Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups

被引:8
作者
Shen, Chen [1 ]
Lu, Yang [1 ,2 ]
Li, Jiguo [3 ,4 ]
机构
[1] Hohai Univ, Coll Comp & Informat, Nanjing 211100, Peoples R China
[2] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing 210097, Peoples R China
[3] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350007, Peoples R China
[4] State Key Lab Cryptol, Beijing 100878, Peoples R China
基金
中国国家自然科学基金;
关键词
Searchable encryption; expressive keyword search; key-policy attribute-based encryption; prime-order group;
D O I
10.1109/ACCESS.2019.2961633
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public key encryption with keyword search (PEKS) allows a cloud server to retrieve particular ciphertexts without leaking the contents of the searched ciphertexts. This kind of cryptographic primitive gives users a special way to retrieve the encrypted documents they need while preserving privacy. Nevertheless, most existing PEKS schemes only offer single-keyword search or conjunctive-keyword search. The poorly expressive ability and constantly inaccurate search results make them hard to meet users' requirements. Although several expressive PEKS (EPEKS) schemes were proposed, they entail high computation and communication costs. An ideal EPEKS scheme should enable fast and accurate ciphertext retrieval, while lowering the storage server's load and reducing the amount of communication data. Drawing on the strongly expressive ability of key-policy attribute-based encryption (KP-ABE), we propose a generic construction of EPEKS from KP-ABE. We demonstrate that the derived EPEKS scheme is secure under the chosen keyword attack if the implicit KP-ABE scheme fulfills the anonymity under the chosen plaintext attack. Furthermore, we present a concrete EPEKS scheme over the prime-order groups. The comparison and experimental results indicate that our scheme is more efficient than the existing EPEKS schemes.
引用
收藏
页码:93 / 103
页数:11
相关论文
共 44 条
  • [1] [Anonymous], [No title captured]
  • [2] [Anonymous], [No title captured]
  • [3] Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6
  • [4] Baek J, 2006, LECT NOTES COMPUT SC, V4176, P217
  • [5] Ballard L, 2005, LECT NOTES COMPUT SC, V3783, P414
  • [6] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
  • [7] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [8] Cao N, 2011, IEEE INFOCOM SER, P829, DOI 10.1109/INFCOM.2011.5935306
  • [9] Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Guo, Fuchun
    Wang, Xiaofen
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) : 789 - 798
  • [10] Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
    Cui, Hui
    Wan, Zhiguo
    Deng, Robert H.
    Wang, Guilin
    Li, Yingjiu
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (03) : 409 - 422