2019
DOI: 10.1109/access.2019.2928455
|View full text |Cite
|
Sign up to set email alerts
|

A Keyword-Searchable ABE Scheme From Lattice in Cloud Storage Environment

Abstract: Currently, the security situation of data security and user privacy protection is increasingly serious in cloud environment. Ciphertext data storage can prevent the risk of user's privacy disclosure. But how to search keyword on ciphertext data without revealing keyword information becomes a new challenge. Searchable encryption (SE) is put forward for this reason, which can be used to realize ciphertextsearch directly. In terms of multiuser data sharing, public-key encryption with keywords search (PEKS) is mor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
19
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(19 citation statements)
references
References 46 publications
(77 reference statements)
0
19
0
Order By: Relevance
“…[34] and Ref. [35], the sizes of the public key, private key and ciphertext in our scheme are shorter than that in other schemes. It can decrease computational complexity of our proposed cryptocurrency scheme.…”
Section: E Comparisonmentioning
confidence: 81%
See 1 more Smart Citation
“…[34] and Ref. [35], the sizes of the public key, private key and ciphertext in our scheme are shorter than that in other schemes. It can decrease computational complexity of our proposed cryptocurrency scheme.…”
Section: E Comparisonmentioning
confidence: 81%
“…Afterwards, in 2018, Wang et al designed a ABE scheme with revocation support and flexible access structure on lattice by using binary tree [34]. In 2019, Liu et al proposed a KS-ABE scheme to strength ciphertextsearch security for cloud storage [35]. However, due to the high ciphertext expansion rate, the size of the ciphertext is large.…”
Section: E Comparisonmentioning
confidence: 99%
“…Literature [15]- [18] conducted a series of technical improvement studies on the shortcomings of previous searchable encryption technology schemes. Combined with the theory of attribute encryption and lattice cryptography, literature [19], which takes into account the problem of data security storage and search. However, most of the existing relevant research results are for the implementation of single or a few specified input keywords as retrieval requests over the public cloud environment.…”
Section: Introductionmentioning
confidence: 99%
“…Yu et al [47] extended tree structure to support AND, OR and threshold gates as LSSS matrix in the KP-ABE scheme. Liu et al [48] extended KP-ABE in a keywordsearchable context, whereas Liu et al [49] focused on addressing the leakage of shared master keys in LSSS. Luo et al [50] applied proxy re-encryption concepts in solving the forward and backward secrecy of the KP-ABE scheme.…”
mentioning
confidence: 99%
“…Pal and Dutta [51] further extended the KP-ABE scheme in supporting functional encryption. Generally, the algorithm design of recent quantum-resistant KP-ABE schemes [24,[41][42][43][44][45][46][47][48][49][50][51] is mainly directed at lattice-based cryptography, which offers security proofs based on NP-hard problems with average-case to worst-case hardness. Moreover, the inherent linear algebra-based matrix or vector operations make lattice-based ABE can be implemented efficiently [15].…”
mentioning
confidence: 99%