Skip to main content
Erschienen in: Soft Computing 15/2018

10.07.2017 | Methodologies and Application

Expressive attribute-based keyword search with constant-size ciphertext

verfasst von: Jinguang Han, Ye Yang, Joseph K. Liu, Jiguo Li, Kaitai Liang, Jian Shen

Erschienen in: Soft Computing | Ausgabe 15/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Prior to outsourcing sensitive data, users need to encrypt the data and outsource the ciphertexts to cloud servers. Therefore, efficient search techniques on encrypted data are required. Attribute-based keyword search (ABKS) is a public key encryption with keyword search scheme where a legal user can authorize a proxy to test whether a ciphertext includes some exact keywords without exposing the content of sensitive data to the proxy. However, the main obstacle to implementing existing ABKS schemes is that the computation cost is very heavy, namely linear with the number of required attributes. In this paper, we propose a new ABKS scheme with following features: (1) It supports AND and NOT gates; (2) the size of the searchable ciphertexts is constant; (3) the size of the trapdoors generated by legal users for the proxy is constant; (4) to encrypt a message, the computation cost is constant; and (5) the computation cost of the test algorithm is constant. To the best of our knowledge, it is the first ABKS which has constant-size ciphertext and supports AND and NOT gates.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Fußnoten
1
Notably, in this paper, we mainly consider how to encrypt keywords. To encrypt the files, standard public key encryption schemes can be adopted, such as AES encryption, RSA encryption, etc.
 
Literatur
Zurück zum Zitat Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50–58CrossRef Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50–58CrossRef
Zurück zum Zitat Baek J, Safiavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In: Proceedings of ICCSA 2008, volume 5072 of lecture notes in computer science. Springer, pp 1249–1259 Baek J, Safiavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In: Proceedings of ICCSA 2008, volume 5072 of lecture notes in computer science. Springer, pp 1249–1259
Zurück zum Zitat Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE S & P 2007. IEEE, pp 321–334 Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE S & P 2007. IEEE, pp 321–334
Zurück zum Zitat Boneh D, Boyen X, Goh EJ (2005) Hierarshical identity based encryption with constant size ciphertetx. In: Proceedings of Enrocrypt 2005, volume 3494 of lecture notes in computer science. Springer, pp 440–456 Boneh D, Boyen X, Goh EJ (2005) Hierarshical identity based encryption with constant size ciphertetx. In: Proceedings of Enrocrypt 2005, volume 3494 of lecture notes in computer science. Springer, pp 440–456
Zurück zum Zitat Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with key word search. In: Proceedings of EUROCRYPT 2004, volume 3027 of lecture notes in computer science. Spinger, pp 506–522 Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with key word search. In: Proceedings of EUROCRYPT 2004, volume 3027 of lecture notes in computer science. Spinger, pp 506–522
Zurück zum Zitat Byun JW, Rhee HS, Park HA, Lee DH (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Proceedings of VLDB SDM 2006, volume 4165 of lecture notes in computer science. Springer, pp 75–83 Byun JW, Rhee HS, Park HA, Lee DH (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Proceedings of VLDB SDM 2006, volume 4165 of lecture notes in computer science. Springer, pp 75–83
Zurück zum Zitat Chen C, Zhang Z, Feng D (2011) Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost. In: Proceedings of ProvSec 2011, volume 6980 of lecture notes in computer science. Springer, pp 84–101 Chen C, Zhang Z, Feng D (2011) Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost. In: Proceedings of ProvSec 2011, volume 6980 of lecture notes in computer science. Springer, pp 84–101
Zurück zum Zitat Cheung L, Newport C (2007) Provably secure ciphertext policy abe. In: Proceedings CCS 2007. ACM, pp 456–465 Cheung L, Newport C (2007) Provably secure ciphertext policy abe. In: Proceedings CCS 2007. ACM, pp 456–465
Zurück zum Zitat Curtmola R, Garay JA, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of CCS 2006. ACM Curtmola R, Garay JA, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of CCS 2006. ACM
Zurück zum Zitat Delerablée C, Paillier P, Pointcheval D (2007) Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. In: Proceedings of Pairing 2007, volume 4575 of lecture notes in computer science. Springer, pp 39–59 Delerablée C, Paillier P, Pointcheval D (2007) Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. In: Proceedings of Pairing 2007, volume 4575 of lecture notes in computer science. Springer, pp 39–59
Zurück zum Zitat Emura K, Miyaji A, Nomura A, Omote K, Soshi M (2009) A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: Proceedings of ISPEC 2009, volume 5451 of lecture notes in computer science. Springer, pp 13–23 Emura K, Miyaji A, Nomura A, Omote K, Soshi M (2009) A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: Proceedings of ISPEC 2009, volume 5451 of lecture notes in computer science. Springer, pp 13–23
Zurück zum Zitat Fu Z, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9):2546–2559CrossRef Fu Z, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9):2546–2559CrossRef
Zurück zum Zitat Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun E98–B(1):190–200 Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun E98–B(1):190–200
Zurück zum Zitat Fu Z, Wu X, Guan C, Sun K, Ren K (2016) Towards efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur. doi:10.1109/TIFS.2016.2596138 Fu Z, Wu X, Guan C, Sun K, Ren K (2016) Towards efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Forensics Secur. doi:10.​1109/​TIFS.​2016.​2596138
Zurück zum Zitat Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. In: Proceedings of ACNS 2004, volume 3089 of lecture notes in computer science. Springer, pp. 31–45 Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. In: Proceedings of ACNS 2004, volume 3089 of lecture notes in computer science. Springer, pp. 31–45
Zurück zum Zitat Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute based encryption for fine-grained access control of encrypted data. In: Proceedings of CCS 2006. ACM, pp 89–98 Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute based encryption for fine-grained access control of encrypted data. In: Proceedings of CCS 2006. ACM, pp 89–98
Zurück zum Zitat Han J, Susio W, Mu Y, Yan J (2012) Attribute-based oblivious access control. Comput J 55(10):1202–1205CrossRef Han J, Susio W, Mu Y, Yan J (2012) Attribute-based oblivious access control. Comput J 55(10):1202–1205CrossRef
Zurück zum Zitat Han F, Qin J, Zhao H, Hu J (2014) A general transformation from KP-ABE to searchable encryption. Future Gener Comput Syst 30:107–115CrossRef Han F, Qin J, Zhao H, Hu J (2014) A general transformation from KP-ABE to searchable encryption. Future Gener Comput Syst 30:107–115CrossRef
Zurück zum Zitat Han J, Susilo W, Mu Y, Zhou J, Au MHA (2015) Improving privacy and security in decentralized ciphertext-policy attribute-based encryption. IEEE Trans Inf Forensics Secur 10(3):665–678CrossRef Han J, Susilo W, Mu Y, Zhou J, Au MHA (2015) Improving privacy and security in decentralized ciphertext-policy attribute-based encryption. IEEE Trans Inf Forensics Secur 10(3):665–678CrossRef
Zurück zum Zitat Herranz J, Laguillaumie F, Ràfols C (2010) Constant size ciphertexts in threshold attribute-based encryption. In: Proceedings of PKC - 2010, volume 6056 of lecture notes in computer science. Springer, pp 19–34 Herranz J, Laguillaumie F, Ràfols C (2010) Constant size ciphertexts in threshold attribute-based encryption. In: Proceedings of PKC - 2010, volume 6056 of lecture notes in computer science. Springer, pp 19–34
Zurück zum Zitat Jeong IR, Kwon JO, Hong D, Lee DH (2009) Constructing PEKS schemes secure against keyword guessing attacks is possible ? Comput Commun 32(2):394–396CrossRef Jeong IR, Kwon JO, Hong D, Lee DH (2009) Constructing PEKS schemes secure against keyword guessing attacks is possible ? Comput Commun 32(2):394–396CrossRef
Zurück zum Zitat Kong Y, Zhang M, Ye D (2016) A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl Based Syst 115:123–132CrossRef Kong Y, Zhang M, Ye D (2016) A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl Based Syst 115:123–132CrossRef
Zurück zum Zitat Kurosawa K, Ohtaki Y (2012) Uc-secure searchable symmetric encryption. In: Proceedings of FC 2012, volume 7397 of lecture notes in computer science . Springer, pp 285–298 Kurosawa K, Ohtaki Y (2012) Uc-secure searchable symmetric encryption. In: Proceedings of FC 2012, volume 7397 of lecture notes in computer science . Springer, pp 285–298
Zurück zum Zitat Li H, Liu D, Jia K, Lin X (2015) Achieving authorized and ranked multi-keyword search over encrypted cloud data. In: Proceedings of ICC 2015. IEEE, pp 7450–7455 Li H, Liu D, Jia K, Lin X (2015) Achieving authorized and ranked multi-keyword search over encrypted cloud data. In: Proceedings of ICC 2015. IEEE, pp 7450–7455
Zurück zum Zitat Li J, Lin X, Zhang Y, Han J (2016) Ksf-oabe: Outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput. doi:10.1109/TSC.2016.2542813 Li J, Lin X, Zhang Y, Han J (2016) Ksf-oabe: Outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput. doi:10.​1109/​TSC.​2016.​2542813
Zurück zum Zitat Li J, Li X, Wang L, He D, Ahmed H, Niu X (2017) Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption. Soft Comput. doi:10.1007/s00500-017-2482-1 Li J, Li X, Wang L, He D, Ahmed H, Niu X (2017) Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption. Soft Comput. doi:10.​1007/​s00500-017-2482-1
Zurück zum Zitat Liang K, Susilo W (2015) Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans Inf Forensics Secur 10(9):1981–1992CrossRef Liang K, Susilo W (2015) Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Trans Inf Forensics Secur 10(9):1981–1992CrossRef
Zurück zum Zitat Liu Q, Cai W, Shen J, Fu Z, Liu X, Linge N (2016) A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur Commun Netw 9(17):4002–4012CrossRef Liu Q, Cai W, Shen J, Fu Z, Liu X, Linge N (2016) A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur Commun Netw 9(17):4002–4012CrossRef
Zurück zum Zitat Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: Proceedings of WISA 2004, volume 3325 of lecture notes in computer science. Springer, pp 73–86 Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: Proceedings of WISA 2004, volume 3325 of lecture notes in computer science. Springer, pp 73–86
Zurück zum Zitat Rhee HS, Susilo W, Kim HJ (2009) Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electron Express 6(5):237–243 Rhee HS, Susilo W, Kim HJ (2009) Secure searchable public key encryption scheme against keyword guessing attacks. IEICE Electron Express 6(5):237–243
Zurück zum Zitat Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Proceedings of EUROCRYPT - 2005, volume 3494 of lecture notes in computer science. Springer, pp 457–473 Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Proceedings of EUROCRYPT - 2005, volume 3494 of lecture notes in computer science. Springer, pp 457–473
Zurück zum Zitat Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings of IEEE - S&P 2000. IEEE, pp 44–55 Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings of IEEE - S&P 2000. IEEE, pp 44–55
Zurück zum Zitat Sun W, Yu S, Lou W, Hou YT, Li H (2014) Protecting your right: attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: Proceedings of INFOCOM 2014. IEEE, pp 226–234 Sun W, Yu S, Lou W, Hou YT, Li H (2014) Protecting your right: attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: Proceedings of INFOCOM 2014. IEEE, pp 226–234
Zurück zum Zitat Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceedings of PKC - 2011, volume 6571 of lecture notes in computer science. Springer, pp 53–70 Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceedings of PKC - 2011, volume 6571 of lecture notes in computer science. Springer, pp 53–70
Zurück zum Zitat Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352CrossRef Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352CrossRef
Zurück zum Zitat Yang Y, Han J, Susilo W, Yuen TH, Li J (2016) Abks-csc: attribute-based keyword search with constant size ciphertexts. Secur Commun Netw 9(18):5003–5015CrossRef Yang Y, Han J, Susilo W, Yuen TH, Li J (2016) Abks-csc: attribute-based keyword search with constant size ciphertexts. Secur Commun Netw 9(18):5003–5015CrossRef
Zurück zum Zitat Zheng Q, Xu S, Ateniese G (2014) VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: Proceedings of INFOCOM 2014. IEEE, pp 522–530 Zheng Q, Xu S, Ateniese G (2014) VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: Proceedings of INFOCOM 2014. IEEE, pp 522–530
Zurück zum Zitat Zhou Z, Huang D (2010) On efficient ciphertext-policy attribute based encryption and broadcast encryption. In: Proceedings of CCS 2010. ACM, pp 753–755 Zhou Z, Huang D (2010) On efficient ciphertext-policy attribute based encryption and broadcast encryption. In: Proceedings of CCS 2010. ACM, pp 753–755
Metadaten
Titel
Expressive attribute-based keyword search with constant-size ciphertext
verfasst von
Jinguang Han
Ye Yang
Joseph K. Liu
Jiguo Li
Kaitai Liang
Jian Shen
Publikationsdatum
10.07.2017
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 15/2018
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-017-2701-9

Weitere Artikel der Ausgabe 15/2018

Soft Computing 15/2018 Zur Ausgabe