Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search

Haijiang Wang, Xiaolei Dong, Zhenfu Cao

Research output: Contribution to journalArticlepeer-review

67 Scopus citations

Abstract

ABKS has drawn much attention from research and industry in recent years, an ABKS scheme is an encryption scheme that supports keyword search and access control. Attribute-Based Encryption is a public key encryption that enables users to encrypt and decrypt message based on attributes. In a typical implementation, the size of the ciphertext is proportional to the number of attributes associated with it and the decryption time is proportional to the number of attributes used during decryption. Inherit from ABE technology, the computation cost and ciphertext size in most ABKS schemes grow with the complexity of the access policy. On the other hand, we found that the traditional ABKS schemes cannot resist our secret-key-recovery attack. To deal with the above problems, we present new ciphertext policy attribute based encryption with fast keyword search constructions. Our constructions preserve the fine-grained access control inherited from the ABE system while supporting hidden policy and fast keyword search. Our constructions feature multi-value-independent compared with the existing attribute based searchable encryption schemes. The performance analysis demonstrates the efficiency of our constructions. We offer rigorous security proof of our second scheme, which is IND-CKA and IND-CPA secure.

Original languageEnglish
Article number8039213
Pages (from-to)1142-1151
Number of pages10
JournalIEEE Transactions on Services Computing
Volume13
Issue number6
DOIs
StatePublished - 1 Nov 2020

Keywords

  • Ciphertext-policy attribute-based encryption
  • commercial applications
  • fast keyword search
  • multi-value-Independent
  • searchable encryption

Fingerprint

Dive into the research topics of 'Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search'. Together they form a unique fingerprint.

Cite this