A lattice-based multi-authority updatable searchable encryption scheme for serverless architecture with scalable on-demand result processing

被引:0
|
作者
Tang, Bin [1 ]
Zhou, Yi-Hua [1 ]
Yang, Yu-Guang [1 ]
Gong, Bei [1 ]
Ning, Zhenhu [1 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci, Beijing 100124, Peoples R China
基金
中国国家自然科学基金;
关键词
Lattice; Serverless; Searchable encryption; Multi-user authorization; Results-on-demand;
D O I
10.1016/j.csi.2024.103956
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable encryption (SE) enables the searchability of encrypted data in cloud environments, thereby safeguarding privacy. Despite this, the actual execution of ciphertext searches within a multi-user data- sharing context necessitates flexible access services for various authorized users. Although the existing solution has achieved ciphertext retrieval with multi-user authorization, it still exhibits shortcomings in areas such as dynamic and manageable permissions and the more granular access control on results. Our scheme, grounded in lattice cryptography, is designed to withstand quantum attacks. It leverages serverless cloud computing and incorporates ciphertext-policy attribute-based encryption (CP-ABE) along with proxy re- encryption (PRE) to construct a multi-user authorization searchable encryption system. This system facilitates keyword searches on encrypted data, supports dynamic multi-user authorization, and ensures scalable, results- on-demand capabilities. Security analysis confirms that our scheme is impervious to collusion attacks, chosen keyword attacks (CKA), and chosen plaintext attacks (CPA). Finally, the performance analysis demonstrates that our scheme is both secure and efficient, outperforming other multi-user searchable encryption schemes in terms of security and efficiency.
引用
收藏
页数:14
相关论文
共 47 条
  • [21] Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption
    Li, Yang
    Qi, Baoyue
    Wang, Mengmeng
    Zhu, Jianming
    Wang, Xiuli
    DATA SCIENCE (ICPCSEE 2022), PT II, 2022, 1629 : 105 - 124
  • [22] Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Wu, Yulin
    Yiu, S. M.
    2018 IEEE INT CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, UBIQUITOUS COMPUTING & COMMUNICATIONS, BIG DATA & CLOUD COMPUTING, SOCIAL COMPUTING & NETWORKING, SUSTAINABLE COMPUTING & COMMUNICATIONS, 2018, : 1003 - 1008
  • [23] Low Complexity Multi-Authority Attribute Based Encryption Scheme for Mobile Cloud Computing
    Li, Fei
    Rahulamathavan, Yogachandran
    Rajarajan, Muttukrishnan
    Phan, Raphael C-W
    2013 IEEE SEVENTH INTERNATIONAL SYMPOSIUM ON SERVICE-ORIENTED SYSTEM ENGINEERING (SOSE 2013), 2013, : 573 - 577
  • [24] Improving File Hierarchy Attribute-Based Encryption Scheme with Multi-authority in Cloud
    Kang, Li
    Zhang, Leyou
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 3 - 18
  • [25] Secure and Efficient Multi-Authority Attribute-Based Encryption Scheme From Lattices
    Liu, Yuan
    Wang, Licheng
    Li, Lixiang
    Yan, Xixi
    IEEE ACCESS, 2019, 7 : 3665 - 3674
  • [26] A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing
    Tu, Shanshan
    Waqas, Muhammad
    Huang, Fengming
    Abbas, Ghulam
    Abbas, Ziaul Haq
    COMPUTER NETWORKS, 2021, 195
  • [27] LWE-based multi-authority attribute-based encryption scheme with hidden policies
    Tian, Qiuting
    Han, Dezhi
    Liu, Xingao
    Yu, Xueshan
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 19 (02) : 233 - 241
  • [28] An efficient and forward-secure lattice-based searchable encryption scheme for the Big-data era
    Islam, Sk Hafizul
    Mishra, Nimish
    Biswas, Souvik
    Keswani, Bharat
    Zeadally, Sherali
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 96
  • [29] Multi-user search on the encrypted multimedia database: lattice-based searchable encryption scheme with time-controlled proxy re-encryption
    Yu, Xiaoling
    Xu, Chungen
    Dou, Bennian
    Wang, Yuntao
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (02) : 3193 - 3211
  • [30] Multi-user search on the encrypted multimedia database: lattice-based searchable encryption scheme with time-controlled proxy re-encryption
    Xiaoling Yu
    Chungen Xu
    Bennian Dou
    Yuntao Wang
    Multimedia Tools and Applications, 2021, 80 : 3193 - 3211