2022
DOI: 10.32604/cmc.2022.028562
|View full text |Cite
|
Sign up to set email alerts
|

A Searchable Encryption Scheme Based on Lattice for Log Systems in燘lockchain

Abstract: With the increasing popularity of cloud storage, data security on the cloud has become increasingly visible. Searchable encryption has the ability to realize the privacy protection and security of data in the cloud. However, with the continuous development of quantum computing, the standard Public-key Encryption with Keyword Search (PEKS) scheme cannot resist quantumbased keyword guessing attacks. Further, the credibility of the server also poses a significant threat to the security of the retrieval process. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 26 publications
(27 reference statements)
0
2
0
Order By: Relevance
“…Secondly, we will introduce the proposed blind ring signature algorithm into more specific blockchain application scenarios, such as medical blockchain and blockchain-enabled Internet of ings. Finally, we will study more cryptographic methods for blockchain data privacy protection, such as searchable encryption [32,33], to improve blockchain privacy protection mechanisms.…”
Section: Discussionmentioning
confidence: 99%
“…Secondly, we will introduce the proposed blind ring signature algorithm into more specific blockchain application scenarios, such as medical blockchain and blockchain-enabled Internet of ings. Finally, we will study more cryptographic methods for blockchain data privacy protection, such as searchable encryption [32,33], to improve blockchain privacy protection mechanisms.…”
Section: Discussionmentioning
confidence: 99%
“…According to the characteristics of high security and high efciency of lattice cryptography [16], this paper proposes a lattice-based handover authentication key agreement algorithm. Tis scheme negotiates the session key between the train UE and the target base station gNB t through the characteristic function on the lattice and the auxiliary modular function, which ensures the forward and backward security of the session key and can defeat various attacks.…”
Section: Proposed Protocolmentioning
confidence: 99%