【摘 要】
:
Threshold proxy re-encryption (TPRE) can prevent collusion between a single proxy and a delegatee from converting arbitrary files against the wishes of the delegator through multiple proxies, and can also provide normal services even when certain proxy se
【机 构】
:
Key Laboratory of Network and Information Security,Engineering University of People’s Armed Police,X
论文部分内容阅读
Threshold proxy re-encryption (TPRE) can prevent collusion between a single proxy and a delegatee from converting arbitrary files against the wishes of the delegator through multiple proxies, and can also provide normal services even when certain proxy servers are paralyzed or damaged. A non-interactive identity-based TPRE (IB-TPRE) scheme over lattices is proposed which removes the public key certificates. To accomplish this scheme, Shamir\'s secret sharing is employed twice, which not only effectively hides the delegator\'s private key information, but also decentralizes the proxy power by splitting the re-encryption key. Robustness means that a combiner can detect a misbehaving proxy server that has sent an invalid transformed ciphertext share. This property is achieved by lattice-based fully homomorphic signatures. As a result, the whole scheme is thoroughly capable of resisting quantum attacks even when they are available. The security of the proposed scheme is based on the decisional learning with error hardness assumption in the standard model. Two typical application scenarios, including a file-sharing system based on a blockchain network and a robust key escrow system with threshold cryptography, are presented.
其他文献
A fundamental task for mobile robots is simultaneous localization and mapping (SLAM). Moreover, long-term robustness is an important property for SLAM. When vehicles or robots steer fast or steer in certain scenarios, such as low-texture environments, lon
A gallium nitride (GaN) power amplifier mono-lithic microwave integrated circuit (MMIC) with a wide band and high efficiency in the microwave fre-quency band is proposed in this study. The power am-plifier MMIC uses a 0.15 μm GaN high electron mo-bility t
In this paper, an intelligent fractional-order integral sliding mode control (FOISMC) strategy based on an improved cascade observer is proposed. First, an FOISMC strategy is designed to control a permanent magnet synchronous motor. It has good tracking p
Because it is magnet-free and can achieve a high integration level, the switched-capacitor (SC) converter acting as a direct current transformer has many promising applications in modern electronics. However, designing an SC converter with large current c
In constructing a smart court, to provide intelligent assistance for achieving more efficient, fair, and explainable trial proceedings, we propose a full-process intelligent trial system (FITS). In the proposed FITS, we introduce essential tasks for const
To avoid Doppler ambiguity, pulse Doppler radar may operate on a high pulse repetition frequency (PRF). The use of a high PRF can, however, lead to range ambiguity in many cases. At present, the major efficient solution to solve range ambiguity is based o
Deep learning has proven to be an effective mechanism for computer vision tasks, especially for image denoising and burst image denoising. In this paper, we focus on solving the burst image denoising problem and aim to generate a single clean image from a
Since traditional machine learning methods are sensitive to skewed distribution and do not consider the characteristics in multiclass imbalance problems, the skewed distribution of multiclass data poses a major challenge to machine learning algorithms. To
Robots need more intelligence to complete cognitive tasks in home environments. In this paper, we present a new cloud-assisted cognition adaptation mechanism for home service robots, which learns new knowledge from other robots. In this mechanism, a chang
1 IntroductionrnA compact ultra-wideband crossed-dipole an-tenna is proposed for 2G/3G/4G/IMT/5G customer premise equipment (CPE) applications. The arms of the crossed-dipole antenna are formed by step-shaped patches, and a wideband operation can be reali