Outsourcing Attribute-Based Encryption with Multi-Keywords and Similarity Ranking Search

被引:0
|
作者
Wang, Dan [1 ]
Cao, Zhenfu [1 ]
Dong, Xiaolei [1 ]
机构
[1] East China Normal Univ, Sch Comp Sci & Software Engn, Shanghai, Peoples R China
来源
2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC) | 2016年
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金; 上海市自然科学基金;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing popularity of cloud computing, a huge amount of documents are stored on the cloud for reduced management cost and ease of access. Although data encryption offers help in some ways, it leaves other privacy concerns behind when users want to share documents with others. Otherwise, the users often share documents in the ABE settings in order to support broadcasting, error-tolerace, etc, however, the Attribute Athority will bear mounts of computations. In this paper, we combine the secure outsourced ABE systems with the keywords search while supporting multi-keyword search and search result ranking, which let the data owner securely uploads the data to a third organization and the data user can search over the ciphertext with multi-keywords and decrypt it without much computation with the help of a third server.
引用
收藏
页码:28 / 32
页数:5
相关论文
共 50 条
  • [1] Multi-Keywords Searchable Attribute-Based Encryption With Verification and Attribute Revocation Over Cloud Data
    Shen, Hua
    Zhou, Jian
    Wu, Ge
    Zhang, Mingwu
    IEEE ACCESS, 2023, 11 : 139715 - 139727
  • [2] Searchable Ciphertext-Policy Attribute-Based Encryption with Multi-Keywords for Secure Cloud Storage
    Zhao, Zhiyuan
    Sun, Lei
    Li, Zuohui
    Liu, Ying
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND PATTERN RECOGNITION (ICCPR 2018), 2018, : 35 - 41
  • [3] Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation
    Gao J.
    Sun J.
    Qin J.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2160 - 2169
  • [4] Attribute-Based Encryption with Multi-Keyword Search
    Li, Runhe
    Zheng, Dong
    Zhang, Yinghui
    Su, Haonan
    Yang, Menglei
    Lang, Pengzhen
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 172 - 177
  • [5] Securely Outsourcing Attribute-Based Encryption with Checkability
    Li, Jin
    Huang, Xinyi
    Li, Jingwei
    Chen, Xiaofeng
    Xiang, Yang
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (08) : 2201 - 2210
  • [6] Searchable Public Key Encryption Supporting Semantic Multi-Keywords Search
    Zhang, Yu
    Wang, Yifan
    Li, Yin
    IEEE ACCESS, 2019, 7 : 122078 - 122090
  • [7] Attribute-Based Encryption with Personalized Search
    Zhang, Qiang
    Wang, Guojun
    Liu, Qin
    Peng, Tao
    2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 1172 - 1178
  • [8] Attribute-Based Online/Offline Encryption with Outsourcing Decryption
    Wang, Zhan-Jun
    Ma, Hai-Ying
    Wang, Jin-Hua
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (06) : 1595 - 1611
  • [9] Attribute-based encryption scheme supporting attribute revocation and decryption outsourcing
    School of Mathematics and Statistics, Xidian Univ., Xi'an
    710071, China
    Xi'an Dianzi Keji Daxue Xuebao, 6 (6-10 and 55):
  • [10] Outsourcing of Verifiable Attribute-Based Keyword Search
    Ohtake, Go
    Safavi-Naini, Reihaneh
    Zhang, Liang Feng
    SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 18 - 35