Novel Constructions for Ciphertext-Policy Attribute-Based Searchable Encryption

被引:4
作者
Brigitthe Hinojosa-Cabello, Melissa [1 ]
Morales-Sandoval, Miguel [1 ]
Marin-Castro, Heidy M. [2 ]
机构
[1] CINVESTAV, Unidad Tamaulipas, Cd Victoria 87130, Tamps, Mexico
[2] Univ Autonoma Tamaulipas, Conacyt, Cd Victoria 87000, Tamps, Mexico
来源
2022 IEEE MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE (ENC) | 2022年
关键词
Searchable encryption; Attribute-based searchable encryption; Attribute-based encryption; Asymmetric pairings; Access control; Confidentiality; Cloud storage; DIFFIE-HELLMAN;
D O I
10.1109/ENC56672.2022.9882941
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
More often, cloud services are being used for outsourcing data storage. Nonetheless, as storage providers are untrustworthy, two major security concerns for data owners are confidentiality and access control. A naive solution to achieve these security goals is to encrypt before outsourcing the data to the cloud. However, such approach entails a major problem for data consumers: searching over unintelligible data becomes quite difficult. In this context, Searchable Encryption (SE) is a powerful cryptographic technique that lets data owners store encrypted data on untrusted external servers while keeping the ability to perform searching and retrieval tasks from the encrypted format. In this paper, we present two novel constructions for searching over encrypted data on the basis of Attribute-Based Searchable Encryption (ABSE). Our constructions are implemented over asymmetric pairings (Type-III), enabling SE deployments for security levels higher than the common and obsolete 80-bit security found in the literature. The proposed constructions consider the two most common realizations of Attribute-Based Encryption (ABE) for the access structure: tree- and matrix-based. The experimental validation and evaluation over the LISA benchmark revealed the suitability of ABSE in practical applications, its correctness, and efficacy.
引用
收藏
页数:8
相关论文
共 25 条
  • [1] Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes
    Akinyele, Joseph A.
    Garman, Christina
    Hohenberger, Susan
    [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1370 - 1381
  • [2] Alston A, 2017, Arxiv, DOI arXiv:1705.06002
  • [3] Bao F, 2003, LECT NOTES COMPUT SC, V2836, P301
  • [4] Barker E., 2020, Tech. Rep. SP 800-57, DOI 10.6028/NIST.SP.800-57pt1r5
  • [5] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [6] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [7] Boneh D, 2012, LECT NOTES COMPUT SC, V7658, P1, DOI 10.1007/978-3-642-34961-4_1
  • [8] Cisco Networking Academy, 2016, CCNA R S 6 0 BRIDGIN
  • [9] Guo W., 2018, EFFICIENT ATTRIBUTE
  • [10] Separating decision Diffie-Hellman from computational Diffie-Hellman in cryptographic groups
    Joux, A
    Nguyen, K
    [J]. JOURNAL OF CRYPTOLOGY, 2003, 16 (04) : 239 - 247