A lattice-based searchable encryption scheme with the validity period control of files

被引:0
作者
En Zhang
Yingying Hou
Gongli Li
机构
[1] Henan Normal University,College of Computer and Information Engineering
[2] Internet of Things of Henan Province,Lab of Intelligence Business
来源
Multimedia Tools and Applications | 2021年 / 80卷
关键词
Searchable encryption; Keyword search; LWE problem; Validity period control; Multimedia data;
D O I
暂无
中图分类号
学科分类号
摘要
In recent years, with the dramatic increase in the use of multimedia data, rapid retrieval and sharing of the multimedia data have become major trends. The validity period control function widely used in daily softwares, which enables multimedia data to be shared from a specific time and revokes the authorization of shared data at another specific time, thereby effectively enhancing the personalized experience of multimedia data users. At the same time, to protect privacy, databases usually store data in an encrypted form and use searchable encryption technology to retrieve keywords on the ciphertext to quickly extract the required multimedia data. However, the existing searchable encryption scheme cannot control the reading of multimedia data by using validity period. To solve this problem, we propose a lattice-based searchable encryption scheme with the validity period control of files. In order that the data owners have flexible and fine-grained control over the files, we convert the time information into a lattice vector for setting a different valid time for each file. Meanwhile, we embed the time information into the ciphertext, so that the data owner only needs to set the validity period once to automatically maintain the life cycle of the files over encrypted data, instead of manually withdrawing each expired file. Furthermore, we combine searchable encryption and time-distance so that our scheme returns valid files only if the keywords match correctly and the search time matches the file’s validity period. This scheme is a candidate for time-controlled searchable encryption technology in the post-quantum era because our scheme constructed on learning with error (LWE) problem which has been proven to resist quantum attacks.
引用
收藏
页码:4655 / 4672
页数:17
相关论文
共 67 条
  • [11] GOH EJ(2018)Certificateless searchable public key encryption scheme for industrial internet of things[J] IEEE Trans Indust Inform 14 759-332
  • [12] Gu CX(2017)VCSE: verifiable conjunctive keywords search over encrypted data without secure-channel[J] Peer-to-Peer Netw Appl 10 995-20
  • [13] Guang Y(2009)On lattices, learning with errors, random linear codes, and cryptography[J] J ACM (JACM) 56 34-2277
  • [14] Zhu YF(1999)Polynomial-time algorithms for prime factorizetion and discrete logarithms on a quantum computer[J] SIAM Rev 41 303-759
  • [15] Guo Z(2018)Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage[J] PloS one 13 e0206126-5694
  • [16] Zhang H(2018)Lattice-based searchable public-key encryption scheme for secure cloud storage[J] Int J Web Grid Serv 14 3-194
  • [17] Sun C(2013)Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack[J] IEEE Trans Comput 62 2266-99
  • [18] Handa R(2015)Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds[J] IEEE Trans Inform Foren Secur 11 746-207
  • [19] Krishna CR(2018)Lattice assumption based fuzzy information retrieval scheme support multi-user for secure multimedia cloud[J] Multimed Tools Appl 77 9927’lC9941-921
  • [20] Aggarwal N(2019)CP-ABSE: a ciphertext-policy attribute-based searchable encryption scheme[J] IEEE Access 7 5682-267