Journal Home > Volume 25 , Issue 5

Attribute-Based Encryption (ABE) has been widely used for ciphertext retrieval in the cloud environment. However, bi-flexible attribute control and privacy keywords are difficult problems that have yet to be solved. In this paper, we introduce the denial of access policy and the mutual matching algorithm of a dataset used to realize bidirectional control of attributes in the cloud server. To solve the problem of keyword privacy, we construct a security trapdoor by adding random numbers that effectively resist keyword guessing attacks from cloud servers and external attackers. System security is reduced to the Deterministic Bilinear Diffie-Hellman (DBDH) hypothesis problem. We validate our scheme through theoretical security analysis and experimental verification. Experiments are conducted on a real dataset, and results show that the scheme has higher security and retrieval efficiency than previous methods.


menu
Abstract
Full text
Outline
About this article

An Attribute-Based Encryption Scheme Based on Unrecognizable Trapdoors

Show Author's information Ruizhong Du( )Ailun TanJunfeng Tian
Cyberspace Security and Computer College, Hebei University, Baoding 071002, China.
Key Laboratory on High Trusted Information System in Hebei Province, Baoding 071002, China.

Abstract

Attribute-Based Encryption (ABE) has been widely used for ciphertext retrieval in the cloud environment. However, bi-flexible attribute control and privacy keywords are difficult problems that have yet to be solved. In this paper, we introduce the denial of access policy and the mutual matching algorithm of a dataset used to realize bidirectional control of attributes in the cloud server. To solve the problem of keyword privacy, we construct a security trapdoor by adding random numbers that effectively resist keyword guessing attacks from cloud servers and external attackers. System security is reduced to the Deterministic Bilinear Diffie-Hellman (DBDH) hypothesis problem. We validate our scheme through theoretical security analysis and experimental verification. Experiments are conducted on a real dataset, and results show that the scheme has higher security and retrieval efficiency than previous methods.

Keywords: Attribute-Based Encryption (ABE), unrecognizable trapdoor, two-way access strategy, ciphertext search

References(20)

[1]
D. Song, D. Wagner, and A. Perrig, Practical techniques for searches on encrypted data, in Proc. of IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 2000, pp. 44-55.
[2]
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, Public key encryption with keyword search, in Proc. of Advances in Cryptology-Eurocrypt, Interlaken, Switzerland, 2004, pp. 506-522.
DOI
[3]
L. M. Fang, W. Susilo, and C. Ge, Public key encryption with keyword search secure against keyword guessing attacks without random oracle, Information Sciences, vol. 238, no. 7, pp. 221-241, 2017.
[4]
Z. Y. Shao and B. Yang, On security against the server in designated tester public key encryption with keyword search, Information Processing Letters, vol. 115, no. 8, pp. 1757-1761, 2015.
[5]
A. Sahai and B. Waters, Fuzzy identity-based encryption, in Proc. of International Conference on Theory and Applications of Cryptographic Techniques, Berlin, Germany, 2005, pp. 457-473.
DOI
[6]
J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attribute-based encryption, in Proc. of IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 2007, pp. 321-334.
DOI
[7]
M. Pirretti, P. Traynor, P. Mcdaniel, and B. Waters, Secure attribute-based systems, Journal of Computer Security, vol. 18, no. 5, pp. 799-837, 2010.
[8]
J. Hur and K. D. Noh, Attribute-based access control with efficient revocation in data outsourcing systems, IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 7, pp. 814-821, 2011.
[9]
J. Li, Y. Shi, and Y. Zhang, Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage, International Journal of Communication Systems, vol. 30, no. 1, pp. 811-820, 2015.
[10]
H. Ma, E. Dong, and Z. Liu, Privacy-preserving multi-authority ciphertext-policy attribute-based encryption with revocation, in Proc. of International Conference on Broadband and Wireless Computing, Communication and Applications, Taiwan, China, 2018, pp. 811-820.
DOI
[11]
K. Yang, X. Jia, and K. Ren, Attribute-based fine-grained access control with efficient revocation in cloud storage systems, in Proc. of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Hangzhou, China, 2013, pp. 523-528.
DOI
[12]
L. Zu, Z. Liu, and J. Li, New ciphertext-policy attribute-based encryption with efficient revocation, in Proc. of IEEE International Conference on Computer and Information Technology, Xi’an, China, 2014, pp. 281-287.
DOI
[13]
W. Sun, S. Yu, and W. Lou, Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud, IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 4, pp. 1187-1198, 2016.
[14]
H. Cui, H. R. Deng, and K. J. Liu, Attribute-based encryption with expressive and authorized keyword search, in Proc. of Australasian Conference on Information Security and Privacy, Auckland, New Zealand, 2017, pp. 106-126.
DOI
[15]
K. Xue, J. Hong, and Y. Xue, CABE: A new comparable attribute-based encryption construction with 0-encoding and 1-encoding, IEEE Transactions on Computers, vol. 66, no. 9, pp. 1491-1503, 2017.
[16]
D. D. Chen, Z. Cao, and X. L. Dong, Online/offline ciphertext-policy attribute-based searchable encryption, Journal of Computer Research and Development, vol. 53, no. 10, pp. 2365-2375, 2016.
[17]
Y. Zhao, M. Ren, and S. Jiang, An efficient and revocable storage CP-ABE scheme in the cloud computing, Computing, vol. 101, no. 4, pp. 1-25, 2018.
[18]
H. Qian, J. Li, and Y. Zhang, Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation, International Journal of Information Security, vol. 14, no. 6, pp. 487-477, 2015.
[19]
S. Canard, H. D. Phan, and D. Pointcheval, A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, Theoretical Computer Science, vol. 723, no. 5, pp. 51-72, 2018.
[20]
L. Xue, Y. Yu, and Y. Li, Efficient attribute-based encryption with attribute revocation for assured data deletion, Information Sciences, vol. 479, no. 4, pp. 640-650, 2018.
Publication history
Copyright
Rights and permissions

Publication history

Received: 24 October 2019
Accepted: 04 November 2019
Published: 16 March 2020
Issue date: October 2020

Copyright

© The author(s) 2020

Rights and permissions

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return