Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Future Generation Co...arrow_drop_down
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
Future Generation Computer Systems
Article . 2019 . Peer-reviewed
License: Elsevier TDM
Data sources: Crossref
DBLP
Article . 2023
Data sources: DBLP
versions View all 2 versions
addClaim

Witness-based searchable encryption with optimal overhead for cloud-edge computing

Authors: Yu-Chi Chen; Xin Xie 0005; Peter Shaojui Wang; Raylin Tso;

Witness-based searchable encryption with optimal overhead for cloud-edge computing

Abstract

Abstract The security and utilization of cloud storage are well-known open issues. Public key encryption with keyword search (PEKS) provides an important primitive to discuss applications in the field of cloud storage, where the receiver can use the trapdoor of the keyword to search. However, the internal attack derived by the cloud server is an inherent issue of PEKS. There are two breakthroughs, so-called authenticated PEKS (APKES) and witness-based searchable encryption (WBSE), to tackle this issue by modifying framework of PEKS. The existing schemes of APEKS and WBSE can offer security against the internal attacks, but they require the trapdoor size is proportional to c n where n is the total number of senders, and c is the constant size of the ciphertext or proportion to the security parameter. In this paper, we propose a new WBSE scheme with constant overhead as long as n is bounded. We analyze the security of our scheme based on homomorphic encryption and digital signature. Finally, we provide implementations to show the effectiveness on the cloud-edge model.

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    17
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Top 10%
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Top 10%
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Top 10%
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
17
Top 10%
Top 10%
Top 10%
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!