Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2024, Vol. 18 Issue (3) : 183817    https://doi.org/10.1007/s11704-023-3128-3
Information Security
Offline/online attribute-based searchable encryption scheme from ideal lattices for IoT
Yang YANG, Guoyin ZHANG, Sizhao LI, Zechao LIU()
College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China
 Download: PDF(1017 KB)   HTML
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Corresponding Author(s): Zechao LIU   
Issue Date: 18 January 2024
 Cite this article:   
Yang YANG,Guoyin ZHANG,Sizhao LI, et al. Offline/online attribute-based searchable encryption scheme from ideal lattices for IoT[J]. Front. Comput. Sci., 2024, 18(3): 183817.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-023-3128-3
https://academic.hep.com.cn/fcs/EN/Y2024/V18/I3/183817
  
Fig.1  The system model of ABSEIL scheme
Scheme KeyGen Enc Trapdoor Search Decrypt ReKeyGen ReEnc
Ref. [5] Tsp 12kn2nq+2n Tsp 6knnq 6knnq 2Tsp 72kn2nq3
Ref. [6] Tpk+Tb 6(k+2)n2nq?+Tsp Tpk+Tb+Tsp 6nnq(n+3?)+Tct ? ? ?
Ref. [7] Tsp+Tb 6(k+1)n2nq 2Tsp 24nnq 12nnq ? ?
Ref. [8] Tpk+Tb (k+2)n2nq ? ? 4n2nq2+Tct Tpk+Tsp 4n2nq2+Tct
Ours 2nn~qn~?+Tpk+T~sl (k+2)nn~nq+nn~?+T~sp nn~?+T~sp 2nn~qn~ n(2n~q+?)n~+Tct 2Tpk+T~sl 4nn~q2n~+Tct
Tab.1  Comparison of computational overhead
1 J, Li Y, Zhang J, Ning X, Huang S P, Poh D Wang . Attribute based encryption with privacy protection and accountability for CloudIoT. IEEE Transactions on Cloud Computing, 2022, 10( 2): 762–773
2 Y, Miao X, Liu K K R, Choo R H, Deng J, Li H, Li J Ma . Privacy-preserving attribute-based keyword search in shared multi-owner setting. IEEE Transactions on Dependable and Secure Computing, 2021, 18( 3): 1080–1094
3 U S, Varri S, Kasani S K, Pasupuleti K V Kadambari . FELT-ABKS: fog-enabled lightweight traceable attribute-based keyword search over encrypted data. IEEE Internet of Things Journal, 2022, 9( 10): 7559–7571
4 Y, Yang J, Sun Z, Liu Y Qiao . Practical revocable and multi-authority CP-ABE scheme from RLWE for Cloud Computing. Journal of Information Security and Applications, 2022, 65: 103108
5 J, Li C, Ma K Zhang . A novel lattice-based CP-ABPRE scheme for cloud sharing. Symmetry, 2019, 11( 10): 1262
6 J, Li M, Ma J, Zhang S, Fan S Li . Attribute-based keyword search from lattices. In: Proceedings of the 15th International Conference on Information Security and Cryptology. 2020, 66–85
7 P, Wang B, Chen T, Xiang Z Wang . Lattice-based public key searchable encryption with fine-grained access control for edge computing. Future Generation Computer Systems, 2022, 127: 373–383
8 F, Luo S, Al-Kuwari F, Wang K Chen . Attribute-based proxy re-encryption from standard lattices. Theoretical Computer Science, 2021, 865: 52–62
[1] FCS-23128-OF-YY_suppl_1 Download
[2] FCS-23128-OF-YY_suppl_2 Download
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed