewable energy resources. IEEE Trans. Industr. Inf. 13(6), 3216–3225 (2017)
Günther, F., Hale, B., Jager, T., Lauer, S.: 0-RTT key exchange with full forward secrecy. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10212, pp. 519–548. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-56617-7_18
Kirshanova, E.: Proxy re-encryption from lattices. In: Public Key Cryptography (2014)
Koponen, T.: A data-oriented (and beyond) network architecture. In: SIGCOMM (2007)
Kuriharay, J., Uzun, E., Wood, C.A.: An encryption-based access control framework for content-centric networking. In: 2015 IFIP Networking Conference (IFIP Networking), pp. 1–9 (2015)
Li, C., Gong, S., Wang, X., Wang, L., Jiang, Q., Okamura, K.: Secure and efficient content distribution in crowdsourced vehicular content-centric networking. IEEE Access 6, 5727–5739 (2018)
Li, R., Asaeda, H., Li, J.: A distributed publisher-driven secure data sharing scheme for information-centric iot. IEEE Internet Things J. 4(3), 791–803 (2017)
Lou, J., Zhang, Q., Qi, Z., Lei, K.: A blockchain-based key management scheme for named data networking. In: 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN), pp. 141–146 (2018)
Mambo Eiji Okamoto, M.: Proxy cryptosystems: Delegation of the power to decrypt ciphertexts. IEICE Trans. Fundamentals Electron. Commun. Comput. Sci. E80-A(1), 54–63 (1997)
Polyakov, Y., Rohloff, K., Ryan, G.W.: Palisade lattice cryptography library, accessed may 2020. https://git.njit.edu/palisade/palisade. Accessed May 2020
Psaras, I., Chai, W., Pavlou, G.: Probabilistic in-network caching for information-centric networks. In: ICN 2012 (2012)
Roy, R., Mathai, P.P.: Proxy re-encryption schemes for secure cloud data and applications: a survey. Int. J. Comput. Appl. 164(5), 1–6 (2017)
Sun, Y.: Trace-driven analysis of icn caching algorithms on video-on-demand workloads. In: Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies (2014)
Wang, Q., Li, W., Qin, Z.: Proxy re-encryption in access control framework of information-centric networks. IEEE Access 7, 48417–48429 (2019)
Wood, C.A., Uzun, E.: Flexible end-to-end content security in ccn (2014)
Wu, L., Yang, X., Zhang, M., Liu, L.: New identity based proxy re-encryption scheme from lattices. China Commun. 16(10), 174–190 (2019)
Xiong, H., Mei, Q., Zhao, Y.: Efficient and provably secure certificateless parallel key-insulated signature without pairing for iiot environments. IEEE Syst. J. 14(1), 310–320 (2020)
Xuan Phuong, T.V., Ning, R., Xin, C., Wu, H.: Puncturable attribute-based encryption for secure data delivery in internet of things (2018 )
Zhang, J., Zhang, Z., Ge, A.: Ciphertext policy attribute-based encryption from lattices, pp. 16–17, May 2012
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Ethics declarations
The authors declare that they have no known competing interests that could have appeared to influence the work reported in this paper.
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Affum, E., Zhang, X., Wang, X., Obiri, I.A. (2022). Lattice Puncturable Attribute Based Proxy Re-encryption Scheme and Its Application in Information Centric Network. In: Arai, K. (eds) Advances in Information and Communication. FICC 2022. Lecture Notes in Networks and Systems, vol 439. Springer, Cham. https://doi.org/10.1007/978-3-030-98015-3_52
Download citation
DOI: https://doi.org/10.1007/978-3-030-98015-3_52
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-98014-6
Online ISBN: 978-3-030-98015-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)