CP-ABSE: A Ciphertext-Policy Attribute-Based Searchable Encryption Scheme

被引:68
|
作者
Yin, Hui [1 ]
Zhang, Jixin [2 ]
Xiong, Yinqiao [1 ,3 ]
Ou, Lu [2 ]
Li, Fangmin [1 ]
Liao, Shaolin [4 ,5 ]
Li, Keqin [6 ]
机构
[1] Changsha Univ, Coll Comp Engn & Appl Math, Changsha 410022, Hunan, Peoples R China
[2] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[3] Natl Univ Def Technol, Coll Comp, Changsha 410073, Hunan, Peoples R China
[4] Argonne Natl Lab, Lemont, IL 60439 USA
[5] IIT, Dept Elect & Comp Engn, Chicago, IL 60616 USA
[6] SUNY Coll New Paltz, Dept Comp Sci, New Paltz, NY 12561 USA
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国国家自然科学基金;
关键词
Access control; attribute-based encryption; search authorization; searchable encryption; KEYWORD SEARCHES; SECURITY;
D O I
10.1109/ACCESS.2018.2889754
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Searchable encryption provides an effective mechanism that achieves secure search over encrypted data. A popular application model of searchable encryption is that a data owner stores encrypted data to a server and the server can effectively perform keyword-based search over encrypted data according to a query trapdoor submitted by a data user, where the owner's data and the user's queries are kept secret in the server. Recently, many searchable encryptions have been proposed to achieve better security and performance, provide secure data updatable feature (dynamics), and search results verifiable capability (verifiability). However, most of the existing works endow the data user an unlimited search capacities and do not consider a data user's search permissions. In practical application, granting search privileges for data users is a very important measure to enforce data access control. In this paper, we propose an attribute-based searchable encryption scheme by leveraging the ciphertext-policy attribute-based encryption technique. Our scheme allows the data owner to conduct a fine-grained search authorization for a data user. The main idea is that a data owner encrypts an index keyword under a specified access policy, if and only if, a data user's attributes satisfy the access policy, the data user can perform search over the encrypted index keyword. We provide the detailed correctness analyses, performance analyses, and security proofs for our scheme. The extensive experiments demonstrate that our proposed scheme outperforms the similar work CP-ABKS proposed by Zheng on many aspects.
引用
收藏
页码:5682 / 5694
页数:13
相关论文
共 50 条
  • [41] An Improved Ciphertext-Policy Attribute-Based Encryption Scheme in Power Cloud Access Control
    Li, Yuancheng
    Zhang, Pan
    Wang, Boyan
    APPLIED SCIENCES-BASEL, 2018, 8 (10):
  • [42] Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation
    Ghopur, Dilxat
    Ma, Jianfeng
    Ma, Xindi
    Miao, Yinbin
    Hao, Jialu
    Jiang, Tao
    SCIENCE CHINA-INFORMATION SCIENCES, 2023, 66 (07)
  • [43] Efficient ciphertext-policy attribute-based encryption with blackbox traceability
    Xu, Shengmin
    Yuan, Jiaming
    Xu, Guowen
    Li, Yingjiu
    Liu, Ximeng
    Zhang, Yinghui
    Ying, Zuobin
    INFORMATION SCIENCES, 2020, 538 : 19 - 38
  • [44] An Efficient Ciphertext-policy Attribute-based Encryption on Ideal Lattices
    Zhao Jian
    Gao Haiying
    Hu Bin
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (07) : 1652 - 1660
  • [45] Adaptively secure outsourcing ciphertext-policy attribute-based encryption
    Wang, Hao
    Zheng, Zhihua
    Wu, Lei
    Wang, Yilei
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2270 - 2280
  • [46] New Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation
    Zu, Longhui
    Liu, Zhenhua
    Li, Juanjuan
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 281 - 287
  • [47] Optimized Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation
    Li, Yang
    Zhu, Jianming
    Wang, Xiuli
    Chai, Yanmei
    Shao, Shuai
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 385 - 394
  • [48] Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
    Deng, Hua
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    Zhang, Lei
    Liu, Jianwei
    Shi, Wenchang
    INFORMATION SCIENCES, 2014, 275 : 370 - 384
  • [49] Dynamic Ciphertext-Policy Attribute-Based Encryption for Expressive Access Policy
    Rao, Y. Sreenivasa
    Dutta, Ratna
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2014, 2014, 8337 : 275 - 286
  • [50] Outsourced ciphertext-policy attribute-based encryption with partial policy hidden
    Yu, Jinxia
    He, Guanghui
    Yan, Xixi
    Tang, Yongli
    Qin, Rongxia
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (05)