Verifiable Keyword Search Encryption Scheme That Supports Revocation of Attributes

نویسندگان

چکیده

In recent years, searchable encryption technology and attribute have been widely used in cloud storage environments, attribute-based schemes can both achieve the retrieval of encrypted data effectively solve access control problem. Considering that existing for only support keyword search do not revocation, most revocation consider computational overhead users ignore large amount resources consumed by authorization centers when updating keys. addition, may lead to partial errors returned results, leading wastage broadband resources. To these issues, this paper proposes an scheme supports is verifiable. realize fine-grained ciphertext data, scenarios dynamic changes user attributes, ensure third-party servers perform process reliably honestly while minimizing computation costs, first, implements with center creating a list key list. At same time, system updates at time request, which reduces overhead. Second, auditor introduced correctness results. Finally, security verified theoretical analysis, efficiency practicality are comparing it other through simulation experiments.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data

As the Cloud Computing technology becomes mature, the need increases rapidly to store sensitive data securely on the cloud server. Since the cloud is not trusted, the data should be stored in an encrypted form at the server. An inherent problem is how to query the encrypted data efficiently. Recently, some searchable encryption schemes have been proposed in the literatures. Although the existin...

متن کامل

A New Efficient Verifiable Fuzzy Keyword Search Scheme

Data outsourcing has attracted considerable attentions recently. It can not only bring high quality data service to users, it also reduces their burden of data storage and maintenance. As the confidentiality of sensitive data, it should be encrypted before outsourcing. To achieve search over the encrypted data becomes a challenging problem. Although the existing searchable encryption schemes al...

متن کامل

Public Key Encryption with Conjunctive Field Free Keyword Search Scheme

Searchable encryption allows a remote server to search over encrypted documents without knowing the sensitive data contents. Prior searchable symmetric encryption schemes focus on single keyword search. Conjunctive Keyword Searches (CKS) schemes improve system usability by retrieving the matched documents. In this type of search, the user has to repeatedly perform the search protocol for many t...

متن کامل

Linear Encryption with Keyword Search

Nowadays an increasing amount of data stored in the public cloud need to be searched remotely for fast accessing. For the sake of privacy, the remote files are usually encrypted, which makes them difficult to be searched by remote servers. It is also harder to efficiently share encrypted data in the cloud than those in plaintext. In this paper, we develop a searchable encryption framework calle...

متن کامل

Generic Codes Based Traitor Tracing Scheme with Revocation Ability from Attributes Based Encryption

Traitor tracing is needed because some users in broadcast encryption system may give out their decryption keys to construct pirate decoders. Many codes based traitor tracing scheme were proposed. However, as stated by Billet and Phan in ICITS 2008, they lack of revocation ability. We provide a generic scheme of codes based traitor tracing with revocation ability, based on ciphertextpolicy attri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Symmetry

سال: 2023

ISSN: ['0865-4824', '2226-1877']

DOI: https://doi.org/10.3390/sym15040914