[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Lattice Puncturable Attribute Based Proxy Re-encryption Scheme and Its Application in Information Centric Network

  • Conference paper
  • First Online:
Advances in Information and Communication (FICC 2022)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 439))

Included in the following conference series:

Abstract

This work presents the first attempt to build a feasible puncturable attribute-based proxy encryption from the lattice. Our system provides flexible and fine-grained access control. In this scheme, the private keys are punctured, allowing the decryption abilities to be revoked for specific messages or receivers and securing sensitive content even if the users’ present keys are compromised. As opposed to the traditional encryption scheme, the proposed technique has the advantage of allowing users to update their keys without requiring key re-issuance from the key generator. Also, it does not necessitate regular communication between the user and the key generation authority, nor does it necessitate deleting elements to remove current keys to generate fresh keys. We developed a new approach for embedding attribute-based keys and punctured keys. This was done in such a way that the secret key size is nearly the same as that of the original attribute-based encryption without a punctured key. Also, we demonstrate that our scheme is secure against a selected plaintext attack in the selective security model under the Learning With Errors (LWE) assumptions. Finally, we implemented our scheme and integrated it with ICN. The implantation results show that our scheme is practical.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 199.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 249.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Badsha, S., Khalil, I., Yi, X., Atiquzzaman, M.: Designing privacy-preserving protocols for content sharing and aggregation in content centric networking. IEEE Access 6, 42119–42130 (2018)

    Article  Google Scholar 

  2. Blaze, M., Bleumer: Divertible protocols and atomic proxy cryptography, pp. 127–144 (1998)

    Google Scholar 

  3. Canetti, R., Raghuraman, S., Richelson, S., Vaikuntanathan, V.: Chosen-ciphertext secure fully homomorphic encryption. In: Fehr, S. (ed.) PKC 2017. LNCS, vol. 10175, pp. 213–240. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54388-7_8

  4. Carzaniga, A., Rutherford, M., Wolf, A.: A routing scheme for content-based networking. IEEE INFOCOM 2004, vol. 2, pp. 918–928 (2004)

    Google Scholar 

  5. Cheriton, D., Gritter, M.: Triad: a scalable deployable nat-based internet architecture, July 2000

    Google Scholar 

  6. Cohen, A., Holmgren, J., Nishimaki, R., Vaikuntanathan, V., Wichs, D.: Watermarking cryptographic capabilities. SIAM J. Comput. 47(6), 2157–2202 (2018)

    Article  MathSciNet  Google Scholar 

  7. Simõcs da Silva, R., Donizetti Zorzo, S.: On the use of proxy re-encryption to control access to sensitive data on information centric networking. In: 2016 International Conference on Information Networking (ICOIN), pp. 7–12. IEEE (2016)

    Google Scholar 

  8. Dannewitz, C., Golic, J., Ohlman, B., Ahlgren, B.: Secure naming for a network of information. In: 2010 INFOCOM IEEE Conference on Computer Communications Workshops, pp. 1–6 (2010)

    Google Scholar 

  9. Diffie, W., Van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchanges. Des. Codes Cryptography 2, 107–125 (1992)

    Article  MathSciNet  Google Scholar 

  10. Fang, W., Xu, M., Zhu, C., Han, W., Zhang, W., Rodrigues, J.J.P.C.: Fetms: fast and efficient trust management scheme for information-centric networking in internet of things. IEEE Access 7, 13476–13485 (2019)

    Article  Google Scholar 

  11. Fotiou, N., Nikander, P., Trossen, D., Polyzos, G.: Developing information networking further: From psirp to pursuit. In: BROADNETS (2010)

    Google Scholar 

  12. Fotiou, N., Polyzos, G.: Securing content sharing over ICN. In: 3rd ACM Conference Inf.-Centric Netw, pp. 176–185 (2016)

    Google Scholar 

  13. Fotiou, N., Polyzos, G.C.: Name-based security for information-centric networking architectures. MDPI, Future internet (2019)

    Book  Google Scholar 

  14. Fotiou, N., Nikander, P., Trossen, D., Polyzos, G.: Developing information networking further: from psirp to pursuit 66, 1–13 (2010)

    Google Scholar 

  15. Gür, K.D., Polyakov, Y., Rohloff, K., Ryan, G.W., Sajjadpour, H., Savaş, E.: Practical applications of improved gaussian sampling for trapdoor lattices. IEEE Trans. Comput. 68(4), 570–584 (2019)

    Article  MathSciNet  Google Scholar 

  16. Green, M.D., Miers, I.: Forward secure asynchronous messaging from puncturable encryption. In: 2015 IEEE Symposium on Security and Privacy, pp. 305–320 (2015)

    Google Scholar 

  17. Guan, Z., Li, J., Zhu, L., Zhang, Z., Du, X., Guizani, M.: Toward delay-tolerant flexible data access control for smart grid with renewable energy resources. IEEE Trans. Industr. Inf. 13(6), 3216–3225 (2017)

    Article  Google Scholar 

  18. Günther, F., Hale, B., Jager, T., Lauer, S.: 0-RTT key exchange with full forward secrecy. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10212, pp. 519–548. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-56617-7_18

  19. Kirshanova, E.: Proxy re-encryption from lattices. In: Public Key Cryptography (2014)

    Google Scholar 

  20. Koponen, T.: A data-oriented (and beyond) network architecture. In: SIGCOMM (2007)

    Google Scholar 

  21. Kuriharay, J., Uzun, E., Wood, C.A.: An encryption-based access control framework for content-centric networking. In: 2015 IFIP Networking Conference (IFIP Networking), pp. 1–9 (2015)

    Google Scholar 

  22. Li, C., Gong, S., Wang, X., Wang, L., Jiang, Q., Okamura, K.: Secure and efficient content distribution in crowdsourced vehicular content-centric networking. IEEE Access 6, 5727–5739 (2018)

    Article  Google Scholar 

  23. Li, R., Asaeda, H., Li, J.: A distributed publisher-driven secure data sharing scheme for information-centric iot. IEEE Internet Things J. 4(3), 791–803 (2017)

    Article  Google Scholar 

  24. Lou, J., Zhang, Q., Qi, Z., Lei, K.: A blockchain-based key management scheme for named data networking. In: 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN), pp. 141–146 (2018)

    Google Scholar 

  25. Mambo Eiji Okamoto, M.: Proxy cryptosystems: Delegation of the power to decrypt ciphertexts. IEICE Trans. Fundamentals Electron. Commun. Comput. Sci. E80-A(1), 54–63 (1997)

    Google Scholar 

  26. Polyakov, Y., Rohloff, K., Ryan, G.W.: Palisade lattice cryptography library, accessed may 2020. https://git.njit.edu/palisade/palisade. Accessed May 2020

  27. Psaras, I., Chai, W., Pavlou, G.: Probabilistic in-network caching for information-centric networks. In: ICN 2012 (2012)

    Google Scholar 

  28. Roy, R., Mathai, P.P.: Proxy re-encryption schemes for secure cloud data and applications: a survey. Int. J. Comput. Appl. 164(5), 1–6 (2017)

    Google Scholar 

  29. Sun, Y.: Trace-driven analysis of icn caching algorithms on video-on-demand workloads. In: Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies (2014)

    Google Scholar 

  30. Wang, Q., Li, W., Qin, Z.: Proxy re-encryption in access control framework of information-centric networks. IEEE Access 7, 48417–48429 (2019)

    Article  Google Scholar 

  31. Wood, C.A., Uzun, E.: Flexible end-to-end content security in ccn (2014)

    Google Scholar 

  32. Wu, L., Yang, X., Zhang, M., Liu, L.: New identity based proxy re-encryption scheme from lattices. China Commun. 16(10), 174–190 (2019)

    Article  Google Scholar 

  33. Xiong, H., Mei, Q., Zhao, Y.: Efficient and provably secure certificateless parallel key-insulated signature without pairing for iiot environments. IEEE Syst. J. 14(1), 310–320 (2020)

    Article  Google Scholar 

  34. Xuan Phuong, T.V., Ning, R., Xin, C., Wu, H.: Puncturable attribute-based encryption for secure data delivery in internet of things (2018 )

    Google Scholar 

  35. Zhang, J., Zhang, Z., Ge, A.: Ciphertext policy attribute-based encryption from lattices, pp. 16–17, May 2012

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaosong Zhang .

Editor information

Editors and Affiliations

Ethics declarations

The authors declare that they have no known competing interests that could have appeared to influence the work reported in this paper.

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Affum, E., Zhang, X., Wang, X., Obiri, I.A. (2022). Lattice Puncturable Attribute Based Proxy Re-encryption Scheme and Its Application in Information Centric Network. In: Arai, K. (eds) Advances in Information and Communication. FICC 2022. Lecture Notes in Networks and Systems, vol 439. Springer, Cham. https://doi.org/10.1007/978-3-030-98015-3_52

Download citation

Publish with us

Policies and ethics