STR-ABKS: Server-Aided Traceable and Revocable Attribute-Based Encryption With Keyword Search

被引:5
作者
Meng, Fei [1 ,2 ]
Cheng, Leixiao [3 ]
机构
[1] Tsinghua Univ, Yanqi Lake Beijing Inst Math Sci & Applicat, Beijing 100084, Peoples R China
[2] Tsinghua Univ, Yau Math Sci Ctr, Beijing 100084, Peoples R China
[3] Shandong Univ, Sch Math, Jinan 250100, Peoples R China
关键词
Encryption; Cloud computing; Keyword search; Internet of Things; Access control; Servers; Public key; Attribute-based encryption with keyword search (ABKS); access control; chosen keyword attack (CKA); revocability; search functionality; traceability; ASSISTED INDUSTRIAL INTERNET; CLOUD DATA; POLICY; SCHEME; ABE;
D O I
10.1109/JIOT.2023.3335624
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption with keyword search (ABKS) is a powerful cryptographic primitive achieving search functionality and access control for the encrypted data outsourced to the cloud. Traceability and revocability are two significant requirements for ABKS system that enable tracing the owner of a maliciously leaked secret key and revoking the key. Recently, Varri et al. proposed two ABKS schemes with traceability and revocability in the IEEE Internet of Things Journal and Journal of Systems Architecture. However, we present a cryptanalysis demonstrating that neither of these two schemes is secure against the chosen keyword attack (CKA), which is a fundamental security requirement for ABKS system. In this article, we put forward a notion called server-aided traceable and revocable ABKS (STR-ABKS) and present a concrete STR-ABKS construction. In addition to traceability, revocability and CKA resistance, our STR-ABKS construction enjoys several notable features: 1) Large Universe Attributes: This property enlarges the practical applications by supporting a flexible number of attributes; 2) Constant User Secret Key: The user's secret key is not related to attributes as in other ABKS schemes; 3) Fast Tracing: Tracing a constant user secret key only requires two pairing operations; and 4) Constant Trapdoor: The size of the trapdoor inherits the size of the user secret key used to generate it. Overall, our construction offers both security, functionality and practical efficiency.
引用
收藏
页码:12649 / 12659
页数:11
相关论文
共 50 条
  • [1] Server-aided revocable attribute-based encryption for cloud computing services
    Cui, Hui
    Yuen, Tsz Hon
    Deng, Robert H.
    Wang, Guilin
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (14)
  • [2] TSR-ABE: Traceable and Server-Aided Revocable Ciphertext-Policy Attribute-Based Encryption Under Static Assumptions
    Meng, Fei
    Cheng, Leixiao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 955 - 967
  • [3] FELT-ABKS: Fog-Enabled Lightweight Traceable Attribute-Based Keyword Search Over Encrypted Data
    Varri, Uma Sankararao
    Kasani, Sreekanth
    Pasupuleti, Syam Kumar
    Kadambari, K., V
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (10) : 7559 - 7571
  • [4] ABKS-PBM: Attribute-Based Keyword Search With Partial Bilinear Map
    Khan, Shawal
    Khan, Shahzad
    Zareei, Mahdi
    Alanazi, Faisal
    Kama, Nazri
    Alam, Masoom
    Anjum, Adeel
    IEEE ACCESS, 2021, 9 : 46313 - 46324
  • [5] A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection
    Han, Dezhi
    Pan, Nannan
    Li, Kuan-Ching
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 316 - 327
  • [6] Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation
    Yu, Gang
    Ma, Xiaoxiao
    Cao, Zhenfu
    Zhu, Weihua
    Zeng, Guang
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 172 - 179
  • [7] Designated server-aided revocable identity-based keyword search on lattice
    Ying Guo
    Fei Meng
    Leixiao Cheng
    Xiaolei Dong
    Zhenfu Cao
    EURASIP Journal on Wireless Communications and Networking, 2021
  • [8] Key-Policy Attribute-Based Encryption With Keyword Search in Virtualized Environments
    Yu, Yong
    Shi, Junbin
    Li, Huilin
    Li, Yannan
    Du, Xiaojiang
    Guizani, Mohsen
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2020, 38 (06) : 1242 - 1251
  • [9] Designated server-aided revocable identity-based keyword search on lattice
    Guo, Ying
    Meng, Fei
    Cheng, Leixiao
    Dong, Xiaolei
    Cao, Zhenfu
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
  • [10] Server-Aided Public Key Encryption With Keyword Search
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Guo, Fuchun
    Huang, Xinyi
    Wang, Xiaofen
    Wang, Yongjun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) : 2833 - 2842