Verifiable identity-based encryption with keyword search for IoT from lattice

Lin Mei, Chungen Xu*, Lei Xu, Xiaoling Yu, Cong Zuo

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

10 Citations (Scopus)

Abstract

Internet of Things (IoT), which provides the solution of connecting things and devices, has increasingly developed as vital tools to realize intelligent life. Generally, source-limited IoT sensors outsource their data to the cloud, which arises the concerns that the transmission of IoT data is happening without appropriate consideration of the profound security challenges involved. Though encryption technology can guarantee the confidentiality of private data, it hinders the usability of data. Searchable encryption (SE) has been proposed to achieve secure data sharing and searching. However, most of existing SE schemes are designed under conventional hardness assumptions and may be vulnerable to the adversary with quantum computers. Moreover, the untrusted cloud server may perform an unfaithful search execution. To address these problems, in this paper, we propose the first verifiable identity-based keyword search (VIBKS) scheme from lattice. In particular, a lattice-based delegation algorithm is adopted to help the data user to verify both the correctness and the integrity of the search results. Besides, in order to reduce the communication overhead, we refer to the identity-based mechanism. We conduct rigorous proof to demonstrate that the proposed VIBKS scheme is ciphertext indistinguishable secure against the semi-honest-but-curious adversary. In addition, we give the detailed computation and communication complexity of our VIBKS and conduct a series of experiments to validate its efficiency performance.

Original languageEnglish
Pages (from-to)2299-2314
Number of pages16
JournalComputers, Materials and Continua
Volume68
Issue number2
DOIs
Publication statusPublished - 13 Apr 2021
Externally publishedYes

Keywords

  • Internet of Things
  • Lattice
  • Searchable encryption
  • Verifiable

Fingerprint

Dive into the research topics of 'Verifiable identity-based encryption with keyword search for IoT from lattice'. Together they form a unique fingerprint.

Cite this