Advanced Search
Volume 41 Issue 1
Jan.  2019
Turn off MathJax
Article Contents
Jin SUN, Xiaojing WANG, Shangping WANG, Lili REN. Verifiable Multi-keyword Search Encryption Scheme with Attribute Revocation[J]. Journal of Electronics & Information Technology, 2019, 41(1): 53-60. doi: 10.11999/JEIT180237
Citation: Jin SUN, Xiaojing WANG, Shangping WANG, Lili REN. Verifiable Multi-keyword Search Encryption Scheme with Attribute Revocation[J]. Journal of Electronics & Information Technology, 2019, 41(1): 53-60. doi: 10.11999/JEIT180237

Verifiable Multi-keyword Search Encryption Scheme with Attribute Revocation

doi: 10.11999/JEIT180237
Funds:  The National Natural Science Youth Foundation of China (61303223), The National Natural Science Foundation of China (61572019)
  • Received Date: 2018-03-14
  • Rev Recd Date: 2018-08-21
  • Available Online: 2018-08-31
  • Publish Date: 2019-01-01
  • In recent years, searchable encryption technology and fine-grained access control attribute encryption is widely used in cloud storage environment. Considering that the existing searchable attribute-based encryption schemes have some flaws:  It only support single-keyword search without attribute revocation. The single-keyword search may result in the waste of computing and broadband resources due to the partial retrieval from search results. A verifiable multi-keyword search encryption scheme that supports revocation of attributes is proposed. The scheme allows users to detect the correctness of cloud server search results while supporting the revocation of user attributes in a fine-grained access control structure without updating the key or re-encrypting the ciphertext during revocation stage. The aforementioned scheme is proved by the deterministic linearity hypothesis, and the relevant analysis results indicate that it can resist the attacks of keyword selection and the privacy of keywords in the random oracle model with high computational efficiency and storage effectiveness.

  • loading
  • SONG D X, WAGNER D, and PERRIG A. Practical techniques for searches on encrypted data[C]. 2000 IEEE Symposium on Security and Privacy, Berkeley, USA, 2008: 44–55. doi: 10.1109/SECPRI.2000.848445.
    BONEH D, CRESCENZO G D, OSTROVSKY R, et al. Public key encryption with keyword search[C]. International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2004: 506–522. doi: 10.1007/978-3-540-24676-3_30.
    CURTMOLA R, GARAY J, KAMARA S, et al. Searchable symmetric encryption: Improved definitions and efficient constructions[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, USA, 2006: 79–88. doi: 10.1145/1180405.1180417.
    李双, 徐智茂. 基于属性的可搜索加密方案[J]. 计算机学报, 2014, 37(5): 1018–1024. doi: 10.3724/SP.J.1016.2014.01017

    LI Shuang and XU Zhimao. Attribute-based public encryption with keyword search[J]. Chinese Journal of Computers, 2014, 37(5): 1018–1024. doi: 10.3724/SP.J.1016.2014.01017
    YANG Yang and MA Maode. Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for E-Health clouds[J]. IEEE Transactions on Information Forensics and Security, 2017, 11(4): 746–759. doi: 10.1109/TIFS.2015.2509912
    QIU Shuo, LIU Jiqiang, SHI Yanfeng, et al. Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack[J]. Science China (Information Sciences) , 2017, 60(5): 1–12. doi: 10.1007/s11432-015-5449-9
    MIAO Yinbin, MA Jianfeng, WEI Fushan, et al. VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel[J]. Peer-to-Peer Networking and Applications, 2017, 10(4): 995–1007. doi: 10.1007/s12083-016-0458-z
    MIAO Yinbin, MA Jianfeng, JIANG Qi, et al. Verifiable keyword search over encrypted cloud data in smart city[J]. Computers and Electrical Engineering, 2017, 65(1): 90–101. doi: 10.1016/j.compeleceng.2017.06.021
    CUI Hui, WAN Zhiguo, DENG R H, et al. Efficient and expressive keyword search over encrypted data in the cloud[J]. IEEE Transactions on Dependable and Secure Computing, 2016, 15(3): 409–422. doi: 10.1109/TDSC.2016.2599883
    LI Runhe, ZHENG Dong, ZHANG Yinghui, et al. Attribute-based encryption with multi-keyword search[C]. IEEE Second International Conference on Data Science in Cyberspace, Shenzhen, China, 2017: 172–177. doi: 10.1109/DSC.2017.97.
    王尚平, 余小娟, 张亚玲. 具有两个可撤销属性列表的密钥策略的属性加密方案[J]. 电子与信息学报, 2016, 38(6): 1406–1411. doi: 10.11999/JEIT150845

    WANG Shangping, YU Xiaojuan, and ZHANG Yaling. Revocable key-policy attribute-based encryption scheme with two revocation lists[J]. Journal of Electronics &Information Technology, 2016, 38(6): 1406–1411. doi: 10.11999/JEIT150845
    SUN Wenhai, YU Shucheng, LOU Wenjing, et al. Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2016, 27(4): 1187–1198. doi: 10.1109/TPDS.2014.2355202
    陈燕俐, 杨华山. 可支持属性撤销的基于CP-ABE可搜索加密方案[J]. 重庆邮电大学学报(自然科学版), 2016, 28(4): 545–554. doi: 10.3979/j.issn.1673-825X.2016.04.016

    CHEN Yanli and YANG Huashan. CP-ABE based searchable encryption with attribute revocation[J]. Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), 2016, 28(4): 545–554. doi: 10.3979/j.issn.1673-825X.2016.04.016
    GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, USA, 2006: 89–98. doi: 10.1145/1180405.1180418.
    ZHENG Qingji, XU Shouhuai, and ATENIESE G. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data[C]. IEEE INFOCOM, Toronto, Canada, 2014: 522–530. doi: 10.1109/INFOCOM.2014.6847976.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(2)  / Tables(3)

    Article Metrics

    Article views (1937) PDF downloads(84) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return