| Literature DB >> 30383840 |
Shangping Wang1, Tingting Gao1, Yaling Zhang2.
Abstract
With the development of outsourcing data services, data security has become an urgent problem that needs to be solved. Attribute-based encryption is a valid solution to data security in cloud storage. There is no existing scheme that can guarantee the privacy of access structures and achieve attribute-based encryption with keyword search and attribute revocation. In this article, we propose a new searchable and revocable multi-data owner attribute-based encryption scheme with a hidden policy in cloud storage. In the new scheme, the same access policy is used in both the keyword index and message encryption. The advantage of keyword index with access policy is that as long as a user's attributes satisfy the access policy, the searched ciphertext can be correctly decrypted. This property improves the accuracy of the search results. The hidden policy is used in both the ciphertext and the keyword index to protect users' privacy. The new scheme contains attribute revocation, which is suitable for the actual situation that a user's attributes maybe changed over time. In the general bilinear group model, the security of the scheme is demonstrated, and the efficiency of the scheme is analyzed.Entities:
Mesh:
Year: 2018 PMID: 30383840 PMCID: PMC6211670 DOI: 10.1371/journal.pone.0206126
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1System model.
Computational complexity.
| Algorithm | Computational complexity | |||
|---|---|---|---|---|
| [ | [ | [ | Our scheme | |
| Establish | 3 | 3 | ||
| KeyGen | (2 | (2 | 3 | 2 |
| Encrypted ciphertext | × | × | (3 | (2 |
| Encrypted index | (2 | (2 | × | 2 |
| Token | (2 | (2 | × | (2 |
| Search | (2 | (2 | × | (2 |
| Decrypt | × | × | 2 | (2 |
Functional comparison.
| Scheme | Hidden policy | Multi owners | Encrypt | Update | |
|---|---|---|---|---|---|
| Miao Y[ | × | √ | × | √ | × |
| Yang K[ | × | × | √ | × | √ |
| Qiu S [ | √ | × | × | √ | × |
| Zhong H[ | √ | × | √ | × | √ |
| Our scheme | √ | √ | √ | √ | √ |
Fig 2Computation comparison.