Poster: Multi-Writer Searchable Encryption with Fast Search and Post-Quantum Security

被引:1
|
作者
Wang, Jiafan [1 ]
Liu, Dongxi [1 ]
机构
[1] CSIRO, Data61, Canberra, ACT, Australia
关键词
D O I
10.1109/ICDCS57875.2023.00143
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable encryption enables secure searches over encrypted data in the cloud. Among all paradigms, public key encryption with keyword search (PEKS) is particularly desirable by privacy-preserving distributed computing and IoT applications, since it allows multiple parties (i.e., writers) to independently contribute encrypted data. However, a PEKS search usually requires a linear scan over the entire dataset for keyword search, causing unacceptable latency when facing a large amount of data. All existing efforts to speed up multi-writer searchable encryption are based on conventional hardness assumptions for security, which can be broken provided the advent of quantum computers. In this work, we propose a lattice-based multi-writer searchable encryption scheme, which lets writers build indices for their outsourced data to make keyword searches faster. Meanwhile, the security of the proposed solution relies on the learning with errors assumption, which is known to withstand the potential attack from quantum computers.
引用
收藏
页码:1061 / 1062
页数:2
相关论文
共 50 条
  • [1] Multi-writer Multi-reader Boolean Keyword Searchable Encryption
    Dhruti Sharma
    Devesh Jinwala
    Arabian Journal for Science and Engineering, 2020, 45 : 10709 - 10729
  • [2] Multi-writer Multi-reader Boolean Keyword Searchable Encryption
    Sharma, Dhruti
    Jinwala, Devesh
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2020, 45 (12) : 10709 - 10729
  • [3] Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation
    Xu, Lei
    Yuan, Xingliang
    Steinfeld, Ron
    Wang, Cong
    Xu, Chungen
    PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 122 - 133
  • [4] Post-quantum Multi-client Conjunctive Searchable Symmetric Encryption from Isogenies
    Patranabis, Sikhar
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2024, 2025, 15351 : 225 - 257
  • [5] Post-Quantum Security Models for Authenticated Encryption
    Soukharev, Vladimir
    Jao, David
    Seshadri, Srinath
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2016, 2016, 9606 : 64 - 78
  • [6] Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications
    Xu, Shiyuan
    Cao, Yibo
    Chen, Xue
    Zhao, Yanmin
    Yiu, Siu-Ming
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 274 - 298
  • [7] On the Post-quantum Security of Classical Authenticated Encryption Schemes
    Lang, Nathalie
    Lucks, Stefan
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2023, 2023, 14064 : 79 - 104
  • [8] Post-Quantum Security of IGE Mode Encryption in Telegram
    Lee, Jeeun
    Kim, Sungsook
    Lee, Seunghyun
    Kim, Kwangjo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01): : 148 - 151
  • [9] Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's Post-Quantum Security
    Cojocaru, Alexandru
    Garay, Juan
    Kiayias, Aggelos
    Song, Fang
    Wallden, Petros
    QUANTUM, 2023, 7
  • [10] Post-Quantum Multi-Recipient Public Key Encryption
    Alwen, Joel
    Hartmann, Dominik
    Kiltz, Eike
    Mularczyk, Marta
    Schwabe, Peter
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1108 - 1122