Privacy-enhanced attribute-based private information retrieval

被引:7
|
作者
Lai, Jianchang [1 ,2 ]
Mu, Yi [1 ]
Guo, Fuchun [1 ]
Jiang, Peng [3 ]
Susilo, Willy [1 ]
机构
[1] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[2] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW 2522, Australia
[3] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing, Peoples R China
关键词
Private information retrieval; Data privacy-enhanced; Attribute-based; ENCRYPTION; PROTOCOL; ACCESS;
D O I
10.1016/j.ins.2018.04.084
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A private information retrieval protocol allows a user to retrieve wth data item (or k items) of its choice from a database of N data items without revealing its choice w to the server. The traditional private information retrieval protocols based on the notion of oblivious transfer must publish the description of each data item stored in the database in order for the user to make a choice before users run the protocol (each data item's content is not revealed though). Aiming to eliminate the information leakage of the data item in the private information retrieval system, in this work, we propose a novel attribute-based private information retrieval protocol which can enhance the data privacy. In our proposed protocol, each data item is associated with a set of attributes which is not made public to users who are only given a universal attribute set, which reveals no information about individual data item. For each query, the user can only obtain the data items whose attributes are within its chosen attribute set. We provide a rigorous security analysis of our protocol and demonstrate its efficiency and feasibility. (C) 2018 Elsevier Inc. All rights reserved.
引用
收藏
页码:275 / 291
页数:17
相关论文
共 50 条
  • [1] A privacy-enhanced attribute-based access control system
    Kolter, Jan
    Schillinger, Rolf
    Pernul, Guenther
    [J]. DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 129 - +
  • [2] An efficient privacy-enhanced attribute-based access control mechanism
    Xu, Yang
    Zeng, Quanrun
    Wang, Guojun
    Zhang, Cheng
    Ren, Ju
    Zhang, Yaoxue
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (05):
  • [3] Location privacy protection method based on attribute-based privacy information retrieval
    Du, Gang
    Zhang, Lei
    Ma, Chunguang
    Zhang, Guoyin
    [J]. Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2021, 42 (05): : 680 - 686
  • [4] Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management
    Palomar, Esther
    Gonzalez-Manzano, Lorena
    Alcaide, Almudena
    Galan, Alvaro
    [J]. IET INFORMATION SECURITY, 2016, 10 (02) : 60 - 68
  • [5] Security-Enhanced Function Privacy Attribute-Based Encryption
    Li, Xinmin
    Zhang, Leyou
    Hou, Xuanyang
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2023, 2024, 1992 : 176 - 188
  • [6] Extended Attribute Based Encryption for Private Information Retrieval
    Yinan, Shan
    Cao, Zhenfu
    [J]. 2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 923 - 928
  • [7] Attribute-based document image retrieval
    Melissa Cote
    Alexandra Branzan Albu
    [J]. International Journal on Document Analysis and Recognition (IJDAR), 2024, 27 : 57 - 71
  • [8] Attribute-based document image retrieval
    Cote, Melissa
    Branzan Albu, Alexandra
    [J]. INTERNATIONAL JOURNAL ON DOCUMENT ANALYSIS AND RECOGNITION, 2024, 27 (01) : 57 - 71
  • [9] A Function Private Attribute-Based Encryption
    Han, Fei
    Qin, Jing
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [10] Privacy Enhanced DigiLocker using Ciphertext-Policy Attribute-Based Encryption
    Bakshi, Puneet
    Nandi, Sukumar
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 541 - 546