Dual Fine-Grained Public-Key Searchable Encryption from Lattices
نویسندگان
چکیده
Fine-grained public key encryption with keyword search (PEKS), allowing users to on encrypted data flexible access control policy, has been widely studied recently due its promising application real-world scenarios such as cloud computing. However, most of the existing fine-grained PEKS schemes are either only able support single (e.g., attribute-based control) or susceptible being attacked compromised by quantum computers in after a short time. In this paper, we propose scheme that o ers dual based lattice. particular, first define primitive against chosen attacks under selective security. Subsequently, adapt homomorphic technique and noise rerandomization design concrete scheme. Particularly, space our construction is unlimited. Then, present formal security proof learning errors (LWE) problem standard model. Moreover, demonstrate theoretical performance experimental result proposed Finally, discuss can be easily extended conjunctive keywords delegation without incurring complex operations.
منابع مشابه
Public Key Searchable Encryption without Random Oracle ⋆
This article is described a new Public Key Encryption with Keyword Search (PEKS) scheme, which is semantically secure against chosen keyword attack, without assuming random oracle. The security of our scheme depends on the complexity assumption of Strong Diffie-Hellman (SDH). The computation operation for constructing cipher text and trapdoor of keyword is simpler than the most schemes introduc...
متن کاملMulti-Key Searchable Encryption
We construct a searchable encryption scheme that enables keyword search over data encrypted with different keys. The scheme is practical and was designed to be included in a new system for protecting data confidentiality in client-server applications against attacks on the server.
متن کاملUltra-Fine Grained Dual-Phase Steels
This paper provides an overview on obtaining low-carbon ultra-fine grained dual-phase steels through rapid intercritical annealing of cold-rolled sheet as improved materials for automotive applications. A laboratory processing route was designed that involves cold-rolling of a tempered martensite structure followed by a second tempering step to produce a fine grained aggregate of ferrite and ca...
متن کاملLattices Part II — Dual Lattices , Fourier Transform , Smoothing Parameter , Public Key Encryption
Fourier transform Consider the interval [0, λ] and suppose that we identify the point λ with 0 (i.e., think of it as a Torus and work modulo λ). Another way to think about this is as the basic cell of the lattice λZ, whose dual is the lattice (1/λ)Z. A periodic function on this torus has to period length of the form λ/n for an integer n. Thus, the Fourier transform of a function on this torus i...
متن کاملPublic Key Encryption with Searchable Keywords Based on Jacobi Symbols
Vishal Saraswat (CRRao AIMSCS) Searchable Encryption APHRDI, 22/09/16 10 / 46 Vishal Saraswat Some other projects Abstract Public-key encryption with keyword search (PEKS) schemes are useful to delegate searching capabilities on encrypted data to a third party, who does not hold the entire secret key, but only an appropriate token which allows searching operations but preserves data privacy. PE...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer and Information Science
سال: 2022
ISSN: ['1913-8997', '1913-8989']
DOI: https://doi.org/10.5539/cis.v15n1p66