Delegated Key-Policy Attribute-Based Set Intersection over Outsourced Encrypted Data Sets for CloudIoT

被引:4
|
作者
Shi, Yanfeng [1 ]
Qiu, Shuo [2 ]
机构
[1] Nanjing Inst Technol, Sch Comp Engn, Nanjing 211167, Peoples R China
[2] Jinling Inst Technol, Sch Software Engn, Nanjing 211169, Peoples R China
关键词
EQUALITY TEST; INTERNET; THINGS;
D O I
10.1155/2021/5595243
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Private set intersection (PSI) is a fundamental cryptographic primitive, allowing two parties to calculate the intersection of their data sets without exposing additional private information. In cloud-based IoT system, IoT-enabled devices would like to outsource their data sets in their encrypted form to the cloud. In this scenario, how to delegate the set intersection computation over outsourced encrypted data sets to the cloud and how to achieve the fine-grained access control for PSI without divulging any additional information to the cloud are still open problems. With that in mind, in this work, we combine key-policy attribute-based encryption (KP-ABE) and PSI to introduce such a novel concept, called delegated key-policy attribute-based set intersection over outsourced encrypted data sets (KP-ABSI), to solve this problem. Then we propose a first concrete KP-ABSI scheme and analyze its efficiency.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data
    Zheng, Qingji
    Xu, Shouhuai
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2015), 2015, : 175 - 184
  • [2] A Key-Policy Attribute-Based Broadcast Encryption
    Sun, Jin
    Hu, Yupu
    Zhang, Leyou
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (05) : 444 - 452
  • [3] Attribute-based Queries over Outsourced Encrypted Database
    Jiang, Zoe L.
    Huang, Jiajun
    Liu, Zechao
    Wang, Xuan
    [J]. 2017 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC), 2017, : 164 - 168
  • [4] Key-Policy Attribute-Based Encryption With Switchable Attributes for Fine-Grained Access Control of Encrypted Data
    Luo, Fucai
    Wang, Haiyan
    Yan, Xingfu
    Wu, Jiahui
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 7245 - 7258
  • [5] Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data
    He, Kai
    Guo, Jun
    Weng, Jian
    Weng, Jiasi
    Liu, Joseph K.
    Yi, Xun
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1207 - 1217
  • [6] VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
    Zheng, Qingji
    Xu, Shouhuai
    Ateniese, Giuseppe
    [J]. 2014 PROCEEDINGS IEEE INFOCOM, 2014, : 522 - 530
  • [7] Hierarchical Authority Key-Policy Attribute-Based Encryption
    You, Lin
    Wang, Lijun
    [J]. 2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 868 - 872
  • [8] Large universe decentralized key-policy attribute-based encryption
    Li, Qi
    Ma, Jianfeng
    Li, Rui
    Xiong, Jinbo
    Liu, Ximeng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (03) : 501 - 509
  • [9] ABAEKS: Attribute-Based Authenticated Encryption With Keyword Search Over Outsourced Encrypted Data
    Luo, Fucai
    Wang, Haiyan
    Lin, Changlu
    Yan, Xingfu
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4970 - 4983
  • [10] Key-Policy Multi-authority Attribute-Based Encryption
    Longo, Riccardo
    Marcolla, Chiara
    Sala, Massimiliano
    [J]. ALGEBRAIC INFORMATICS (CAI 2015), 2015, 9270 : 152 - 164