A General Transformation from KP-ABE to Searchable Encryption

نویسندگان

  • Fei Han
  • Jing Qin
  • Huawei Zhao
  • Jiankun Hu
چکیده

Users are inclined to share sensitive data in a remote server if no strong security mechanism is in place. Searchable encryption satisfies the need of users to execute a search on encrypted data. Previous searchable encryption method such as “public key encryption with keyword search (PEKS)” restricted the data access to certain users, because only the assigned users were able to search on the encrypted data. In this paper we will discuss the relation between Attribute Based Encryption (ABE) and searchable encryption and define a weak anonymity of ABE scheme, named “attribute privacy”. With the weak anonymity, we propose a general transformation from ABE to Attribute Based Encryption with Keyword Search (ABEKS) and a concrete attribute private key-policy ABE (KP-ABE) scheme. We present an ABEKS scheme based on this KP-ABE scheme and permit multi-users to execute a flexible search on the remote encrypted data.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Linear Encryption with Keyword Search

Nowadays an increasing amount of data stored in the public cloud need to be searched remotely for fast accessing. For the sake of privacy, the remote files are usually encrypted, which makes them difficult to be searched by remote servers. It is also harder to efficiently share encrypted data in the cloud than those in plaintext. In this paper, we develop a searchable encryption framework calle...

متن کامل

Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs

Predicate encryption is an advanced form of public-key encryption that yield high flexibility in terms of access control. In the literature, many predicate encryption schemes have been proposed such as fuzzy-IBE, KP-ABE, CP-ABE, (doubly) spatial encryption (DSE), and ABE for arithmetic span programs. In this paper, we study relations among them and show that some of them are in fact equivalent ...

متن کامل

Attribute Based Cryptographically secure (ABCs) Encryption In Cloud Computing: Analysis and Comparative Study

In today’s digital world Cloud computing is a revolution knowledge for stream of computing as a utility. That is providing platform and services for enormous-scale of data storage and data manage. Big Data on cloud environment analyze, storage, manage, visualization, security are some challenges that requires more timing and large computation infrastructure processing. Security in terms of data...

متن کامل

Browse searchable encryption schemes: Classification, methods and recent developments

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

متن کامل

Towards Secure Targeted Broadcast in Smart Grid

Significant research efforts have recently been directed towards materializing smart grid for the purpose of transforming the aging power grid into an efficient and intelligent electric power distribution system. Conceptually, smart grid can be regarded as a fusion of different advanced technologies, i.e., electrical power engineering meets sensing, control, digital communication, and network i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012