Multi-Keywords Searchable Attribute-Based Encryption With Verification and Attribute Revocation Over Cloud Data

被引:1
|
作者
Shen, Hua [1 ]
Zhou, Jian [1 ]
Wu, Ge [2 ]
Zhang, Mingwu [1 ]
机构
[1] Hubei Univ Technol, Sch Comp Sci, Wuhan 430068, Peoples R China
[2] Southeast Univ, Sch Cyber Sci Engn, Nanjing 211189, Peoples R China
基金
中国国家自然科学基金;
关键词
Searchable encryption; attribute-based encryption; linear secret sharing; attribute revocation; EFFICIENT;
D O I
10.1109/ACCESS.2023.3334733
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The convenience and efficient management of cloud servers have resulted in an increasing number of users opting to store their data in the cloud. Consequently, data-outsourcing services relying on cloud servers have been extensively deployed and utilized. In this case, before outsourcing the data to cloud storage, we should ensure unauthorized users cannot access the data. In this article, we present a scheme termed MKSABE-VaAR (multi-keyword searchable attribute-based encryption with verification and attribute revocation). Aiming at the problems of inefficiency, excessive computation in the search process, and only supporting single-keyword search in most attribute-based searchable encryption schemes, first, we package multiple keywords into a polynomial to realize multi-keyword search. Based on this polynomial, MKSABE-VaAR can reduce the amount of search calculation for keyword ciphertext and improve search efficiency by reducing the number of bilinear pairing operations. At the same time, we have made some special constructs for indexing to add verification of user attributes in the keyword search process, which improves the search accuracy. Moreover, we adopt a linear secret-sharing technique to construct the attribute revocation function of MKSABE-VaAR, making a lower computational cost of attribute revocation. Furthermore, the mechanism of storing data and indexes separately greatly reduces the risk of data leakage of MKSABE-VaAR.
引用
收藏
页码:139715 / 139727
页数:13
相关论文
共 50 条
  • [21] Attribute-based encryption scheme supporting decryption outsourcing and attribute revocation in cloud storage
    Liu, Hongwei
    Zhu, Ping
    Chen, Zehong
    Zhang, Peng
    Jiang, Zoe L.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 556 - 561
  • [22] Adaptively Secure Attribute-Based Encryption Supporting Attribute Revocation
    Wu Qiuxin
    Zhang Miao
    CHINA COMMUNICATIONS, 2012, 9 (09) : 22 - 40
  • [23] Multi-authority attribute-based encryption with efficient revocation
    Zhang K.
    Ma J.-F.
    Li H.
    Zhang J.-W.
    Zhang T.
    Tongxin Xuebao/Journal on Communications, 2017, 38 (03): : 83 - 91
  • [24] Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage
    Wang, Shangping
    Jia, Shasha
    Zhang, Yaling
    IEEE ACCESS, 2019, 7 : 50136 - 50147
  • [25] An Attribute-Based Searchable Encryption Scheme for Cloud-Assisted IIoT
    Yin, Hui
    Zhang, Wei
    Deng, Hua
    Qin, Zheng
    Li, Keqin
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (12) : 11014 - 11023
  • [26] Cloud-Assisted Attribute-Based Searchable Encryption Scheme on Blockchain
    Niu S.
    Xie Y.
    Yang P.
    Du X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (04): : 811 - 821
  • [27] Attribute-based Proxy Re-encryption Method for Revocation in Cloud Data Storage
    Yasumura, Yoshiko
    Imabayashi, Hiroki
    Yamana, Hayato
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 4858 - 4860
  • [28] Generic user revocation systems for attribute-based encryption in cloud storage
    Chen, Genlang
    Xu, Zhiqian
    Jiang, Hai
    Li, Kuan-ching
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2018, 19 (11) : 1362 - 1384
  • [29] Generic user revocation systems for attribute-based encryption in cloud storage
    Genlang CHEN
    Zhiqian XU
    Hai JIANG
    Kuan-ching LI
    FrontiersofInformationTechnology&ElectronicEngineering, 2018, 19 (11) : 1362 - 1384
  • [30] Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
    Wang, Guojun
    Liu, Qin
    Wu, Jie
    Guo, Minyi
    COMPUTERS & SECURITY, 2011, 30 (05) : 320 - 331