2021
DOI: 10.32604/cmc.2021.017216
|View full text |Cite
|
Sign up to set email alerts
|

Verifiable Identity-Based Encryption with Keyword Search for IoT from Lattice

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(12 citation statements)
references
References 13 publications
0
12
0
Order By: Relevance
“…As compared to the lattice-based searchable encryption schemes YXX22 31 and MXX21, 33 it is evident that our scheme has smaller keyword ciphertext and trapdoor sizes MXX21 33 No No Secure Insecure Insecure Yes Ours Yes Yes Secure Secure Secure Secure compared to YXX22, 31 while having storage size similar to MXX21. 33 Due to the algebraic structures of lattice cryptography, such as matrices and vectors, our scheme requires more storage space when compared to LLW21 8 and LHS19. 32 We have compared our scheme with existing searchable encryption schemes in terms of security and other performance aspects, as listed in Table 4.…”
Section: Performance Analysismentioning
confidence: 85%
See 1 more Smart Citation
“…As compared to the lattice-based searchable encryption schemes YXX22 31 and MXX21, 33 it is evident that our scheme has smaller keyword ciphertext and trapdoor sizes MXX21 33 No No Secure Insecure Insecure Yes Ours Yes Yes Secure Secure Secure Secure compared to YXX22, 31 while having storage size similar to MXX21. 33 Due to the algebraic structures of lattice cryptography, such as matrices and vectors, our scheme requires more storage space when compared to LLW21 8 and LHS19. 32 We have compared our scheme with existing searchable encryption schemes in terms of security and other performance aspects, as listed in Table 4.…”
Section: Performance Analysismentioning
confidence: 85%
“…As indicated in Table 3, Test algorithm of MXX21 33 involves t the matrix multiplication operations, while our scheme's Test algorithm requires 2t the matrix multiplication operations and matrix inverse operations, resulting in higher Test algorithm time cost compared to MXX21. 33 However, in comparison to the Test algorithm time cost of YXX22, 31 as shown in Figure 6, our scheme exhibits lower time costs. Although the test algorithm in our scheme involves the matrix inverse operation, it should be noted that the inversion matrix is only related to the CS private key.…”
Section: Performance Analysismentioning
confidence: 99%
“…The searchable encryption scheme under the public key system was presented by Boneh et al [1], which also gave a general transformation from identity-based encryption (IBE) to PEKS. Since then, many improved schemes [9][10][11][12][13][14][15][16][17][18][19][20][21][22] involving security, performance, function were presented. After Park et al [2] put forward a PECKS scheme which supports joint keyword search, many works [23][24][25][26][27] have been committed to reducing the computation cost and the trapdoor length.…”
Section: Related Workmentioning
confidence: 99%
“…Searchable encryption [24,25] is a technique widely being explored in the area of cloud computing, where large amounts of data are stored in the cloud. Searchable encryption allows a user to generate a search query (also called a trapdoor) and can delegate the search across the peers involved in a network.…”
Section: Searchable Encryption On Dna Strandsmentioning
confidence: 99%