Advanced Search
Volume 40 Issue 3
Mar.  2018
Turn off MathJax
Article Contents
LIU Zhenhua, ZHOU Peilin, DUAN Shuhong. Attribute-based Proxy Re-encryption Scheme with Keyword Search[J]. Journal of Electronics & Information Technology, 2018, 40(3): 683-689. doi: 10.11999/JEIT170448
Citation: LIU Zhenhua, ZHOU Peilin, DUAN Shuhong. Attribute-based Proxy Re-encryption Scheme with Keyword Search[J]. Journal of Electronics & Information Technology, 2018, 40(3): 683-689. doi: 10.11999/JEIT170448

Attribute-based Proxy Re-encryption Scheme with Keyword Search

doi: 10.11999/JEIT170448
Funds:

The National Key RD Program of China (2017YFB0802000), The National Natural Science Foundation of China (61472470), The Scientific Research Plan Project of Education Department of Shaanxi Province (17JK0362)

  • Received Date: 2017-05-11
  • Rev Recd Date: 2017-12-13
  • Publish Date: 2018-03-19
  • Attribute-based proxy re-encryption mechanism can not only realize data sharing but also achieve data forwarding. However, this mechanism can not support the functionality of data retrieval, which hinders the applications of attribute-based proxy re-encryption. In order to solve the issue, this paper proposes a ciphertext- policy attribute-based proxy re-encryption scheme with keyword search. By dividing a secret key into an attribute key and a search key, the new scheme can not only achieve the keyword search, but also support proxy re- encryption. In the test phase, while conducting the keywords matching algorithm, the cloud server can do partial decryption of the original ciphertext and the re-encrypted ciphertext, which can reduce the computational burden for users. The security analysis indicates that the proposed scheme can achieve data security, hidden keywords, query isolation and collusion resistance.
  • loading
  • 黄海平, 杜建澎, 戴华, 等. 一种基于云存储的多服务器多关键词可搜索加密方案[J]. 电子与信息学报, 2017, 39(2): 389-396. doi: 10.11999/JEIT160338.
    YANG Chaowei, HUANG Qunying, LI Zhenlong, et al. Big data and cloud computing: Innovation opportunities and challenges[J]. International Journal of Digital Earth, 2017, 10(1): 13-53. doi: 10.1080/17538947.2016.1239771.
    HUANG Haiping, DU Jianpeng, DAI Hua, et al. Multi-sever multi-keyword searchable encryption scheme based on cloud storage. Journal of Electronics Information Technology, 2017, 39(2): 389-396. doi: 10.11999/JEIT160338.
    王光波, 王建华. 基于属性加密的云存储方案研究[J]. 电子与信息学报, 2016, 38(11): 29312939. doi: 10.11999/JEIT16006 4.
    WANG Guangbo and WANG Jianhua. Research on cloud storage scheme with attribute-based encryption[J]. Journal of Electronics Information Technology, 2016, 38(11): 29312939. doi: 10.11999/JEIT160064.
    ATTRAPADUNG N, HANAOKA G, MATSUMOTO T, et al. Attribute based encryption with direct efficiency tradeoff[C]. Proceedings of the 14th International Conference on Applied Cryptography and Network Security, London, United Kindom, 2016: 249-266. doi: 10.1007/978-3-319-39555-5_14.
    SAHAI A and WATERS B. Fuzzy identity-based encryption[C]. Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 2005: 457-473. doi: 10.1007 /11426639_27.
    GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, 2006: 89-98. doi: 10.1145/1180405.1180418.
    WATERS B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization[C]. Proceedings of 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, 2011: 53-70. doi: 10.1007/978-3-642-19379-8_4.
    GUO Shanqing, ZENG Yingpei, WEI Juan, et al. Attribute- based re-encryption scheme in the standard model[J]. Wuhan University Journal of Natural Sciences, 2008, 13(5): 621-625. doi: 10.1007/s11859-008-0522-5.
    LIANG Xiaohui, CAO Zhenfu, LIN Huang, et al. Attribute based proxy re-encryption with delegating capabilities[C]. Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia, 2009: 276-286. doi: 10.1145/1533057. 1533094.
    LIANG Kaitai, FANG Liming, SUSILO W, et al. A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security[C]. Proceedings of the 5th Intelligent Networking and Collaborative Systems (INCoS), Xian, China, 2013: 552-559. doi: 10.1109/INCoS.2013.103.
    GE Chunpeng, SUSILO W, WANG Jiandong, et al. A key- policy aattribute-based proxy re-encryption without random oracles[J]. The Computer Journal, 2016, 59(7): 970-982. doi: 10.1093/comjnl/bxv100.
    ZHANG Yinghui, LI Jin, CHEN Xiaofeng, et al. Anonymous attribute-based proxy re-encryption for access control in cloud computing[J]. Security and Communication Networks, 2016, 9(14): 2397-2411. doi: 10.1002/sec.1509.
    SHI Yanfeng, LIU Jiqiang, HAN Zhen, et al. Attribute-based proxy re-rncryption with keyword search[J]. PloS One, 2014, 9(12): e116325(1-24). doi: 10.1371/journal.pone.0116325.
    LIANG Kaitai and SUSILO W. Searchable attribute-based mechanism with efficient data sharing for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9): 1981-1992. doi: 10.1109/TIFS.2015. 2442215.
    WANG Changji, LI Wentao, LI Yuan, et al. A ciphertext- policy attribute-based encryption scheme supporting keyword search function[C]. Proceedings of the 5th International Symposium on Cyberspace Safety and Security (CSS), Hunan, China, 2013: 377-386. doi: 10.1007/978-3-319- 03584-0_28.
    LI Jiazhi and ZHANG Lei. Attribute-based keyword search and data access control in cloud[C]. Proceedings of the 10th International Conference on Computational Intelligence and Security, Kunming, China, 2014: 382-386. doi: 10.1109/CIS. 2014.113.
    ZHENG Qingji, XU Shouhuai, and ATENIESE G. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data[C]. Proceedings of the IEEE Conference on Computer Communications, Toronto, Canada, 2014: 522-530. doi: 10.1109/INFOCOM.2014.6847976.
    SHAO Jun, CAO Zhenfu, LIANG Xiaohui, et al. Proxy re-encryption with keyword search[J]. Information Sciences, 2010, 180(13): 2576-2587. doi: 10.1016/j.ins.2010.03.026.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1758) PDF downloads(331) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return