Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search

被引:101
|
作者
Wang, Haijiang [1 ]
Dong, Xiaolei [2 ]
Cao, Zhenfu [2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Keyword search; Encryption; Servers; Cloud computing; Access control; Public key; Ciphertext-policy attribute-based encryption; searchable encryption; commercial applications; multi-value-Independent; fast keyword search;
D O I
10.1109/TSC.2017.2753231
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
ABKS has drawn much attention from research and industry in recent years, an ABKS scheme is an encryption scheme that supports keyword search and access control. Attribute-Based Encryption is a public key encryption that enables users to encrypt and decrypt message based on attributes. In a typical implementation, the size of the ciphertext is proportional to the number of attributes associated with it and the decryption time is proportional to the number of attributes used during decryption. Inherit from ABE technology, the computation cost and ciphertext size in most ABKS schemes grow with the complexity of the access policy. On the other hand, we found that the traditional ABKS schemes cannot resist our secret-key-recovery attack. To deal with the above problems, we present new ciphertext policy attribute based encryption with fast keyword search constructions. Our constructions preserve the fine-grained access control inherited from the ABE system while supporting hidden policy and fast keyword search. Our constructions feature multi-value-independent compared with the existing attribute based searchable encryption schemes. The performance analysis demonstrates the efficiency of our constructions. We offer rigorous security proof of our second scheme, which is IND-CKA and IND-CPA secure.
引用
收藏
页码:1142 / 1151
页数:10
相关论文
共 50 条
  • [21] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    XU Peng
    TANG Yong
    JIANG Wenbin
    JIN Hai
    ZOU Deqing
    Chinese Journal of Electronics, 2014, 23 (04) : 655 - 660
  • [22] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    Xu Peng
    Tang Yong
    Jiang Wenbin
    Jin Hai
    Zou Deqing
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 655 - 660
  • [23] Astrape: An Efficient Concurrent Cloud Attestation with Ciphertext-Policy Attribute-Based Encryption
    Ba, Haihe
    Zhou, Huaizhe
    Mei, Songzhu
    Qiao, Huidong
    Hong, Tie
    Wang, Zhiying
    Ren, Jiangchun
    SYMMETRY-BASEL, 2018, 10 (10):
  • [24] Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment
    Nayudu P.P.
    Sekhar K.R.
    Computer Systems Science and Engineering, 2023, 46 (01): : 1079 - 1092
  • [25] A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection
    Han, Dezhi
    Pan, Nannan
    Li, Kuan-Ching
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 316 - 327
  • [26] An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things
    Li, Hang
    Yu, Keping
    Liu, Bin
    Feng, Chaosheng
    Qin, Zhiguang
    Srivastava, Gautam
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2022, 26 (05) : 1949 - 1960
  • [27] Comment on "Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption With Verifiable Delegation in Cloud Computing"
    Cao, Zhengjun
    Markowitch, Olivier
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (02) : 392 - 393
  • [28] Extensions to ciphertext-policy attribute-based encryption to support distributed environments
    Servos, Daniel
    Mohammed, Sabah
    Fiaidhi, Jinan
    Kim, Tai Hoon
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2013, 47 (2-3) : 215 - 226
  • [29] A Ciphertext-Policy Attribute-Based Encryption Based on Multi-valued Decision Diagram
    Zhang, Shaowei
    Li, Long
    Chang, Liang
    Gu, Tianlong
    Liu, Huadong
    INTELLIGENT INFORMATION PROCESSING IX, 2018, 538 : 303 - 310
  • [30] Outsourced ciphertext-policy attribute-based encryption with partial policy hidden
    Yu, Jinxia
    He, Guanghui
    Yan, Xixi
    Tang, Yongli
    Qin, Rongxia
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (05)