Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT

被引:12
|
作者
Tang, Yongli [1 ]
Ba, Yanpeng [1 ]
Li, Lixiang [2 ]
Wang, Xiaojun [3 ]
Yan, Xixi [1 ]
机构
[1] Henan Polytech Univ, Sch Comp Sci & Technol, Jiaozuo 454003, Henan, Peoples R China
[2] Beijng Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[3] Dublin City Univ, Sch Elect Engn, Dublin 9, Ireland
关键词
Public-Key Encryption with keyword Search (PEKS); Industrial Internet of Things (IIoT); Lattice; Multi-user; Conjunctive keyword search; SCHEME;
D O I
10.1007/s10586-021-03488-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most traditional Public-Key Encryption with keyword Search (PEKS) schemes are suffering a tremendous threat occasioned by the burgeoning of quantum computing since these schemes are derived from the bilinear pairing. For the sake of preserving the security of data outsourced by the Industrial Internet of Things (IIoT), a novel efficient PEKS scheme based on lattice assumption is proffered, and it can achieve security against quantum computing attacks. Also, it supports both multi-user and conjunctive keyword search. Besides, we adopt broadcast encryption technology to address the enormous storage cost of keywords ciphertext in a multi-user setting. Our scheme only needs to generate one ciphertext for all data users, thus significantly reducing the storage cost. Lastly, its performance is analyzed theoretically and experimentally. Experimental simulation results demonstrated the superiority of our algorithms in multi-user and multi-keyword scenarios. The scenario of 100 keywords in keyword encryption for 10-100 users always costs about 0.0204 s, and the storage cost keeps at 81.7 KB-84.7 KB.
引用
收藏
页码:2305 / 2316
页数:12
相关论文
共 50 条
  • [21] A LATTICE-BASED PUBLIC-KEY ENCRYPTION SCHEME FOR RFID APPLICATIONS
    Lin Hui
    Dong Yahui
    Liu Dongshen
    Liu Zilong
    Hou Dawei
    Tong Hengqin
    [J]. 2014 12TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT), 2014,
  • [22] Design and Implementation of a Lattice-Based Public-Key Encryption Scheme
    Lin, Hui
    Liu, Dongsheng
    Zhang, Cong
    Dong, Yahui
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2018, 27 (13)
  • [23] Tree-Based Public Key Encryption with Conjunctive Keyword Search
    Zhang, Yu
    You, Lei
    Li, Yin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [24] Single-Server Public-Key Authenticated Encryption With Keyword Search and Its Application in IIoT
    Zhou, Xiaotong
    He, Debiao
    Ning, Jianting
    Luo, Min
    Huang, Xinyi
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (01): : 404 - 415
  • [25] Efficient Keyword Search for Public-Key Setting
    Zhang, Rui
    Xue, Rui
    [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1236 - 1241
  • [26] Public-Key Encryption With Keyword Search via Obfuscation
    Hu, Chengyu
    Liu, Pengtao
    Yang, Rupeng
    Xu, Yan
    [J]. IEEE ACCESS, 2019, 7 : 37394 - 37405
  • [27] Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware
    Poeppelmann, Thomas
    Gueneysu, Tim
    [J]. SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 68 - 85
  • [28] AN EFFICIENT PUBLIC KEY ENCRYPTION WITH CONJUNCTIVE KEYWORD SEARCH SCHEME BASED ON PAIRINGS
    Ding, Maozhen
    Gao, Fei
    Jin, Zhengping
    Zhang, Hua
    [J]. PROCEEDINGS OF THE 3RD IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC 2012), 2012, : 526 - 530
  • [29] A lattice-based public-key cryptosystem
    Cai, JY
    Cusick, TW
    [J]. INFORMATION AND COMPUTATION, 1999, 151 (1-2) : 17 - 31
  • [30] A lattice-based public-key cryptosystem
    Cai, JY
    Cusick, TW
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 219 - 233