Offline/online attribute-based searchable encryption scheme from ideal lattices

The system of ABSEIL scheme. Credit: Yang Yang, Guoyin Zhang, Sizhao Li, Zechao Liu

The safety of conventional attribute-based searchable encryption schemes depends on conventional number-theoretic assumptions, and thus they aren’t ready to withstand the specter of quantum algorithms. Current lattice-based searchable encryption schemes have two essential issues: one is the low effectivity of the execution of encryption, key technology and search algorithms. The second is the massive area required for storing search trapdoors.

To unravel the issues, a analysis staff led by Yang Yang performed new research and revealed their findings in Frontiers of Pc Science.

The staff proposes an offline/on-line attribute-based searchable encryption scheme from very best lattices (ABSEIL). Benefiting from the key phrase search perform of ABSEIL scheme, approved customers can effectively retrieve the specified information with a light-weight search trapdoor.

Via on-line/offline expertise, complicated arithmetic operations in encryption and key technology algorithms are pre-executed within the offline part, and the net part solely includes a number of arithmetic operations. Moreover, ABSEIL scheme incorporates the proxy re-encryption mechanism for finishing end-to-end information sharing.

ABSEIL includes 5 kinds of contributors: central authority (CA), information proprietor (DO), information shopper (DC), proxy server (PS) and cloud server (CS).

CA performs the function of initializing the system. Then it generates the grasp public key for all entities along with the grasp secret key for itself. Additionally, it grants secret key to all information customers. DO encrypts information, and uploads the ciphertext to CS. Earlier than decrypting, DC requests a searchable trapdoor from CA and forwards it to CS to seek for matched.

DC can provoke a request to CA to supply a re-encryption key. Then CA transfers to PS. On this setting, DC delegates the decryption proper to the by the authorization of CA. PS makes use of to supply a contemporary re-encrypted ciphertext, then transfers to CS. CS provides storage providers. Moreover, CS makes use of to seek for matched ciphertext for DC.

Extra info:
Yang Yang et al, Offline/on-line attribute-based searchable encryption scheme from very best lattices for IoT, Frontiers of Pc Science (2024). DOI: 10.1007/s11704-023-3128-3

Offered by
Increased Education Press

Offline/on-line attribute-based searchable encryption scheme from very best lattices (2024, July 3)
retrieved 3 July 2024

This doc is topic to copyright. Other than any honest dealing for the aim of personal examine or analysis, no
half could also be reproduced with out the written permission. The content material is supplied for info functions solely.

Click Here To Join Our Telegram Channel

Source link

If in case you have any considerations or complaints concerning this text, please tell us and the article can be eliminated quickly. 

Raise A Concern

Show More

Related Articles

Back to top button