STR-ABKS: Server-Aided Traceable and Revocable Attribute-Based Encryption With Keyword Search

被引:7
作者
Meng, Fei [1 ,2 ]
Cheng, Leixiao [3 ]
机构
[1] Tsinghua Univ, Yanqi Lake Beijing Inst Math Sci & Applicat, Beijing 100084, Peoples R China
[2] Tsinghua Univ, Yau Math Sci Ctr, Beijing 100084, Peoples R China
[3] Shandong Univ, Sch Math, Jinan 250100, Peoples R China
关键词
Encryption; Cloud computing; Keyword search; Internet of Things; Access control; Servers; Public key; Attribute-based encryption with keyword search (ABKS); access control; chosen keyword attack (CKA); revocability; search functionality; traceability; ASSISTED INDUSTRIAL INTERNET; CLOUD DATA; POLICY; SCHEME; ABE;
D O I
10.1109/JIOT.2023.3335624
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption with keyword search (ABKS) is a powerful cryptographic primitive achieving search functionality and access control for the encrypted data outsourced to the cloud. Traceability and revocability are two significant requirements for ABKS system that enable tracing the owner of a maliciously leaked secret key and revoking the key. Recently, Varri et al. proposed two ABKS schemes with traceability and revocability in the IEEE Internet of Things Journal and Journal of Systems Architecture. However, we present a cryptanalysis demonstrating that neither of these two schemes is secure against the chosen keyword attack (CKA), which is a fundamental security requirement for ABKS system. In this article, we put forward a notion called server-aided traceable and revocable ABKS (STR-ABKS) and present a concrete STR-ABKS construction. In addition to traceability, revocability and CKA resistance, our STR-ABKS construction enjoys several notable features: 1) Large Universe Attributes: This property enlarges the practical applications by supporting a flexible number of attributes; 2) Constant User Secret Key: The user's secret key is not related to attributes as in other ABKS schemes; 3) Fast Tracing: Tracing a constant user secret key only requires two pairing operations; and 4) Constant Trapdoor: The size of the trapdoor inherits the size of the user secret key used to generate it. Overall, our construction offers both security, functionality and practical efficiency.
引用
收藏
页码:12649 / 12659
页数:11
相关论文
共 53 条
[1]   Secure and Lightweight Fine-Grained Searchable Data Sharing for IoT-Oriented and Cloud-Assisted Smart Healthcare System [J].
Bao, Yangyang ;
Qiu, Weidong ;
Cheng, Xiaochun .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) :2513-2526
[2]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[3]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[4]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
[5]   Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing [J].
Chen, Yang ;
Li, Wenmin ;
Gao, Fei ;
Wen, Qiaoyan ;
Zhang, Hua ;
Wang, Huawei .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (02) :724-735
[6]   Server-Aided Revocable Attribute-Based Encryption [J].
Cui, Hui ;
Deng, Robert H. ;
Li, Yingjiu ;
Qin, Baodong .
COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 :570-587
[7]   OOABKS: Online/offline attribute-based encryption for keyword search in mobile cloud [J].
Cui, Jie ;
Zhou, Han ;
Xu, Yan ;
Zhong, Hong .
INFORMATION SCIENCES, 2019, 489 :63-77
[8]   AKSER: Attribute-based keyword search with efficient revocation in cloud computing [J].
Cui, Jie ;
Zhou, Han ;
Zhong, Hong ;
Xu, Yan .
INFORMATION SCIENCES, 2018, 423 :343-352
[9]  
Goyal V., 2006, P 13 ACM C COMPUTER, V2006, P309, DOI DOI 10.1145/1180405.1180418
[10]   Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data [J].
He, Kai ;
Guo, Jun ;
Weng, Jian ;
Weng, Jiasi ;
Liu, Joseph K. ;
Yi, Xun .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) :1207-1217