{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T11:22:11Z","timestamp":1777375331287,"version":"3.51.4"},"reference-count":34,"publisher":"World Scientific Pub Co Pte Ltd","issue":"05","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472097"],"award-info":[{"award-number":["61472097"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Special Research Found for the Doctoral Program of Higher Education of China","award":["20132304110017"],"award-info":[{"award-number":["20132304110017"]}]},{"name":"Open Fund of the State Key Laboratory of Information Security","award":["2016-MS-10"],"award-info":[{"award-number":["2016-MS-10"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Found. Comput. Sci."],"published-print":{"date-parts":[[2020,8]]},"abstract":"<jats:p> Proxy Re-Encryption (PRE) is a cryptographic primitive that allows a proxy to turn an Alice\u2019s ciphertext into a Bob\u2019s ciphertext on the same plaintext. All of the PRE schemes are public key encryption and semantic security. Deterministic Public Key Encryption (D-PKE) provides an alternative to randomized public key encryption in various scenarios where the latter exhibits inherent drawbacks. In this paper, we construct the first multi-use unidirectional D-PRE scheme from Lattices in the auxiliary-input setting. We also prove that it is PRIV1-INDr secure in the standard model based on the LWR. Finally, an identity-based D-PRE is obtained from the basic construction. <\/jats:p>","DOI":"10.1142\/s0129054120500252","type":"journal-article","created":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T10:16:36Z","timestamp":1597313796000},"page":"551-567","source":"Crossref","is-referenced-by-count":7,"title":["Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting"],"prefix":"10.1142","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2721-2655","authenticated-orcid":false,"given":"Juyan","family":"Li","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, P. R. China"},{"name":"College of Data Science and Technology, Heilongjiang University, Harbin 150080, P. R. China"}]},{"given":"Chunguang","family":"Ma","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, P. R. China"},{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, P. R. China"}]},{"given":"Zhen","family":"Gu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2020,8,12]]},"reference":[{"key":"S0129054120500252BIB001","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054122"},{"key":"S0129054120500252BIB002","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"S0129054120500252BIB003","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54631-0_5"},{"key":"S0129054120500252BIB004","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55032-4_58"},{"key":"S0129054120500252BIB005","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E98.A.100"},{"key":"S0129054120500252BIB006","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00862-7_19"},{"key":"S0129054120500252BIB007","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1300"},{"key":"S0129054120500252BIB008","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.09.035"},{"key":"S0129054120500252BIB009","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.027"},{"key":"S0129054120500252BIB010","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.11.016"},{"key":"S0129054120500252BIB011","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.11.012"},{"key":"S0129054120500252BIB012","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.04.013"},{"key":"S0129054120500252BIB013","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_19"},{"key":"S0129054120500252BIB014","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"S0129054120500252BIB015","volume-title":"Cryptography with Lattices","author":"Xagawa K.","year":"2010"},{"key":"S0129054120500252BIB016","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03515-4_1"},{"key":"S0129054120500252BIB017","doi-asserted-by":"publisher","DOI":"10.3390\/sym11101262"},{"issue":"4","key":"S0129054120500252BIB018","first-page":"592","volume":"21","author":"Li J.","year":"2019","journal-title":"Int. J. Netw. Sec."},{"key":"S0129054120500252BIB019","doi-asserted-by":"publisher","DOI":"10.1142\/S0129054117400111"},{"key":"S0129054120500252BIB020","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47422-9_21"},{"issue":"3","key":"S0129054120500252BIB021","first-page":"38","volume":"3","author":"Singh K.","year":"2013","journal-title":"J. Internet Services and Information Security (JISIS)"},{"key":"S0129054120500252BIB022","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2013.000003"},{"key":"S0129054120500252BIB023","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"S0129054120500252BIB024","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_13"},{"key":"S0129054120500252BIB025","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"S0129054120500252BIB026","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32928-9_1"},{"key":"S0129054120500252BIB027","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74143-5_30"},{"key":"S0129054120500252BIB028","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_31"},{"key":"S0129054120500252BIB029","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_26"},{"key":"S0129054120500252BIB030","doi-asserted-by":"publisher","DOI":"10.1007\/s00224-010-9278-3"},{"key":"S0129054120500252BIB031","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_41"},{"key":"S0129054120500252BIB032","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_28"},{"key":"S0129054120500252BIB033","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_42"},{"key":"S0129054120500252BIB034","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374407"}],"container-title":["International Journal of Foundations of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0129054120500252","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,11]],"date-time":"2020-09-11T10:53:29Z","timestamp":1599821609000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0129054120500252"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":34,"journal-issue":{"issue":"05","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["10.1142\/S0129054120500252"],"URL":"https:\/\/doi.org\/10.1142\/s0129054120500252","relation":{},"ISSN":["0129-0541","1793-6373"],"issn-type":[{"value":"0129-0541","type":"print"},{"value":"1793-6373","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8]]}}}