scispace - formally typeset
Journal ArticleDOI

Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack

TLDR
A novel primitive named hidden policy ciphertext-policy attribute-based encryption with keyword search (HP-CPABKS) is proposed, which is unable to search on encrypted data and learn any information about the access structure if his/her attribute credentials cannot satisfy the access control policy specified by the data owner.
Abstract
Attribute-based encryption with keyword search (ABKS) enables data owners to grant their search capabilities to other users by enforcing an access control policy over the outsourced encrypted data. However, existing ABKS schemes cannot guarantee the privacy of the access structures, which may contain some sensitive private information. Furthermore, resulting from the exposure of the access structures, ABKS schemes are susceptible to an off-line keyword guessing attack if the keyword space has a polynomial size. To solve these problems, we propose a novel primitive named hidden policy ciphertext-policy attribute-based encryption with keyword search (HP-CPABKS). With our primitive, the data user is unable to search on encrypted data and learn any information about the access structure if his/her attribute credentials cannot satisfy the access control policy specified by the data owner. We present a rigorous selective security analysis of the proposed HP-CPABKS scheme, which simultaneously keeps the indistinguishability of the keywords and the access structures. Finally, the performance evaluation verifies that our proposed scheme is efficient and practical.

read more

Citations
More filters
Journal ArticleDOI

Security and privacy protection in cloud computing: Discussions and challenges

TL;DR: This work introduces some privacy security risks of cloud computing and proposes a comprehensive privacy security protection framework, and shows and discusses the research progress of several technologies, such as access control; ciphertext policy attribute-based encryption (CP-ABE); key policy attributes based encryption (KP-ABe); and multi-tenant, trust, and a combination of multiple technologies.
Journal ArticleDOI

Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing

TL;DR: This paper devise a practical cryptographic primitive called attribute-based multi-keyword search scheme to support comparable attributes through utilizing 0-encoding and 1-encode, and demonstrates that this scheme can drastically decrease both computational and storage costs.
Journal ArticleDOI

Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting

TL;DR: It is proved that the proposed ABKS-SM systems achieve selective security and resist off-line keyword-guessing attack in the generic bilinear group model, and their performance is evaluated using real-world datasets.
Journal ArticleDOI

Lightweight Sharable and Traceable Secure Mobile Health System

TL;DR: A Lightweight Sharable and Traceable (LiST) secure mobile health system in which patient data are encrypted end-to-end from a patient's mobile device to data users and it is proved that it is secure without random oracle.
Journal ArticleDOI

Searchable Encryption for Healthcare Clouds: A Survey

TL;DR: This survey paper describes the notion of searchable encryption (SE) in the context of healthcare applications and characterize the SE use cases into four scenarios in healthcare, and describes how the existing SE schemes relate to and differ from one another, and point out the connections between the SE techniques and the security and privacy requirements of Healthcare applications and the open research problems.
References
More filters
Proceedings ArticleDOI

Ciphertext-Policy Attribute-Based Encryption

TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Proceedings ArticleDOI

Attribute-based encryption for fine-grained access control of encrypted data

TL;DR: This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption.
Book ChapterDOI

Fuzzy identity-based encryption

TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Posted Content

Fuzzy Identity Based Encryption.

TL;DR: In this paper, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Journal ArticleDOI

Fast Probabilistic Algorithms for Verification of Polynomial Identities

TL;DR: Vanous fast probabdlsttc algonthms, with probability of correctness guaranteed a prion, are presented for testing polynomial ldentmes and propemes of systems of polynomials and ancdlary fast algorithms for calculating resultants and Sturm sequences are given.
Related Papers (5)