2020
DOI: 10.1109/tdsc.2018.2867462
|View full text |Cite
|
Sign up to set email alerts
|

Lattice-Based Public Key Searchable Encryption from Experimental Perspectives

Abstract: Public key Encryption with Keyword Search (PEKS) aims in mitigating the impacts of data privacy versus utilization dilemma by allowing any user in the system to send encrypted files to the server to be searched by a receiver. The receiver can retrieve the encrypted files containing specific keywords by providing the corresponding trapdoors of these keywords to the server. Despite their merits, the existing PEKS schemes introduce a high end-to-end delay that may hinder their adoption in practice. Moreover, they… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0
1

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 66 publications
(27 citation statements)
references
References 56 publications
0
17
0
1
Order By: Relevance
“…To date, no lightweight operation can replace it while keeping the same algebraic features. In addition, very few PEKS schemes are constructed without bilinear mapping, such as the PEKS schemes based on quadratic residuosity or lattice algebra [16]- [19]. However, all of them cannot achieve fast searching performance over ciphertexts, i.e., the sublinear search complexity, and many random numbers are chosen in their encryption algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…To date, no lightweight operation can replace it while keeping the same algebraic features. In addition, very few PEKS schemes are constructed without bilinear mapping, such as the PEKS schemes based on quadratic residuosity or lattice algebra [16]- [19]. However, all of them cannot achieve fast searching performance over ciphertexts, i.e., the sublinear search complexity, and many random numbers are chosen in their encryption algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…There are many directions on the research of PEKS. For example, some schemes [24][25][26] are constructed to possess resistance against for a quantum attack by founding on lattice-based cryptography. Other direction is to prohibit reusing a token (namely, a trapdoor), Sharma et al proposed a scheme which can evaluate the freshness of the token in [27].…”
Section: Related Searchable Techniquesmentioning
confidence: 99%
“…Behnia et al [24] proposed two PEKS schemes from a view of the experiment, where one scheme is based on NTRU, the other is based on LWE problem. In this work, they implemented NTRU-PEKS that is 18 times lower end-to-end delay than the most efficient pairing-based scheme.…”
Section: B Related Workmentioning
confidence: 99%
“…So searchable encryption scheme that can resist quantum computing attack is an urgent issue. Since then, some lattice-based searchable encryption schemes [21]- [24] were proposed.…”
Section: Introductionmentioning
confidence: 99%