Proxy Re-Encryption in cloud using ALBC (adaptive lattice based cryptography)

Chandrakala B M, S C Lingareddy


In recent days, data sharing has provided the flexibility to share the data, store the data, and perform operation on data virtually as well as cost effectively. Data sharing in cloud is one of the feature, which is being popular and widely accepted. However, the concern here is to ensure the data security and this has led the researcher to research in this area. To provide the security several Proxy re-encryption scheme has been introduced, however all these method lacks of efficiency. Hence In this paper, we propose a scheme known as ALBC (Adaptive Lattice Based Cryptography), this scheme follows the two phase i.e. encryption and Re-encryption. Encryption phase has few algorithms such as Key_Gen, Enc, Dec. Similarly ALBC Re-Enc has five algorithm i.e. Key_Gen, Key_ReGen,  Enc, Re-Enc, Dec. our algorithm not only provides the security but also solves the problem of RL(Ring-learning) with errors problems. In order to evaluate, our algorithm is compared with the existing model in terms of encryption time, decryption time, re-encryption time, key generation  and key regeneration by varying the various key size. When we observe the comparative analysis, it is observed that our algorithm outperforms the existing algorithm.


Encryption, Re-Encryption, Proxy Re-Encryption

Full Text:



J. Weinman, "Toward a Theoretical Model of Cloud Computing," in IEEE Cloud Computing, vol. 5, no. 6, pp. 92-101, Nov./Dec. 2018.

S. Basu et al., "Cloud computing security challenges & solutions-A survey," 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, 2018, pp. 347-356.

J. P. Singh, Mamta and S. Kumar, "Authentication and encryption in Cloud Computing," 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), Chennai, 2015, pp. 216-219.

K. Sakurai, T. Nishide and A. Syalim, "Improved proxy re-encryption scheme for symmetric key cryptography," 2017 International Workshop on Big Data and Information Security (IWBIS), Jakarta, 2017, pp. 105-111.

B. Libert and D. Vergnaud, "Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption," in IEEE Transactions on Information Theory, vol. 57, no. 3, pp. 1786-1802, March 2011.

D. Zhe, W. Qinghong, S. Naizheng and Z. Yuhan, "Study on Data Security Policy Based on Cloud Storage," 2017 ieee 3rd international conference on big data security on cloud (bigdatasecurity), ieee international conference on high performance and smart computing (hpsc), and ieee international conference on intelligent data and security (ids), Beijing, 2017, pp. 145-149.

R. H. Deng, J. Weng, S. Liu, and K. Chen, “Chosen ciphertext secure proxy re-encryption without pairings,” in Proceedings of the 7th International Conference on Cryptology and Network Security. Springer, 2008, pp. 1–17.

B. Libert and D. Vergnaud, “Unidirectional chosen ciphertext secure proxy re-encryption,” in Public KeyCryptography–PKC’08. Springer, 2008, pp. 360–379.

R. Canetti and S. Hohenberger, “Chosen-ciphertext secure proxy re-encryption,” in Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, pp. 185–194.

J. Shao and Z. Cao, “Cca-secure proxy re-encryption without pairings,” in Public Key Cryptography–PKC’09.Springer, 2009, pp. 357–376.

X. Liang, Z. Cao, H. Lin, and J. Shao, “Attribute based proxy re-encryption with delegating capabilities,”in Proceedings of the 4th International Symposium on Information, Computer, and Communications Security. ACM, 2009, pp. 276–286.

T. Fei, L. Hongda, and J. Chang, “Multi-hop unidirectional proxy re-encryption from multilinear maps,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 98, no. 2,pp. 762–766, 2015.

S. Garg, C. Gentry, and S. Halevi, “Candidate multilinear maps from ideal lattices.” in Advances in Cryptology–Eurocrypt’13, vol. 7881. Springer, 2013, pp. 1–17.

D. Hua, W. Qianhong, Q. Bo, S. Willy, L. Joseph, and S. Wenchang, “Asymmetric cross-cryptosystem reencryption applicable to efficient and secure mobile access to outsourced data,” in Proceedings of the 10thACM Symposium on Information, Computer and Communications Security (ASIA CCS ’15). ACM, 2015, pp. 393–404.

Z. Yunya, D. Hua, W. Qianhong, Q. Bo, L. Jianwei, and D. Yong, “Identity-based proxy re-encryption version 2: Making mobile access easy in cloud,” Future Generation Computer Systems, p. in press, 2015.

M. Green and G. Ateniese, “Identity-based proxy reencryption,” in Proceedings of the 5th International Conference on Applied Cryptography and Network Security. Springer, 2007, pp. 288–306.

W. K. Koo, J. Y. Hwang, and D. H. Lee, “Security vulnerability in a non-interactive id-based proxy reencryption scheme,” Information Processing Letters, vol. 109, no. 23, pp. 1260–1262, 2009.

G. Ateniese, K. Benson and S. Hohenberger, Key-Private Proxy Re-Encryption, Topics in Cryptology, Springer, 2009.

K. Liang, L. Fang, D. S. Wong, and W. Susilo, A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security, 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS), 2013.

A. Sahai and B. Waters, Fuzzy Identity Based Encryption, Springer, pp. 457-473, 2005.

K. Liang, M. H. Au, W. Susilo, D. S. Wong, G. Yang, and Y. Yu, An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing, 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014.

Total views : 35 times


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

shopify stats IJEECS visitor statistics