Skip to main content

Privacy-Preserving Attribute-Based Multi-keyword Search Encryption Scheme with User Tracing

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11983))

Included in the following conference series:

Abstract

Attribute-based keyword search encryption (ABKSE) can provide fine-grained data sharing and keyword search over encrypted data. However, most of the existing ABKSE schemes need a large amount of computation cost in the encryption phase and only support single-keyword queries in the search phase, and the access policy embedded in the ciphertext cannot be hidden, which will leak some sensitive information to malicious user. Furthermore, some malicious authorized users could leak their secret keys to others for benefits, but it is difficult to identify the malicious users who disclosed the secret keys when the same attributes are shared by many users. To address the above problems, we propose a privacy-preserving attribute-based multi-keyword search encryption scheme with user tracing. In the proposed scheme, we adopt the AND gate on multi-value attribute technique to hide the access policy. Meanwhile, an aggregate technique is used to achieve fast multi-keyword search and Shamir’s threshold scheme is utilized to trace the malicious users. The security analysis demonstrates that the proposed scheme is selectively secure and fully traceable. Performance analysis shows that the proposed scheme is efficient and practical.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 44–55. IEEE, Berkeley (2000)

    Google Scholar 

  2. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_30

    Chapter  Google Scholar 

  3. Cao, N., Wang, C., Li, M., et al.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2011)

    Article  Google Scholar 

  4. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27

    Chapter  Google Scholar 

  5. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 321–334. ACM, Berkeley (2007)

    Google Scholar 

  6. Wang, H., Dong, X., Cao, Z., et al.: Secure and efficient attribute-based encryption with keyword search. Comput. J. 61(8), 1133–1142 (2018)

    Article  MathSciNet  Google Scholar 

  7. Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM, Alexandria (2006)

    Google Scholar 

  8. Wang, C., Li, W., Li, Y., Xu, X.: A ciphertext-policy attribute-based encryption scheme supporting keyword search function. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds.) CSS 2013. LNCS, vol. 8300, pp. 377–386. Springer, Cham (2013). https://doi.org/10.1007/978-3-319-03584-0_28

    Chapter  Google Scholar 

  9. Sun, W., Yu, S., Lou, W., et al.: Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans. Parallel Distrib. Syst. 27(4), 1187–1198 (2016)

    Article  Google Scholar 

  10. Zheng, Q., Xu, S., Ateniese, G.: VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: Proceedings of IEEE Conference on Computer Communications, pp. 522–530. IEEE, Toronto (2014)

    Google Scholar 

  11. Miao, Y., Ma, J., Liu, X., et al.: m2-ABKS: attribute-based multi-keyword search over encrypted personal health records in multi-owner setting. J. Med. Syst. 40(11), 1–12 (2016)

    Article  Google Scholar 

  12. Wang, S., Jia, S., Zhang, Y.: Verifiable and multi-keyword searchable attribute-based encryption scheme for cloud storage. IEEE Access 7, 50136–50147 (2019)

    Article  Google Scholar 

  13. Qiu, S., Liu, J., Shi, Y., et al.: Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack. Sci. China Inf. Sci. 60(5), 1 (2016)

    Article  MathSciNet  Google Scholar 

  14. Chaudhari, P., Das, M.: Privacy preserving searchable encryption with fine-grained access control. IEEE Trans. Cloud Comput. (2019). https://doi.org/10.1109/TCC.2019.2892116

  15. Liu, Z., Cao, Z., Wong, D.: White-box traceable ciphertextpolicy attribute-based encryption supporting any monotone access structures. IEEE Trans. Inf. Forensics Secur. 8(1), 76–88 (2013)

    Article  Google Scholar 

  16. Ning, J., Dong, X., Cao, Z., et al.: White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans. Inf. Forensics Secur. 10(6), 1274–1288 (2015)

    Article  Google Scholar 

  17. Wang, H., Dong, X., Cao, Z.: Multi-value-independent ciphertext-policy attribute based encryption with fast keyword search. IEEE Trans. Serv. Comput. (2017). https://doi.org/10.1109/TSC.2017.2753231

  18. Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440–456. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_26

    Chapter  Google Scholar 

  19. Schwartz, J.: Fast probabilistic algorithms for verification of polynomial identities. J. ACM 27(4), 701–717 (1980)

    Article  MathSciNet  Google Scholar 

  20. Caro, A., Iovino, V.: JPBC: Java pairing based cryptography. In: Proceedings of 2011 IEEE Symposium on Computers and Communications, pp. 850–855. IEEE, Kerkyra (2011)

    Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China under Grants No. 61807026, the Natural Science Basic Research Plan in Shaanxi Province of China under Grant No. 2019JM-198, the Plan For Scientific Innovation Talent of Henan Province under Grant No. 184100510012, and in part by the Program for Science and Technology Innovation Talents in the Universities of Henan Province under Grant No. 18HASTIT022.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yan Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, Z., Liu, Y., Xu, J., Wang, B. (2019). Privacy-Preserving Attribute-Based Multi-keyword Search Encryption Scheme with User Tracing. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11983. Springer, Cham. https://doi.org/10.1007/978-3-030-37352-8_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37352-8_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37351-1

  • Online ISBN: 978-3-030-37352-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics