A lattice-based multi-authority updatable searchable encryption scheme for serverless architecture with scalable on-demand result processing

被引:0
|
作者
Tang, Bin [1 ]
Zhou, Yi-Hua [1 ]
Yang, Yu-Guang [1 ]
Gong, Bei [1 ]
Ning, Zhenhu [1 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci, Beijing 100124, Peoples R China
基金
中国国家自然科学基金;
关键词
Lattice; Serverless; Searchable encryption; Multi-user authorization; Results-on-demand;
D O I
10.1016/j.csi.2024.103956
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable encryption (SE) enables the searchability of encrypted data in cloud environments, thereby safeguarding privacy. Despite this, the actual execution of ciphertext searches within a multi-user data- sharing context necessitates flexible access services for various authorized users. Although the existing solution has achieved ciphertext retrieval with multi-user authorization, it still exhibits shortcomings in areas such as dynamic and manageable permissions and the more granular access control on results. Our scheme, grounded in lattice cryptography, is designed to withstand quantum attacks. It leverages serverless cloud computing and incorporates ciphertext-policy attribute-based encryption (CP-ABE) along with proxy re- encryption (PRE) to construct a multi-user authorization searchable encryption system. This system facilitates keyword searches on encrypted data, supports dynamic multi-user authorization, and ensures scalable, results- on-demand capabilities. Security analysis confirms that our scheme is impervious to collusion attacks, chosen keyword attacks (CKA), and chosen plaintext attacks (CPA). Finally, the performance analysis demonstrates that our scheme is both secure and efficient, outperforming other multi-user searchable encryption schemes in terms of security and efficiency.
引用
收藏
页数:14
相关论文
共 47 条
  • [31] A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records
    Pussewalage, Harsha S. Gardiyawasam
    Oleshchuk, Vladimir A.
    PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 255 - 262
  • [32] A revocable multi-authority attribute-based encryption scheme for fog-enabled IoT
    Penuelas-Angulo, Alejandro
    Feregrino-Uribe, Claudia
    Morales-Sandoval, Miguel
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 155
  • [33] Weighted Attribute-Based Proxy Re-Encryption Scheme with Distributed Multi-Authority Attributes
    Yi, Wenlong
    Wang, Chuang
    Kuzmin, Sergey
    Gerasimov, Igor
    Cheng, Xiangping
    SENSORS, 2024, 24 (15)
  • [34] Distributed Multi-authority Attribute-based Encryption Scheme for Friend Discovery in Mobile Social Networks
    Wang, Wenbo
    Qi, Fang
    Wu, Xiaoqiang
    Tang, Zhe
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE 2016 (ICCS 2016), 2016, 80 : 617 - 626
  • [35] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Zhong, Hong
    Zhu, Wenlong
    Xu, Yan
    Cui, Jie
    SOFT COMPUTING, 2018, 22 (01) : 243 - 251
  • [36] Multi-Authority Attribute-Based Encryption Access Control Scheme in Wireless Body Area Network
    Xiao, Min
    Hu, Xiaoyong
    2018 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS ENGINEERING (ICISE), 2018, : 39 - 45
  • [37] Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks
    Luo, Entao
    Liu, Qin
    Wang, Guojun
    IEEE COMMUNICATIONS LETTERS, 2016, 20 (09) : 1772 - 1775
  • [38] Multi-Authority Attribute-Based Encryption Scheme With Access Delegation for Cross Blockchain Data Sharing
    Duan, Pengfei
    Ma, Zhaofeng
    Gao, Hongmin
    Tian, Tian
    Zhang, Yuqing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 323 - 337
  • [39] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Hong Zhong
    Wenlong Zhu
    Yan Xu
    Jie Cui
    Soft Computing, 2018, 22 : 243 - 251
  • [40] Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation
    Zhang, Xiao
    Wu, Faguo
    Yao, Wang
    Wang, Zhao
    Wang, Wenhua
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (21):