Lattice-based public key searchable encryption with fine-grained access control for edge computing

被引:14
|
作者
Wang, Peng [1 ]
Chen, Biwen [2 ]
Xiang, Tao [2 ]
Wang, Zhongming [2 ]
机构
[1] Chongqing Univ Sci & Technol, Sch Intelligent Technol & Engn, Chongqing 401331, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
基金
中国国家自然科学基金;
关键词
Edge computing; Searchable encryption; Post-quantum security; Learning with errors; IDENTITY-BASED ENCRYPTION; KEYWORD SEARCH; SECURITY; INTERNET;
D O I
10.1016/j.future.2021.09.012
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As a bridge between cloud computing platforms and the Internet of Things (IoT) devices, edge computing provides various on-demand data services to reduce latency and network congestion. To ensure data security in edge computing, sensitive data should be encrypted before being outsourced to edge servers. Public key encryption with keyword search (PEKS) can provide search service for encrypted data. Nevertheless, most existing PEKS schemes are susceptible to quantum attacks because their security assumptions are based on traditional hardness assumptions. Moreover, many lattice based PEKS schemes only apply to the single-user scenario, limiting the range of applications. In this paper, we present an efficient lattice-based public key searchable encryption with fine-grained access control for edge computing. Our scheme achieves post-quantum security and highly flexible access control policies for multi-user applications, by utilizing the learning with errors (LWE) assumption and subset predicate encryption. The security proof illustrates that our proposed scheme is secure under chosen plaintext attacks and chosen keyword attacks. Finally, extensive experiments on real-world datasets illustrate that our encryption algorithm is faster than existing approaches. (C) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页码:373 / 383
页数:11
相关论文
共 50 条
  • [1] Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control
    Wang, Zhongming
    Chen, Biwen
    Xiang, Tao
    Zhou, Lu
    Yan, Hongyang
    Li, Jin
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021, 2021, 13059 : 3 - 18
  • [2] Privacy Preserving Searchable Encryption with Fine-Grained Access Control
    Chaudhari, Payal
    Das, Manik Lal
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (02) : 753 - 762
  • [3] Multi-user Searchable Encryption with Fine-Grained Access Control without Key Sharing
    Wang, Qinqin
    Zhu, Yanqin
    Luo, Xizhao
    3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES ACSAT 2014, 2014, : 145 - 150
  • [4] Lattice-Based Public Key Searchable Encryption from Experimental Perspectives
    Behnia, Rouzbeh
    Ozmen, Muslum Ozgur
    Yavuz, Attila Altay
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1269 - 1282
  • [5] Fine-Grained Access Control Functional Encryption for Inner Product on Lattice
    Hou J.-Q.
    Peng C.-G.
    Tan W.-J.
    Ye Y.-T.
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (06): : 1172 - 1183
  • [6] Key-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control
    Liu, Ximeng
    Zhu, Hui
    Ma, Jianfeng
    Ma, Jun
    Ma, Siqi
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC), 2014, : 694 - 699
  • [7] Lattice-based searchable public-key encryption scheme for secure cloud storage
    Xie, Run
    Xu, Chunxiang
    He, Chanlian
    Zhang, Xiaojun
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2018, 14 (01) : 3 - 20
  • [8] Attribute Based Encryption with Fine-grained Access Provision in Cloud Computing
    Tamizharasi, G. S.
    Balamurugan, B.
    Manjula, R.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [9] Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server
    Zhang, Xiaojun
    Xu, Chunxiang
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (03) : 907 - 921
  • [10] Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server
    Xiaojun Zhang
    Chunxiang Xu
    Wireless Personal Communications, 2018, 100 : 907 - 921