Searchable Encryption Scheme Supporting Policy Hiding and Constant Ciphertext Length

被引:0
|
作者
Yang Xiaodong [1 ]
Li Ting [1 ]
Ma Tingchun [1 ]
Chen Guilan [1 ]
Wang Caifen [1 ,2 ]
机构
[1] Northwest Normal Univ, Coll Comp Sci & Engn, Lanzhou 730070, Peoples R China
[2] Shenzhen Technol Univ, Coll Big Data & Internet, Shenzhen 518118, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud storage; Attribute-Based Encryption (ABE); Constant ciphertext length; Keyword search; Public audit; ATTRIBUTE-BASED-ENCRYPTION; SIZE CIPHERTEXTS; KEYWORD SEARCH; HIDDEN;
D O I
10.11999/JEIT200083
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Attribute-Based Encryption (ABE) mechanism is one of the key technologies for implementing flexible access control of data in cloud storage. However, the existing ABE schemes have some problems, such as too much ciphertext storage overhead and user privacy leakage, and unsupported public auditing of cloud data. To solve these problems, a new searchable ABE scheme is proposed, and its security can be reduced to the difficulty of q-BDHE (q -decisional Bilinear Diffie-Hellman Exponent) problem and CDH (Computational Diffie-Hellman) problem. The proposed scheme achieves a constant ciphertext length on the basis of supporting keyword search. By introducing strategies to hide ideas, it prevents attackers from obtaining sensitive information and ensures the privacy of users. And the integrity of the data in cloud storage is verified through data public audit mechanism. Compared with the existing similar schemes, this scheme greatly reduces the data encryption overhead, keyword search overhead, ciphertext storage cost and decryption cost, which has a good application prospect to the cloud storage environment.
引用
收藏
页码:900 / 907
页数:8
相关论文
共 27 条
  • [1] [Anonymous], 2019, SOFT COMPUTING SIGNA, DOI DOI 10.1016/B978-0-12-813912-7.00012-0
  • [2] PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT
    Belguith, Sana
    Kaaniche, Nesrine
    Laurent, Maryline
    Jemai, Abderrazak
    Attia, Rabah
    [J]. COMPUTER NETWORKS, 2018, 133 : 141 - 156
  • [3] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [4] Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
  • [5] Emura K, 2009, LECT NOTES COMPUT SC, V5451, P13, DOI 10.1007/978-3-642-00843-6_2
  • [6] Ge Aijun, 2012, Information Security and Privacy. Proceedings 17th Australasian Conference, ACISP 2012, P336, DOI 10.1007/978-3-642-31448-3_25
  • [7] Herranz J, 2010, LECT NOTES COMPUT SC, V6056, P19
  • [8] Lai JZ, 2011, LECT NOTES COMPUT SC, V6672, P24, DOI 10.1007/978-3-642-21031-0_3
  • [9] Lifeng AN, 2018, COMMUNICATIONS TECHN, V51, P156, DOI [10.3969/j.issn.1002-0802.2018.01.028, DOI 10.3969/J.ISSN.1002-0802.2018.01.028]
  • [10] Attribute-based Proxy Re-encryption Scheme with Keyword Search
    Liu Zhenhua
    Zhou Peilin
    Duan Shuhong
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (03) : 683 - 689