A lattice-based searchable encryption scheme with the validity period control of files

被引:0
|
作者
En Zhang
Yingying Hou
Gongli Li
机构
[1] Henan Normal University,College of Computer and Information Engineering
[2] Internet of Things of Henan Province,Lab of Intelligence Business
来源
Multimedia Tools and Applications | 2021年 / 80卷
关键词
Searchable encryption; Keyword search; LWE problem; Validity period control; Multimedia data;
D O I
暂无
中图分类号
学科分类号
摘要
In recent years, with the dramatic increase in the use of multimedia data, rapid retrieval and sharing of the multimedia data have become major trends. The validity period control function widely used in daily softwares, which enables multimedia data to be shared from a specific time and revokes the authorization of shared data at another specific time, thereby effectively enhancing the personalized experience of multimedia data users. At the same time, to protect privacy, databases usually store data in an encrypted form and use searchable encryption technology to retrieve keywords on the ciphertext to quickly extract the required multimedia data. However, the existing searchable encryption scheme cannot control the reading of multimedia data by using validity period. To solve this problem, we propose a lattice-based searchable encryption scheme with the validity period control of files. In order that the data owners have flexible and fine-grained control over the files, we convert the time information into a lattice vector for setting a different valid time for each file. Meanwhile, we embed the time information into the ciphertext, so that the data owner only needs to set the validity period once to automatically maintain the life cycle of the files over encrypted data, instead of manually withdrawing each expired file. Furthermore, we combine searchable encryption and time-distance so that our scheme returns valid files only if the keywords match correctly and the search time matches the file’s validity period. This scheme is a candidate for time-controlled searchable encryption technology in the post-quantum era because our scheme constructed on learning with error (LWE) problem which has been proven to resist quantum attacks.
引用
收藏
页码:4655 / 4672
页数:17
相关论文
共 50 条
  • [21] Design of a Lattice-based Access Control Scheme
    Chiang, Chia-Chu
    Bayrak, Coskun
    Seker, Remzi
    Topaloglu, Umit
    Demirer, Murat
    Samadi, Nasrola
    Tek, Suleyman
    Jiang, Bian
    Zhou, GuangXu
    Wang, Xiaoran
    2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, 2009, : 68 - +
  • [22] Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server
    Zhang, Xiaojun
    Xu, Chunxiang
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 100 (03) : 907 - 921
  • [23] Trapdoor Security Lattice-Based Public-Key Searchable Encryption with a Designated Cloud Server
    Xiaojun Zhang
    Chunxiang Xu
    Wireless Personal Communications, 2018, 100 : 907 - 921
  • [24] A lattice-based revocable adaptive-ID secure encryption scheme
    State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an
    710071, China
    Dianzi Yu Xinxi Xuebao, 2 (423-428):
  • [25] A lattice-based public key encryption scheme with delegated equality test
    Xiao, Kaifeng
    Chen, Xinjian
    Huang, Jianye
    Li, Hongbo
    Huang, Qiong
    COMPUTER STANDARDS & INTERFACES, 2024, 87
  • [26] Design and Implementation of a Lattice-Based Public-Key Encryption Scheme
    Lin, Hui
    Liu, Dongsheng
    Zhang, Cong
    Dong, Yahui
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2018, 27 (13)
  • [27] A LATTICE-BASED PUBLIC-KEY ENCRYPTION SCHEME FOR RFID APPLICATIONS
    Lin Hui
    Dong Yahui
    Liu Dongshen
    Liu Zilong
    Hou Dawei
    Tong Hengqin
    2014 12TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT), 2014,
  • [28] Homomorphic Encryption within Lattice-Based Encryption System
    Kadykov, Victor
    Levina, Alla
    Voznesensky, Alexander
    14TH INTERNATIONAL SYMPOSIUM INTELLIGENT SYSTEMS, 2021, 186 : 309 - 315
  • [29] A lattice-based data sharing functional encryption scheme with HRA security for IoT
    Hou, Jinqiu
    Peng, Changgen
    Tan, Weijie
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 254
  • [30] Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model
    Tang Yongli
    Wang Mingming
    Ye Qing
    Qin Panke
    Zhao Zongqu
    The Journal of China Universities of Posts and Telecommunications, 2019, 26 (04) : 70 - 79