Lattice-based public key searchable encryption with fine-grained access control for edge computing

被引:14
|
作者
Wang, Peng [1 ]
Chen, Biwen [2 ]
Xiang, Tao [2 ]
Wang, Zhongming [2 ]
机构
[1] Chongqing Univ Sci & Technol, Sch Intelligent Technol & Engn, Chongqing 401331, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
基金
中国国家自然科学基金;
关键词
Edge computing; Searchable encryption; Post-quantum security; Learning with errors; IDENTITY-BASED ENCRYPTION; KEYWORD SEARCH; SECURITY; INTERNET;
D O I
10.1016/j.future.2021.09.012
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As a bridge between cloud computing platforms and the Internet of Things (IoT) devices, edge computing provides various on-demand data services to reduce latency and network congestion. To ensure data security in edge computing, sensitive data should be encrypted before being outsourced to edge servers. Public key encryption with keyword search (PEKS) can provide search service for encrypted data. Nevertheless, most existing PEKS schemes are susceptible to quantum attacks because their security assumptions are based on traditional hardness assumptions. Moreover, many lattice based PEKS schemes only apply to the single-user scenario, limiting the range of applications. In this paper, we present an efficient lattice-based public key searchable encryption with fine-grained access control for edge computing. Our scheme achieves post-quantum security and highly flexible access control policies for multi-user applications, by utilizing the learning with errors (LWE) assumption and subset predicate encryption. The security proof illustrates that our proposed scheme is secure under chosen plaintext attacks and chosen keyword attacks. Finally, extensive experiments on real-world datasets illustrate that our encryption algorithm is faster than existing approaches. (C) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页码:373 / 383
页数:11
相关论文
共 50 条
  • [21] A lattice-based searchable encryption scheme with the validity period control of files
    En Zhang
    Yingying Hou
    Gongli Li
    Multimedia Tools and Applications, 2021, 80 : 4655 - 4672
  • [22] A lattice-based searchable encryption scheme with the validity period control of files
    Zhang, En
    Hou, Yingying
    Li, Gongli
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (03) : 4655 - 4672
  • [23] Updatable Searchable Symmetric Encryption with fine-grained delete functionality
    Miyano, Motoki
    Obana, Satoshi
    2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018), 2018, : 438 - 444
  • [24] Fine-grained searchable encryption in multi-user setting
    Jun Ye
    Jianfeng Wang
    Jiaolian Zhao
    Jian Shen
    Kuan-Ching Li
    Soft Computing, 2017, 21 : 6201 - 6212
  • [25] Fine-grained searchable encryption in multi-user setting
    Ye, Jun
    Wang, Jianfeng
    Zhao, Jiaolian
    Shen, Jian
    Li, Kuan-Ching
    SOFT COMPUTING, 2017, 21 (20) : 6201 - 6212
  • [26] Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing
    Liu, Jun'e
    Wan, Zhiguo
    Gu, Ming
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 98 - 107
  • [27] Fine Grained Access Control Based on Smart Contract for Edge Computing
    Zhu, Yong
    Wu, Xiao
    Hu, Zhihui
    ELECTRONICS, 2022, 11 (01)
  • [28] Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    Liang, Kaitai
    COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 588 - 605
  • [29] A fine-grained data access control algorithm in cloud computing
    Han, Dezhi
    Wu, Shuai
    Bi, Kun
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2012, 40 (SUPPL.1): : 245 - 248
  • [30] Blind attribute-based encryption and oblivious transfer with fine-grained access control
    Alfredo Rial
    Designs, Codes and Cryptography, 2016, 81 : 179 - 223