AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (1.9 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

An Attribute-Based Encryption Scheme Based on Unrecognizable Trapdoors

Cyberspace Security and Computer College, Hebei University, Baoding 071002, China.
Key Laboratory on High Trusted Information System in Hebei Province, Baoding 071002, China.
Show Author Information

Abstract

Attribute-Based Encryption (ABE) has been widely used for ciphertext retrieval in the cloud environment. However, bi-flexible attribute control and privacy keywords are difficult problems that have yet to be solved. In this paper, we introduce the denial of access policy and the mutual matching algorithm of a dataset used to realize bidirectional control of attributes in the cloud server. To solve the problem of keyword privacy, we construct a security trapdoor by adding random numbers that effectively resist keyword guessing attacks from cloud servers and external attackers. System security is reduced to the Deterministic Bilinear Diffie-Hellman (DBDH) hypothesis problem. We validate our scheme through theoretical security analysis and experimental verification. Experiments are conducted on a real dataset, and results show that the scheme has higher security and retrieval efficiency than previous methods.

References

[1]
D. Song, D. Wagner, and A. Perrig, Practical techniques for searches on encrypted data, in Proc. of IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 2000, pp. 44-55.
[2]
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, Public key encryption with keyword search, in Proc. of Advances in Cryptology-Eurocrypt, Interlaken, Switzerland, 2004, pp. 506-522.
[3]
L. M. Fang, W. Susilo, and C. Ge, Public key encryption with keyword search secure against keyword guessing attacks without random oracle, Information Sciences, vol. 238, no. 7, pp. 221-241, 2017.
[4]
Z. Y. Shao and B. Yang, On security against the server in designated tester public key encryption with keyword search, Information Processing Letters, vol. 115, no. 8, pp. 1757-1761, 2015.
[5]
A. Sahai and B. Waters, Fuzzy identity-based encryption, in Proc. of International Conference on Theory and Applications of Cryptographic Techniques, Berlin, Germany, 2005, pp. 457-473.
[6]
J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attribute-based encryption, in Proc. of IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 2007, pp. 321-334.
[7]
M. Pirretti, P. Traynor, P. Mcdaniel, and B. Waters, Secure attribute-based systems, Journal of Computer Security, vol. 18, no. 5, pp. 799-837, 2010.
[8]
J. Hur and K. D. Noh, Attribute-based access control with efficient revocation in data outsourcing systems, IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 7, pp. 814-821, 2011.
[9]
J. Li, Y. Shi, and Y. Zhang, Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage, International Journal of Communication Systems, vol. 30, no. 1, pp. 811-820, 2015.
[10]
H. Ma, E. Dong, and Z. Liu, Privacy-preserving multi-authority ciphertext-policy attribute-based encryption with revocation, in Proc. of International Conference on Broadband and Wireless Computing, Communication and Applications, Taiwan, China, 2018, pp. 811-820.
[11]
K. Yang, X. Jia, and K. Ren, Attribute-based fine-grained access control with efficient revocation in cloud storage systems, in Proc. of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Hangzhou, China, 2013, pp. 523-528.
[12]
L. Zu, Z. Liu, and J. Li, New ciphertext-policy attribute-based encryption with efficient revocation, in Proc. of IEEE International Conference on Computer and Information Technology, Xi’an, China, 2014, pp. 281-287.
[13]
W. Sun, S. Yu, and W. Lou, Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud, IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 4, pp. 1187-1198, 2016.
[14]
H. Cui, H. R. Deng, and K. J. Liu, Attribute-based encryption with expressive and authorized keyword search, in Proc. of Australasian Conference on Information Security and Privacy, Auckland, New Zealand, 2017, pp. 106-126.
[15]
K. Xue, J. Hong, and Y. Xue, CABE: A new comparable attribute-based encryption construction with 0-encoding and 1-encoding, IEEE Transactions on Computers, vol. 66, no. 9, pp. 1491-1503, 2017.
[16]
D. D. Chen, Z. Cao, and X. L. Dong, Online/offline ciphertext-policy attribute-based searchable encryption, Journal of Computer Research and Development, vol. 53, no. 10, pp. 2365-2375, 2016.
[17]
Y. Zhao, M. Ren, and S. Jiang, An efficient and revocable storage CP-ABE scheme in the cloud computing, Computing, vol. 101, no. 4, pp. 1-25, 2018.
[18]
H. Qian, J. Li, and Y. Zhang, Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation, International Journal of Information Security, vol. 14, no. 6, pp. 487-477, 2015.
[19]
S. Canard, H. D. Phan, and D. Pointcheval, A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, Theoretical Computer Science, vol. 723, no. 5, pp. 51-72, 2018.
[20]
L. Xue, Y. Yu, and Y. Li, Efficient attribute-based encryption with attribute revocation for assured data deletion, Information Sciences, vol. 479, no. 4, pp. 640-650, 2018.
Tsinghua Science and Technology
Pages 579-588
Cite this article:
Du R, Tan A, Tian J. An Attribute-Based Encryption Scheme Based on Unrecognizable Trapdoors. Tsinghua Science and Technology, 2020, 25(5): 579-588. https://doi.org/10.26599/TST.2019.9010066

816

Views

74

Downloads

2

Crossref

N/A

Web of Science

3

Scopus

2

CSCD

Altmetrics

Received: 24 October 2019
Accepted: 04 November 2019
Published: 16 March 2020
© The author(s) 2020

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return