Multi-user search on the encrypted multimedia database: lattice-based searchable encryption scheme with time-controlled proxy re-encryption

被引:5
|
作者
Yu, Xiaoling [1 ]
Xu, Chungen [1 ]
Dou, Bennian [1 ]
Wang, Yuntao [2 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Sci, Nanjing 210094, Peoples R China
[2] Japan Adv Inst Sci & Technol, Sch Informat Sci Secur & Networks, Nomi, Ishikawa 9231292, Japan
关键词
Multimedia data security; Searchable encryption; Lattice assumption; Multi-user search; Time control; PUBLIC-KEY ENCRYPTION; KEYWORD GUESSING ATTACKS; SECURE;
D O I
10.1007/s11042-020-09753-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multimedia cloud storage which saves the huge storage overhead of local devices has attracted considerable attention. However, due to the lack of physical control of data, the privacy protection of data on the multimedia cloud has become one of the main concerns of users. Public-key encryption with keywords search (PEKS) is a technique that can keep the privacy and searchability of data in the cloud. In this paper, we present a PEKS with time-controlled proxy re-encryption model which allows the data owner to delegate the access right of the encrypted multimedia database to other users, to achieve the time-controlled multi-user search. Furthermore, it is designed to resist keywords guessing attack and support conjunctive keywords search. Compared with previous works which require a time server to generate a time seal for the generation of the search token, this model embeds the time information of accessing the encrypted database into public and secret key pairs of data users, which saves the managing overhead and reduces the security risks resulting from an extra server. In addition, most existing PEKS schemes were constructed based on the hardness of classical mathematical problems which can be broken by quantum computers. To address this issue, a lattice-based PEKS scheme based on the above model is proposed, which can be considered as the candidate for protecting multimedia data security in the quantum era.
引用
收藏
页码:3193 / 3211
页数:19
相关论文
共 50 条
  • [1] Multi-user search on the encrypted multimedia database: lattice-based searchable encryption scheme with time-controlled proxy re-encryption
    Xiaoling Yu
    Chungen Xu
    Bennian Dou
    Yuntao Wang
    Multimedia Tools and Applications, 2021, 80 : 3193 - 3211
  • [2] A Multi-users Searchable Encryption Scheme with Proxy Re-encryption
    Zhang Ya-ling
    Liu Kai
    Wang Shang-ping
    Sun Qin-dong
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 563 - 567
  • [3] A Lattice-based Unidirectional Proxy Re-encryption
    Wang, Lewei
    Jiang, Mingming
    Guo, Yuyan
    Ge, Hui
    International Journal of Network Security, 2024, 26 (04) : 598 - 604
  • [4] Lattice-based unidirectional Proxy Re-Encryption and Proxy Re-Encryption+ schemes
    Singh, Kunwar
    Rangan, C. Pandu
    Sheshank, Samir
    Agrawal, Richa
    IET INFORMATION SECURITY, 2021, 15 (01) : 1 - 12
  • [5] Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability
    Wang, Xiaolei
    Wang, Yang
    Wang, Mingqiang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 535 - 544
  • [6] Lattice-based multi-use unidirectional proxy re-encryption
    Jiang, M. M.
    Hu, Y. P.
    Wang, B. C.
    Wang, F. H.
    Lai, Q. Q.
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3796 - 3803
  • [7] Lattice-based Fuzzy Conditional Proxy Re-encryption
    Li, BaoHong
    Xu, JieFei
    Liu, YanZhi
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (05): : 1379 - 1385
  • [8] A lattice-based searchable encryption scheme with multi-user authorization for the certificateless cloud computing environment
    Zhou, Yihua
    Tang, Bin
    Yang, Yuguang
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (04)
  • [9] Lattice-based autonomous path proxy re-encryption in the standard model
    Wenli XIE
    Jian WENG
    Yao TONG
    Xiaojian LIANG
    Lisha YAO
    Feixiang ZHAO
    Science China(Information Sciences), 2023, 66 (10) : 184 - 195
  • [10] Lattice-based autonomous path proxy re-encryption in the standard model
    Xie, Wenli
    Weng, Jian
    Tong, Yao
    Liang, Xiaojian
    Yao, Lisha
    Zhao, Feixiang
    SCIENCE CHINA-INFORMATION SCIENCES, 2023, 66 (10)