Attribute-Based Proxy Re-Encryption with Keyword Search

被引:19
|
作者
Shi, Yanfeng [1 ]
Liu, Jiqiang [1 ]
Han, Zhen [1 ]
Zheng, Qingji [3 ]
Zhang, Rui [2 ]
Qiu, Shuo [1 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[3] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX USA
来源
PLOS ONE | 2014年 / 9卷 / 12期
关键词
D O I
10.1371/journal.pone.0116325
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search (ABRKS), which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, ABRKS allows (i) the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii) the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy). We formalize the syntax and security definitions for ABRKS, and propose two concrete constructions for ABRKS: key-policy ABRKS and ciphertext-policy ABRKS. In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] Attribute-Based Keyword Search with Proxy Re-Encryption in the Cloud
    Chen, Yanli
    Hu, Yuanyuan
    Zhu, Minhui
    Yang, Geng
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2018, E101B (08) : 1798 - 1808
  • [2] Attribute-based Proxy Re-encryption Scheme with Keyword Search
    Liu Zhenhua
    Zhou Peilin
    Duan Shuhong
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (03) : 683 - 689
  • [3] Revocable attribute-based proxy re-encryption
    Luo, Fucai
    Al-Kuwari, Saif
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2021, 15 (01) : 465 - 482
  • [4] Searchable Attribute-Based Proxy Re-encryption: Keyword Privacy, Verifiable Expressive Search, and Outsourced Decryption
    Bera S.
    Rao Y.S.
    [J]. SN Computer Science, 5 (5)
  • [5] Proxy re-encryption with keyword search
    Shao, Jun
    Cao, Zhenfu
    Liang, Xiaohui
    Lin, Huang
    [J]. INFORMATION SCIENCES, 2010, 180 (13) : 2576 - 2587
  • [6] Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption
    Mizuno, Takeo
    Doi, Hiroshi
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 288 - +
  • [7] Anonymous Attribute-Based Conditional Proxy Re-encryption
    Mao, Xianping
    Li, Xuefeng
    Wu, Xiaochuan
    Wang, Chuansheng
    Lai, Junzuo
    [J]. NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 95 - 110
  • [8] Attribute-Based Proxy Re-Encryption with Dynamic Membership
    Fan, Chun-I
    Wu, Chien-Nan
    Chen, Chun-Hung
    Tseng, Yi-Fan
    Feng, Cheng-Chun
    [J]. 2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 26 - 32
  • [9] Ciphertext Policy Attribute-Based Proxy Re-encryption
    Luo, Song
    Hu, Jianbin
    Chen, Zhong
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 401 - +
  • [10] Attribute-based proxy re-encryption scheme with multiple features
    Feng, Chaosheng
    Luo, Wangping
    Qin, Zhiguang
    Yuan, Ding
    Zou, Liping
    [J]. Tongxin Xuebao/Journal on Communications, 2019, 40 (06): : 177 - 189