Lattice-based public key searchable encryption with fine-grained access control for edge computing

被引:19
作者
Wang, Peng [1 ]
Chen, Biwen [2 ]
Xiang, Tao [2 ]
Wang, Zhongming [2 ]
机构
[1] Chongqing Univ Sci & Technol, Sch Intelligent Technol & Engn, Chongqing 401331, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2022年 / 127卷
基金
中国国家自然科学基金;
关键词
Edge computing; Searchable encryption; Post-quantum security; Learning with errors; IDENTITY-BASED ENCRYPTION; KEYWORD SEARCH; SECURITY; INTERNET;
D O I
10.1016/j.future.2021.09.012
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As a bridge between cloud computing platforms and the Internet of Things (IoT) devices, edge computing provides various on-demand data services to reduce latency and network congestion. To ensure data security in edge computing, sensitive data should be encrypted before being outsourced to edge servers. Public key encryption with keyword search (PEKS) can provide search service for encrypted data. Nevertheless, most existing PEKS schemes are susceptible to quantum attacks because their security assumptions are based on traditional hardness assumptions. Moreover, many lattice based PEKS schemes only apply to the single-user scenario, limiting the range of applications. In this paper, we present an efficient lattice-based public key searchable encryption with fine-grained access control for edge computing. Our scheme achieves post-quantum security and highly flexible access control policies for multi-user applications, by utilizing the learning with errors (LWE) assumption and subset predicate encryption. The security proof illustrates that our proposed scheme is secure under chosen plaintext attacks and chosen keyword attacks. Finally, extensive experiments on real-world datasets illustrate that our encryption algorithm is faster than existing approaches. (C) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页码:373 / 383
页数:11
相关论文
共 50 条
[31]   Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization [J].
Tang, Qiang .
INFORMATION SECURITY AND PRIVACY, 2011, 6812 :389-406
[32]   A lattice-based searchable encryption scheme with multi-user authorization for the certificateless cloud computing environment [J].
Zhou, Yihua ;
Tang, Bin ;
Yang, Yuguang .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (04)
[33]   Attribute-Based Searchable Encryption in Edge Computing for Lightweight Devices [J].
Niu, Shufen ;
Hu, Ying ;
Zhou, Siwei ;
Shao, Honglin ;
Wang, Caifen .
IEEE SYSTEMS JOURNAL, 2023, 17 (03) :3503-3514
[34]   Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control [J].
Wang, Shangping ;
Zhang, Xia ;
Zhang, Yaling .
IET INFORMATION SECURITY, 2018, 12 (02) :141-149
[35]   An efficient fine-grained searchable encryption for secure communication in IoT-based vehicular social networks [J].
Mamta ;
Sharma, Shivani ;
Kumar, Sachin .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (02)
[36]   Lattice-based identity-based resplittable threshold public key encryption scheme [J].
Singh, Kunwar ;
Rangan, C. Pandu ;
Banerjee, A. K. .
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2016, 93 (02) :289-307
[37]   Bloccess: Enabling Fine-Grained Access Control Based on Blockchain [J].
Ding, Yepeng ;
Sato, Hiroyuki .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2023, 31 (01)
[38]   Public key searchable encryption scheme based on blockchain [J].
Du R. ;
Tan A. ;
Tian J. .
Tongxin Xuebao/Journal on Communications, 2020, 41 (04) :114-122
[39]   An Efficient Pairing-Free Certificateless Searchable Public Key Encryption for Cloud-Based IIoT [J].
Ma, Mimi ;
Luo, Min ;
Fan, Shuqin ;
Feng, Dengguo .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
[40]   Towards a fine-grained access control for Cloud [J].
Msahli, Mounira ;
Chen, Xiuzhen ;
Serhrouchni, Ahmed .
2014 IEEE 11TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2014, :286-291