Poster: Multi-Writer Searchable Encryption with Fast Search and Post-Quantum Security

被引:1
|
作者
Wang, Jiafan [1 ]
Liu, Dongxi [1 ]
机构
[1] CSIRO, Data61, Canberra, ACT, Australia
关键词
D O I
10.1109/ICDCS57875.2023.00143
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable encryption enables secure searches over encrypted data in the cloud. Among all paradigms, public key encryption with keyword search (PEKS) is particularly desirable by privacy-preserving distributed computing and IoT applications, since it allows multiple parties (i.e., writers) to independently contribute encrypted data. However, a PEKS search usually requires a linear scan over the entire dataset for keyword search, causing unacceptable latency when facing a large amount of data. All existing efforts to speed up multi-writer searchable encryption are based on conventional hardness assumptions for security, which can be broken provided the advent of quantum computers. In this work, we propose a lattice-based multi-writer searchable encryption scheme, which lets writers build indices for their outsourced data to make keyword searches faster. Meanwhile, the security of the proposed solution relies on the learning with errors assumption, which is known to withstand the potential attack from quantum computers.
引用
收藏
页码:1061 / 1062
页数:2
相关论文
共 50 条
  • [21] Quantum and Post-Quantum Security in Future Networks
    Sanon, Sogo Pierre
    Alzalam, Ihab
    Schotten, Hans D.
    2023 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2024,
  • [22] A Hybrid Double Encryption Approach for Enhanced Cloud Data Security in Post-Quantum Cryptography
    Manjushree C.V.
    Nandakumar A.N.
    Intl. J. Adv. Comput. Sci. Appl., 2023, 12 (242-248): : 242 - 248
  • [23] A Hybrid Double Encryption Approach for Enhanced Cloud Data Security in Post-Quantum Cryptography
    Manjushree, C., V
    Nandakumar, A. N.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (12) : 242 - 248
  • [24] POSTER: On Post-Quantum Identification in 5G
    Damir, Mohamed Taoufiq
    Niemi, Valtteri
    PROCEEDINGS OF THE 15TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '22), 2022, : 292 - 294
  • [25] Post-Quantum Security: Opportunities and Challenges
    Li, Silong
    Chen, Yuxiang
    Chen, Lin
    Liao, Jing
    Kuang, Chanchan
    Li, Kuanching
    Liang, Wei
    Xiong, Naixue
    SENSORS, 2023, 23 (21)
  • [26] Post-quantum Security of the Sponge Construction
    Czajkowski, Jan
    Bruinderink, Leon Groot
    Hulsing, Andreas
    Schaffner, Christian
    Unruh, Dominique
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2018, 2018, 10786 : 185 - 204
  • [27] Post-Quantum Primitives in Information Security
    Aleksandrova, E. B.
    Shtyrkina, A. A.
    Iarmak, A. V.
    NONLINEAR PHENOMENA IN COMPLEX SYSTEMS, 2019, 22 (03): : 269 - 276
  • [28] Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution
    Ghashghaei, Farshad Rahimi
    Ahmed, Yussuf
    Elmrabit, Nebrase
    Yousefi, Mehdi
    COMPUTERS, 2024, 13 (07)
  • [29] Fast, Searchable, Symmetric Encryption Scheme Supporting Ranked Search
    He, Wei
    Zhang, Yu
    Li, Yin
    SYMMETRY-BASEL, 2022, 14 (05):
  • [30] Round5: Compact and Fast Post-quantum Public-Key Encryption
    Baan, Hayo
    Bhattacharya, Sauvik
    Fluhrer, Scott
    Garcia-Morchon, Oscar
    Laarhoven, Thijs
    Rietman, Ronald
    Saarinen, Markku-Juhani O.
    Tolhuizen, Ludo
    Zhang, Zhenfei
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2019, 2019, 11505 : 83 - 102