Then, the concrete selective HRA security proof of AB-CPRE scheme is shown below.
Proof of Theorem 4 First, we define three simulation algorithms, which are , and . The algorithm is presented in Theorem 3, and below we present two simulation algorithms, and , respectively.
-
–
: If
,
, let
where
,
,
,
,
are randomly chosen matrices or vectors. Outputs
.
-
–
-
: If the adversary inputs , , f, where , and , the algorithm does the following:
Firstly, sample and run satisfying
Secondly, obtain a trapdoor by running algorithm.
Thirdly, sample
Let
where
,
,
,
,
. Outputs
.
It should be noted that announces both the challenge user and the challenge attribute vector in the Init phase. The security proof for selective HRA can be presented as a sequence of games, as shown below.
Game 0. This game is identical to Definition 8.
Game 1. Based on Game 0, this game is mainly modified and .
-
–
-
Re-encryption Key Generation: If inputs , , f and the key pairs for and were generated in or . The oracle does the following:
When , , returns by running algorithm, and inserts into with the key-value (, , f, );
When , ,
1) , , outputs ⊥;
2) , , returns by running algorithm. Then, inserts into with the key-value (, , f, );
3) , returns by running algorithm. Then, inserts into with the key-value (, , f, ).
when and , and , returns by running , and inserts into with the key-value (, , f, ).
Finally, the challenger outputs to the adversary .
-
–
-
Re-encryption: Given , , , f and k, where . If there is no value in with key or when holds, return ⊥. Otherwise, gets by searching set or queries . Then, when , ,
1) , , and , outputs ⊥. If , and , return the by running algorithm. outputs ⊥;
2) , , returns by running algorithm.
3) , returns by running algorithm.
when and , and , and , returns by running where were obtained by . Then inserts into with the key-value (, , f, ).
Game 2. The game being described here is the same as Game 1, with the only difference being the method used to generate . Let where the random matrices be chosen randomly at Setup phase. The matrices should be kept secret, while can be disclosed and consists of .
By using Definition 6, we can demonstrate that Game 2 is statistically identical to Game 1. Consequently, from the perspective of the adversary, all the matrices are statistically close to a uniform distribution, which implies that the (defined as are also close to a uniform distribution. Consequently, it can be concluded that Game 2 and Game 1 are statistically indistinguishable.
Game 3. Compared to Game 2, we change how is produced where a uniformly random matrix . The construction of remains as the same as in Game 2, where .
By using Definition 3, we can demonstrate that Game 3 is statistically identical to Game Game 2.
Game 4. The game being described here is the same as Game 3, with the only difference being the method used to generate .
Reduction from DLWE: Assume that confers a non-negligible advantage in differentiating between Game 4 and Game 3. We build , a DLWE solver, using .
-
–
DLWE instance:
begins by obtaining a DLWE challenge consisting of two random matrices
, and two vectors
. Here,
,
are either random or
where
,
.
Init: announces challenge user and the challenge attributes vector .
Setup: The same as the Game 3.
Query Phase 1: The same as the Game 3 and be the public key for user .
Challenge Phase: After sends two messages to , first randomly selects a bit b from , then computes and . sends to . Additionally, increments and add to the set . Finally, stores to the set with key .
Query Phase 2: The same as the Query Phase 1 of the Game 3.
Decision Phase: guesses if it interacts with a Game 4 or Game 3 challenger. Then will output ’s guess as an answer to the DLWE challenge.
As mentioned earlier, if exhibits a non-negligible advantage in distinguishing Game 4 from Game 3, then similarly possesses a non-negligible advantage in solving the DLWE problem. We establish the security of our AB-CPRE scheme with re-encryption simulatability against selective HRA in the standard model under the LWE assumption. □