Affiliation:
1. New Jersey Institute of Technology 8 Massachusetts Institute of Technology, Cambridge MA
2. New Jersey Institute of Technology, Newark, NJ
3. Massachusetts Institute of Technology, Cambridge MA
Abstract
We develop two IND-CPA-secure multihop unidirectional Proxy Re-Encryption (PRE) schemes by applying the Ring-LWE (RLWE) key switching approach from the homomorphic encryption literature. Unidirectional PRE is ideal for secure publish-subscribe operations where a publisher encrypts information using a public key without knowing upfront who the subscriber will be and what private key will be used for decryption. The proposed PRE schemes provide a multihop capability, meaning that when PRE-encrypted information is published onto a PRE-enabled server, the server can either delegate access to specific clients or enable other servers the right to delegate access. Our first scheme (which we call NTRU-ABD-PRE) is based on a variant of the NTRU-RLWE homomorphic encryption scheme. Our second and main PRE scheme (which we call BV-PRE) is built on top of the Brakerski-Vaikuntanathan (BV) homomorphic encryption scheme and relies solely on the RLWE assumption.
We present an open-source C++ implementation of both schemes and discuss several algorithmic and software optimizations. We examine parameter selection tradeoffs in the context of security, runtime/latency, throughput, ciphertext expansion, memory usage, and multihop capabilities. Our experimental analysis demonstrates that BV-PRE outperforms NTRU-ABD-PRE in both single-hop and multihop settings. The BV-PRE scheme has a lower time and space complexity than existing IND-CPA-secure lattice-based PRE schemes and requires small concrete parameters, making the scheme computationally efficient for use on low-resource embedded systems while still providing 100 bits of security. We present practical recommendations for applying the PRE schemes to several use cases of ad hoc information sharing for publish-subscribe operations.
Funder
Army Research Laboratory
Intelligence Advanced Research Projects Activity
NSF
Simons Investigator Award Agreement
Alfred P. Sloan Research Fellowship, the Microsoft Faculty Fellowship, the NEC Corporation, and a Steven and Renee Finn Career Development Chair from MIT
Office of the Director of National Intelligence
Defense Advanced Research Projects Agency
National Security Agency
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Reference35 articles.
1. A Subfield Lattice Attack on Overstretched NTRU Assumptions
2. Yoshinori Aono Xavier Boyen Le Trieu Phong and Lihua Wang. 2013. Key-private proxy re-encryption under LWE. In Progress in Cryptology (INDOCRYPT’13). Springer 1--18. 10.1007/978-3-319-03515-4_1 Yoshinori Aono Xavier Boyen Le Trieu Phong and Lihua Wang. 2013. Key-private proxy re-encryption under LWE. In Progress in Cryptology (INDOCRYPT’13). Springer 1--18. 10.1007/978-3-319-03515-4_1
3. Improved proxy re-encryption schemes with applications to secure distributed storage
4. Low-cost and area-efficient FPGA implementations of lattice-based cryptography
Cited by
58 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献