Multi-Keywords Searchable Attribute-Based Encryption With Verification and Attribute Revocation Over Cloud Data

被引:1
|
作者
Shen, Hua [1 ]
Zhou, Jian [1 ]
Wu, Ge [2 ]
Zhang, Mingwu [1 ]
机构
[1] Hubei Univ Technol, Sch Comp Sci, Wuhan 430068, Peoples R China
[2] Southeast Univ, Sch Cyber Sci Engn, Nanjing 211189, Peoples R China
基金
中国国家自然科学基金;
关键词
Searchable encryption; attribute-based encryption; linear secret sharing; attribute revocation; EFFICIENT;
D O I
10.1109/ACCESS.2023.3334733
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The convenience and efficient management of cloud servers have resulted in an increasing number of users opting to store their data in the cloud. Consequently, data-outsourcing services relying on cloud servers have been extensively deployed and utilized. In this case, before outsourcing the data to cloud storage, we should ensure unauthorized users cannot access the data. In this article, we present a scheme termed MKSABE-VaAR (multi-keyword searchable attribute-based encryption with verification and attribute revocation). Aiming at the problems of inefficiency, excessive computation in the search process, and only supporting single-keyword search in most attribute-based searchable encryption schemes, first, we package multiple keywords into a polynomial to realize multi-keyword search. Based on this polynomial, MKSABE-VaAR can reduce the amount of search calculation for keyword ciphertext and improve search efficiency by reducing the number of bilinear pairing operations. At the same time, we have made some special constructs for indexing to add verification of user attributes in the keyword search process, which improves the search accuracy. Moreover, we adopt a linear secret-sharing technique to construct the attribute revocation function of MKSABE-VaAR, making a lower computational cost of attribute revocation. Furthermore, the mechanism of storing data and indexes separately greatly reduces the risk of data leakage of MKSABE-VaAR.
引用
收藏
页码:139715 / 139727
页数:13
相关论文
共 50 条
  • [31] Generic user revocation systems for attribute-based encryption in cloud storage
    Genlang Chen
    Zhiqian Xu
    Hai Jiang
    Kuan-ching Li
    Frontiers of Information Technology & Electronic Engineering, 2018, 19 : 1362 - 1384
  • [32] Attribute-based Encryption with Flexible Revocation for IoV
    Chen, Ruoyu
    Li, Yuhong
    Rahmani, Rahim
    18TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS, FNC 2023/20TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING, MOBISPC 2023/13TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, SEIT 2023, 2023, 224 : 131 - 138
  • [33] Attribute-based encryption scheme supporting attribute revocation and decryption outsourcing
    School of Mathematics and Statistics, Xidian Univ., Xi'an
    710071, China
    Xi'an Dianzi Keji Daxue Xuebao, 6 (6-10 and 55):
  • [34] Multi authority attribute based encryption with attribute revocation
    Liu Zhenpeng
    Zhu Xianchao
    Zhang Shouhua
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1872 - 1876
  • [35] Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage
    Wang, Shangping
    Gao, Tingting
    Zhang, Yaling
    PLOS ONE, 2018, 13 (11):
  • [36] Research on Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage
    Wang, Guangbo
    Wang, Jianhua
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2017, 2017
  • [37] Decentralized Multi-Authority Attribute-based Searchable Encryption Scheme
    Ren, Juan
    Zhang, Leyou
    Wang, Baocang
    International Journal of Network Security, 2021, 23 (02) : 332 - 342
  • [38] Decentralized Attribute-Based Encryption Scheme with Scalable Revocation for Sharing Data in Public Cloud Servers
    Binbusayyis, Adel
    Zhang, Ning
    2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 185 - 192
  • [39] Attribute-based encryption scheme for secure data sharing in cloud with fine-grained revocation
    Islam, Md Azharul
    Madria, Sanjay
    SECURITY AND PRIVACY, 2024, 7 (01)
  • [40] Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
    Zhang, Kejun
    Wang, Wenbin
    Xu, Shaofei
    Yu, Xinying
    Wang, Jun
    Li, Pengcheng
    Qian, Rong
    Tongxin Xuebao/Journal on Communications, 2024, 45 (09): : 244 - 257