Thursday, November 13, 2025
Science
No Result
View All Result
  • Login
  • HOME
  • SCIENCE NEWS
  • CONTACT US
  • HOME
  • SCIENCE NEWS
  • CONTACT US
No Result
View All Result
Scienmag
No Result
View All Result
Home Science News Technology and Engineering

Offline/online attribute-based searchable encryption scheme from ideal lattices

July 3, 2024
in Technology and Engineering
Reading Time: 3 mins read
0
The system of ABSEIL scheme
66
SHARES
596
VIEWS
Share on FacebookShare on Twitter
ADVERTISEMENT

The security of traditional attribute-based searchable encryption schemes relies on traditional number-theoretic assumptions, and thus they are not able to resist the threat of quantum algorithms. Meanwhile, existing lattice-based searchable encryption schemes have two main problems: one is the low efficiency of the execution of encryption, key generation and search algorithms. The second is the large space required for storing search trapdoors.

The system of ABSEIL scheme

Credit: Yang YANG, Guoyin ZHANG, Sizhao LI, Zechao LIU

The security of traditional attribute-based searchable encryption schemes relies on traditional number-theoretic assumptions, and thus they are not able to resist the threat of quantum algorithms. Meanwhile, existing lattice-based searchable encryption schemes have two main problems: one is the low efficiency of the execution of encryption, key generation and search algorithms. The second is the large space required for storing search trapdoors.

To solve the problems, a research team led by Yang YANG published their new research on 15 June 2024 in Frontiers of Computer Science co-published by Higher Education Press and Springer Nature.

The team proposes an offline/online attribute-based searchable encryption scheme from ideal lattices (ABSEIL). Benefiting from the keyword search function of ABSEIL scheme, authorized consumers can efficiently retrieve the desired data with a lightweight search trapdoor. Through online/offline technology, complex arithmetic operations in encryption and key generation algorithms are pre-executed in the offline phase, and the online phase only involves a few arithmetic operations. Besides, ABSEIL scheme incorporates the proxy re-encryption mechanism for completing end-to-end data sharing.

ABSEIL involves five types of participants: central authority (CA), data owner (DO), data consumer (DC), proxy server (PS) and cloud server (CS).

CA plays the role of initializing the system. Then it generates the master public key () for all entities together with the master secret key for itself. Also, it grants secret key to all data consumers (See ① and ②). DO encrypts data, and uploads the ciphertext  to CS (See ③). Before decrypting , DC requests a searchable trapdoor  from CA and forwards it to CS to search for matched . Moreover, DC can initiate a request to CA to produce a re-encryption key . Then CA transfers  to PS. In this setting, DC delegates the decryption right to the  through the authorization of CA (See ④ and ⑤). PS utilizes  to produce a fresh re-encrypted ciphertext , then transfers  to CS (See ⑥). CS supplies storage services. Furthermore, CS utilizes  to search for matched ciphertext  for DC (See ⑦). 

DOI: 10.1007/s11704-023-3128-3



Journal

Frontiers of Computer Science

DOI

10.1007/s11704-023-3128-3

Method of Research

Experimental study

Subject of Research

Not applicable

Article Title

Offline/online attribute-based searchable encryption scheme from ideal lattices for IoT

Article Publication Date

15-Jun-2024

Share26Tweet17
Previous Post

Theoretical design and experimental verification of high-entropy carbide ablative resistant coating

Next Post

Scientists pinpoint strategies that could stop cats from scratching your furniture

Related Posts

Technology and Engineering

Continuous Wireless Temperature Monitoring in Children Using TempTraq®

November 13, 2025
blank
Technology and Engineering

Cloud-Based Multi-Mode System for Steel Defect Detection

November 13, 2025
blank
Medicine

Rock Strength Drives Soil Formation Rates

November 13, 2025
blank
Technology and Engineering

Neuromorphic Hardware Tackles Sparse Finite Element Challenges

November 13, 2025
blank
Technology and Engineering

Managing Cyber-Physical-Human Systems in Connectivity Challenges

November 13, 2025
blank
Medicine

Multifaceted Assembly Drives Florigen Complex Formation

November 13, 2025
Next Post
Scientists pinpoint strategies that could stop cats from scratching your furniture

Scientists pinpoint strategies that could stop cats from scratching your furniture

  • Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    27581 shares
    Share 11029 Tweet 6893
  • University of Seville Breaks 120-Year-Old Mystery, Revises a Key Einstein Concept

    987 shares
    Share 395 Tweet 247
  • Bee body mass, pathogens and local climate influence heat tolerance

    651 shares
    Share 260 Tweet 163
  • Researchers record first-ever images and data of a shark experiencing a boat strike

    520 shares
    Share 208 Tweet 130
  • Groundbreaking Clinical Trial Reveals Lubiprostone Enhances Kidney Function

    488 shares
    Share 195 Tweet 122
Science

Embark on a thrilling journey of discovery with Scienmag.com—your ultimate source for cutting-edge breakthroughs. Immerse yourself in a world where curiosity knows no limits and tomorrow’s possibilities become today’s reality!

RECENT NEWS

  • Continuous Wireless Temperature Monitoring in Children Using TempTraq®
  • Machine Learning Estimates Streamflow for Bartın Dam
  • Unraveling Antenatal Diagnosis of Caecal Volvulus
  • Assessing Medical Research Impact: Fuzzy Delphi Insights

Categories

  • Agriculture
  • Anthropology
  • Archaeology
  • Athmospheric
  • Biology
  • Blog
  • Bussines
  • Cancer
  • Chemistry
  • Climate
  • Earth Science
  • Marine
  • Mathematics
  • Medicine
  • Pediatry
  • Policy
  • Psychology & Psychiatry
  • Science Education
  • Social Science
  • Space
  • Technology and Engineering

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 5,190 other subscribers

© 2025 Scienmag - Science Magazine

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • HOME
  • SCIENCE NEWS
  • CONTACT US

© 2025 Scienmag - Science Magazine

Discover more from Science

Subscribe now to keep reading and get access to the full archive.

Continue reading