Offline/online attribute-based searchable encryption scheme from ideal lattices for IoT

Yang YANG, Guoyin ZHANG, Sizhao LI, Zechao LIU

PDF(1017 KB)
PDF(1017 KB)
Front. Comput. Sci. ›› 2024, Vol. 18 ›› Issue (3) : 183817. DOI: 10.1007/s11704-023-3128-3
Information Security
LETTER

Offline/online attribute-based searchable encryption scheme from ideal lattices for IoT

Author information +
History +

Graphical abstract

Cite this article

Download citation ▾
Yang YANG, Guoyin ZHANG, Sizhao LI, Zechao LIU. Offline/online attribute-based searchable encryption scheme from ideal lattices for IoT. Front. Comput. Sci., 2024, 18(3): 183817 https://doi.org/10.1007/s11704-023-3128-3

References

[1]
Li J, Zhang Y, Ning J, Huang X, Poh S P, Wang D . Attribute based encryption with privacy protection and accountability for CloudIoT. IEEE Transactions on Cloud Computing, 2022, 10( 2): 762–773
[2]
Miao Y, Liu X, Choo K K R, Deng R H, Li J, Li H, Ma J . Privacy-preserving attribute-based keyword search in shared multi-owner setting. IEEE Transactions on Dependable and Secure Computing, 2021, 18( 3): 1080–1094
[3]
Varri U S, Kasani S, Pasupuleti S K, Kadambari K V . FELT-ABKS: fog-enabled lightweight traceable attribute-based keyword search over encrypted data. IEEE Internet of Things Journal, 2022, 9( 10): 7559–7571
[4]
Yang Y, Sun J, Liu Z, Qiao Y . Practical revocable and multi-authority CP-ABE scheme from RLWE for Cloud Computing. Journal of Information Security and Applications, 2022, 65: 103108
[5]
Li J, Ma C, Zhang K . A novel lattice-based CP-ABPRE scheme for cloud sharing. Symmetry, 2019, 11( 10): 1262
[6]
Li J, Ma M, Zhang J, Fan S, Li S. Attribute-based keyword search from lattices. In: Proceedings of the 15th International Conference on Information Security and Cryptology. 2020, 66–85
[7]
Wang P, Chen B, Xiang T, Wang Z . Lattice-based public key searchable encryption with fine-grained access control for edge computing. Future Generation Computer Systems, 2022, 127: 373–383
[8]
Luo F, Al-Kuwari S, Wang F, Chen K . Attribute-based proxy re-encryption from standard lattices. Theoretical Computer Science, 2021, 865: 52–62

Acknowledgements

This work was supported by the National Key R&D Program of China (No. 2022YFB4400703), the Special Project for Industrial Foundation Reconstruction and High Quality Development of Manufacturing Industry (TC220A04X-1), and the Basic Research Program (No. JCKY2020604C011).

Competing interests

The authors declare that they have no competing interests or financial conflicts to disclose.

Supporting information

The supporting information is available online at journal.hep.com.cn and link.springer.com.

RIGHTS & PERMISSIONS

2024 Higher Education Press
AI Summary AI Mindmap
PDF(1017 KB)

Accesses

Citations

Detail

Sections
Recommended

/