Journal ArticleDOI
Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack
TLDR
A novel primitive named hidden policy ciphertext-policy attribute-based encryption with keyword search (HP-CPABKS) is proposed, which is unable to search on encrypted data and learn any information about the access structure if his/her attribute credentials cannot satisfy the access control policy specified by the data owner.Citations
More filters
Journal ArticleDOI
Security and privacy protection in cloud computing: Discussions and challenges
TL;DR: This work introduces some privacy security risks of cloud computing and proposes a comprehensive privacy security protection framework, and shows and discusses the research progress of several technologies, such as access control; ciphertext policy attribute-based encryption (CP-ABE); key policy attributes based encryption (KP-ABe); and multi-tenant, trust, and a combination of multiple technologies.
Journal ArticleDOI
Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing
TL;DR: This paper devise a practical cryptographic primitive called attribute-based multi-keyword search scheme to support comparable attributes through utilizing 0-encoding and 1-encode, and demonstrates that this scheme can drastically decrease both computational and storage costs.
Journal ArticleDOI
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting
Yinbin Miao,Ximeng Liu,Kim-Kwang Raymond Choo,Robert H. Deng,Jiguo Li,Hongwei Li,Jianfeng Ma +6 more
TL;DR: It is proved that the proposed ABKS-SM systems achieve selective security and resist off-line keyword-guessing attack in the generic bilinear group model, and their performance is evaluated using real-world datasets.
Journal ArticleDOI
Lightweight Sharable and Traceable Secure Mobile Health System
TL;DR: A Lightweight Sharable and Traceable (LiST) secure mobile health system in which patient data are encrypted end-to-end from a patient's mobile device to data users and it is proved that it is secure without random oracle.
Journal ArticleDOI
Searchable Encryption for Healthcare Clouds: A Survey
Rui Zhang,Rui Xue,Ling Liu +2 more
TL;DR: This survey paper describes the notion of searchable encryption (SE) in the context of healthcare applications and characterize the SE use cases into four scenarios in healthcare, and describes how the existing SE schemes relate to and differ from one another, and point out the connections between the SE techniques and the security and privacy requirements of Healthcare applications and the open research problems.
References
More filters
Proceedings ArticleDOI
Ciphertext-Policy Attribute-Based Encryption
TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Proceedings ArticleDOI
Attribute-based encryption for fine-grained access control of encrypted data
TL;DR: This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption.
Book ChapterDOI
Fuzzy identity-based encryption
Amit Sahai,Brent Waters +1 more
TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Posted Content
Fuzzy Identity Based Encryption.
Amit Sahai,Brent Waters +1 more
TL;DR: In this paper, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Journal ArticleDOI
Fast Probabilistic Algorithms for Verification of Polynomial Identities
TL;DR: Vanous fast probabdlsttc algonthms, with probability of correctness guaranteed a prion, are presented for testing polynomial ldentmes and propemes of systems of polynomials and ancdlary fast algorithms for calculating resultants and Sturm sequences are given.