{"title":"一种基于格子的无线传感器网络公钥加密与密钥搜索方案","authors":"Fugeng Zeng","doi":"10.1109/CIIS.2017.27","DOIUrl":null,"url":null,"abstract":"With the rapid progress in technology, wireless sensor networks (WSNs) have attracted people's interest in the research community. However, due to the limited node communication and computing power, the traditional public key encryption algorithm can't be effectively applied. And as step into post-quantum era, pairing related assumption is fragile. Lattice is an ideal choice for building secure encryption scheme against quantum attack. Based on this, we propose a public encryption with key search scheme from lattice for wireless sensor networks. Compared with the existing public searchable encryption algorithm, the proposed encryption algorithm requires less computation time and achieves more security level.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A Lattice-Based Public Encryption with Key Search Scheme for Wireless Sensor Networks\",\"authors\":\"Fugeng Zeng\",\"doi\":\"10.1109/CIIS.2017.27\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the rapid progress in technology, wireless sensor networks (WSNs) have attracted people's interest in the research community. However, due to the limited node communication and computing power, the traditional public key encryption algorithm can't be effectively applied. And as step into post-quantum era, pairing related assumption is fragile. Lattice is an ideal choice for building secure encryption scheme against quantum attack. Based on this, we propose a public encryption with key search scheme from lattice for wireless sensor networks. Compared with the existing public searchable encryption algorithm, the proposed encryption algorithm requires less computation time and achieves more security level.\",\"PeriodicalId\":254342,\"journal\":{\"name\":\"2017 International Conference on Computing Intelligence and Information System (CIIS)\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Computing Intelligence and Information System (CIIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIIS.2017.27\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Computing Intelligence and Information System (CIIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIIS.2017.27","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Lattice-Based Public Encryption with Key Search Scheme for Wireless Sensor Networks
With the rapid progress in technology, wireless sensor networks (WSNs) have attracted people's interest in the research community. However, due to the limited node communication and computing power, the traditional public key encryption algorithm can't be effectively applied. And as step into post-quantum era, pairing related assumption is fragile. Lattice is an ideal choice for building secure encryption scheme against quantum attack. Based on this, we propose a public encryption with key search scheme from lattice for wireless sensor networks. Compared with the existing public searchable encryption algorithm, the proposed encryption algorithm requires less computation time and achieves more security level.