Fast keyword search over encrypted data with short ciphertext in clouds

被引:1
|
作者
Tseng, Yi-Fan [1 ]
Fan, Chun-, I [2 ,3 ,4 ]
Liu, Zi-Cheng [2 ]
机构
[1] Natl Chengchi Univ, Dept Comp Sci, Taipei, Taiwan
[2] Natl Sun Yat sen Univ, Dept Comp Sci & Engn, Kaohsiung, Taiwan
[3] Natl Sun Yat sen Univ, Secur Res Ctr, Kaohsiung, Taiwan
[4] Natl Sun Yat sen Univ, Intelligent Elect Commerce Res Ctr, Kaohsiung, Taiwan
关键词
Public key searchable encryption; Key-policy attribute-based encryption; Anonymous KP-ABE; The standard model; Monotonic access structure; ATTRIBUTE-BASED ENCRYPTION; PUBLIC-KEY ENCRYPTION; PREDICATE ENCRYPTION; EFFICIENT; SCHEME;
D O I
10.1016/j.jisa.2022.103320
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, it is convenient for people to store their data on clouds. To protect the privacy, people tend to encrypt their data before uploading them to clouds. Due to the widespread use of cloud services, public key searchable encryption is necessary for users to search the encrypted files efficiently and correctly. However, the existing public key searchable encryption schemes supporting monotonic queries suffer from either infeasibility in keyword testing or inefficiency such as heavy computing cost of testing, large size of ciphertext or trapdoor, and so on. In this work, we first propose a novel and efficient anonymous key-policy attribute-based encryption (KP-ABE). Then by applying Shen et al.'s generic construction to the proposed anonymous KP-ABE, we obtain an efficient and expressive public key searchable encryption, which to the best of our knowledge achieves the best performance in testing among the existing such schemes. Only 2 pairings are needed in testing. By applying our searchable encryption, one is able to expressively and efficiently search their encrypted data on clouds, without leaking the keyword information. Besides, we also implement our scheme and others with Python for comparing the performance. From the implementation results, our scheme owns the best performance on testing, and the size of ciphertexts and trapdoors are smaller than most of the existing schemes.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Authorized Private Keyword Search over Encrypted Data in Cloud Computing
    Li, Ming
    Yu, Shucheng
    Cao, Ning
    Lou, Wenjing
    31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, : 383 - 392
  • [32] An Efficient Attack on A Fuzzy Keyword Search Scheme over Encrypted Data
    Zheng, Minghui
    Zhou, Huihua
    2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, : 1647 - 1650
  • [33] Efficient verifiable multi-keyword search over encrypted data
    Miao, Yinbin
    Ma, Jianfeng
    Zhang, Junwei
    Liu, Zhiquan
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2017, 44 (04): : 18 - 23
  • [34] Approximate Keyword-based Search over Encrypted Cloud Data
    Ibrahim, Ayad
    Jin, Hai
    Yassin, Ali A.
    Zou, Deqing
    2012 NINTH IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2012, : 238 - 245
  • [35] Keyword Search with Access Control over Encrypted Data in Cloud Computing
    Shen, Zhirong
    Shu, Jiwu
    Xue, Wei
    2014 IEEE 22ND INTERNATIONAL SYMPOSIUM OF QUALITY OF SERVICE (IWQOS), 2014, : 87 - 92
  • [36] RSAE: Ranked Keyword Search over Asymmetric Encrypted cloud data
    Guo, Cheng
    Song, Qiongqiong
    Zhuang, Ruhan
    Feng, Bin
    PROCEEDINGS 2015 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING BDCLOUD 2015, 2015, : 82 - 86
  • [37] Secure Multi-Keyword Search Over Encrypted Outsourced Data
    Anukrishna, P. R.
    Paul, Vince
    International Journal of Computer Science and Network Security, 2016, 16 (11): : 86 - 89
  • [38] Dynamic Verifiable Search Over Encrypted Data in Untrusted Clouds
    Nie, Xiaohong
    Liu, Qin
    Liu, Xuhui
    Peng, Tao
    Lin, Yapin
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2016, 2016, 10048 : 557 - 571
  • [39] Multi-Keyword search over encrypted data with scoring and search pattern obfuscation
    Cengiz Orencik
    Ayse Selcuk
    Erkay Savas
    Murat Kantarcioglu
    International Journal of Information Security, 2016, 15 : 251 - 269
  • [40] Multi-Keyword search over encrypted data with scoring and search pattern obfuscation
    Orencik, Cengiz
    Selcuk, Ayse
    Savas, Erkay
    Kantarcioglu, Murat
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (03) : 251 - 269