Next Article in Journal
Completeness and Hereditary Transfer of Exactness Properties for Internal Group Objects in D-Modules
Previous Article in Journal
A Lightweight YOLOv8-Based Network for Efficient Corn Disease Detection
Previous Article in Special Issue
Multiparty Quantum Private Comparison Protocol Using n-Particle GHZ State
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

OO-IB-MPRE: A Post-Quantum Secure Online/Offline Identity-Based Matchmaking Proxy Re-Encryption Scheme for Exercise Physiology Data

1
College of Physical Education, Harbin University, Harbin 150090, China
2
College of Computer and Big Data, Heilongjiang University, Harbin 150080, China
*
Authors to whom correspondence should be addressed.
Mathematics 2025, 13(24), 4004; https://doi.org/10.3390/math13244004
Submission received: 4 November 2025 / Revised: 7 December 2025 / Accepted: 13 December 2025 / Published: 16 December 2025
(This article belongs to the Special Issue Applications of Cryptography Theory in Network Security)

Abstract

As smart education evolves, there is an increasing need for the cloud-centric management and sharing of student exercise physiological data gathered through wearable devices in the physical education domain. However, challenges arise in achieving authentication for data sources, ensuring the security of sensitive data, and implementing efficient dynamic access control. Traditional cryptographic schemes face limitations in resisting quantum attacks, authenticating data sources, protecting identity privacy, handling dynamic permission changes, and computational efficiency. To tackle these challenges, we put forward a lattice-based Online/Offline Identity-Based Matchmaking Proxy Re-Encryption (OO-IB-MPRE) scheme. The scheme offers post-quantum security assurances grounded in lattice cryptography (under the LWE/ISIS assumptions); incorporates Identity-Based matchmaking encryption (IB-ME) to realize bidirectional identity matching, which not only enables identity authentication for data sources but also safeguards the sender’s identity privacy from exposure to other entities; leverages Proxy Re-Encryption (PRE) to support dynamic management of access control; and combines online/offline encryption to adapt to resource constrained sensors. The security of the OO-IB-MPRE scheme is verified under standard lattice assumptions to meet the security requirements of semi-selective privacy and authenticity. Performance analysis and experimental validation demonstrate that in comparison to existing lattice-based PRE schemes, the devised scheme shows notable advantages in both space and computational overhead. Therefore, the proposed OO-IB-MPRE offers a secure, efficient, and scalable solution for the sensitive health data in smart physical education.

1. Introduction

In the era of the rapidly developing field of smart education, the application of various sensor devices in educational settings is becoming increasingly widespread; among these applications, the security of sensitive health data is particularly critical in sports-related scenarios.
Taking athletic training and physical fitness testing as examples, two categories of key data regarding students must be collected in real-time via smart sensing devices (e.g., smart wristbands, electromyography sensors, wearable heart rate monitors, etc.). The first type: Physiological signal data—including heart rate, blood oxygen levels, and lactate concentration—is gathered during training and testing. This reflects whether exercise intensity is appropriate, assesses aerobic capacity, and determines fatigue levels. The second type: Performance data like speed, strength, and gait collected during training, which reflects technical proficiency and physical capabilities, aiding in movement correction or injury prevention. However, the computational and storage limitations of smart sensors severely hinder the data sharing. Leveraging the robust computing and storage power of cloud services, smart sensors can offload their collected physiological data to cloud servers for storage, eliminating the need for local data maintenance.
However, as sensitive student personal information, the security of physiological data during cloud storage and sharing faces significant challenges. First, such data may be maliciously accessed by cloud servers or unauthorized devices, leading to privacy breaches. For the secure transmission of motion physiological data from computationally constrained smart sensors, the Identity-Based Encryption scheme offers a distinct advantage. Its core innovation lies in using an identity directly as a public key, thereby eliminating the complex certificate management and verification processes inherent in traditional public key infrastructure. This not only significantly reduces the computational and storage burden on the endpoint devices but also simplifies system deployment and key management. Consequently, IBE is particularly suited for securing data in resource-limited IoT environments, providing efficient and robust security for sensitive health information.
Identity-Based Encryption (IBE) can ensure that unauthorized entities are unable to decrypt a message, but it cannot verify the sender’s identity. Consequently, if an attacker forges a “sensor device identity” to send fraudulent data, the recipient (such as a physical education teacher or cloud platform) cannot identify it. In other words, IBE lacks data-source authentication. To overcome this limitation, Matchmaking Encryption (ME) was proposed, formally defining two crucial security properties: privacy and authenticity. The privacy ensures that the sender’s attributes, the encrypted message, and the specified target receiver’s policy remain hidden from other users. Authenticity ensures that enc keys cannot be forged by malicious adversaries. By integrating Identity-Based Encryption (IBE) and Matchmaking Encryption (ME), Identity-Based Matchmaking Encryption (IB-ME) is a cryptographic technique that employs a user’s identity as both attributes and policies for matching. The receiver can only decrypt the ciphertext successfully if the attribute identity and policy identity embedded in the private key are respectively consistent with the policy identity and attribute identity defined in the ciphertext. Via a bidirectional matching mechanism, IB-ME ensures that only the intended recipient can decrypt the message while also allowing the recipient to verify whether the data comes from a legitimate sender (e.g., a designated wearable device or biometric system). This approach blocks the risk of “false data injection” at its source, making it particularly well-suited for the requirement that “authenticity and privacy are equally important” in the collected measurements.
However, the conventional cryptographic schemes display notable limitations in dynamic access control management. For instance, Identity-Based Matchmaking Encryption (IB-ME), though supporting identity-based attribute matching, necessitates re-encrypting all existing data during dynamic access right changes. For example, when providing access privileges to a newly onboarded nurse in the system, it is essential to reconstruct all ciphertexts. Proxy Re-Encryption (PRE) was originally proposed, and the technique has been widely noticed and researched in the academic community ever since; it optimizes the efficiency of data access, enabling a third-party proxy to convert a ciphertext encrypted under an original public key into a ciphertext encrypted under a new public key, without ever knowing the underlying plaintext. It offers a solution for dynamic access control management of cloud-based data. By using Identity-Based Matchmaking Proxy Re-Encryption (IB-MPRE), which integrates IB-ME and PRE, we can realize identity-based bidirectional identity matching and dynamic access control, thus achieving high levels of security and flexibility.
Quantum computing’s advancement means traditional cryptographic algorithms could be compromised by quantum computing systems. The development of quantum computing has spurred research and analysis into cryptographic algorithms resistant to quantum attacks. Lattice-based cryptosystems, with their simple structure and reliance on worst-case computational difficulty assumptions, possess inherent advantages against quantum attacks and represent the most promising category of post-quantum cryptographic technologies. However, lattice cryptography still suffers from significant computational inefficiencies, which severely impacts the overall efficiency of lattice-based cryptographic algorithms. To address this, lattice-based online/offline cryptography techniques can offload computationally intensive operations to the offline phase, requiring only lightweight computations during the online phase. This characteristic aligns perfectly with the data upload requirements of sensor systems.
To sum up, although Identity-based Matchmaking Encryption (IB-ME) already exists, it is difficult to meet the data sharing requirements of Exercise Physiology. We extend the functionality of Identity-based Matchmaking Encryption to construct Identity-Based Matchmaking Proxy Re-Encryption (IB-MPRE). In addition, to improve the enc speed, we introduce online/offline encryption. By incorporating lattice cryptography, Online/Offline computation, Identity-Based Matchmaking Encryption and Proxy Re-Encryption encryption, we put forward a lattice-based Online/Offline Identity-Based Matchmaking Proxy Re-Encryption (OO-IB-MPRE) scheme for exercise physiological data. The key contributions of the this research are outlined below:
1.
In our scheme, we develop a lattice-based Identity-Based Matchmaking Proxy Re-Encryption (IB-MPRE) scheme for exercise physiological data. The scheme not only effectively safeguards identity privacy and exercise physiological data security but also enables secure ciphertext transformation based on user identity attributes;
2.
By introducing online/offline technology, complex computations in the proposed scheme are pre-processed offline, significantly enhancing system performance to meet the requirement for sensor data upload. Experiment findings indicate that the suggested scheme is superior in efficiency to other existing approaches;
3.
We demonstrate the security of the OO-IB-MPRE scheme by proving its semi-selective privacy under the Learning With Errors (LWE) assumption and its authenticity under the Inhomogeneous Small Integer Solution (ISIS) problem.

2. Related Work

Identity-Based Encryption (IBE), first introduced by Shamir [1] in 1984, presents a notable cryptographic paradigm by employing user identity directly as a public key, thus removing the need for complex certificate management. This inherent simplicity makes it particularly suitable for resource-constrained devices. However, conventional IBE schemes that make them susceptible to quantum computing attacks, indicating they lack post-quantum security. To address this quantum threat, lattice-based cryptography has come to the fore as a primary solution. The theoretical groundwork for this transition was laid by Gentry et al. [2], who constructed foundational lattice-based IBE schemes. Building on this, Gao et al. [3] has further advanced the field by proposing concrete post-quantum IBE schemes that integrate the Learning With Errors (LWE) problem with quantum circuits. In summary, IBE technology is actively developing from its classical form towards anti-quantum versions based on hard lattice problems and other quantum-resistant mathematical foundations, ensuring its long-term security in the future quantum computing era.
Identity-based Matchmaking Encryption (IB-ME) has inherent application potential as an cryptographic paradigm that protects both parties’ identities and content privacy. Matchmaking Encryption (ME) was first proposed by Ateniese et al. [4]. It acts as the foundational prototype for Identity-Based Matchmaking Encryption (IB-ME). This scheme improves traditional identity-based encryption by integrating a bidirectional identity matching mechanism. Specifically, the encryptor must define the recipient’s identity (rcv) when generating the ciphertext, while the decryptor must specify the sender’s identity (snd) when attempting decryption. The condition for accurate plaintext retrieval is twofold: the sender’s true identity must correspond to the snd provided by the receiver, and the receiver’s true identity must correspond to the rcv established during enc. If the matching condition is not satisfied, the decryption fails and the user’ identity information remains uncompromised. In 2021, Francati et al. [5] presented an Identity-Based Matchmaking Encryption scheme that is secure in the Standard Model (SM) without depending on the Random Oracle Model, based on the non-standard q-Augmented Bilinear Diffie-Hellman Exponent (q-ABDHE) assumption. In 2023, Wu et al. [6] extended conventional IB-ME to fuzzy identity-based matchmaking encryption, which enables users to achieve non-interactive matching based on attribute set similarity (where the intersection size exceeds a threshold d). They also employed splitting techniques and global identifier binding to defend against identity leakage attacks. In an effort to resist quantum computing attacks, Wang et al. [7] extended identity-based matching encryption (IB-ME) to achieve post-quantum security. They pioneered a non-black-box construction based on the standard lattice assumptions (LWE/ISIS), replacing traditional cryptographic components with a primal sample function (PSF) and a non-interactive zero-knowledge proof system (NIZK). This approach ensures post-quantum security while optimizing performance. In 2022, Chen et al. [8] developed the first IB-ME scheme in the Standard Model. The security of this scheme is based on the Symmetric External Diffie-Hellman (SXDH) assumption over bilinear pairing groups, and it combines a two-level anonymous Hierarchical Identity-Based Encryption (HIBE) with an Identity-Based Signature (IBS) scheme. Inspired by his work, Wang et al. [9] conducted further enhancements on a lattice-based IBS to shorten its signature length, thus reducing the size of the final ciphertext and improving the efficiency of lattice-based IB-ME.
However, in practical applications, cloud data requires flexible access control to accommodate different scenarios. Traditional cryptographic schemes have limitations in dynamic permission management. For instance, while IBE supports identity-based access, it necessitates re-encrypting all data whenever permissions change—such as when granting access to a new hospital nurse, which requires reconstructing all ciphertext, resulting in additional overhead. Proxy Re-Encryption (PRE) can improve data access efficiency while maintaining security guarantees.
Blaze et al. [10] introduced the PRE scheme to realize secure and efficient data sharing. It empowers a semi-trusted proxy server to execute authorized ciphertext transformation for diverse users, without revealing either plaintext information or users’ private keys. Subsequently, Green [11] pioneered the proposal of Identity-Based Proxy Re-Encryption (IB-PRE) to streamline the Public Key Infrastructure (PKI). Within the IB-PRE, a user’s identity can directly act as a replacement for their public key. To enhance the security of IB-PRE, Wu et al. [12] developed an IND-ID-CPA-secure lattice-based IB-PRE by integrating the re-encryption algorithm into the IBE scheme put forward by Agrawal et al. [13], introducing a new feature termed “re-encryption verifiability.” Moreover, by expanding the basic IB-PRE scheme, they put forth a new primitive, “IB-VPRE” (Identity-Based Verifiable Proxy Re-Encryption), devised to fend off insider attacks. To combat collusion attacks, Dutta et al. [14] presented a construction for a collusion-resistant IB-PRE scheme within the standard model, tackling both selective identity and adaptive identity attacks. Dutta et al. [15] were the pioneers in constructing a concrete unidirectional Identity-Based Proxy Re-Encryption (IB-PRE) scheme grounded in the LWE problem, and they validated its security within the standard model. In the same year, Li et al. [16] integrated lattice cryptography with Auxiliary-Input to develop a lattice-based multi-use unidirectional deterministic public key proxy re-encryption scheme, resolving the applicability challenge of traditional PRE in scenarios featuring randomized enc defects. In contrast to traditional certificateless public key encryption (CL-PKE) schemes which rely on the difficulty of integer factorization and the discrete logarithm problem, Li et al. [17] constructed a lattice-based CL-PKE scheme against quantum computing attacks, thus enabling more secure big data sharing in the cloud.
IB-PRE can also be extended to Ciphertext-Policy Attribute-Based Encryption (CP-ABE). Correspondingly, Li et al. [18] developed a Ciphertext-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE) scheme grounded in Ring Learning with Errors (RLWE). Ge et al. [19] presented a verifiable and fair Attribute-Based Proxy Re-Encryption scheme in 2021, which boosts the security and reliability of encrypted data sharing in cloud environments. Afterwards, in 2024, Zhao et al. [20] addressed the security issues of electronic health record sharing in cloud storage by proposing Lavida, an Attribute-Based Proxy Re-Encryption scheme. It integrates Non-Interactive Zero-Knowledge Proofs (NIZK) with a partially hidden policy to achieve verifiable and dynamic fine-grained access control. In the same year, Zhang et al. [21] also introduced a non-interactive IBE-ABE PRE scheme that cuts down the computational overhead for the data owner. This scheme not only offers fine-grained access control over ciphertext data but also allows the conversion of ciphertexts encrypted under IBE into those encrypted under ABE.
Although the IB-PRE scheme allows flexible authorization of user access, its data processing efficiency still needs enhancement. To further address this shortcoming, Guo et al. [22] first proposed the Identity-Based Online/Offline Encryption (IBOOE) scheme in 2008. Its main idea is to enable high-performance devices to finish resource-intensive computations in the offline phase, thus allowing for the rapid assembly of the encryption ciphertext or key in the online phase. The low efficiency of certain lattice-based IB-PRE schemes mainly arises from their strong reliance on Gaussian sampling. Since the current implementations of Gaussian sampling often depend on extensive simulation to approximate the target distribution, this dependence significantly restricts the overall computational efficiency. Furthermore, building on the scheme of Guo et al., Hohenberger et al. [23] extended the Identity-Based Online/Offline Encryption scheme to Attribute-Based Encryption (ABE). Building on the work of Guo et al., Lai et al. [24] presented a semi-generic transformation method to construct an Identity-Based Online/Offline cryptographic scheme. This method optimizes the identity computation splitting to cut down both offline storage and online computational overhead. To enhance the efficiency of existing lattice-based IBE schemes, Zuo et al. [25] employed an online/offline computation mechanism. This approach transfers most Gaussian sampling and computation tasks that do not depend on identity or message authentication to high-performance devices for offline processing. This optimization saves time and resources, allowing constrained devices, such as smart cards and sensors, to process the computation-intensive tasks in advance, with the real-time enc phase requiring only microsecond-level operations.
Due to security considerations for online/offline encryption schemes, Langrehr et al. [26] developed two tightly secure Hierarchical Identity-Based Encryption (HIBE) schemes based on the matrix Diffie–Hellman assumption. Zhang et al. [27] built an Identity-Based Online/Offline Encryption (IBOOE) scheme with a leakage-resilient property by using a private key extension technique. Meanwhile, Yu et al. [28] put forward a Leakage-Resilient Hierarchical Identity-Based Online/Offline Encryption (LR-HIOOE) scheme. By utilizing the binary extractor technique, this scheme can resist the leakage of the symmetric key used during enc.

3. Preliminaries

Lattice An m-dimensional lattice L is a discrete subgroup of R m . Let L q A represent a q-ary lattice, defined as { x Z m A x = 0 mod q } , where n ,   m and q are positive integers, and A is a matrix in Z q n × m . For each u Z q n , we define L q u A as the coset x Z m A x = u mod q .
Discrete Gaussians For any σ > 0 , the discrete Gaussian distribution is given by ρ L ,   σ x = ρ σ x ρ σ L , where ρ σ x is defined as e x p π x 2 σ 2 and ρ σ L = x L   ρ σ ( x ) serves as the normalization factor. The following lemmas describe key properties of discrete Gaussians [2].
If S = ( s 1 ,   s 2 ,   ,   s m ) R n × m , denote S = m a x { s i 2 } i = 1 ,   2 ,   ,   m .
Lemma 1
([13]). The following bounds hold for the matrix norm defined previously.
  • Let R { 1 ,   1 } m × m be chosen at random, then Pr [ R > 12 2 m ] < e 2 m .
  • Let R be sampled from D Z m × m ,   σ , then we have Pr [ R > σ m ] < e 2 m .
Lemma 2
([13]). Suppose that m > n + 1 log q + w l o g n . Let R { 1 ,   1 } m × k be chosen uniformly at random for some polynomial k = k n . Let A a n d B be randomly chosen matrices from Z q n × m a n d Z q n × k respectively. Then, for any vector w Z m , the following two distributions are statistically indistinguishable:
A ,     A R ,     R T w A ,     B ,     R T w
Sampling Algorithms. We recall several sampling algorithms from [29,30,31].
Lemma 3.
For integers n 1 ,   m 2 n l o g q ,   q 2 , the following polynomial time algorithms are available:
  • SamplePre A ,   T A ,   σ ,   u s : Takes as input a matrix A Z q n × m , its trapdoor T A , a vector u Z q n , and a parameter σ   T A ˜ · ω ( log m ) , output a vector s Z q m , satisfying A · s = u and s m σ .
  • SampleLeft ( A ,   M ,   T A ,   M ,   T A ,   σ ,   u s : Takes as input a matrix A Z q n × m and its trapdoor T A , a matrix M Z q n × m 0 , a vector u Z q n , and a parameter σ   T A ˜ · ω log ( m + m 0 ) , output a vector s Z q m + m 0 whose distribution is statistically close to D L q u A M ,   σ .
  • SampleRight A ,   G ,   R ,   T G ,   σ ,   u s : Takes as input a matrix A Z q n × m , the gadget matrix G and its trapdoor T G , a uniform random matrix R { 1 ,   1 } m × m , a vector u Z q n , and a parameter σ T G ˜ · m · ω ( log m ) , output a vector s Z q 2 m whose distribution is statistically close to D L q u A | A R + G ,   σ .
Lemma 4.
Let n ,   m ,   q be positive integers with m > 2 n log q . For A Z q n × m and e D Z m ,   σ , the distribution of u = A e mod q is statistically indistinguishable from the uniform distribution over Z q n .
Lemma 5
([2,32,33]). Let n ,   m ,   q be integers with n 1 ,   q 2 , and m = 2 n log q . There exists a probabilistic polynomial-time (PPT) algorithm T r a p G e n ( q ,   n ) , that outputs ( A Z q n × m ,   T A Z q m × m ) , where A is statistically close to a matrix in Z q n × m and T A is a basis of Λ q ( A ) in Z q m × m . T A satisfies T A ˜   O ( n log q ) , T A   O ( n log q ) with almost negligible probability in n.
Definition 1
(Learning with Errors [33]). Let n ,   q be positive integers and σ R be a parameter, for any PPT adversary A , there exists a negligible function n e g l · that satisfies
Pr A ( α ,   s α + e ) = 1 Pr A ( α ,   γ ) = 1 negl ( λ )
where α Z q n ,   s Z q n ,   γ Z q ,   e D Z ,   σ .
Definition 2.
A function H: Z q n Z q n × n is called a full-rank different map if for any two distinct inputs u ,   v Z q n , the difference H u H v is full rank matrix over Z q n × n , and H can be is computed in 𝒪 n l o g q time.
The Inhomogeneous Small Integer Solution (ISIS) problem was introduced by Gentry et al. in [2]. It involves finding a solution for specified parameters ( n ,   m ,   q ,   β ) , a random matrix A Z q m × n and a target vector y Z n . Specifically, the problem requires determining an x that satisfies the equation: x A y ( mod q ) (1), where the norm of x is bounded by β . Gentry et al. further demonstrated that the ISIS problem is at least as challenging as approximating the SIVP γ problem, with γ = β · O ˜ ( n ) when β = poly ( n ) and q β · ω ( n log n ) . Solving Equation (1) can be viewed as a variant of the ISIS problem, albeit with a relaxed bound on the norm of x. In the following section, we employ an intersection-based approach to streamline the solution process.

4. Formal Definition and Security Model

4.1. System Model

As depicted in Figure 1, our scheme involves the following four participants: Trusted Authority (TA), Sender, Proxy, and Receiver.
  • Trusted Authority (TA): Generates the system’s master public key and master private key. It generates the sender’s enc key based on the sender’s identity and the receiver’s decryption key based on the receiver’s identity, and can also generate the re-enc key based on the receiver’s identity.
  • Sender: (a) Offline Phase: Pre-executes a large number of complex calculations to generate the intermediate ciphertext. (b) Online Phase: When real-time data needs to be encrypted, it combines the intermediate ciphertext, the target identity specified by the sender, and the plaintext to generate the final original ciphertext.
  • Proxy (typically a cloud service provider): Decrypts the ciphertext stored in the cloud to generate the re-encrypted ciphertext.
  • Receiver: Decrypts the data using their own decryption key and the ciphertext encrypted by the sender (including the original ciphertext and the re-encrypted ciphertext) and finally obtains the original plaintext.

4.2. Formal Definition

Definition: An OO-IB-MPRE scheme consists of the following eight algorithms:
  • S e t u p 1 λ m p k ,   m s k : Inputs security parameter λ , TA outputs master public key and master private key pair ( m p k ,   m s k ) .
  • E k G e n m p k ,   m s k ,   σ e k σ : Inputs m p k ,   m s k , and sender’s identity σ , TA outputs enc key e k σ .
  • D k G e n m p k ,   m s k ,   ρ d k ρ : Inputs mpk, msk, and receiver’s identity ρ , TA outputs decryption key d k ρ .
  • R k G e n ( m p k ,   m s k ,   r c v ,   r c v ) r k r c v r c v : Inputs m p k ,   m s k , and sender-specified target identities r c v and r c v , TA outputs re-enc key r k r c v r c v from r c v to r c v .
  • E n c o f f ( m p k ,   e k σ ) c t ¯ : Inputs m p k and e k σ , the algorithm outputs intermediate ciphertext c t ¯ .
  • E n c o n m p k ,   c t ¯ ,   r c v ,   m c t : Inputs m p k ,   c t ¯ ,   r c v and plaintext m, the algorithm outputs complete original ciphertext c t .
  • R e E n c m p k ,   c t ,   r k r c v r c v c t : Inputs m p k ,   c t and r k r c v r c v , if ct is the ciphertext corresponding to rcv, the algorithm outputs the re-encrypted ciphertext c t corresponding to r c v ; otherwise, it outputs ⊥.
  • D e c ( m p k ,   d k ρ ,   s n d ,   c t ) m : Inputs m p k ,   d k ρ , receiver-specified target identity s n d and c t (including original ciphertext and re-encrypted ciphertext), outputs m.
Correctness: The correctness of the OO-IB-MPRE scheme requires that the decryption works correctly for both original ciphertext c t and re-encrypted ciphertext c t . If s n d and r c v match σ and ρ respectively, then with a non-negligible probability, for original ciphertext, D e c m p k ,   s n d ,   c t m , and for re-encrypted ciphertext, D e c ( m p k ,   d k ρ ,   s n d ,   c t ) m , where m p k ,   d k ρ ,   s n d ,   c t ,   c t are correctly generated according to the formal definitions above.

4.3. Security Model

In the security model of [7], Wang et al. pointed out that if the adversary sends two sender identities in addition to two receiver identities, a trivial attack exists here. They also indicated that [7] can only protect the sender’s identity against honest receivers. This section, similar to [7], defines the semi-selective security model for OO-IB-MPRE through a game G a m e π ,   t s s p r i v between the adversary A and the challenger C . In the security model, the adversary first submits two receiver identities before the master public key (mpk) is generated. After the mpk is generated, the adversary then submits a challenge tuple m 0 * ,   m 1 * ,   σ 0 * ,   σ 1 * that contains two sets of messages and corresponding sender identities. The security strength of the semi-selective security model lies between that of the selective security model and the fully adaptive security model.
Initialization: The adversary A sends two challenge identities ( r c v 0 * ,   r c v 1 * ) to the challenger C .
Setup phase: C runs S e t u p 1 λ to generate m p k ,   m s k . C keeps m s k secret and sends m p k to A .
Learning phase 1: In this phase, A can adaptively access the following oracles for any polynomial number of times.
Enc Key Oracle O e k ( σ ) : A inputs sender’s identity σ , C returns enc key e k σ .
Decryption Key Oracle O d k ( ρ ) : A inputs receiver’s identity ρ , C returns decryption key d k ρ .
Re-Enc Key Oracle O r k ( r c v ,   r c v ) : A inputs sender-specified target identities r c v and r c v , C returns re-enc key r k r c v r c v .
Re-enc oracle O r e ( c t ,   r c v ,   r c v ) : A inputs c t , r c v and r c v , if c t is a valid ciphertext under r c v , C returns re-encrypted ciphertext c t .
Challenge: A sends the randomly selected message-identity pairs m 0 * ,   m 1 * ,   σ 0 * ,   σ 1 * to C . C randomly selects a bit b 0 ,   1 and computes the challenge ciphertext c t ¯ * E n c o f f m p k ,   e k σ b * , c t * Enc o n ( m p k ,   r c v b * ,   c t * ¯ ,   m b * ) . Finally, C sends c t * to A .
Learning phase 2: In this phase, A can continue to query the oracles as in Learning phase 1, but it is not allowed to query the following oracles:
O d k ( ρ ) for any ρ { r c v 0 * ,   r c v 1 * } .
O r k ( r c v ,   r c v ) for any ρ { r c v 0 * ,   r c v 1 * } , and ρ = r c v , O d k ( ρ ) has been inquired.
O r e ( c t ,   r c v ,   r c v ) for any ρ { r c v 0 * ,   r c v 1 * } , and ρ = r c v , O d k ( ρ ) has been inquired.
  • Guess: A outputs a guess b { 0 ,   1 }
  • Output: If b = b , output 1, otherwise output 0.
Definition 3
(semi-selective privacy). An OO-IB-MPRE scheme is semi-selectively private if for any PPT adversary A , the advantage of winning the above game is negligible.
Pr G a m e π ,   t sspriv ( λ ) = 1 1 2 ε
where ε is a negligible quantity.
Next, we define the authenticity security model of the OO-IB-MPRE scheme. Similar to the semi-selective privacy security model, we also characterize it through a game G a m e π ,   t A u t h between the adversary A and the challenger C .
Setup phase: C runs S e t u p λ to generate m p k ,   m s k . C keeps m s k secret and sends m p k to A .
Learning phase 1: Identical to Game π ,   t sspriv , A can query the oracles O d k ( ρ ) , O e k ( σ ) , O r k ( r c v ,   r c v ) and O r e ( c t ,   r c v ,   r c v ) .
Forgery phase: A outputs a forgery tuple ( c t * ,   ρ * ,   snd * ) and sends it to C .
Output: C generates m Dec ( m p k ,   d k ρ * ,   snd * ,   c t * ) . If O e k ( send * ) has not been inquired and m , then C outputs 1, otherwise outputs 0.
Definition 4
(Authenticity). An OO-IB-MPRE scheme is authentic if for any PPT adversary A :
Pr G a m e π ,   A Auth ( λ ) = 1 ε
where ε is a negligible quantity.
Definition 5.
If an OO-IB-MPRE scheme is secure in terms of privacy and authenticity, then it is said to be secure.
Remark: While the fully adaptive security model provides enhanced security guarantees, achieving full adaptivity in lattice-based cryptographic systems requires sophisticated techniques such as dual system encryption or admissible hash functions. This often leads to excessive parameter expansion, thereby increasing storage and computational overhead. Furthermore, generic transformation methods for achieving full adaptivity can compromise the efficiency of online/offline operations.
The core objective of the proposed scheme is to enable secure sharing of motion physiological data while maintaining lightweight performance for resource-constrained wearable sensors. Thus, the semi-adaptive security model represents a reasonable trade-off between security rigor and practical deployability, consistent with the established practices of lattice-based cryptography in resource-constrained scenarios.

5. OO-IB-MPRE from Lattices

5.1. Construction

  • Setup ( 1 λ ) ( m p k ,   m s k ) . Input security parameter λ . TA performs the following operations.
    (1)
    Generate ( A 0 ,   T A 0 ) ,   ( A ,   T A ) TrapGen ( q ,   n ,   m ) .
    (2)
    Randomly select u 0 Z q n , A 1 ,   B Z q n × m .
    (3)
    Randomly select two hash functions H 1 : Z q n Z q n ,   H 2 : Z q n Z q n × n , where H 2 is a full-rank difference hash function [13].
    (4)
    Output the master public key m p k = ( A 0 ,   A 1 ,   A ,   B ,   H 1 ,   H 2 ,   u 0 ) and the master private key m s k = ( T A 0 ,   T A ) .
  • EkGen ( m p k ,   m s k ,   σ ) e k σ . Input m p k , m s k and sender’s identity σ . TA performs the following operations.
    (1)
    Generate e σ SamplePre ( A ,   T A ,   H 1 ( σ ) ) , where A e σ = H 1 ( σ ) .
    (2)
    Output the enc key e k σ = e σ Z q m .
  • DkGen ( m p k ,   m s k ,   ρ ) d k ρ . Input m p k , m s k and receiver’s identity ρ . TA performs the following operations.
    (1)
    Let F ρ = [ A 0 A 1 + H 2 ( ρ ) B ] Z q n × 2 m .
    (2)
    Generate e ρ SampleLeft ( A 0 ,   T A 0 ,   F ρ ) , such that F ρ e ρ = u 0 .
    (3)
    Output the decryption key d k ρ = e ρ Z q 2 m .
  • ReKeyGen ( m p k ,   m s k ,   r c v ,   r c v ) . Input m p k ,   m s k , the identity of the original target receiver identity r c v and the identity of the converted target receiver identity r c v . TA performs the following operations.
    (1)
    Let F r c v = A 0 | A 1 + H 2 r c v B and F r c v = A 0 | A 1 + H 2 r c v B be the two matrices corresponding to the original target receiver identity r c v and the converted target receiver identity r c v respectively.
    (2)
    Generate the re-enc key from r c v to r c v using the SampleLeft algorithm, i.e., compute e r k S a m p l e L e f t F r c v ,   T A 0 ,   A 1 + H 2 r c v B , such that
    F r c v e r k = A 1 + H 2 r c v B . It should be noted that for the subsequent security proof, there is no requirement for F r c v e r k = F r c v .
    (3)
    Output the re-enc key r k r c v r c v = e r k Z q 2 m × m from r c v to r c v . Let I m be an m-order identity matrix, e r k = e r k 1 e r k 2 Z q 2 m × m , then we have
    F r c v I m e r k 1 0 e r k 2 = [ A 0 A 1 + H 2 ( r c v ) B ] = F r c v .
  • Enc o f f m p k ,   e k σ c t ¯ . Input m p k and e k σ . Sender performs the following operations.
    (1)
    Compute
    c ¯ 0 = u 0 T s + x + A e k σ mod q ; c ¯ 11 = A 0 T s + y ; c ¯ 12 = R T y
    where s Z q n ,   x χ ,   R { 1 ,   1 } m × m ,   y χ m , A e k σ = A e k σ mod q , the following norm operations are analogous, meaning they implicitly involve a modulo q operation.
    (2)
    Output the intermediate ciphertext c t ¯ = ( c ¯ 0 ,   c ¯ 11 ,   c ¯ 12 ,   s ) .
  • Enc o n ( m p k ,   r c v ,   c t ¯ ,   m ) c t . Input m p k , c t ¯ = ( c ¯ 0 ,   c ¯ 11 ,   c ¯ 12 ,   s ) , target receiver identity r c v , and plaintext m. Sender performs the following operations.
    (1)
    Compute
    c 0 = c ¯ 0 + q 2 m ,   c 1 = c ¯ 11 ( A 1 + H 2 ( r c v ) B ) T s + 0 c ¯ 12 = A 0 T s + y ( A 1 + H 2 ( r c v ) B ) T s + R T y = A 0 T ( A 1 + H 2 ( r c v ) B ) T s + y R T y = F r c v T s + y R T y .
    (2)
    Output the original ciphertext c t = ( c 0 ,   c 1 ) .
  • ReEnc ( m p k ,   c t ,   r k r c v r c v ) c t . Input m p k , c t = ( c 0 ,   c 1 ) and r k r c v r c v . Proxy computes and outputs the re-encrypted ciphertext c t = ( c 0 ,   c 1 ) = ( c 0 ,   r k r c v r c v T c 1 ) , where r k r c v r c v T c 1 represents the multiplication of r k r c v r c v T and c 1 . It should be noted that
    r k r c v r c v T c 1 = e r k T c 1 = e r k T ( F r c v T s + y R T y ) = e r k T F r c v T s + e r k T y R T y = ( F r c v e r k ) T s + e r k T y R T y = ( F r c v ) T s + e r k T y R T y .
  • Dec ( m p k ,   d k ρ ,   s n d ,   c t ) m . Input m p k , d k ρ , target sender identity s n d and c t = ( c 0 ,   c 1 ) . Receiver performs the following operations.
    (1)
    Compute z = c 0 e ρ T c 1 H 1 ( s n d ) .
    (2)
    Compared to 0, if z is closed to q 2 , output 1; otherwise output 0.

5.2. Correctness

When s n d and r c v match σ and ρ respectively, then H 1 ( snd ) = H 1 ( σ ) , F r c v e ρ = u 0 . For the original ciphertext c t = c 0 ,   c 1 , we have:
c 0 e ρ T c 1 H 1 ( snd ) = = q 2 m + u 0 T s + x + A e k σ e ρ T F r c v T s + y R y H 1 ( snd ) = q 2 m + u 0 T s + x + A e k σ ( F r c v e ρ ) T s e ρ T y R y H 1 ( σ ) = q 2 m + u 0 T s + x F r c v e ρ T s e ρ T y R y = q 2 m + x e ρ T y R y Δ = q 2 m + Δ
When Δ < q 4 the decryption is correct.
For the re-encrypted ciphertext, c t = ( c 0 ,   c 1 ) , if s n d and r c v match σ and ρ respectively, we have:
c 0 e ρ T c 1 H 1 ( snd ) = c 0 e ρ T r k r c v r c v T c 1 H 1 ( snd ) = q 2 m + u 0 T s + x + A e k σ e ρ T ( F r c v ) T s + e r k T y R T y H 1 ( snd ) = q 2 m + u 0 T s + x + A e k σ e ρ T ( F r c v ) T s + e r k T y R T y H 1 ( snd ) = q 2 m + u 0 T s + x e ρ T ( F r c v ) T s + e r k T y R T y = q 2 m + u 0 T s + x ( F r c v e ρ ) T s e ρ T e r k T y R y = q 2 m + x e ρ T e r k T y R y Δ = q 2 m + Δ
When   Δ < q 4 , the decryption is correct.
In addition, the OO-IB-MPRE scheme needs to meet the following conditions:
Setup requires m 2 n log q ;
EkGen requires σ   T ˜ A ω log m ;
DkGen requires σ   T ˜ A ω log ( m + m ) ;
RekeyGen requires σ   T ˜ A ω log ( m + m ) ;
LWE requires α q > 2 n .
Therefore, we can set n = λ , m = 2 n log q , χ = D Z ,   α q , σ = α q = m ω log m , α 3 < 1 20 q 2 m 2 . Let e ρ T = [ e ρ 1 ,   e ρ 2 ] .
According to Lemma 1,   x   σ , e ρ 1 e ρ 2 R     e ρ 1 + e ρ 2 R   σ m + σ m 2 m . We have:
Δ = x e ρ T y R y = x [ e ρ 1 ,   e ρ 2 ] y R y = x [ e ρ 1 e ρ 2 R ] y x + ( e ρ 1 e ρ 2 R ) y     x + e ρ 1 e ρ 2 R y σ + σ m σ m + σ m 2 m 2 σ 2 m 3 2 = 2 α 2 q 2 m 3 2 < 2 q 2 m 3 2 20 2 3 q 4 3 m 4 3 < q 5
Let e ρ T = [ e ρ 1 ,   e ρ 2 ] ,   e r k T = I e r k 1 0 e r k 2 ,   we have :
Δ = x e ρ T r k r c v r c v T y R y = x + e ρ 1 ,   e ρ 1 e r k 1 + e ρ 2 e r k 2 y R y x + e ρ 1 + ( e ρ 1 e r k 1 + e ρ 2 e r k 2 ) R y x + e ρ 1 + e ρ 1 e r k 1 + e ρ 2 e r k 2 + R y σ + σ m + ( 2 σ m · σ m ) 2 m σ m = σ + σ 2 m + 2 2 σ 3 m 2 4 σ 3 m 2
It can be inferred from the parameter settings that σ = α q ; so, 4 σ 3 m 2 4 α 3 q 3 m 2 . Since α 3 < 1 20 q 2 m 2 , we have 4 α 3 q 3 m 2 4 q 3 m 2 20 q 2 m 2 = q 5 . That is Δ < q 4 .

5.3. Security

Theorem 1.
If the LWE problem is hard, then the above OO-IB-MPRE scheme satisfies semi-selective privacy.
Proof. 
The proof of the theorem is carried out through a series of games.
  • G 0 : Identical to the semi-selective privacy security game.
  • G 1 : Identical to G 0 , except for the generation of A 1 . In G 1 , the challenger C randomly selects R * { 1 ,   1 } m × m , b { 0 ,   1 } , and sets A 1 = A 0 R * H 2 ( r c v b * ) B .
Here, R * is used solely for generating the subsequent ciphertext component ( R * ) T y . Since A 0 and A 1 is uniformly distributed over Z q n × m , by Lemma 2, the tuples ( A 0 ,   A 0 R * ,   ( R * ) T y ) and ( A 0 ,   A 1 ,   ( R * ) T y ) are statistically indistinguishable. Hence, G 0 and G 1 are statistically indistinguishable.
  • G 2 : Identical to G 1 , except for the generation of A 0 and B. In G 2 , the challenger C randomly selects A 0 Z q n × m and generates ( B ,   T B ) TrapGen ( q ,   n ,   m ) .
In G 1 , T A 0 is used to generate the decryption key e σ SamplePre ( A ,   T A ,   H 1 ( σ ) ) and re-encryption key e r k S a m p l e L e f t F r c v ,   T A 0 ,   A 1 + H 2 r c v B , whereas in G 2 , the challenger C utilizes T B for the same purpose. We next prove that the decryption keys and re-encryption keys generated in G 1 and G 2 are indistinguishable, thereby demonstrating the indistinguishability of G 1 and G 2 .
For the decryption key e ρ of the receiver identity ρ , we have: F ρ = [ A 0 A 1 + H 2 ( ρ ) B ] = A 0 ( A 0 R * H 2 ( r c v b * ) B ) + H 2 ( ρ ) B = A 0 A 0 R * + H 2 ( ρ ) H 2 ( r c v b * ) B . Since ρ { r c v 0 * ,   r c v 1 * } , H 2 ( ρ ) H 2 ( r c v b * ) is a full-rank matrix. Thus, T B can be used to generate e ρ SampleRight ( A 0 ,   H 2 ( ρ ) H 2 ( r c v b * ) B ,   R * ,   T B ,   u 0 ) such that F ρ e ρ = u 0 . By Lemma 3, the statistical distributions of e ρ in G 2 and G 1 are indistinguishable.
For the re-enc key r k r c v r c v , the challenger selects Q r c v r c v D Z 2 m × m ,   s , and computes H 2 ( r c v ) as the hash value of r c v according to the equation F r c v Q r c v r c v = A 1 + H 2 ( r c v ) B , and stores ( r c v 1 ,   F r c v ,   Q r c v r c v ,   H 2 ( r c v ) ) in the table T . By Lemma 3, Q r c v r c v is statistically indistinguishable from the re-enc key in G 1 . Thus, Q r c v r c v serves as the re-enc key from r c v r c v .
Consequently, G 2 is statistically indistinguishable from G 1 by Lemma 3.
  • G 3 : Identical to G 2 , except for the generation of the ciphertext c 0 * . The challenger randomly selects Z * Z q n . Let A e k 0 = Z * , i.e., c 0 * = q 2 m + u 0 T s + x + Z * .
Since e ρ SampleRight ( A 0 ,   H 2 ( ρ ) H 2 ( r c v b * ) B ,   R * ,   T B ,   u 0 ) , by Lemma 4, A e k 0 and Z * are statistically indistinguishable. Therefore, G 3 is statistically indistinguishable from G 2 .
  • G 4 : Identical to G 3 except for the generation of the challenge ciphertext c t * = ( c 0 * ,   c 1 * ) . The challenger randomly selects c 0 * Z q ,   c 1 * Z q 2 m , setting c 0 * = c 0 * , c 1 * = c 1 * .
Based on the LWE assumption, c 0 * and c 0 * , c 1 * and c 1 * are computationally indistinguishable. Therefore, G 4 and G 3 are computationally indistinguishable. At this point, the advantage of adversary 𝒜 in G 4 is negligible.
From the indistinguishability of the above four games, G 4 and G 0 are computationally indistinguishable. Furthermore, the adversary’s advantage in winning G 4 is negligible. Therefore, Theorem 1 holds, i.e., the OO-IB-MPRE scheme satisfies semi-selective privacy. □
Theorem 2.
If the ISIS problem is hard, then the above OO-IB-MPRE scheme satisfies authenticity.
Proof. 
Suppose there exists an adversary A who can break the authenticity of the above OO-IB-MPRE scheme with a non-negligible advantage. Then we can construct an algorithm B that solves the ISIS problem with a non-negligible advantage.
  • G 0 : Identical to the semi-selective authenticity security game.
  • G 1 : Identical to G 0 , except for the generation of A 1 . In G 1 , algorithm B randomly selects R * { 1 ,   1 } m × m , b { 0 ,   1 } , and sets A 1 = A 0 R * H 2 ( r c v b * ) B .
  • G 2 : Identical to G 1 , except for the generation of A 0 and B. In G 2 , algorithm B randomly selects A 0 Z q n × m and generates ( B ,   T B ) TrapGen ( q ,   n ,   m ) .
From the proof of Theorem 1, G 0 and Game G 1 are statistically indistinguishable, G 1 and G 2 are statistically indistinguishable. Consequently, G 0 and G 2 are statistically indistinguishable.
  • G 3 : Identical to G 2 , except for the generation of the matrix A. In G 3 , the algorithm B randomly selects A Z q n × m . When an adversary A initiates a query for the hash value H 1 ( σ ) of user σ , algorithm B first searches its local storage. If ( σ ,   ρ 0 ,   A e σ ) exists, it returns the corresponding hash value A e σ . If not found, it selects e σ X m , then sets H 1 ( σ ) = A e σ , stores ( σ ,   A e σ ,   e σ ) locally, and returns the corresponding H 1 ( σ ) = A σ .
From Lemma 3, A is identically distributed in G 2 and G 3 , and e σ is also identically distributed in these two games. Consequently, G 2 and G 3 are statistically indistinguishable.
  • G 4 : Identical to G 3 , except for the generation of the ciphertext c 0 * . The algorithm B randomly selects Z * Z q n . Let A e k σ = Z * , i.e., c 0 * = q 2 m + u 0 T s + x + Z * .
  • G 5 : Identical to G 4 except for the generation of the challenge ciphertext c t * = ( c 0 * ,   c 1 * ) . The algorithm B randomly selects c 0 * Z q ,   c 1 * Z q 2 m , setting c 0 * = c 0 * , c 1 * = c 1 * . At this point, the advantage of adversary 𝒜 in G 4 is negligible.
From the proof of Theorem 1, G 3 and Game G 4 are statistically indistinguishable, G 4 and G 5 are computationally indistinguishable. Consequently, G 0 and G 5 are computationally indistinguishable. Furthermore, the adversary’s advantage in winning G 5 is negligible.
When A initiates an enc key query for σ , algorithm B first searches its local storage. If ( σ ,   e σ ,   A e σ ) exists, it returns e k σ = e σ . Otherwise, it selects e σ X m and computes H 1 ( σ ) = A e σ . Then stores ( σ ,   e σ ,   A e σ ) locally, and finally returns e k σ = e σ .
If adversary A forges ( c t * ,   ρ * ,   s n d * ) with a non-negligible advantage, and c t * can be correctly decrypted, i.e., m Dec ( m p k ,   d k ρ * ,   s n d * ,   c t * ) . Adversary A has successfully forged the public key e k σ of s e n d * , and adversary A has queried the hash value H ( s e n d * ) of s e n d * , but O e k ( s e n d * ) has not been queried. Therefore, except with a probability of 2 ω ( log n ) , we have e k σ e k s e n d * , meaning a bounded solution e k σ to A x = H 1 ( s e n d * ) has been found, thereby solving the ISIS problem.
Theorem 3.
The above OO-IB-MPRE scheme is secure.
Proof. 
By Theorem 1 and Theorem 2, we can conclude that Theorem 3 is correct. □

6. Performance

6.1. Space Overhead

In comparing space overhead, we primarily examined the overhead of the following terms: public key size, private key size, ciphertext size, and re-encryption key size. Specifically, the plaintext size for Wang et al.’s IB-ME scheme [7], Wu et al.’s IB-VPRE scheme [12], Dutta et al.’s IB-PRE scheme [15], Li et al.’s CL-PRE scheme [17] and our proposed OO-IB-MPRE scheme is 1. Setting λ = n , q = 2 n , m = 6 n log q = 6 n 1.5 , N = 2 n log q = 2 n 1.5 , M = ( n + 1 ) log q + 2 n = n 1.5 + 2 n + n ,   k = log q . Wang’s scheme [7] does not involve proxy re-encryption; so, we cannot compare its re-encryption key size. Wu’s scheme [12] and Dutta’s scheme [15] both use identity as the public key; so, we cannot compare their public key sizes. For ease of comparison, we set the length l of the identity code in Wu’s scheme [12] to 1. Subsequently, we can compute the size of the space overhead, as shown in Table 1. The symbol “—” indicates that this item is not included in the scheme.
When re-encrypting 1-bit plaintext, the proposed scheme has a public key size of 6 n 2 , a private key size and ciphertext size of 12 n 2 , and a re-encryption key size of 72 n 3.5 . In comparison, the Wang’s scheme [7] has a public key size of 6 n 2 , a private key size and ciphertext size of 12 n 2 ; the Wu’s scheme [12] has a private key size and ciphertext size of 12 n 2 , and a re-encryption key size of 144 n 4 + 12 n 2.5 + 12 n 2 + n ; the Dutta’s scheme [15] has a private key size of 12 n 3.5 , a ciphertext size of 8 n 2 , and a re-encryption key size of 64 n 3.5 ; the Li’s scheme [17] has a public key size of 6 n 3 , a private key size and ciphertext size of 72 n 3.5 , and a re-encryption key size of 108 n 3.5 + 72 n 4 . Thus, the proposed scheme demonstrates superior space efficiency over the Wu’s scheme and the Li’s scheme.
For the same security parameter n, the public key size, private key size, ciphertext size and re-encryption key size required by Wang’s scheme [7], Wu’s scheme [12], Dutta’s scheme [15], Li’s scheme [17] and our proposed scheme for encrypting 1-bit plaintext are shown in Table 2. Figure 2, Figure 3, Figure 4 and Figure 5 further illustrate the experimental results under different security parameters n, demonstrating that our scheme exhibits significant advantages in terms of space overhead.
To facilitate size comparison with other schemes [7,12,15,17], Table 1 and Table 2 only account for online ciphertext size without considering offline ciphertext size. We now present a direct comparison between online and offline ciphertext sizes in our proposed scheme, with the results for security parameter n shown in Table 3 and Table 4. It can be seen that as the security parameter n increases, the difference in the size of online and offline ciphertexts becomes negligible.

6.2. Computational Overhead

This section makes a comparison of the computational overhead of the devised scheme with that of Wang’s scheme [7], Wu’s scheme [12], Dutta’s scheme [15] and Li’s scheme [17]. Let T t g ,   T s p ,   T s d ,   T s l ,   T d t ,   T i v represent the time overhead of the TrapGen algorithm, the SamplePre algorithm, the SampleD algorithm, the SampleLeft algorithm, the DelTrap algorithm, the Invert algorithm, respectively. Let T α β γ mul represent the time overhead of multiplying an β × γ matrix by an α × β matrix, where α ,   β ,   γ Z . T ( m n ) mul represents the time it takes to multiply a 1 × m vector by a number. T m m mul represents the time it takes to multiply a m × m matrix by a number. T n m mul represents the time it takes to multiply a n × m matrix by a number. T p zk represents the time overhead of the proof process for zero-knowledge proofs. T v zk represents the time overhead of the verification process for zero-knowledge proofs. The DelTrap algorithm in Dutta’s scheme [15] employs the trapdoor of A i for presampling. However, differing implementations of trapdoor result in variations in the algorithm’s design. For consistency, the SamplePre algorithm replaces the DelTrap algorithm for time simulation. Since the Invert algorithm can be executed offline, its computational overhead is negligible. For comparison purposes, the computational overheads of calculating T p zk and T v zk in Wang’s scheme [7] are also ignored. Furthermore, as Wang’s scheme [7] does not involve proxy re-encryption, we cannot compare its computational overhead for RekeyGen and ReEnc algorithms. Table 5 shows the specific comparison of computational overhead and presents the average time for these algorithms after ten executions.
The devised OO-IB-MPRE solution operates on a server outfitted with a 32-vCPU Intel® Xeon® Platinum 8352V processor @2.10GHz and 60GB of RAM, running under Ubuntu. To achieve better portability, we utilize the NTL library and C++ language to implement the program.
Considering that hash functions run in negligible time and matrix inversion can be carried out offline by users, the computational overhead of these operations is negligible. The specific computational overhead for the five algorithms—Public Key and Private Key Generation, Encryption, Rekey Generation, Re-Encryption, and Decryption are contrasted in Table 6. For ease of comparison, the setup and private key generation algorithms have been integrated into a single category: Public Key and Private Key Generation.
For ease of comparison, set t = n , q = 2 n , m = 6 n log q = 6 n 1.5 , N = 2 n log q = 2 n 1.5 , M = ( n + 1 ) log q + 2 n = n 1.5 + 2 n + n , k = log q . When security parameter n = 32 , in Wang et al.’s scheme [7], the time overhead of the Public Key and Private Key Generation algorithm is approximately T s p + T s l 4.37 s , the Encryption algorithm is approximately T 1 n 1 mul + T n n m mul + T ( 2 m ) n 1 mul 0.0565 s , and the Decryption algorithm is approximately T 1 ( 2 m ) 1 mul 0.0001 s ; in Wu et al.’s scheme [12], the time overhead of the Public Key and Private Key Generation algorithm is approximately T s p + T n m mul 2.0822 s , the Encryption algorithm is approximately T n m mul + T m m mul + T 1 m m mul + T 1 n ( 2 m ) mul + T 1 n 1 mul 0.0073 s , the Rekey Generation algorithm is approximately T ( 2 m n ) mul + T ( 2 m n ) n 1 mul 2.2849 s , the Re-Encryption algorithm is approximately T 1 ( 2 m n ) ( 2 m + 1 ) mul 1.6515 s , and the Decryption algorithm is approximately T 1 ( 2 m ) 1 mul 0.0001 s ; in Dutta et al.’s scheme [15], the time overhead of the Public Key and Private Key Generation algorithm is approximately 3 T n n ( n 1.5 ) mul + 2 T n n n mul + 2 T s p 4.2154 s , the Encryption algorithm is approximately T 1 n ( m + 2 n 1.5 ) mul + 3 T n n ( n 1.5 ) mul + 2 T n n n mul 0.0584 s , the Rekey Generation algorithm is approximately 3 T s p + 6 T n n ( n 1.5 ) mul + 4 T n n n mul 6.3508 s , the Re-Encryption algorithm is approximately T 1 n ( m + 2 n 1.5 ) mul + 3 T 1 ( m n 1.5 ) ( n 1.5 ) mul + 6 T 1 ( n 1.5 ) ( n 1.5 ) mul 0.0818 s , and the Decryption algorithm is approximately 3 T n n ( n 1.5 ) mul + 2 T n n n mul + T 1 ( m + 2 n 1.5 ) ( 2 n 1.5 ) mul 0.0959 s ; in Li et al.’s scheme [17], the time overhead of the Public Key and Private Key Generation algorithm is approximately T s p + T t g 2.143 s , the Encryption algorithm is approximately 2 T m n m mul + T n m n mul 0.275 s , the Rekey Generation algorithm is approximately T s p + 2 T m n ( m n ) mul + ( n ) T ( m n ) mul 3.474 s , the Re-Encryption algorithm is approximately T 2 m ( m n ) m mul + T ( 2 m ) m m mul 38.760 s , and the Decryption algorithm is approximately 4 T m m m mul + T m m mul 13.159 s .
In our scheme, the time overhead of the Public Key and Private Key Generation algorithm is approximately T s p + T s l 4.37 s , the Encryption algorithm is approximately T n n m mul + T m n 1 mul 0.056 s , the Rekey Generation algorithm is approximately T s l + T n n m mul 2.3463 s , the Re-Encryption algorithm is approximately T m ( 2 m ) 1 mul 0.0001 s , and the Decryption algorithm is approximately T 1 ( 2 m ) 1 mul 0.0001 s .
When security parameter n = 64 , in Wang et al.’s scheme [7], the time overhead of the Public Key and Private Key Generation algorithm is approximately T s p + T s l 4.374 s , the Encryption algorithm is approximately T 1 n 1 mul + T n n m mul + T ( 2 m ) n 1 mul 0.3433 s , and the Decryption algorithm is approximately T 1 ( 2 m ) 1 mul 0.0003 s ; in Wu et al.’s scheme [12], the time overhead of the Public Key and Private Key Generation algorithm is approximately T s p + T n m mul 2.0894 s , the Encryption algorithm is approximately T n m mul + T m m mul + T 1 m m mul + T 1 n ( 2 m ) mul + T 1 n 1 mul 0.0691 s , the Rekey Generation algorithm is approximately T ( 2 m n ) mul + T ( 2 m n ) n 1 mul 41.8379 s , the Re-Encryption algorithm is approximately T 1 ( 2 m n ) ( 2 m + 1 ) mul 16.1692 s , and the Decryption algorithm is approximately T 1 ( 2 m ) 1 mul 0.0003 s ; in Dutta et al.’s scheme [15], the time overhead of the Public Key and Private Key Generation algorithm is approximately 3 T n n ( n 1.5 ) mul + 2 T n n n mul + 2 T s p 4.6831 s , the Encryption algorithm is approximately T 1 n ( m + 2 n 1.5 ) mul + 3 T n n ( n 1.5 ) mul + 2 T n n n mul 0.5512 s , the Rekey Generation algorithm is approximately 3 T s p + 6 T n n ( n 1.5 ) mul + 4 T n n n mul 7.2903 s , the Re-Encryption algorithm is approximately T 1 n ( m + 2 n 1.5 ) mul + 3 T 1 ( m n 1.5 ) ( n 1.5 ) mul + 6 T 1 ( n 1.5 ) ( n 1.5 ) mul 0.5153 s , and the Decryption algorithm is approximately 3 T n n ( n 1.5 ) mul + 2 T n n n mul + T 1 ( m + 2 n 1.5 ) ( 2 n 1.5 ) mul 0.8778 s ; in Li et al.’s scheme [17], the time overhead of the Public Key and Private Key Generation algorithm is approximately T s p + T t g 2.14 s , the Encryption algorithm is approximately 2 T m n m mul + T n m n mul 2.5595 s , the Rekey Generation algorithm is approximately T s p + 2 T m n ( m n ) mul + ( n ) T ( m n ) mul 20.4131 s , the Re-Encryption algorithm is approximately T 2 m ( m n ) m mul + T ( 2 m ) m m mul 733.482 s , and the Decryption algorithm is approximately 4 T mmm mul + T mm mul 175.7775 s .
In our scheme, the time overhead of the Public Key and Private Key Generation algorithm is approximately T s p + T s l 4.374 s , the Encryption algorithm is approximately T n n m mul + T m n 1 mul 0.3426 s , the Rekey Generation algorithm is approximately T s l + T n n m mul 2.6403 s , the Re-Encryption algorithm is approximately T m ( 2 m ) 1 mul 0.0004 s , and the Decryption algorithm is approximately T 1 ( 2 m ) 1 mul 0.0003 s .
As shown in Figure 6 and Figure 7, although our scheme requires more time than Wu et al.’s scheme [12] and Li et al.’s scheme [17] in the Public Key and Private Key Generation algorithms, the key generation algorithm only needs to be executed once when encrypting data. In terms of encryption algorithm and re-encryption key generation algorithm, our scheme exhibits lower computational overhead than Dutta et al.’s scheme [15] and Li et al.’s scheme [17]. For re-encryption algorithm specifically, our scheme demonstrates significant advantages, with computational overhead substantially lower than Wu et al.’s scheme [12], Dutta et al.’s scheme [15], and Li et al.’s scheme [17]. For the decryption algorithm, our scheme incurs lower computational overhead than Wu et al.’s scheme [12] and Li et al.’s scheme [17]. In terms of overall computational overhead, our scheme also incurs lower computational overhead than the schemes Wu et al.’s scheme [12] and Li et al.’s scheme [17].

6.3. Limitations and Discussion

While the OO-IB-MPRE scheme proposed herein achieves post-quantum security and optimizes online efficiency for resource-constrained sensors, we must explicitly acknowledge several limitations inherent to the scheme:
  • Storage and Bandwidth Overhead: As detailed in Table 2, the dimensionality of the underlying matrices leads to relatively large key sizes. In particular, the re-encryption key r k rcv rcv generated by the SampleLeft algorithm is a matrix belonging to the space Z q 2 m × m . At elevated security parameter settings (e.g., n = 512 ), the size of this key can reach the gigabyte (GB) scale.
  • Computational Cost of Key Generation: Both the key generation and re-encryption key generation phases entail complex Gaussian sampling (as shown in Table 5). This computational overhead surpasses that of conventional bilinear pairing-based cryptographic schemes-a necessary trade-off to achieve resistance against quantum attacks. While such overhead is negligible in small-scale user deployment scenarios, it may create performance bottlenecks during the bulk registration of large user cohorts. This limitation can be alleviated through optimization strategies such as multi-authority hierarchical key generation.
  • Trust Assumptions: The proposed system relies on a single Trusted Authority (TA) to generate all user private keys, which inherently introduces the key escrow problem prevalent in Identity-Based Encryption (IBE) systems. If the TA is compromised, the security of all system users will be irreparably jeopardized. Future research can address this vulnerability by decentralizing the trust architecture via multi-authority or threshold IBE techniques.

7. Real World Applications

In the context of smart physical education, the demand for the sharing and collaboration of exercise physiological data is growing increasingly. Specifically in the field of college physical education, there are three core data application scenarios:
  • Management of College Physical Fitness Test Data. Students collect exercise physiological data (such as heart rate during endurance running and blood oxygen data related to lung capacity) during physical fitness tests via wearable sensors and upload the data to the cloud. The core requirements here are to protect data privacy (preventing the leakage of students’ physiological data) and ensure identity security (guaranteeing that data is accurately associated with the corresponding student), so as to support the authenticity and security of the physical fitness test results.
  • Personalized Physical Education Instruction. Relying on the exercise physiological data stored in the cloud (such as a student’s running gait and lactic acid accumulation rate during strength training), teachers can develop differentiated training plans—for example, adjusting running postures for students with abnormal gaits or optimizing endurance training intensity for students with excessively fast lactic acid accumulation—thereby achieving targeted physical education teaching.
  • Prevention of Sports Injuries and Rehabilitation Tracking. Injury Prevention: Real-time sports data (such as impact force when landing from a jump and joint movement angles) is monitored via sensors. When the data exceeds safety thresholds (e.g., excessive impact force), timely warnings are issued to avoid issues such as ankle sprains and knee joint injuries. Rehabilitation Tracking: It is necessary to synchronize the exercise data of students in the rehabilitation period (such as the range of motion of joints during rehabilitation training and the recovery status of muscle strength) to rehabilitation hospitals. Doctors adjust rehabilitation plans based on this data. Meanwhile, it is necessary to ensure the legitimate access of hospitals to data and prevent unrelated personnel from obtaining data.
For instance, in scenarios involving personalized physical education instruction and collaborative sports injury rehabilitation, a student’s data may require access by physical education teachers, fitness coaches, and even rehabilitation physicians. Access control must dynamically adjust based on the teaching or rehabilitation phase. The proposed lattice-based Online/Offline Identity-Based Matching Proxy Re-encryption (OO-IB-MPRE) scheme addresses these scenarios by establishing a secure, efficient data sharing framework. As illustrated in Figure 8, the system entities comprise the Sports Center, athletes (senders), coaches/proctors (receivers), and the proxy (cloud). The TA, as the system’s trusted entity, generates the master public key and master private key pair.
Initialization Phase:
  • Students wear sensors to confirm proper functioning and bind personal information.
  • TA executes the SetUp algorithm to generate a master public key and master private key pair.
Key Generation Phase:
3.
The sender (student) uploads their identity to TA, which then runs the EkGen algorithm to generate the enc key for the athlete.
4.
The TA runs the DkGen algorithm based on the recipient’s identity to generate the corresponding decryption key.
Physical Testing Phase:
5.
Coaches access data to analyze student status and develop personalized physical education instruction. Proctors access data to record physical test data.
6.
Offline Enc: During idle periods, sensors worn by students (e.g., wristbands) run offline enc algorithms to generate intermediate ciphertext.
7.
Online Enc: When uploading real-time data such as heart rate, step frequency, and blood oxygen saturation, the wristband executes an online enc algorithm. Combining the intermediate ciphertext, the designated target recipient, and the plaintext m (i.e., the data), it rapidly generates the final ciphertext.
8.
Upload and store the generated ciphertext to the cloud server.
Dynamic Access Control and Data Sharing:
9.
When it is necessary to expand the scope of data sharing (e.g., requiring physician involvement), the data owner runs the R k G e n algorithm to generate the re-enc key r k r e v r e v based on the original identity r e v and new identity r e v , and sends it to the cloud server.
10.
Upon authorization, the cloud server runs the R e E n c algorithm to the stored original ciphertext c t , generating re-encrypted ciphertext c t .
Data Decryption and Usage:
11.
When a data user (e.g., a doctor) needs to access data, they download the ciphertext (possibly c t or c t ) from the cloud server.
12.
The doctor runs the D e c algorithm using their own decryption key d k ρ , their desired sender (student) identity, and the ciphertext. Decryption succeeds and yields the plaintext data m.

8. Conclusions

To address the issues of missing data source authentication, weak security mechanisms, inefficient access control, and insufficient quantum-resistant capabilities in cloud-based management of exercise physiological data within smart sports education scenarios, this paper proposes a lattice-based online/offline identity-based matching proxy re-encryption scheme (OO-IB-MPRE). This scheme integrates lattice cryptography, identity-based matching encryption (IB-ME), proxy re-encryption (PRE), and online/offline technology. It achieves post-quantum security and protects the privacy of data source identities while effectively reducing computational overhead. This makes it suitable for the resource constraints of wearable devices and meets data upload requirements. Under the standard lattice assumption, formal security proofs demonstrate that the scheme satisfies privacy and authenticity requirements in the semi-selective attack model, providing theoretical security guarantees for practical applications. Thus, the OO-IB-MPRE scheme provides a comprehensive solution for securing exercise physiological data. Subsequent research will prioritize the improvement in computational efficiency, expanding applicable scenarios, and exploring deployment strategies under multi-proxy and multi-trusted-entity environments to further enhance the scheme’s practicality and adaptability.

Author Contributions

Conceptualization and methodology, Y.Z. and J.L.; writing—original draft, Y.S. and J.L.; software and validation, Y.S. and W.S.; writing—review and editing, Y.Z. and J.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the horizontal research project of Harbin University (Research on the Reform of Sports Game Teaching and the Development of Informatization).

Data Availability Statement

The original contributions presented in this study are included in this article. Further inquiries can be directed to the corresponding authors.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Shamir, A. Identity-based cryptosystems and signature schemes. In Advances in Cryptology: Proceedings of CRYPTO 84 4; Springer: Berlin/Heidelberg, Germany, 1985; pp. 47–53. [Google Scholar]
  2. Gentry, C.; Peikert, C.; Vaikuntanathan, V. Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, Victoria, BC, Canada, 30 May 2008; ACM: New York, NY, USA, 2008; pp. 197–206. [Google Scholar]
  3. Gao, W.; Yang, L.; Zhang, D.; Liu, X. Quantum identity-based encryption from the learning with errors problem. Cryptography 2022, 6, 9. [Google Scholar] [CrossRef]
  4. Ateniese, G.; Francati, D.; Nuñez, D.; Venturi, D. Match me if you can: Matchmaking encryption and its applications. In Proceedings of the Annual International Cryptology Conference, San Francisco, CA, USA, 1 August 2019; Springer International Publishing: Cham, Switzerland, 2019; pp. 701–731. [Google Scholar]
  5. Francati, D.; Guidi, A.; Russo, L.; Venturi, D. Identity-based matchmaking encryption without random oracles. In Proceedings of the International Conference on Cryptology in India, Kolkata, India, 9 December 2021; Springer International Publishing: Cham, Switzerland, 2021; pp. 415–435. [Google Scholar]
  6. Wu, A.; Luo, W.; Weng, J.; Yang, A.; Wen, J. Fuzzy Identity-Based Matchmaking Encryption and Its Application. IEEE Trans. Inf. Forensics Secur. 2023, 18, 5592–5607. [Google Scholar] [CrossRef]
  7. Wang, H.; Chen, K.; Xie, Q.; Meng, Q. Post-Quantum Secure Identity-Based Matchmaking Encryption. IEEE Trans. Dependable Secur. Comput. 2025, 22, 833–844. [Google Scholar] [CrossRef]
  8. Chen, J.; Li, Y.; Wen, J.; Weng, J. Identity-based matchmaking encryption from standard assumptions. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, 5–9 December 2022; Springer Nature: Cham, Switzerland; pp. 394–422. [Google Scholar]
  9. Wang, Y.; Wang, B.; Lai, Q.; Zhan, Y. Identity-based matchmaking encryption with stronger security and instantiation on lattices. Theor. Comput. Sci. 2025, 1029, 115048. [Google Scholar] [CrossRef]
  10. Blaze, M.; Bleumer, G.; Strauss, M. Divertible protocols and atomic proxy cryptography. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Espoo, Finland, 31 May–4 June 1998; Springer: Berlin/Heidelberg, Germany, 1998; pp. 127–144. [Google Scholar]
  11. Green, M.; Ateniese, G. Identity-based proxy re-encryption. In Proceedings of the International Conference on Applied Cryptography and Network Security, Zhuhai, China, 5–8 June 2007; Springer: Berlin/Heidelberg, Germany; pp. 288–306. [Google Scholar]
  12. Wu, L.; Yang, X.; Zhang, M.; Wang, X. IB-VPRE: Adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability. J. Ambient. Intell Hum. Comput. 2022, 13, 469–482. [Google Scholar]
  13. Agrawal, S.; Boneh, D.; Boyen, X. Efficient Lattice (H)IBE in the Standard Model. In Advances in Cryptology–EUROCRYPT 2010; Gilbert, H., Ed.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2010; Volume 6110, pp. 553–572. [Google Scholar]
  14. Dutta, P.; Susilo, W.; Duong, D.H.; Roy, P.S. Collusion-resistant identity-based proxy re-encryption: Lattice-based constructions in standard model. Theor. Comput. Sci. 2021, 871, 16–29. [Google Scholar] [CrossRef]
  15. Dutta, P.; Susilo, W.; Duong, D.H.; Baek, J.; Roy, P.S. Lattice-Based unidirectional IBPRE secure in standard model. arXiv 2020, arXiv:2005.06741. [Google Scholar] [CrossRef]
  16. Li, J.; Ma, C.; Gu, Z. Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting. Int. J. Found. Comput. Sci. 2020, 31, 551–567. [Google Scholar] [CrossRef]
  17. Li, J.; Yan, M.; Peng, J.; Huang, H.; Abd El-Latif, A.A. A lattice-based efficient certificateless public key encryption for big data security in clouds. Future Gener. Comput. Syst. 2024, 158, 255–266. [Google Scholar] [CrossRef]
  18. Li, J.; Peng, J.; Qiao, Z. A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment. Big Data 2024, 12, 357–366. [Google Scholar] [CrossRef] [PubMed]
  19. Ge, C.; Susilo, W.; Baek, J.; Liu, Z.; Xia, J.; Fang, L. A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds. IEEE Trans. Dependable Secur. Comput. 2021, 19, 2907–2919. [Google Scholar] [CrossRef]
  20. Zhao, J.; Zhang, K.; Gong, J.; Qian, H. Lavida: Large-universe, verifiable, and dynamic fine-grained access control for e-health cloud. IEEE Trans. Inf. Forensics Secur. 2024, 19, 2732–2745. [Google Scholar] [CrossRef]
  21. Zhang, Q.; Fu, Y.; Cui, J.; He, D.; Zhong, H. Efficient Fine-Grained Data Sharing Based on Proxy Re-Encryption in IIoT. IEEE Trans. Dependable Secur. Comput. 2024, 21, 5797–5809. [Google Scholar] [CrossRef]
  22. Guo, F.; Mu, Y.; Chen, Z. Identity-Based Online/Offline Encryption. In Financial Cryptography and Data Security; Tsudik, G., Ed.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2008; Volume 5143, pp. 247–261. [Google Scholar]
  23. Hohenberger, S.; Waters, B. Online/Offline Attribute-Based Encryption. In Public-Key Cryptography—PKC 2014; Krawczyk, H., Ed.; Springer: Berlin/Heidelberg, Germany, 2014; pp. 293–310. [Google Scholar]
  24. Lai, J.; Mu, Y.; Guo, F.; Susilo, W. Improved identity-based online/offline encryption. In Information Security and Privacy; Springer: Berlin/Heidelberg, Germany, 2015; pp. 160–173. [Google Scholar]
  25. Zuo, B.; Li, J.; Zhang, Y.; Shen, J. Identity-based online/offline encryption scheme from LWE. Information 2024, 15, 539. [Google Scholar] [CrossRef]
  26. Langrehr, R.; Pan, J. Tightly Secure Hierarchical Identity-Based Encryption. J. Cryptol. 2020, 33, 1787–1821. [Google Scholar] [CrossRef]
  27. Zhang, X.; Fu, X.; Hong, L.; Liu, Y.; Wang, L. Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network. Int. J. Distrib. Sens. Netw. 2020, 16, 155014772092873. [Google Scholar] [CrossRef]
  28. Yu, Q.; Li, J.; Ji, S. Hierarchical Identity-Based Online/Offline Encryption Scheme with Leakage Resilience. Secur. Commun. Netw. 2022, 2022, 6849761. [Google Scholar] [CrossRef]
  29. Micciancio, D.; Regev, O. Worst-case to average-case reductions based on Gaussian measures. Siam J. Comput. 2007, 37, 267–302. [Google Scholar] [CrossRef]
  30. Ajtai, M. Generating Hard Instances of the Short Basis Problem. In Automata, Languages and Programming; Wiedermann, J., Van Emde Boas, P., Nielsen, M., Eds.; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 1999; Volume 1644, pp. 1–9. [Google Scholar]
  31. Alwen, J.; Peikert, C. Generating Shorter Bases for Hard Random Lattices. Theory Comput. Syst 2011, 48, 535–553. [Google Scholar] [CrossRef]
  32. Micciancio, D.; Peikert, C. Trapdoors for lattices: Simpler, tighter, faster, smaller. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, 15–19 April 2012; Springer: Berlin/Heidelberg, Germany, 2012; pp. 700–718. [Google Scholar]
  33. Regev, O. On lattices, learning with errors, random linear codes, and cryptography. J. ACM 2009, 56, 1–40. [Google Scholar] [CrossRef]
Figure 1. The system model of OO-IB-MPRE scheme.
Figure 1. The system model of OO-IB-MPRE scheme.
Mathematics 13 04004 g001
Figure 2. Public Key size comparison. The curves in this figure correspond to: Wang et al. [7] (2025, black line), Li et al. [17] (2024, green line) and the proposed scheme (Ours, purple line).
Figure 2. Public Key size comparison. The curves in this figure correspond to: Wang et al. [7] (2025, black line), Li et al. [17] (2024, green line) and the proposed scheme (Ours, purple line).
Mathematics 13 04004 g002
Figure 3. Private Key size comparison. The curves in this figure correspond to: Wang et al. [7] (2025, black line), Wu et al. [12] (2022, red line), Dutta et al. [15] (2020, blue line), Li et al. [17] (2024, green line) and the proposed scheme (Ours, purple line).
Figure 3. Private Key size comparison. The curves in this figure correspond to: Wang et al. [7] (2025, black line), Wu et al. [12] (2022, red line), Dutta et al. [15] (2020, blue line), Li et al. [17] (2024, green line) and the proposed scheme (Ours, purple line).
Mathematics 13 04004 g003
Figure 4. Ciphertext size comparison. The curves in this figure correspond to: Wang et al. [7] (2025, black line), Wu et al. [12] (2022, red line), Dutta et al. [15] (2020, blue line), Li et al. [17] (2024, green line) and the proposed scheme (Ours, purple line).
Figure 4. Ciphertext size comparison. The curves in this figure correspond to: Wang et al. [7] (2025, black line), Wu et al. [12] (2022, red line), Dutta et al. [15] (2020, blue line), Li et al. [17] (2024, green line) and the proposed scheme (Ours, purple line).
Mathematics 13 04004 g004
Figure 5. Re-encryption Key size comparison. The curves in this figure correspond to: Wu et al. [12] (2022, red line), Dutta et al. [15] (2020, blue line), Li et al. [17] (2024, green line) and the proposed scheme (Ours, purple line).
Figure 5. Re-encryption Key size comparison. The curves in this figure correspond to: Wu et al. [12] (2022, red line), Dutta et al. [15] (2020, blue line), Li et al. [17] (2024, green line) and the proposed scheme (Ours, purple line).
Mathematics 13 04004 g005
Figure 6. The comparison of computational overhead when n = 32. The bars in this figure correspond to: Wang et al. [7] (2025, brown bar), Wu et al. [12] (2022, green bar), Dutta et al. [15] (2020, purple bar), Li et al. [17] (2024, yellow bar) and the proposed scheme (Ours, blue bar).
Figure 6. The comparison of computational overhead when n = 32. The bars in this figure correspond to: Wang et al. [7] (2025, brown bar), Wu et al. [12] (2022, green bar), Dutta et al. [15] (2020, purple bar), Li et al. [17] (2024, yellow bar) and the proposed scheme (Ours, blue bar).
Mathematics 13 04004 g006
Figure 7. The comparison of computational overhead when n = 64. The bars in this figure correspond to: Wang et al. [7] (2025, brown bar), Wu et al. [12] (2022, green bar), Dutta et al. [15] (2020, purple bar), Li et al. [17] (2024, yellow bar) and the proposed scheme (Ours, blue bar).
Figure 7. The comparison of computational overhead when n = 64. The bars in this figure correspond to: Wang et al. [7] (2025, brown bar), Wu et al. [12] (2022, green bar), Dutta et al. [15] (2020, purple bar), Li et al. [17] (2024, yellow bar) and the proposed scheme (Ours, blue bar).
Mathematics 13 04004 g007
Figure 8. The OO-IB-MPRE scheme in real world application.
Figure 8. The OO-IB-MPRE scheme in real world application.
Mathematics 13 04004 g008
Table 1. The comparison of space overhead.
Table 1. The comparison of space overhead.
Wang et al. [7]Wu et al. [12]Dutta et al. [15]Li et al. [17]Proposed Scheme
plaintext size11111
public key size 6 n 2 6 n 3 6 n 2
private key size 12 n 2 12 n 2 12 n 3.5 72 n 3.5 12 n 2
ciphertext size 12 n 2 12 n 2 8 n 2 72 n 3.5 12 n 2
Re-encryption key size 144 n 4 + 12 n 2.5 + 12 n 2 + n 64 n 3.5 108 n 3.5 + 72 n 4 72 n 3.5
Table 2. Comparison of Scheme size.
Table 2. Comparison of Scheme size.
SchemenPublic Key Size (KB)Private Key Size (KB)Ciphertext Size (KB)Re-Encryption Key Size (KB)
Wang et al. [7] n = 32 0.751.51.5
n = 64 36.06.0
n = 128 1224.024.0
n = 256 4896.096.0
n = 512 192384.0384.0
n = 1024 7681536.01536.0
Wu et al. [12] n = 32 1.51.518,442.6107
n = 64 6.06.0295,002.6611
n = 128 24.024.04,718,898.2084
n = 256 96.096.075,500,317
n = 512 384.0384.01,208,823,118.5
n = 1024 1536.01536.019,327,408,403
Dutta et al. [15] n = 32 271.530211448.1547
n = 64 3072416,384
n = 128 34,77016185,442
n = 256 393,216642,097,152
n = 512 4,446,603.625623,715,219.2
n = 1024 50,331,6481024268,435,456
Li et al. [17] n = 32 241629.17581629.175811,659.7637
n = 64 19218,43218,432175,104
n = 128 1536208,534.2715208,534.27152,672,097.407
n = 256 12,2882,359,2962,359,29641,287,680
n = 512 98,30426,692,387.2126,692,387.21644,018,356.8
n = 1024 786,432301,989,888301,989,88810,116,661,248
Proposed scheme n = 32 0.751.51.51629.1758
n = 64 36618,432
n = 128 122424208,534.2715
n = 256 4896962,359,296
n = 512 19238438426,692,387.21
n = 1024 76815361536301,989,888
Table 3. The comparison of space overhead between online and offline ciphertext.
Table 3. The comparison of space overhead between online and offline ciphertext.
Proposed Scheme
online ciphertext size 12 n 2
offline ciphertext size 12 n 2 + n 1.5
Table 4. The size comparison of online and offline ciphertext.
Table 4. The size comparison of online and offline ciphertext.
SchemenOnline Ciphertext Size (KB)Offline Ciphertext Size (KB)
Proposed scheme n = 32 1.51.5221
n = 64 66.0625
n = 128 2424.1768
n = 256 9696.5
n = 512 384385.4142
n = 1024 15361540
Table 5. The running time of every algorithm.
Table 5. The running time of every algorithm.
Basic OperationWhen n = 32 Execution Time (s)When n = 64 Execution Time (s)
T t g 0.0630.064
T s p 2.0802.076
T s l 2.2902.298
T m m mul 0.0048960.055118
T m m m mul 3.288543.9306
T m n ( m n ) mul 0.66856258.40894
T ( 2 m ) m m mul 5.6197572.3685
T n m n mul 0.0530.376
T m n m mul 0.1111.09175
T n n m mul 0.056250.34225
T m n 1 mul 0.00008510.000352
T m ( 2 m ) 1 mul 0.00011480.0004114
T 1 ( 2 m ) 1 mul 0.00011270.0002909
T 2 m ( m n + m ) m mul 33.1398661.1135
( n 1 ) T ( m n ) mul 0.056561.519259
T 1 n 1 mul 0.00002040250.0000143242
T ( 2 m ) n 1 mul 0.0002418050.00100945
T 1 m m mul 0.0001244720.000528142
T 1 n ( 2 m ) mul 0.00001308280.0000200966
T ( 2 m n ) n ( 2 m ) mul 2.2828841.8259
T ( 2 m n ) n 1 mul 0.0020.012
T 1 ( 2 m n + 1 ) ( 2 m + 1 ) mul 1.651516.1692
T n n ( n 1.5 ) mul 0.0171250.164375
T 1 n ( m + 2 n 1.5 ) mul 0.0030.02025
T 1 ( m n 1.5 ) ( n 1.5 ) mul 0.0110.11775
T 1 ( n 1.5 ) ( n 1.5 ) mul 0.0076250.023625
T 1 ( m + 2 n 1.5 ) ( 2 n 1.5 ) mul 0.04050.34625
T n n n mul 0.0020.019
T n m mul 0.002201870.0133956
Table 6. Computational overhead comparison.
Table 6. Computational overhead comparison.
SchemeWang et al. [7]Wu et al. [12]Dutta et al. [15]Li et al. [17]Proposed Scheme
Public/Private key Gen T s p + T s l T s p + T n m mul 3 T n n ( n 1.5 ) mul + 2 T n n n mul + 2 T d t T s p + T t g T s p + T s l
Enc T 1 n 1 mul + T n n m mul + T ( 2 m ) n 1 mul + T p zk T n m mul + T m m mul + T 1 m m mul + T 1 n ( 2 m ) mul + T 1 n 1 mul T 1 n ( m + 2 n 1.5 ) mul + 3 T n n ( n 1.5 ) mul + 2 T n n n mul 2 T m n m mul + T n m n mul T n n m mul + T m n 1 mul
RekeyGen T ( 2 m n ) n ( 2 m ) mul + T ( 2 m n ) n 1 mul 3 T s p + 6 T n n ( n 1.5 ) mul + 4 T n n n mul T s p + 2 T m n ( m n ) mul + ( n 1 ) T ( m n ) mul T s l + T n n m mul
ReEnc T 1 ( 2 m n + 1 ) ( 2 m + 1 ) mul T 1 n ( m + 2 n 1.5 ) mul + 3 T 1 ( m n 1.5 ) ( n 1.5 ) mul + 6 T 1 ( n 1.5 ) ( n 1.5 ) mul T ( 2 m ) ( m n + m ) m mul + T ( 2 m ) m m mul T m ( 2 m ) 1 mul
Dec T 1 ( 2 m ) 1 mul + T v zk T 1 ( 2 m ) 1 mul 3 T n n ( n 1.5 ) mul + 2 T n n n mul + T 1 ( m + 2 n 1.5 ) ( 2 n 1.5 ) mul + T i v 4 T m m m mul + T m m mul T 1 ( 2 m ) 1 mul
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhao, Y.; Song, Y.; Song, W.; Li, J. OO-IB-MPRE: A Post-Quantum Secure Online/Offline Identity-Based Matchmaking Proxy Re-Encryption Scheme for Exercise Physiology Data. Mathematics 2025, 13, 4004. https://doi.org/10.3390/math13244004

AMA Style

Zhao Y, Song Y, Song W, Li J. OO-IB-MPRE: A Post-Quantum Secure Online/Offline Identity-Based Matchmaking Proxy Re-Encryption Scheme for Exercise Physiology Data. Mathematics. 2025; 13(24):4004. https://doi.org/10.3390/math13244004

Chicago/Turabian Style

Zhao, You, Ye Song, Weiyi Song, and Juyan Li. 2025. "OO-IB-MPRE: A Post-Quantum Secure Online/Offline Identity-Based Matchmaking Proxy Re-Encryption Scheme for Exercise Physiology Data" Mathematics 13, no. 24: 4004. https://doi.org/10.3390/math13244004

APA Style

Zhao, Y., Song, Y., Song, W., & Li, J. (2025). OO-IB-MPRE: A Post-Quantum Secure Online/Offline Identity-Based Matchmaking Proxy Re-Encryption Scheme for Exercise Physiology Data. Mathematics, 13(24), 4004. https://doi.org/10.3390/math13244004

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop