| Literature DB >> 25549257 |
Yanfeng Shi1, Jiqiang Liu1, Zhen Han1, Qingji Zheng2, Rui Zhang3, Shuo Qiu1.
Abstract
Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search (ABRKS), which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, ABRKS allows (i) the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii) the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy). We formalize the syntax and security definitions for ABRKS, and propose two concrete constructions for ABRKS: key-policy ABRKS and ciphertext-policy ABRKS. In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography.Entities:
Mesh:
Year: 2014 PMID: 25549257 PMCID: PMC4280219 DOI: 10.1371/journal.pone.0116325
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Property summary for PRES, ABE, ABPRE, ABKS in the literature and the solution in this paper.
| Scheme | Proxy Re-encryption | Keyword Search | Access Control |
| PRES |
|
|
|
| ABE |
|
|
|
| ABKS |
|
|
|
| ABPRE |
|
|
|
| ABRKS(Our solution) |
|
|
|
Figure 1System model of attribute-based access control for proxy re-encryption with keyword search.
Figure 2The high level idea of enabling keyword search over re-encrypted ciphertext by re-encryption.
Figure 3Sequence diagram for using in the application where the data owner shares his medical records with some professionals such that only authorized professionals can retrieve medical records of their interests.