Abstract
Attribute-based keyword search encryption (ABKSE) can provide fine-grained data sharing and keyword search over encrypted data. However, most of the existing ABKSE schemes need a large amount of computation cost in the encryption phase and only support single-keyword queries in the search phase, and the access policy embedded in the ciphertext cannot be hidden, which will leak some sensitive information to malicious user. Furthermore, some malicious authorized users could leak their secret keys to others for benefits, but it is difficult to identify the malicious users who disclosed the secret keys when the same attributes are shared by many users. To address the above problems, we propose a privacy-preserving attribute-based multi-keyword search encryption scheme with user tracing. In the proposed scheme, we adopt the AND gate on multi-value attribute technique to hide the access policy. Meanwhile, an aggregate technique is used to achieve fast multi-keyword search and Shamir’s threshold scheme is utilized to trace the malicious users. The security analysis demonstrates that the proposed scheme is selectively secure and fully traceable. Performance analysis shows that the proposed scheme is efficient and practical.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 44–55. IEEE, Berkeley (2000)
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_30
Cao, N., Wang, C., Li, M., et al.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222–233 (2011)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 321–334. ACM, Berkeley (2007)
Wang, H., Dong, X., Cao, Z., et al.: Secure and efficient attribute-based encryption with keyword search. Comput. J. 61(8), 1133–1142 (2018)
Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM, Alexandria (2006)
Wang, C., Li, W., Li, Y., Xu, X.: A ciphertext-policy attribute-based encryption scheme supporting keyword search function. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds.) CSS 2013. LNCS, vol. 8300, pp. 377–386. Springer, Cham (2013). https://doi.org/10.1007/978-3-319-03584-0_28
Sun, W., Yu, S., Lou, W., et al.: Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans. Parallel Distrib. Syst. 27(4), 1187–1198 (2016)
Zheng, Q., Xu, S., Ateniese, G.: VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: Proceedings of IEEE Conference on Computer Communications, pp. 522–530. IEEE, Toronto (2014)
Miao, Y., Ma, J., Liu, X., et al.: m2-ABKS: attribute-based multi-keyword search over encrypted personal health records in multi-owner setting. J. Med. Syst. 40(11), 1–12 (2016)
Wang, S., Jia, S., Zhang, Y.: Verifiable and multi-keyword searchable attribute-based encryption scheme for cloud storage. IEEE Access 7, 50136–50147 (2019)
Qiu, S., Liu, J., Shi, Y., et al.: Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack. Sci. China Inf. Sci. 60(5), 1 (2016)
Chaudhari, P., Das, M.: Privacy preserving searchable encryption with fine-grained access control. IEEE Trans. Cloud Comput. (2019). https://doi.org/10.1109/TCC.2019.2892116
Liu, Z., Cao, Z., Wong, D.: White-box traceable ciphertextpolicy attribute-based encryption supporting any monotone access structures. IEEE Trans. Inf. Forensics Secur. 8(1), 76–88 (2013)
Ning, J., Dong, X., Cao, Z., et al.: White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans. Inf. Forensics Secur. 10(6), 1274–1288 (2015)
Wang, H., Dong, X., Cao, Z.: Multi-value-independent ciphertext-policy attribute based encryption with fast keyword search. IEEE Trans. Serv. Comput. (2017). https://doi.org/10.1109/TSC.2017.2753231
Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440–456. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_26
Schwartz, J.: Fast probabilistic algorithms for verification of polynomial identities. J. ACM 27(4), 701–717 (1980)
Caro, A., Iovino, V.: JPBC: Java pairing based cryptography. In: Proceedings of 2011 IEEE Symposium on Computers and Communications, pp. 850–855. IEEE, Kerkyra (2011)
Acknowledgments
This work is supported by the National Natural Science Foundation of China under Grants No. 61807026, the Natural Science Basic Research Plan in Shaanxi Province of China under Grant No. 2019JM-198, the Plan For Scientific Innovation Talent of Henan Province under Grant No. 184100510012, and in part by the Program for Science and Technology Innovation Talents in the Universities of Henan Province under Grant No. 18HASTIT022.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Liu, Z., Liu, Y., Xu, J., Wang, B. (2019). Privacy-Preserving Attribute-Based Multi-keyword Search Encryption Scheme with User Tracing. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11983. Springer, Cham. https://doi.org/10.1007/978-3-030-37352-8_34
Download citation
DOI: https://doi.org/10.1007/978-3-030-37352-8_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37351-1
Online ISBN: 978-3-030-37352-8
eBook Packages: Computer ScienceComputer Science (R0)