| Literature DB >> 29973569 |
Axin Wu1,2, Dong Zheng3,4, Yinghui Zhang5,6, Menglei Yang7.
Abstract
Attribute-based encryption can be used to realize fine-grained data sharing in open networks. However, in practical applications, we have to address further challenging issues, such as attribute revocation and data search. How do data users search for the data they need in massive amounts of data? When users leave the system, they lose the right to decrypt the shared data. In this case, how do we ensure that revoked users cannot decrypt shared data? In this paper, we successfully address these issues by proposing a hidden policy attribute-based data sharing scheme with direct revocation and keyword search. In the proposed scheme, the direct revocation of attributes does not need to update the private key of non-revoked users during revocation. In addition, a keyword search is realized in our scheme, and the search time is constant with the increase in attributes. In particular, the policy is hidden in our scheme, and hence, users’ privacy is protected. Our security and performance analyses show that the proposed scheme can tackle the security and efficiency concerns in cloud computing.Entities:
Keywords: attribute-based encryption; cloud computing; direct revocation; hidden policy; keyword search
Year: 2018 PMID: 29973569 PMCID: PMC6069486 DOI: 10.3390/s18072158
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Subset cover.
Figure 2The data sharing system. CT is the ciphertext, I is the keyword index, R′ is the revocation list, T is the keyword trapdoor and SK is the secret key.
Figure 3User registration.
Figure 4Ciphertext uploaded.
Figure 5Trapdoor generation.
Figure 6Ciphertext decryption.
Feature comparison of our scheme and other typical schemes .
| Scheme | KS | FKS | DR | HP | CO | SO |
|---|---|---|---|---|---|---|
| [ | × | × | √ | × | − |
|
| [ | × | × | √ | √ | − |
|
| [ | √ | × | × | √ |
|
|
| [ | √ | √ | × | √ |
|
|
| [ | √ | √ | √ | × |
|
|
| Our scheme | √ | √ | √ | √ |
|
|
The symbol √ (resp. ×) represents the corresponding feature is (resp. is not) achieved in the scheme. KS means keyword search, FKS means fast keyword search, DR means direct revocation, HP means hidden policy, CO means communication overhead and SO means storage sverhead. |S| means the number of user attributes, |Z| means the bit length of an element of , |G| means the bit length of an element of , |I| means the bit length of user ID, |L| means the number of rows of the access control matrix, |P| means the number of columns of the access control structure, |C| means the cardinality of cover(R), |R| means the cardinality of a revocation list, |M| means the maximum number of revoked users and |N| means the number of keywords.
Figure 7The comparison of keyword search performance.