Efficient Verifiable Public Key Encryption with Keyword Search Based on KP-ABE

被引:38
作者
Liu, Pengliang [1 ]
Wang, Jianfeng [2 ]
Ma, Hua [1 ]
Nie, Haixin [1 ]
机构
[1] Xidian Univ, Sch Math & Stat, Xian, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Network ISN, Xian, Peoples R China
来源
2014 NINTH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA) | 2014年
关键词
Encryption with keyword search; Public key; Verify; Key policy attribute-based encryption; Keyword search; SCHEME;
D O I
10.1109/BWCCA.2014.119
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As a very attractive cryptographic primitive, the public key encryption with keyword search (PEKS) enables users to search on encrypted data, and hence is applicable to the setting of cloud computing. Although the existing PEKS schems can allow a user to search encrypted data confidentially, most of them failed to verify the searched result and the system did not specify the users who can make a request for encrypted data files stored on the cloud server. Recently, a novel cryptographic solution, called verifiable attribute-based keyword search (VABKS) was proposed by Zheng. It allows a data user, whose credentials satisfy the data owner's access control policy, to search the encrypted data file and verify the searched result. However, the scheme exists an unrealistic assumption of secure channel as in the Boneh's scheme. In this paper, we propose a new scheme which "removes secure channel" and construct a novel method for verifying the searched result from the cloud server based on key policy attribute-based keyword search(KP-ABKS) of VABKS. It can be effectively to verify the correctness and integrity of the data file which the data user desired for. By our simulation for the verification, it proves that our scheme is more practical than VABKS.
引用
收藏
页码:584 / 589
页数:6
相关论文
共 16 条
[1]  
[Anonymous], 2013, INT J NETWORK SECURI
[2]  
[Anonymous], 2012, J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl.
[3]  
Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
[4]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[5]   Hierarchical identity based encryption with constant size ciphertext [J].
Boneh, D ;
Boyen, X ;
Goh, EJ .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :440-456
[6]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[7]  
Chai Q., 2012, P ICC
[8]  
Genkin D., 2013, IACR Cryptology ePrint Archive, P857
[9]  
Goyal V., 2006, ACM CCS 2006, P89, DOI DOI 10.1145/1180405.1180418
[10]   Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions [J].
He, Daojing ;
Chen, Chun ;
Chan, Sammy ;
Bu, Jiajun .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (01) :48-53