Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage

被引:7
|
作者
Wang, Shangping [1 ]
Gao, Tingting [1 ]
Zhang, Yaling [2 ]
机构
[1] Xian Univ Technol, Sch Sci, Xian, Shaanxi, Peoples R China
[2] Xian Univ Technol, Sch Comp Sci & Engn, Xian, Shaanxi, Peoples R China
来源
PLOS ONE | 2018年 / 13卷 / 11期
基金
中国国家自然科学基金;
关键词
ACCESS-CONTROL; REVOCATION;
D O I
10.1371/journal.pone.0206126
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the development of outsourcing data services, data security has become an urgent problem that needs to be solved. Attribute-based encryption is a valid solution to data security in cloud storage. There is no existing scheme that can guarantee the privacy of access structures and achieve attribute-based encryption with keyword search and attribute revocation. In this article, we propose a new searchable and revocable multi-data owner attribute-based encryption scheme with a hidden policy in cloud storage. In the new scheme, the same access policy is used in both the keyword index and message encryption. The advantage of keyword index with access policy is that as long as a user's attributes satisfy the access policy, the searched ciphertext can be correctly decrypted. This property improves the accuracy of the search results. The hidden policy is used in both the ciphertext and the keyword index to protect users' privacy. The new scheme contains attribute revocation, which is suitable for the actual situation that a user's attributes maybe changed over time. In the general bilinear group model, the security of the scheme is demonstrated, and the efficiency of the scheme is analyzed.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage
    Wang, Shangping
    Zhang, Duo
    Zhang, Yaling
    Liu, Lihua
    IEEE ACCESS, 2018, 6 : 30444 - 30457
  • [2] Multi-Keyword Searchable and Data Verifiable Attribute-Based Encryption Scheme for Cloud Storage
    Sun, Jin
    Ren, Lili
    Wang, Shangping
    Yao, Xiaomin
    IEEE ACCESS, 2019, 7 : 66655 - 66667
  • [3] Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage
    Ming, Yang
    He, Baokang
    Wang, Chenhao
    IEEE ACCESS, 2021, 9 : 42593 - 42603
  • [4] Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
    Zhang, Kejun
    Wang, Wenbin
    Xu, Shaofei
    Yu, Xinying
    Wang, Jun
    Li, Pengcheng
    Qian, Rong
    Tongxin Xuebao/Journal on Communications, 2024, 45 (09): : 244 - 257
  • [5] Efficient Revocable Attribute-Based Encryption with Hidden Policies
    Ziegler, Dominik
    Marsalek, Alexander
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1638 - 1645
  • [6] Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX
    Bakas, Alexandros
    Michalas, Antonis
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 : 472 - 486
  • [7] A traceable and revocable decentralized attribute-based encryption scheme with fully hidden access policy for cloud-based smart healthcare
    Dai, Yue
    Xue, Lulu
    Yang, Bo
    Wang, Tao
    Zhang, Kejia
    COMPUTER STANDARDS & INTERFACES, 2025, 92
  • [8] Revocable Attribute-based Encryption with Escrow-free in Cloud Storage
    Zhao Zhiyuan
    Zhu Zhiqiang
    Wang Jianhua
    Sun Lei
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (01) : 1 - 10
  • [9] Decentralized Attribute-Based Encryption and Data Sharing Scheme in Cloud Storage
    Li, Xiehua
    Wang, Yanlong
    Xu, Ming
    Cui, Yaping
    CHINA COMMUNICATIONS, 2018, 15 (02) : 138 - 152
  • [10] Multi-authority attribute-based encryption access control scheme with hidden policy and constant length ciphertext for cloud storage
    Fan Yundong
    Wu Xiaoping
    Wang Jiasheng
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 205 - 212