Multi-user search on the encrypted multimedia database: lattice-based searchable encryption scheme with time-controlled proxy re-encryption

被引:5
|
作者
Yu, Xiaoling [1 ]
Xu, Chungen [1 ]
Dou, Bennian [1 ]
Wang, Yuntao [2 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Sci, Nanjing 210094, Peoples R China
[2] Japan Adv Inst Sci & Technol, Sch Informat Sci Secur & Networks, Nomi, Ishikawa 9231292, Japan
关键词
Multimedia data security; Searchable encryption; Lattice assumption; Multi-user search; Time control; PUBLIC-KEY ENCRYPTION; KEYWORD GUESSING ATTACKS; SECURE;
D O I
10.1007/s11042-020-09753-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multimedia cloud storage which saves the huge storage overhead of local devices has attracted considerable attention. However, due to the lack of physical control of data, the privacy protection of data on the multimedia cloud has become one of the main concerns of users. Public-key encryption with keywords search (PEKS) is a technique that can keep the privacy and searchability of data in the cloud. In this paper, we present a PEKS with time-controlled proxy re-encryption model which allows the data owner to delegate the access right of the encrypted multimedia database to other users, to achieve the time-controlled multi-user search. Furthermore, it is designed to resist keywords guessing attack and support conjunctive keywords search. Compared with previous works which require a time server to generate a time seal for the generation of the search token, this model embeds the time information of accessing the encrypted database into public and secret key pairs of data users, which saves the managing overhead and reduces the security risks resulting from an extra server. In addition, most existing PEKS schemes were constructed based on the hardness of classical mathematical problems which can be broken by quantum computers. To address this issue, a lattice-based PEKS scheme based on the above model is proposed, which can be considered as the candidate for protecting multimedia data security in the quantum era.
引用
收藏
页码:3193 / 3211
页数:19
相关论文
共 50 条
  • [21] A Multi-keyword Multi-user Searchable Encryption Scheme Based On Cloud Storage
    Huang, Haiping
    Du, Jianpeng
    Wang, Hui
    Wang, Ruchuan
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1937 - 1943
  • [22] An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data
    Rao, Deepthi
    Kumar, D. V. N. Siva
    Thilagam, P. Santhi
    2018 9TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2018,
  • [23] Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices
    Zhuang, Er-Shuo
    Fan, Chun-, I
    MATHEMATICS, 2023, 11 (18)
  • [24] Lattice-Based HRA-secure Attribute-Based Proxy Re-Encryption in Standard Model
    Susilo, Willy
    Dutta, Priyanka
    Duong, Dung Hoang
    Roy, Partha Sarathi
    COMPUTER SECURITY - ESORICS 2021, PT II, 2021, 12973 : 169 - 191
  • [25] Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT
    Tang, Yongli
    Ba, Yanpeng
    Li, Lixiang
    Wang, Xiaojun
    Yan, Xixi
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (04): : 2305 - 2316
  • [26] Hardening secure search in encrypted database: a KGA-resistance conjunctive searchable encryption scheme from lattice
    Xiaoling Yu
    Chungen Xu
    Lei Xu
    Lin Mei
    Soft Computing, 2022, 26 : 11139 - 11151
  • [27] Hardening secure search in encrypted database: a KGA-resistance conjunctive searchable encryption scheme from lattice
    Yu, Xiaoling
    Xu, Chungen
    Xu, Lei
    Mei, Lin
    SOFT COMPUTING, 2022, 26 (21) : 11139 - 11151
  • [28] Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT
    Yongli Tang
    Yanpeng Ba
    Lixiang Li
    Xiaojun Wang
    Xixi Yan
    Cluster Computing, 2022, 25 : 2305 - 2316
  • [29] Dynamic Encrypted Data Sharing Scheme Based on Conditional Proxy Broadcast Re-Encryption for Cloud Storage
    Jiang, Linmei
    Guo, Donghui
    IEEE ACCESS, 2017, 5 : 13336 - 13345
  • [30] Multi-element based on proxy re-encryption scheme for mobile cloud computing
    School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing
    210094, China
    不详
    100070, China
    Tongxin Xuebao, 11