Skip to main content
Erschienen in:

01.04.2025

AAQ-PEKS: An Attribute-based Anti-Quantum Public Key Encryption Scheme with Keyword Search for E-healthcare Scenarios

verfasst von: Gang Xu, Shiyuan Xu, Yibo Cao, Ke Xiao, Yanhui Mao, Xiu-Bo Chen, Mianxiong Dong, Shui Yu

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 2/2025

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Der Artikel stellt AAQ-PEKS vor, ein neuartiges attribute-basiertes Anti-Quanten-Public-Key-Verschlüsselungssystem mit Schlüsselwortsuche, das für E-Healthcare-Szenarien entwickelt wurde. Es befasst sich mit den Herausforderungen des Schutzes elektronischer Krankenakten (EMR), die in der Cloud gespeichert sind, einschließlich ausgewählter Klartext-Angriffe (CPA) und ausgewählter Keyword-Angriffe (CKA). Das System nutzt gitterbasierte Kryptographie, um Widerstand gegen Quantencomputer-Angriffe zu gewährleisten, und integriert attributbasierte Verschlüsselung, um eine feinkörnige Zugangskontrolle zu erreichen. Die Autoren liefern eine umfassende Sicherheitsanalyse, die zeigt, dass das Schema unter der Annahme von Learning With Errors (LWE) Ununterscheidbarkeit bei ausgewählten Klartext- und Keyword-Angriffen (IND-CPA und IND-CKA) erreicht. Leistungsbewertungen zeigen, dass AAQ-PEKS in Bezug auf Recheneffizienz und Kommunikationsaufwand bestehende Systeme übertrifft, was es zu einer praktischen Lösung für sicheres EMR-Management in IoMT-Umgebungen macht.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ma H, Zhang R, Yang G, Song Z, He K, Xiao Y (2020) Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices. IEEE Trans Dependable Secur Comput 17(5):1026–1038CrossRef Ma H, Zhang R, Yang G, Song Z, He K, Xiao Y (2020) Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices. IEEE Trans Dependable Secur Comput 17(5):1026–1038CrossRef
2.
Zurück zum Zitat Liu J, Liang T, Sun R, Du X, Guizani M (2020) A privacy-preserving medical data sharing scheme based on consortium blockchain. In: 2020 IEEE Global Communications Conference (GLOBECOM). IEEE, Taipei, Taiwan, pp 1–6 Liu J, Liang T, Sun R, Du X, Guizani M (2020) A privacy-preserving medical data sharing scheme based on consortium blockchain. In: 2020 IEEE Global Communications Conference (GLOBECOM). IEEE, Taipei, Taiwan, pp 1–6
3.
Zurück zum Zitat Wei J, Chen X, Huang X, Hu X, Susilo W (2021) RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud. IEEE Trans Dependable Secur Comput 18(5):2301–2315 Wei J, Chen X, Huang X, Hu X, Susilo W (2021) RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud. IEEE Trans Dependable Secur Comput 18(5):2301–2315
4.
Zurück zum Zitat Huang Q, Yan G, Yang Y (2022) Privacy-preserving traceable attribute-based keyword search in multi-authority medical cloud. IEEE Trans Cloud Comput 11(1): 678–691 Huang Q, Yan G, Yang Y (2022) Privacy-preserving traceable attribute-based keyword search in multi-authority medical cloud. IEEE Trans Cloud Comput 11(1): 678–691
5.
Zurück zum Zitat Chen X, Xu S, Qin T, Cui Y, Gao S, Kong W (2022) AQ–ABS: Anti-quantum attribute-based signature for Emrs sharing with blockchain. In: 2022 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, Austin, TX, USA, pp 1176–1181 Chen X, Xu S, Qin T, Cui Y, Gao S, Kong W (2022) AQ–ABS: Anti-quantum attribute-based signature for Emrs sharing with blockchain. In: 2022 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, Austin, TX, USA, pp 1176–1181
6.
Zurück zum Zitat Andrew J, Isravel DP, Sagayam KM, Bhushan B, Sei Y, Eunice J (2023) Blockchain for healthcare systems: Architecture, security challenges, trends and future directions. J Netw Comput Appl 215:103633CrossRef Andrew J, Isravel DP, Sagayam KM, Bhushan B, Sei Y, Eunice J (2023) Blockchain for healthcare systems: Architecture, security challenges, trends and future directions. J Netw Comput Appl 215:103633CrossRef
7.
Zurück zum Zitat Haque RU, Hasan ASMT, Daria A, Rasool A, Chen H, Jiang Q et al (2023) A novel secure and distributed architecture for privacy-preserving healthcare system. J Netw Comput Appl 217:103696CrossRef Haque RU, Hasan ASMT, Daria A, Rasool A, Chen H, Jiang Q et al (2023) A novel secure and distributed architecture for privacy-preserving healthcare system. J Netw Comput Appl 217:103696CrossRef
8.
Zurück zum Zitat Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public Key Encryption with Keyword Search. In: Advances in Cryptology – EUROCRYPT, Interlaken, Switzerland, pp 506–522 Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public Key Encryption with Keyword Search. In: Advances in Cryptology – EUROCRYPT, Interlaken, Switzerland, pp 506–522
9.
Zurück zum Zitat Xu L, Li J, Chen X, Li W, Tang S, Wu H (2019) Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things. J Netw Comput Appl 128:11–20CrossRef Xu L, Li J, Chen X, Li W, Tang S, Wu H (2019) Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things. J Netw Comput Appl 128:11–20CrossRef
10.
Zurück zum Zitat Zhandry M (2021) Redeeming Reset Indifferentiability and Applications to Post-quantum Security," In: 27th Advances in Cryptology – ASIACRYPT, Singapore, pp 518–548 Zhandry M (2021) Redeeming Reset Indifferentiability and Applications to Post-quantum Security," In: 27th Advances in Cryptology – ASIACRYPT, Singapore, pp 518–548
11.
Zurück zum Zitat Wang H, Ning J, Huang X, Wei G, Poh GS, Liu X (2021) Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud. IEEE Trans Dependable Secur Comput 18(3):1307–1319 Wang H, Ning J, Huang X, Wei G, Poh GS, Liu X (2021) Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud. IEEE Trans Dependable Secur Comput 18(3):1307–1319
12.
Zurück zum Zitat Miao Y, Liu X, Choo K-KR, Deng RH, Li J, Li H et al (2021) Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting. IEEE Trans Dependable Secur Comput 18(3):1080–1094CrossRef Miao Y, Liu X, Choo K-KR, Deng RH, Li J, Li H et al (2021) Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting. IEEE Trans Dependable Secur Comput 18(3):1080–1094CrossRef
13.
Zurück zum Zitat Jiang P, Mu Y, Guo F, Wen Q (2016) Public key encryption with authorized keyword search. In: 2016 Australasian Conference on Information Security and Privacy (ACISP). Springer, Melbourne, VIC, Australia, pp 170–186 Jiang P, Mu Y, Guo F, Wen Q (2016) Public key encryption with authorized keyword search. In: 2016 Australasian Conference on Information Security and Privacy (ACISP). Springer, Melbourne, VIC, Australia, pp 170–186
14.
Zurück zum Zitat Chen R, Mu Y, Yang G, Guo F, Wang X (2016) Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage. IEEE Trans Inf Forensics Secur 11(4):789–798CrossRef Chen R, Mu Y, Yang G, Guo F, Wang X (2016) Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage. IEEE Trans Inf Forensics Secur 11(4):789–798CrossRef
15.
Zurück zum Zitat Chen B, Wu L, Zeadally S, He D (2022) Dual-Server Public-Key Authenticated Encryption with Keyword Search. IEEE Trans Cloud Comput 10(1):322–333CrossRef Chen B, Wu L, Zeadally S, He D (2022) Dual-Server Public-Key Authenticated Encryption with Keyword Search. IEEE Trans Cloud Comput 10(1):322–333CrossRef
16.
Zurück zum Zitat Yuan X, Wang X, Wang C, Yu C, Nutanong S (2017) Privacy-Preserving Similarity Joins Over Encrypted Data. IEEE Trans Inf Forensics Secur 12(11):2763–2775CrossRef Yuan X, Wang X, Wang C, Yu C, Nutanong S (2017) Privacy-Preserving Similarity Joins Over Encrypted Data. IEEE Trans Inf Forensics Secur 12(11):2763–2775CrossRef
17.
Zurück zum Zitat Qin B, Chen Y, Huang Q, Liu X, Zheng D (2020) Public-key authenticated encryption with keyword search revisited: Security model and constructions. Inform Sci 516:515–528MathSciNetCrossRef Qin B, Chen Y, Huang Q, Liu X, Zheng D (2020) Public-key authenticated encryption with keyword search revisited: Security model and constructions. Inform Sci 516:515–528MathSciNetCrossRef
18.
Zurück zum Zitat Song X, Dong C, Yuan D, Xu Q, Zhao M (2020) Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency. IEEE Trans Dependable Secur Comput 17(5):912–927CrossRef Song X, Dong C, Yuan D, Xu Q, Zhao M (2020) Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency. IEEE Trans Dependable Secur Comput 17(5):912–927CrossRef
19.
Zurück zum Zitat Cui J, Lu J, Zhong H, Zhang Q, Gu C, Liu L (2022) Parallel Key-Insulated Multiuser Searchable Encryption for Industrial Internet of Things. IEEE Trans Ind Informatics 18(7):4875–4883CrossRef Cui J, Lu J, Zhong H, Zhang Q, Gu C, Liu L (2022) Parallel Key-Insulated Multiuser Searchable Encryption for Industrial Internet of Things. IEEE Trans Ind Informatics 18(7):4875–4883CrossRef
20.
Zurück zum Zitat Hoang T, Yavuz AA, Guajardo J (2021) A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services. IEEE Trans Serv Comput 14(6):1675–1689CrossRef Hoang T, Yavuz AA, Guajardo J (2021) A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services. IEEE Trans Serv Comput 14(6):1675–1689CrossRef
21.
Zurück zum Zitat Xu G, Cao Y, Xu S, Liu X, Chen XB, Yu Y, Wang X (2022) A searchable encryption scheme based on lattice for log systems in blockchain. CMC- Comput Mater Contin 72(3):5429–5441 Xu G, Cao Y, Xu S, Liu X, Chen XB, Yu Y, Wang X (2022) A searchable encryption scheme based on lattice for log systems in blockchain. CMC- Comput Mater Contin 72(3):5429–5441
22.
Zurück zum Zitat Chen X, Xu S, He Y, Cui Y, He J, Gao S (2022) LFS-AS: Lightweight forward secure aggregate signature for e-health scenarios. In: 2022 IEEE International Conference on Communications (ICC). IEEE, Seoul, South Korea, pp 1176–1181 Chen X, Xu S, He Y, Cui Y, He J, Gao S (2022) LFS-AS: Lightweight forward secure aggregate signature for e-health scenarios. In: 2022 IEEE International Conference on Communications (ICC). IEEE, Seoul, South Korea, pp 1176–1181
23.
Zurück zum Zitat Zhang R, Xue R, Liu L (2018) Searchable Encryption for Healthcare Clouds: A Survey. IEEE Trans Serv Comput 11(6):978–996CrossRef Zhang R, Xue R, Liu L (2018) Searchable Encryption for Healthcare Clouds: A Survey. IEEE Trans Serv Comput 11(6):978–996CrossRef
24.
Zurück zum Zitat Xu C, Wang N, Zhu L, Sharif K, Zhang C (2019) Achieving Searchable and Privacy-Preserving Data Sharing for Cloud-Assisted E-Healthcare System. IEEE Internet Things J 6(5):8345–8356CrossRef Xu C, Wang N, Zhu L, Sharif K, Zhang C (2019) Achieving Searchable and Privacy-Preserving Data Sharing for Cloud-Assisted E-Healthcare System. IEEE Internet Things J 6(5):8345–8356CrossRef
25.
Zurück zum Zitat Bao Y, Qiu W, Cheng X (2022) Secure and Lightweight Fine-Grained Searchable Data Sharing for IoT-Oriented and Cloud-Assisted Smart Healthcare System. IEEE Internet Things J 9(4):2513–2526CrossRef Bao Y, Qiu W, Cheng X (2022) Secure and Lightweight Fine-Grained Searchable Data Sharing for IoT-Oriented and Cloud-Assisted Smart Healthcare System. IEEE Internet Things J 9(4):2513–2526CrossRef
26.
Zurück zum Zitat Xu S, Chen X, Wang C, He Y, Xiao K, Cao Y (2021) A lattice-based ring signature scheme to secure automated valet parking. In: 2021 International Conference on Wireless Algorithms, Systems, and Applications (WASA) vol. 12938. Springer, Nanjing, China, pp 70–83 Xu S, Chen X, Wang C, He Y, Xiao K, Cao Y (2021) A lattice-based ring signature scheme to secure automated valet parking. In: 2021 International Conference on Wireless Algorithms, Systems, and Applications (WASA) vol. 12938. Springer, Nanjing, China, pp 70–83
27.
Zurück zum Zitat Zhang X, Tang Y, Wang H, Xu C, Miao Y, Cheng H (2019) Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage. Inf Sci 494:183–207MathSciNetCrossRef Zhang X, Tang Y, Wang H, Xu C, Miao Y, Cheng H (2019) Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage. Inf Sci 494:183–207MathSciNetCrossRef
28.
Zurück zum Zitat Xu S, Cao Y, Chen X, Guo Y, Yang Y, Guo F, Yiu SM (2024) Post-quantum searchable encryption supporting user-authorization for outsourced data management. In: 2024 ACM International Conference on Information and Knowledge Management (CIKM). ACM, Boise, Idaho, USA, pp 2702–2711 Xu S, Cao Y, Chen X, Guo Y, Yang Y, Guo F, Yiu SM (2024) Post-quantum searchable encryption supporting user-authorization for outsourced data management. In: 2024 ACM International Conference on Information and Knowledge Management (CIKM). ACM, Boise, Idaho, USA, pp 2702–2711
29.
Zurück zum Zitat Xu S, Cao Y, Chen X, Zhao Y, Yiu SM (2023) Post-quantum public-key authenticated searchable encryption with forward security: general construction, and applications. In: 2023 International Conference on Information Security and Cryptology (Inscrypt). Springer, Hangzhou, China, pp 274–298) Xu S, Cao Y, Chen X, Zhao Y, Yiu SM (2023) Post-quantum public-key authenticated searchable encryption with forward security: general construction, and applications. In: 2023 International Conference on Information Security and Cryptology (Inscrypt). Springer, Hangzhou, China, pp 274–298)
30.
Zurück zum Zitat Cao Y, Xu S, Chen X, He Y, Jiang S (2022) A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios. Comput Netw 214:109149CrossRef Cao Y, Xu S, Chen X, He Y, Jiang S (2022) A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios. Comput Netw 214:109149CrossRef
31.
Zurück zum Zitat Xu G, Cao Y, Xu S, Liu X, Chen XB, Yu Y et al (2022) "A Searchable Encryption Scheme Based on Lattice for Log Systems in Blockchain. CMC- Comput Mater Contin 72(3):5429–5441 Xu G, Cao Y, Xu S, Liu X, Chen XB, Yu Y et al (2022) "A Searchable Encryption Scheme Based on Lattice for Log Systems in Blockchain. CMC- Comput Mater Contin 72(3):5429–5441
32.
Zurück zum Zitat Hou C, Liu F, Bai H, Ren L (2014) Public-key searchable encryption from lattices. Int J High Perform Syst Archit 5(1):25–32 Hou C, Liu F, Bai H, Ren L (2014) Public-key searchable encryption from lattices. Int J High Perform Syst Archit 5(1):25–32
33.
Zurück zum Zitat Wang P, Xiang T, Li X, Xiang H (2020) Public key encryption with conjunctive keyword search on lattice. J Inf Secur Appl 51:102433 Wang P, Xiang T, Li X, Xiang H (2020) Public key encryption with conjunctive keyword search on lattice. J Inf Secur Appl 51:102433
34.
Zurück zum Zitat Behnia R, Ozmen MO, Yavuz AA (2020) Lattice-Based Public Key Searchable Encryption from Experimental Perspectives. IEEE Trans Dependable Secur Comput 17(6):1269–1282CrossRef Behnia R, Ozmen MO, Yavuz AA (2020) Lattice-Based Public Key Searchable Encryption from Experimental Perspectives. IEEE Trans Dependable Secur Comput 17(6):1269–1282CrossRef
35.
Zurück zum Zitat Xu G, Xu S, Cao Y, Yun F, Cui Y, Yu Y et al (2022) PPSEB: A Postquantum Public-Key Searchable Encryption Scheme on Blockchain for E-Healthcare Scenarios. Secur Commun Netw 2022:3368819 Xu G, Xu S, Cao Y, Yun F, Cui Y, Yu Y et al (2022) PPSEB: A Postquantum Public-Key Searchable Encryption Scheme on Blockchain for E-Healthcare Scenarios. Secur Commun Netw 2022:3368819
36.
Zurück zum Zitat Sahai A, Waters B (2005) “Fuzzy Identity-Based Encryption,” in Advances in Cryptology – EUROCRYPT. Aarhus, Denmark 3494:457–473 Sahai A, Waters B (2005) “Fuzzy Identity-Based Encryption,” in Advances in Cryptology – EUROCRYPT. Aarhus, Denmark 3494:457–473
37.
Zurück zum Zitat Yin C, Wang H, Zhou L, Fang L (2020) Ciphertext-policy attribute-based encryption with multi-keyword search over medical cloud data. In: 2020 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, Guangzhou, China, pp 277–284 Yin C, Wang H, Zhou L, Fang L (2020) Ciphertext-policy attribute-based encryption with multi-keyword search over medical cloud data. In: 2020 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, Guangzhou, China, pp 277–284
39.
Zurück zum Zitat Zhao S, Jiang R, Bhargava B (2022) RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage. IEEE Trans Serv Comput 15(2):1026–1035CrossRef Zhao S, Jiang R, Bhargava B (2022) RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage. IEEE Trans Serv Comput 15(2):1026–1035CrossRef
40.
Zurück zum Zitat Ajtai M (1999) Generating hard instances of the short basis problem. In: 1999 Automata, Languages and Programming: 26th International Colloquium (ICALP). Springer, Prague, Czech, pp 1–9 Ajtai M (1999) Generating hard instances of the short basis problem. In: 1999 Automata, Languages and Programming: 26th International Colloquium (ICALP). Springer, Prague, Czech, pp 1–9
41.
Zurück zum Zitat Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proc. of STOC, Victoria, British Columbia, vol 14, pp 197–206 Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proc. of STOC, Victoria, British Columbia, vol 14, pp 197–206
42.
Zurück zum Zitat Cash D, Hofheinz D, Kiltz E, Peikert C (2012) Bonsai Trees, or How to Delegate a Lattice Basis. J Cryptol 25:601–639MathSciNetCrossRef Cash D, Hofheinz D, Kiltz E, Peikert C (2012) Bonsai Trees, or How to Delegate a Lattice Basis. J Cryptol 25:601–639MathSciNetCrossRef
43.
Zurück zum Zitat Agrawal S, Boneh D, Boyen X (2010) Efficient lattice (H)IBE in the standard model. In: 2010 Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Springer, Riviera, France, pp 553–572 Agrawal S, Boneh D, Boyen X (2010) Efficient lattice (H)IBE in the standard model. In: 2010 Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Springer, Riviera, France, pp 553–572
44.
Zurück zum Zitat Sultan NH, Kaaniche N, Laurent M, Barbhuiya FA (2022) Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment. IEEE Trans Cloud Comput 10(1):216–233CrossRef Sultan NH, Kaaniche N, Laurent M, Barbhuiya FA (2022) Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment. IEEE Trans Cloud Comput 10(1):216–233CrossRef
45.
Zurück zum Zitat Zeng M, Qian H, Chen J, Zhang K (2022) Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage. IEEE Trans Cloud Comput 10(1):426–438CrossRef Zeng M, Qian H, Chen J, Zhang K (2022) Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage. IEEE Trans Cloud Comput 10(1):426–438CrossRef
46.
Zurück zum Zitat Gu K, Zhang W, Li X, Jia W (2022) Self-Verifiable Attribute-Based Keyword Search Scheme for Distributed Data Storage in Fog Computing With Fast Decryption. IEEE Trans Netw Serv Manag 19(1):271–288CrossRef Gu K, Zhang W, Li X, Jia W (2022) Self-Verifiable Attribute-Based Keyword Search Scheme for Distributed Data Storage in Fog Computing With Fast Decryption. IEEE Trans Netw Serv Manag 19(1):271–288CrossRef
47.
Zurück zum Zitat Qu H, Yan Z, Lin X, Zhang Q, Sun L (2018) Certificateless public key encryption with equality test. Inf Sci 462:76–92MathSciNetCrossRef Qu H, Yan Z, Lin X, Zhang Q, Sun L (2018) Certificateless public key encryption with equality test. Inf Sci 462:76–92MathSciNetCrossRef
48.
Zurück zum Zitat Ling Y, Ma S, Huang Q, Li X, Ling Y (2020) Group public key encryption with equality test against offline message recovery attack. Inf Sci 510:16–32MathSciNetCrossRef Ling Y, Ma S, Huang Q, Li X, Ling Y (2020) Group public key encryption with equality test against offline message recovery attack. Inf Sci 510:16–32MathSciNetCrossRef
49.
Zurück zum Zitat Ma S, Mu Y, Susilo W (2018) A Generic Scheme of Plaintext-Checkable Database Encryption. Inf Sci 429:88–101MathSciNetCrossRef Ma S, Mu Y, Susilo W (2018) A Generic Scheme of Plaintext-Checkable Database Encryption. Inf Sci 429:88–101MathSciNetCrossRef
50.
Zurück zum Zitat Lee HT, Ling S, Seo JH, Wang H, Youn TY (2020) Public key encryption with equality test in the standard model,". Inf Sci 516:89–108MathSciNetCrossRef Lee HT, Ling S, Seo JH, Wang H, Youn TY (2020) Public key encryption with equality test in the standard model,". Inf Sci 516:89–108MathSciNetCrossRef
51.
Zurück zum Zitat Elhabob R, Zhao Y, Sellla I, Xiong H (2019) Public key encryption with equality test for heterogeneous systems in cloud computing. KSII Trans Internet Inf Syst 13(9):4742–4770 Elhabob R, Zhao Y, Sellla I, Xiong H (2019) Public key encryption with equality test for heterogeneous systems in cloud computing. KSII Trans Internet Inf Syst 13(9):4742–4770
52.
Zurück zum Zitat Lee HT, Ling S, Seoet JH, Wang H (2019) Public key encryption with equality test from generic assumptions in the random oracle model. Inf Sci 500:15–33MathSciNetCrossRef Lee HT, Ling S, Seoet JH, Wang H (2019) Public key encryption with equality test from generic assumptions in the random oracle model. Inf Sci 500:15–33MathSciNetCrossRef
53.
Zurück zum Zitat Lee HT, Ling S, Seo JH, Wang H (2016) Semi-generic construction of public key encryption and identity-based encryption with equality test. Inf Sci 373:419–440CrossRef Lee HT, Ling S, Seo JH, Wang H (2016) Semi-generic construction of public key encryption and identity-based encryption with equality test. Inf Sci 373:419–440CrossRef
54.
Zurück zum Zitat Zhang X, Xu C, Wang H, Zhang Y, Wang S (2021) FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things. IEEE Trans Dependable Secur Comput 18(3):1019–1032 Zhang X, Xu C, Wang H, Zhang Y, Wang S (2021) FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things. IEEE Trans Dependable Secur Comput 18(3):1019–1032
Metadaten
Titel
AAQ-PEKS: An Attribute-based Anti-Quantum Public Key Encryption Scheme with Keyword Search for E-healthcare Scenarios
verfasst von
Gang Xu
Shiyuan Xu
Yibo Cao
Ke Xiao
Yanhui Mao
Xiu-Bo Chen
Mianxiong Dong
Shui Yu
Publikationsdatum
01.04.2025
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 2/2025
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-024-01842-4