Fast keyword search over encrypted data with short ciphertext in clouds

被引:1
|
作者
Tseng, Yi-Fan [1 ]
Fan, Chun-, I [2 ,3 ,4 ]
Liu, Zi-Cheng [2 ]
机构
[1] Natl Chengchi Univ, Dept Comp Sci, Taipei, Taiwan
[2] Natl Sun Yat sen Univ, Dept Comp Sci & Engn, Kaohsiung, Taiwan
[3] Natl Sun Yat sen Univ, Secur Res Ctr, Kaohsiung, Taiwan
[4] Natl Sun Yat sen Univ, Intelligent Elect Commerce Res Ctr, Kaohsiung, Taiwan
关键词
Public key searchable encryption; Key-policy attribute-based encryption; Anonymous KP-ABE; The standard model; Monotonic access structure; ATTRIBUTE-BASED ENCRYPTION; PUBLIC-KEY ENCRYPTION; PREDICATE ENCRYPTION; EFFICIENT; SCHEME;
D O I
10.1016/j.jisa.2022.103320
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, it is convenient for people to store their data on clouds. To protect the privacy, people tend to encrypt their data before uploading them to clouds. Due to the widespread use of cloud services, public key searchable encryption is necessary for users to search the encrypted files efficiently and correctly. However, the existing public key searchable encryption schemes supporting monotonic queries suffer from either infeasibility in keyword testing or inefficiency such as heavy computing cost of testing, large size of ciphertext or trapdoor, and so on. In this work, we first propose a novel and efficient anonymous key-policy attribute-based encryption (KP-ABE). Then by applying Shen et al.'s generic construction to the proposed anonymous KP-ABE, we obtain an efficient and expressive public key searchable encryption, which to the best of our knowledge achieves the best performance in testing among the existing such schemes. Only 2 pairings are needed in testing. By applying our searchable encryption, one is able to expressively and efficiently search their encrypted data on clouds, without leaking the keyword information. Besides, we also implement our scheme and others with Python for comparing the performance. From the implementation results, our scheme owns the best performance on testing, and the size of ciphertexts and trapdoors are smaller than most of the existing schemes.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Attribute-Based Data Retrieval with Keyword Search over Encrypted Data in Cloud
    Ali, Azza A.
    Saleh, Shereen
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2019, 2020, 1058 : 876 - 890
  • [42] A System of Shareable Keyword Search on Encrypted Data
    Lu, Wei-Ting
    Wu, Wei
    Lin, Shih-Ya
    Tseng, Min-Chi
    Sun, Hung-Min
    NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 283 - 299
  • [43] Semantic-based Compound Keyword Search over Encrypted Cloud Data
    Lang, Bo
    Wang, Jinmiao
    Li, Ming
    Liu, Yanxi
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (03) : 850 - 863
  • [44] Security analysis of secure kNN and ranked keyword search over encrypted data
    Wakaha Ogata
    Takaaki Otemori
    International Journal of Information Security, 2020, 19 : 419 - 425
  • [45] Evaluable Secure Ranked Keyword Search Scheme over Encrypted Cloud Data
    Jia Zhi-peng
    Zhang Ya-ling
    Wang Shang-ping
    Sun Qin-dong
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 697 - 701
  • [46] Efficient Verifiable Fuzzy Keyword Search over Encrypted Data in Cloud Computing
    Wang, Jianfeng
    Ma, Hua
    Tang, Qiang
    Li, Jin
    Zhu, Hui
    Ma, Siqi
    Chen, Xiaofeng
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2013, 10 (02) : 667 - 684
  • [47] An improved multi-keyword ranked search over encrypted cloud data
    Xia, Taijun
    2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2017, : 177 - 182
  • [48] A Novel Dynamic Ranked Fuzzy Keyword Search Over Cloud Encrypted Data
    Jie, Wang
    Xiao, Yu
    Ming, Zhao
    Yong, Wang
    2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 91 - +
  • [49] Efficient keyword search over encrypted data in multi-cloud setting
    Miao, Yinbin
    Liu, Jiajia
    Ma, Jianfeng
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3808 - 3820
  • [50] Security analysis of secure kNN and ranked keyword search over encrypted data
    Ogata, Wakaha
    Otemori, Takaaki
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (04) : 419 - 425