Xiaoling Yu1, Chungen Xu1, *, Lei Xu1, Yuntao Wang2
CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1107-1125, 2020, DOI:10.32604/cmc.2020.09680
- 10 June 2020
Abstract To save the local storage, users store the data on the cloud server who offers
convenient internet services. To guarantee the data privacy, users encrypt the data before
uploading them into the cloud server. Since encryption can reduce the data availability, public-key encryption with keyword search (PEKS) is developed to achieve the retrieval
of the encrypted data without decrypting them. However, most PEKS schemes cannot
resist quantum computing attack, because the corresponding hardness assumptions are
some number theory problems that can be solved efficiently under quantum computers.
Besides, the traditional PEKS schemes have an inherent… More >