A lattice-based searchable encryption scheme with the validity period control of files

被引:0
作者
En Zhang
Yingying Hou
Gongli Li
机构
[1] Henan Normal University,College of Computer and Information Engineering
[2] Internet of Things of Henan Province,Lab of Intelligence Business
来源
Multimedia Tools and Applications | 2021年 / 80卷
关键词
Searchable encryption; Keyword search; LWE problem; Validity period control; Multimedia data;
D O I
暂无
中图分类号
学科分类号
摘要
In recent years, with the dramatic increase in the use of multimedia data, rapid retrieval and sharing of the multimedia data have become major trends. The validity period control function widely used in daily softwares, which enables multimedia data to be shared from a specific time and revokes the authorization of shared data at another specific time, thereby effectively enhancing the personalized experience of multimedia data users. At the same time, to protect privacy, databases usually store data in an encrypted form and use searchable encryption technology to retrieve keywords on the ciphertext to quickly extract the required multimedia data. However, the existing searchable encryption scheme cannot control the reading of multimedia data by using validity period. To solve this problem, we propose a lattice-based searchable encryption scheme with the validity period control of files. In order that the data owners have flexible and fine-grained control over the files, we convert the time information into a lattice vector for setting a different valid time for each file. Meanwhile, we embed the time information into the ciphertext, so that the data owner only needs to set the validity period once to automatically maintain the life cycle of the files over encrypted data, instead of manually withdrawing each expired file. Furthermore, we combine searchable encryption and time-distance so that our scheme returns valid files only if the keywords match correctly and the search time matches the file’s validity period. This scheme is a candidate for time-controlled searchable encryption technology in the post-quantum era because our scheme constructed on learning with error (LWE) problem which has been proven to resist quantum attacks.
引用
收藏
页码:4655 / 4672
页数:17
相关论文
共 67 条
[21]  
Hong J(2017)Server-aided private set intersection based on reputation[J] Inform Sci 387 180-undefined
[22]  
Wen T(2019)Efficient conjunctive keywords search over encrypted e-mail data in public key setting[J] Appl Sci 9 3655-undefined
[23]  
Guo Q(2017)Outsourcing secret sharing scheme based on homomorphism encryption[J] IET Inform Secur 12 94-undefined
[24]  
Li J(2019)Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage[J] Inform Sci 494 193-undefined
[25]  
Lin X(2018)Trapdoor security lattice-based public-key searchable encryption with a designated cloud server[J] Wirel Pers Commun 100 907-undefined
[26]  
Zhang Y(2011)An efficient public key encryption with conjunctive-subset keywords search[J] J Netw Comput Appl 34 262-undefined
[27]  
MA MM(undefined)undefined undefined undefined undefined-undefined
[28]  
HE DB(undefined)undefined undefined undefined undefined-undefined
[29]  
KUMAR N(undefined)undefined undefined undefined undefined-undefined
[30]  
Miao Y(undefined)undefined undefined undefined undefined-undefined