Skip to main content
Top
Published in: Soft Computing 2/2019

26-09-2017 | Methodologies and Application

Fuzzy matching: multi-authority attribute searchable encryption without central authority

Authors: Binrui Zhu, Jiameng Sun, Jing Qin, Jixin Ma

Published in: Soft Computing | Issue 2/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Attribute-based keyword search (ABKS) supports the access control on the search result based upon fuzzy identity over encrypted data, when the search operation is performed over outsourced encrypted data in cloud. However, almost ABKS schemes trust a single authority to monitor the attribute key for users. In practice, we usually have different entities responsible for monitoring different attribute keys to a user. Thus, it is not realistic to trust a single authority to monitor all attributes keys for ABKS scheme in practical situation. Although a large body of ABKS schemes have been proposed, few works have been done on multi-authority attribute searchable encryption. We propose a multi-authority attribute searchable encryption without central authority in this paper. Comparing previous ABKS schemes, we extend the single-authority ABKS scheme to multi-authority ABKS scheme and remove the central authority in multi-authority ABKS scheme. We analyze our scheme in terms of security and efficiency.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Abdalla M, Bellare M, Catalano D et al (2008) Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. J Cryptol 21(3):350–391MathSciNetCrossRefMATH Abdalla M, Bellare M, Catalano D et al (2008) Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. J Cryptol 21(3):350–391MathSciNetCrossRefMATH
go back to reference Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In: International conference on computational science and its applications. Lecture notes in computer science, vol 5072, pp 1249–1259 Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In: International conference on computational science and its applications. Lecture notes in computer science, vol 5072, pp 1249–1259
go back to reference Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy, pp 321–334 Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy, pp 321–334
go back to reference Boneh D, Crescenzo GD, Ostrovsky R et al (2004) Public key encryption with keyword search. In: Advances in cryptology-EUROCRYPT 2004. Springer, Berlin, pp 506–522 Boneh D, Crescenzo GD, Ostrovsky R et al (2004) Public key encryption with keyword search. In: Advances in cryptology-EUROCRYPT 2004. Springer, Berlin, pp 506–522
go back to reference Chang YC, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. Applied cryptography and network security. Springer, Berlin, pp 442–455MATH Chang YC, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. Applied cryptography and network security. Springer, Berlin, pp 442–455MATH
go back to reference Chase M, Chow SSM (2009) Improving privacy and security in multi-authority attribute-based encryption. In: ACM conference on computer and communications security. ACM, pp 121–130 Chase M, Chow SSM (2009) Improving privacy and security in multi-authority attribute-based encryption. In: ACM conference on computer and communications security. ACM, pp 121–130
go back to reference Chow SM (2010) New privacy-preserving architectures for identity-attribute-based encryption. Dissertation, New York University Chow SM (2010) New privacy-preserving architectures for identity-attribute-based encryption. Dissertation, New York University
go back to reference Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definition and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 79–88 Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definition and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 79–88
go back to reference Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. Lect Notes Comput Sci 3089:31–45CrossRefMATH Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. Lect Notes Comput Sci 3089:31–45CrossRefMATH
go back to reference Goyal V, Pandey O, Sahai A et al (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: ACM conference on computer and communications security. ACM, pp 89–98 Goyal V, Pandey O, Sahai A et al (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: ACM conference on computer and communications security. ACM, pp 89–98
go back to reference Han F, Qin J, Zhao H et al (2014) A general transformation from KP-ABE to searchable encryption. Future Gener Comput Syst 30(C):107–115CrossRef Han F, Qin J, Zhao H et al (2014) A general transformation from KP-ABE to searchable encryption. Future Gener Comput Syst 30(C):107–115CrossRef
go back to reference Koo D, Hur J, Yoon H (2013) Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comput Electr Eng 39(1):34–46CrossRef Koo D, Hur J, Yoon H (2013) Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comput Electr Eng 39(1):34–46CrossRef
go back to reference Li J, Zhang L (2014) Attribute-based keyword search and data access control in cloud. In: Tenth international conference on computational intelligence and security. IEEE, pp 382–386 Li J, Zhang L (2014) Attribute-based keyword search and data access control in cloud. In: Tenth international conference on computational intelligence and security. IEEE, pp 382–386
go back to reference Lin H, Cao Z, Liang X et al (2008) Secure threshold multi authority attribute based encryption without a central authority. In: International conference on cryptology in India: progress in cryptology. Springer, pp 426–436 Lin H, Cao Z, Liang X et al (2008) Secure threshold multi authority attribute based encryption without a central authority. In: International conference on cryptology in India: progress in cryptology. Springer, pp 426–436
go back to reference Liu P, Wang J, Ma H et al (2014) Efficient verifiable public key encryption with keyword search based on KP-ABE. In: 2014 ninth international conference on broadband and wireless computing, communication and applications (BWCCA), pp 584–589 Liu P, Wang J, Ma H et al (2014) Efficient verifiable public key encryption with keyword search based on KP-ABE. In: 2014 ninth international conference on broadband and wireless computing, communication and applications (BWCCA), pp 584–589
go back to reference Liu Z, Weng J, Li J et al (2016) Cloud-based electronic health record system supporting fuzzy keyword search. Soft Comput 20(8):3243–3255CrossRef Liu Z, Weng J, Li J et al (2016) Cloud-based electronic health record system supporting fuzzy keyword search. Soft Comput 20(8):3243–3255CrossRef
go back to reference Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: International conference on information security applications. Springer, pp 73–86 Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: International conference on information security applications. Springer, pp 73–86
go back to reference Rhee HS, Park JH, Susilo W et al (2010) Trapdoor security in a searchable public-key encryption scheme with a designated tester. J Syst Softw 83(5):763–771CrossRef Rhee HS, Park JH, Susilo W et al (2010) Trapdoor security in a searchable public-key encryption scheme with a designated tester. J Syst Softw 83(5):763–771CrossRef
go back to reference Shi Y, Liu J, Zhen H et al (2014) Attribute-based proxy re-encryption with keyword search. Plos One 9(12):e116325CrossRef Shi Y, Liu J, Zhen H et al (2014) Attribute-based proxy re-encryption with keyword search. Plos One 9(12):e116325CrossRef
go back to reference Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: IEEE symposium on security and privacy. IEEE Computer Society, pp 44–55 Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: IEEE symposium on security and privacy. IEEE Computer Society, pp 44–55
go back to reference Wang C, Li W, Li Y et al (2013) A ciphertext-policy attribute-based encryption scheme supporting keyword search function. In: Cyberspace safety and security. Lecture notes in computer science, vol 8300, pp 377–386 Wang C, Li W, Li Y et al (2013) A ciphertext-policy attribute-based encryption scheme supporting keyword search function. In: Cyberspace safety and security. Lecture notes in computer science, vol 8300, pp 377–386
go back to reference Xhafa F, Wang J, Chen X et al (2014) An efficient PHR service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795–1802CrossRef Xhafa F, Wang J, Chen X et al (2014) An efficient PHR service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795–1802CrossRef
go back to reference Xu J, Wen Q, Li W et al (2016) Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing. Soft Comput 21(18):5265–5279CrossRefMATH Xu J, Wen Q, Li W et al (2016) Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing. Soft Comput 21(18):5265–5279CrossRefMATH
go back to reference Zheng Q, Xu S, Ateniese G (2014) VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014—IEEE conference on computer communications. IEEE, pp 522–530 Zheng Q, Xu S, Ateniese G (2014) VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014—IEEE conference on computer communications. IEEE, pp 522–530
Metadata
Title
Fuzzy matching: multi-authority attribute searchable encryption without central authority
Authors
Binrui Zhu
Jiameng Sun
Jing Qin
Jixin Ma
Publication date
26-09-2017
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 2/2019
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-017-2849-3

Other articles of this Issue 2/2019

Soft Computing 2/2019 Go to the issue

Premium Partner