Abstract

Public key encryption with keyword search (PEKS) allows a cloud server to retrieve particular ciphertexts without leaking the contents of the searched ciphertexts. This kind of cryptographic primitive gives users a special way to retrieve the encrypted documents they need while preserving privacy. Nevertheless, most existing PEKS schemes only offer single-keyword search or conjunctive-keyword searcha. The poorly expressive ability and constantly inaccurate search results make them hard to meet users' requirements. Although several expressive PEKS (EPEKS) schemes were proposed, they entail high computation and communication costs. An ideal EPEKS scheme should enable fast and accurate ciphertext retrieval, while lowering the storage server's load and reducing the amount of communication data. Drawing on the strongly expressive ability of key-policy attribute-based encryption (KP-ABE), we propose a generic construction of EPEKS from KP-ABE. We demonstrate that the derived EPEKS scheme is secure under the chosen keyword attack if the implicit KP-ABE scheme fulfills the anonymity under the chosen plaintext attack. Furthermore, we present a concrete EPEKS scheme over the prime-order groups. The comparison and experimental results indicate that our scheme is more efficient than the existing EPEKS schemes.

Highlights

  • With the prevalence of the Internet and the widespread application of cloud computing technology, personal privacy information often undergoes massive transmission via channels such as computer networks and public communication devices

  • This paper proposes a generic construction of expressive PEKS (EPEKS) from key-policy attribute-based encryption (KP-attribute-based encryption (ABE)) and gives an efficient EPEKS scheme over the prime-order groups

  • If the user attributes are regarded as the search keywords, the private key generation algorithm in the KP-ABE scheme could be used to generate the trapdoors of search keywords in the EPEKS scheme

Read more

Summary

INTRODUCTION

With the prevalence of the Internet and the widespread application of cloud computing technology, personal privacy information often undergoes massive transmission via channels such as computer networks and public communication devices. In 2016, Cui et al [27] embedded the LSSS structure into keyword search and, for the first time, implemented an EPEKS scheme over the prime-order groups Both the communication cost and the computation cost of the scheme remain high. If the user attributes are regarded as the search keywords, the private key generation algorithm in the KP-ABE scheme could be used to generate the trapdoors of search keywords in the EPEKS scheme. The strong access control ability of KP-ABE on user screening could be inherited by the derived EPEKS scheme to screen files Such transformation is unsuitable to most existing KP-ABE schemes, because these schemes should attach an attribute set behind the generated ciphertext and don’t provide any protection to the user attributes.

PRELIMINARIES
AN ANONYMOUS KP-ABE SCHEME
SECURITY OF THE PROPOSED KP-ABE SCHEME
AN EFFICIENT EPEKS SCHEME
PERFORMANCE ANALYSIS
CONCLUSION AND PROSPECT
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call