Skip to main content

Attribute-Based and Keywords Vector Searchable Public Key Encryption

  • Conference paper
  • First Online:
Smart Computing and Communication (SmartCom 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10135))

Included in the following conference series:

  • 2700 Accesses

Abstract

Nowadays, for third-party cloud platforms are not fully trustable, in order to ensure data security and user privacy when storing data on cloud servers, many enterprises and users choose to store their data in the ciphertext form. So it is essential to search the needed cryptographic information in the cloud servers. In this paper, we proposed public key encryption module based on the attributes-multi keyword vector. Firstly, we adopt the prime order bilinear pairings method to improve time efficiency. Secondly, we introduced the attribute and keywords vector to optimize the vector encryption algorithm. Finally, considering conditions of the limited resources, we proposed the storage domain differentiation policy to save the computing resources and improve efficiency. In order to verify the result of this module, we built up a system based on jPBC, a Java class library. The result shows that the system can achieve the strict access control and multi-user shared fast search mechanism. In the future, it will be applied to the new medical cloud scenes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008. LNCS, vol. 5072, pp. 1249–1259. Springer, Heidelberg (2008). doi:10.1007/978-3-540-69839-5_96

    Chapter  Google Scholar 

  2. Boneh, D., Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. Springer, Berlin, Heidelberg (2003)

    MATH  Google Scholar 

  3. Chang, Y.C., Michael, M.: Privacy Preserving Keyword Searches on Remote Encrypted Data. Springer, Berlin, Heidelberg (2015)

    MATH  Google Scholar 

  4. Dong, C., Russello, G., Dulay, N.: Shared and searchable encrypted data for untrusted servers. J. Comput. Secur. 19(3), 367–397 (2008)

    Article  Google Scholar 

  5. Bao, F., Deng, R.H., Ding, X., Yang, Y.: Private query on encrypted data in multi-user settings. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 71–85. Springer, Heidelberg (2008). doi:10.1007/978-3-540-79104-1_6

    Chapter  Google Scholar 

  6. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, 30 October–November, pp. 89–98 (2006)

    Google Scholar 

  7. Hattori, M., Hirano, T., Takashi, I., Matsuda, N., Takumi, M., Sakai, Y., Kazuo, O.: Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting. Springer, Berlin, Heidelberg (2011)

    Book  MATH  Google Scholar 

  8. Lai, J., Deng, R.H., Liu, S., Weng, J., Zhao, Y.: Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack. Springer, Berlin, Heidelberg (2014)

    Book  MATH  Google Scholar 

  9. Michel, A., Mihir, B., Dario, C., Eike, K., Tadayoshi, K., Tanja, L., John, M.L., Gregory, N., Pascal, P., Shi, H.X.: Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. J. Cryptol. 21(3), 350–391 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  10. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). doi:10.1007/11426639_27

    Chapter  Google Scholar 

  11. Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium on Security & Privacy, pp. 44–55 (2000)

    Google Scholar 

  12. Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). doi:10.1007/978-3-642-19379-8_4

    Chapter  Google Scholar 

  13. Yang, Y., Lu, H., Weng, J.: Multi-user private keyword search for cloud computing. In: Proceedings of IEEE International Conference on Cloud Computing Technology and Science, Cloudcom 2011, Athens, Greece, 29 November–December, pp. 264–271 (2011)

    Google Scholar 

  14. Zhu, B., Zhu, B., Ren, K.: Peksrand: providing predicate privacy in public-key encryption with keyword search. In: ICC, vol. 2010(4), pp. 1–6 (2011)

    Google Scholar 

Download references

Acknowledgements

The authors gratefully acknowledge the contribution of the National Science Foundation of China [61572330][61472258], the Natural Science foundation of Guangdong Province [2014A030313554], and the Technology Planning Project (Grant No. 2014B010 118005) from Guangdong Province.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yanli Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Wang, H., Li, J., Yang, Y., Ming, Z. (2017). Attribute-Based and Keywords Vector Searchable Public Key Encryption. In: Qiu, M. (eds) Smart Computing and Communication. SmartCom 2016. Lecture Notes in Computer Science(), vol 10135. Springer, Cham. https://doi.org/10.1007/978-3-319-52015-5_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-52015-5_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-52014-8

  • Online ISBN: 978-3-319-52015-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics