Abstract: With the gradual formation of the cloud computing ecosystem, the value of cloud computing is becoming increasingly evident, and the accompanying information security issues have become core elements. The challenge lies in securely transmitting, computing, and sharing data in a cloud computing environment while keeping privacy. In this paper, we propose an access control proxy re-encryption scheme that supports inner product operations based on lattices in the standard model. First, the ciphertext is linked to the attributes, and condition for transition is associated with the re-encryption key. The proxy may re-encrypt ciphertext that meets attribute conditions instead of all ciphertext, thereby limiting the proxy’s conversion permissions. Furthermore, the user outputs the inner product value after decryption. Finally, honestly re-encryption attacks (HRA) security with increased CPA security is employed to better capture the target of proxy re-encryption. In addition, we propose a new method of hiding access policy, which uses differential privacy technology to perturb the attribute values to better safeguard the privacy of users.
Loading