2019
DOI: 10.1109/access.2019.2952163
|View full text |Cite
|
Sign up to set email alerts
|

Lattice-Based Key-Aggregate (Searchable) Encryption in Cloud Storage

Abstract: In cloud storage, selectively sharing encrypted data is becoming increasingly important. One key design challenge is the management of encryption keys. Traditionally, a large quantity of encryption keys have to be managed by the data owner, and an equally large number of keyword trapdoors must be sent to the cloud for the purpose of searching over the shared data, which are cumbersome in terms of secure communication and management. Recently, key-aggregate (searchable) encryption schemes have been introduced t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
29
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(32 citation statements)
references
References 27 publications
0
29
0
Order By: Relevance
“…2|G| Table 5, we can observe that none of the existing KASE schemes listed in the table provide revocation of delegated rights, conjunctive keywords search using a single trapdoor and energy-efficient encryption as well as decryption algorithms for resource-limited devices. Additionally, as shown in Table 5, the KASE schemes [4,13,23,24,31,32,34,35] do not support search over multiowners' data using a single trapdoor. On the other hand, the KASE schemes proposed in [18][19][20][21][22] provide the solution to search over multi-owners' data using a single trapdoor.…”
Section: Evaluation Of Kase Schemesmentioning
confidence: 98%
See 3 more Smart Citations
“…2|G| Table 5, we can observe that none of the existing KASE schemes listed in the table provide revocation of delegated rights, conjunctive keywords search using a single trapdoor and energy-efficient encryption as well as decryption algorithms for resource-limited devices. Additionally, as shown in Table 5, the KASE schemes [4,13,23,24,31,32,34,35] do not support search over multiowners' data using a single trapdoor. On the other hand, the KASE schemes proposed in [18][19][20][21][22] provide the solution to search over multi-owners' data using a single trapdoor.…”
Section: Evaluation Of Kase Schemesmentioning
confidence: 98%
“…Yao et al propose the first lattice-based KASE scheme in [32]. The lattice-based KASE [32] scheme provides security against quantum computing attacks and potential efficiency.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The key aggregate searchable encryption (KASE) scheme [5 ] is more extended in scope, in which a DO delegates search rights over a selected dataset using an aggregate key and the user can search over shared data by submitting a single aggregate trapdoor to the cloud. The KAE schemes [4, 6–11 ] and KASE schemes [5, 12–23 ] focus on the list of data that the DO wants to share with other users rather than focusing on the role or the attributes of recipients. This data‐centric characteristic of the KAE and the KASE helps them to reduce the number of keys required for group data sharing, as compared to the user‐centric data sharing schemes [1–3 ].…”
Section: Introductionmentioning
confidence: 99%