STR-ABKS: Server-Aided Traceable and Revocable Attribute-Based Encryption With Keyword Search

被引:7
作者
Meng, Fei [1 ,2 ]
Cheng, Leixiao [3 ]
机构
[1] Tsinghua Univ, Yanqi Lake Beijing Inst Math Sci & Applicat, Beijing 100084, Peoples R China
[2] Tsinghua Univ, Yau Math Sci Ctr, Beijing 100084, Peoples R China
[3] Shandong Univ, Sch Math, Jinan 250100, Peoples R China
关键词
Encryption; Cloud computing; Keyword search; Internet of Things; Access control; Servers; Public key; Attribute-based encryption with keyword search (ABKS); access control; chosen keyword attack (CKA); revocability; search functionality; traceability; ASSISTED INDUSTRIAL INTERNET; CLOUD DATA; POLICY; SCHEME; ABE;
D O I
10.1109/JIOT.2023.3335624
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption with keyword search (ABKS) is a powerful cryptographic primitive achieving search functionality and access control for the encrypted data outsourced to the cloud. Traceability and revocability are two significant requirements for ABKS system that enable tracing the owner of a maliciously leaked secret key and revoking the key. Recently, Varri et al. proposed two ABKS schemes with traceability and revocability in the IEEE Internet of Things Journal and Journal of Systems Architecture. However, we present a cryptanalysis demonstrating that neither of these two schemes is secure against the chosen keyword attack (CKA), which is a fundamental security requirement for ABKS system. In this article, we put forward a notion called server-aided traceable and revocable ABKS (STR-ABKS) and present a concrete STR-ABKS construction. In addition to traceability, revocability and CKA resistance, our STR-ABKS construction enjoys several notable features: 1) Large Universe Attributes: This property enlarges the practical applications by supporting a flexible number of attributes; 2) Constant User Secret Key: The user's secret key is not related to attributes as in other ABKS schemes; 3) Fast Tracing: Tracing a constant user secret key only requires two pairing operations; and 4) Constant Trapdoor: The size of the trapdoor inherits the size of the user secret key used to generate it. Overall, our construction offers both security, functionality and practical efficiency.
引用
收藏
页码:12649 / 12659
页数:11
相关论文
共 53 条
[41]   Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud [J].
Sun, Wenhai ;
Yu, Shucheng ;
Lou, Wenjing ;
Hou, Y. Thomas ;
Li, Hui .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (04) :1187-1198
[42]   Traceable and revocable multi-authority attribute-based keyword search for cloud storage [J].
Varri, Uma Sankararao ;
Pasupuleti, Syam Kumar ;
Kadambari, K., V .
JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 132
[43]   FELT-ABKS: Fog-Enabled Lightweight Traceable Attribute-Based Keyword Search Over Encrypted Data [J].
Varri, Uma Sankararao ;
Kasani, Sreekanth ;
Pasupuleti, Syam Kumar ;
Kadambari, K., V .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (10) :7559-7571
[44]  
Wang Jingwei, 2018, Revised Selected Papers, V14, P490
[45]   AESM2 Attribute-Based Encrypted Search for Multi-Owner and Multi-User Distributed Systems [J].
Wang, Mingyue ;
Miao, Yinbin ;
Guo, Yu ;
Huang, Hejiao ;
Wang, Cong ;
Jia, Xiaohua .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2023, 34 (01) :92-107
[46]   Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization [J].
Waters, Brent .
PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 :53-70
[47]   An Attribute-Based Keyword Search Scheme for Multiple Data Owners in Cloud-Assisted Industrial Internet of Things [J].
Yin, Hui ;
Li, Yangfan ;
Deng, Hua ;
Zhang, Wei ;
Qin, Zheng ;
Li, Keqin .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (04) :5763-5773
[48]   An Efficient Revocable and Searchable MA-ABE Scheme With Blockchain Assistance for C-IoT [J].
Yu, Jiguo ;
Liu, Suhui ;
Xu, Minghui ;
Guo, Hechuan ;
Zhong, Fangtian ;
Cheng, Wei .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (03) :2754-2766
[49]   Key-Policy Attribute-Based Encryption With Keyword Search in Virtualized Environments [J].
Yu, Yong ;
Shi, Junbin ;
Li, Huilin ;
Li, Yannan ;
Du, Xiaojiang ;
Guizani, Mohsen .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2020, 38 (06) :1242-1251
[50]   Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage [J].
Zhang, Kai ;
Jiang, Zhe ;
Ning, Jianting ;
Huang, Xinyi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 :1771-1784