Attribute-Based Keyword Search with Proxy Re-Encryption in the Cloud

被引:9
|
作者
Chen, Yanli [1 ]
Hu, Yuanyuan [1 ]
Zhu, Minhui [1 ]
Yang, Geng [2 ]
机构
[1] Nanjing Univ Posts & Telecommun, Dept Comp Sci, Nanjing 210000, Jiangsu, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Overseas Cooperat & Exchange Off, Nanjing 210000, Jiangsu, Peoples R China
关键词
cloud computing; attribute-based encryption; keyword search delegation; proxy re-encryption;
D O I
10.1587/transcom.2017EBP3274
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This work is conducted to solve the current problem in the attribute-based keyword search (ABKS) scheme about how to securely and efficiently delegate the search rights to other users when the authorized user is not online. We first combine proxy re-encryption (PRE) with the ABKS technology and propose a scheme called attribute-based keyword search with proxy re-encryption (PABKS). The scheme not only realizes the functions of data search and fine-grained access control, but also supports search function sharing. In addition, we randomly blind the user's private key to the server, which ensures the confidentiality and security of the private key. Then, we also prove that the scheme is selective access structure and chosen keyword attack (IND-sAS-CKA) secured in the random oracle model. A performance analysis and security proof show that the proposed scheme can achieve efficient and secure data search in the cloud.
引用
收藏
页码:1798 / 1808
页数:11
相关论文
共 50 条
  • [1] Attribute-Based Proxy Re-Encryption with Keyword Search
    Shi, Yanfeng
    Liu, Jiqiang
    Han, Zhen
    Zheng, Qingji
    Zhang, Rui
    Qiu, Shuo
    [J]. PLOS ONE, 2014, 9 (12):
  • [2] Attribute-based Proxy Re-encryption Scheme with Keyword Search
    Liu Zhenhua
    Zhou Peilin
    Duan Shuhong
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (03) : 683 - 689
  • [3] Revocable attribute-based proxy re-encryption
    Luo, Fucai
    Al-Kuwari, Saif
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2021, 15 (01) : 465 - 482
  • [4] Searchable Attribute-Based Proxy Re-encryption: Keyword Privacy, Verifiable Expressive Search, and Outsourced Decryption
    Bera S.
    Rao Y.S.
    [J]. SN Computer Science, 5 (5)
  • [5] Proxy re-encryption with keyword search
    Shao, Jun
    Cao, Zhenfu
    Liang, Xiaohui
    Lin, Huang
    [J]. INFORMATION SCIENCES, 2010, 180 (13) : 2576 - 2587
  • [6] Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption
    Mizuno, Takeo
    Doi, Hiroshi
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 288 - +
  • [7] A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
    Tang, Yongli
    Lian, Huanhuan
    Zhao, Zemao
    Yan, Xixi
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 56 (02): : 339 - 352
  • [8] Anonymous Attribute-Based Conditional Proxy Re-encryption
    Mao, Xianping
    Li, Xuefeng
    Wu, Xiaochuan
    Wang, Chuansheng
    Lai, Junzuo
    [J]. NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 95 - 110
  • [9] Attribute-Based Proxy Re-Encryption with Dynamic Membership
    Fan, Chun-I
    Wu, Chien-Nan
    Chen, Chun-Hung
    Tseng, Yi-Fan
    Feng, Cheng-Chun
    [J]. 2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 26 - 32
  • [10] Ciphertext Policy Attribute-Based Proxy Re-encryption
    Luo, Song
    Hu, Jianbin
    Chen, Zhong
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 401 - +