A Novel Model for Lattice-Based Authorized Searchable Encryption with Special Keyword

被引:4
|
作者
Zeng, Fugeng [1 ,2 ]
Xu, Chunxiang [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Qiongzhou Univ, Dept Math, Sanya 572000, Hainan, Peoples R China
基金
中国国家自然科学基金;
关键词
ATTRIBUTE-BASED ENCRYPTION;
D O I
10.1155/2015/314621
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Data stored in the cloud servers, keyword search, and access controls are two important capabilities which should be supported. Public-keyword encryption with keyword search (PEKS) and attribute based encryption (ABE) are corresponding solutions. Meanwhile, as we step into postquantum era, pairing related assumption is fragile. Lattice is an ideal choice for building secure encryption scheme against quantum attack. Based on this, we propose the first mathematical model for lattice-based authorized searchable encryption. Data owners can sort the ciphertext by specific keywords such as time; data users satisfying the access control hand the trapdoor generated with the keyword to the cloud sever; the cloud sever sends back the corresponding ciphertext. The security of our schemes is based on the worst-case hardness on lattices, called learning with errors (LWE) assumption. In addition, our scheme achieves attribute-hiding, which could protect the sensitive information of data user.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] Lattice-based certificateless public-key encryption in the standard model
    Sepahi, Reza
    Steinfeld, Ron
    Pieprzyk, Josef
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (04) : 315 - 333
  • [32] Multi-Keyword Searchable Encryption Algorithm Based on Semantic Extension
    Xu G.
    Shi C.
    Wang W.
    Pan Q.
    Li F.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2193 - 2206
  • [33] LARA: A Design Concept for Lattice-Based Encryption
    El Bansarkhani, Rachid
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2019, 2019, 11598 : 377 - 395
  • [34] Fast Lattice-Based Encryption: Stretching SPRING
    Bouillaguet, Charles
    Delaplace, Claire
    Fouque, Pierre-Alain
    Kirchner, Paul
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2017, 2017, 10346 : 125 - 142
  • [35] Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT
    Tang, Yongli
    Ba, Yanpeng
    Li, Lixiang
    Wang, Xiaojun
    Yan, Xixi
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (04): : 2305 - 2316
  • [36] Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT
    Yongli Tang
    Yanpeng Ba
    Lixiang Li
    Xiaojun Wang
    Xixi Yan
    Cluster Computing, 2022, 25 : 2305 - 2316
  • [37] Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model
    Tang Yongli
    Wang Mingming
    Ye Qing
    Qin Panke
    Zhao Zongqu
    The Journal of China Universities of Posts and Telecommunications, 2019, 26 (04) : 70 - 79
  • [38] Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model
    Tang Yongli
    Wang Mingming
    Ye Qing
    Qin Panke
    Zhao Zongqu
    The Journal of China Universities of Posts and Telecommunications, 2019, (04) : 70 - 79
  • [39] Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model
    Yongli T.
    Mingming W.
    Qing Y.
    Panke Q.
    Zongqu Z.
    Journal of China Universities of Posts and Telecommunications, 2019, 26 (04): : 70 - 79
  • [40] Lattice-based autonomous path proxy re-encryption in the standard model
    Wenli XIE
    Jian WENG
    Yao TONG
    Xiaojian LIANG
    Lisha YAO
    Feixiang ZHAO
    Science China(Information Sciences), 2023, 66 (10) : 184 - 195