Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack

被引:2
作者
Shuo QIU [1 ]
Jiqiang LIU [1 ]
Yanfeng SHI [1 ]
Rui ZHANG [2 ]
机构
[1] School of Computer and Information Technology, Beijing Jiaotong University
[2] State Key Laboratory of Information Security, Institute of Information Engineering,Chinese Academy of Sciences
基金
中国国家自然科学基金;
关键词
earch; access structure; privacy; hidden policy; keyword guessing attack;
D O I
暂无
中图分类号
TP309.7 [加密与解密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Attribute-based encryption with keyword search(ABKS) enables data owners to grant their search capabilities to other users by enforcing an access control policy over the outsourced encrypted data. However,existing ABKS schemes cannot guarantee the privacy of the access structures, which may contain some sensitive private information. Furthermore, resulting from the exposure of the access structures, ABKS schemes are susceptible to an off-line keyword guessing attack if the keyword space has a polynomial size. To solve these problems, we propose a novel primitive named hidden policy ciphertext-policy attribute-based encryption with keyword search(HP-CPABKS). With our primitive, the data user is unable to search on encrypted data and learn any information about the access structure if his/her attribute credentials cannot satisfy the access control policy specified by the data owner. We present a rigorous selective security analysis of the proposed HP-CPABKS scheme, which simultaneously keeps the indistinguishability of the keywords and the access structures. Finally,the performance evaluation verifies that our proposed scheme is efficient and practical.
引用
收藏
页码:130 / 141
页数:12
相关论文
共 3 条
  • [1] Public key encryption with keyword search secure against keyword guessing attacks without random oracle[J] . Liming Fang,Willy Susilo,Chunpeng Ge,Jiandong Wang.Information Sciences . 2013
  • [2] FAST PROBABILISTIC ALGORITHMS FOR VERIFICATION OF POLYNOMIAL IDENTITIES
    SCHWARTZ, JT
    [J]. JOURNAL OF THE ACM, 1980, 27 (04) : 701 - 717
  • [3] Bounded ciphertext policy attribute based encryption .2 Goyal V,Jain A,Pandey O,et al. Automata, Languages and Programming . 2008