Open Access
ARTICLE
Verifiable Identity-Based Encryption with Keyword Search for IoT from Lattice
1 School of Science, Nanjing University of Science and Technology, Nanjing, 210094, China
2 College of Data Science, Taiyuan University of Technology, Taiyuan, 030000, China
3 Faculty of Information Technology, Monash University, Clayton, 3800, Australia
* Corresponding Author: Chungen Xu. Email:
Computers, Materials & Continua 2021, 68(2), 2299-2314. https://doi.org/10.32604/cmc.2021.017216
Received 19 January 2021; Accepted 24 February 2021; Issue published 13 April 2021
Abstract
Internet of Things (IoT), which provides the solution of connecting things and devices, has increasingly developed as vital tools to realize intelligent life. Generally, source-limited IoT sensors outsource their data to the cloud, which arises the concerns that the transmission of IoT data is happening without appropriate consideration of the profound security challenges involved. Though encryption technology can guarantee the confidentiality of private data, it hinders the usability of data. Searchable encryption (SE) has been proposed to achieve secure data sharing and searching. However, most of existing SE schemes are designed under conventional hardness assumptions and may be vulnerable to the adversary with quantum computers. Moreover, the untrusted cloud server may perform an unfaithful search execution. To address these problems, in this paper, we propose the first verifiable identity-based keyword search (VIBKS) scheme from lattice. In particular, a lattice-based delegation algorithm is adopted to help the data user to verify both the correctness and the integrity of the search results. Besides, in order to reduce the communication overhead, we refer to the identity-based mechanism. We conduct rigorous proof to demonstrate that the proposed VIBKS scheme is ciphertext indistinguishable secure against the semi-honest-but-curious adversary. In addition, we give the detailed computation and communication complexity of our VIBKS and conduct a series of experiments to validate its efficiency performance.Keywords
Cite This Article
Citations
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.