Cargando…

Attribute-Based Proxy Re-Encryption with Keyword Search

Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption w...

Descripción completa

Detalles Bibliográficos
Autores principales: Shi, Yanfeng, Liu, Jiqiang, Han, Zhen, Zheng, Qingji, Zhang, Rui, Qiu, Shuo
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4280219/
https://www.ncbi.nlm.nih.gov/pubmed/25549257
http://dx.doi.org/10.1371/journal.pone.0116325
_version_ 1782350827499814912
author Shi, Yanfeng
Liu, Jiqiang
Han, Zhen
Zheng, Qingji
Zhang, Rui
Qiu, Shuo
author_facet Shi, Yanfeng
Liu, Jiqiang
Han, Zhen
Zheng, Qingji
Zhang, Rui
Qiu, Shuo
author_sort Shi, Yanfeng
collection PubMed
description Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search ([Image: see text]), which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, [Image: see text] allows (i) the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii) the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy). We formalize the syntax and security definitions for [Image: see text], and propose two concrete constructions for [Image: see text]: key-policy [Image: see text] and ciphertext-policy [Image: see text]. In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography.
format Online
Article
Text
id pubmed-4280219
institution National Center for Biotechnology Information
language English
publishDate 2014
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-42802192015-01-07 Attribute-Based Proxy Re-Encryption with Keyword Search Shi, Yanfeng Liu, Jiqiang Han, Zhen Zheng, Qingji Zhang, Rui Qiu, Shuo PLoS One Research Article Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search ([Image: see text]), which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, [Image: see text] allows (i) the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii) the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy). We formalize the syntax and security definitions for [Image: see text], and propose two concrete constructions for [Image: see text]: key-policy [Image: see text] and ciphertext-policy [Image: see text]. In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography. Public Library of Science 2014-12-30 /pmc/articles/PMC4280219/ /pubmed/25549257 http://dx.doi.org/10.1371/journal.pone.0116325 Text en © 2014 Shi et al http://creativecommons.org/licenses/by/4.0/ This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are properly credited.
spellingShingle Research Article
Shi, Yanfeng
Liu, Jiqiang
Han, Zhen
Zheng, Qingji
Zhang, Rui
Qiu, Shuo
Attribute-Based Proxy Re-Encryption with Keyword Search
title Attribute-Based Proxy Re-Encryption with Keyword Search
title_full Attribute-Based Proxy Re-Encryption with Keyword Search
title_fullStr Attribute-Based Proxy Re-Encryption with Keyword Search
title_full_unstemmed Attribute-Based Proxy Re-Encryption with Keyword Search
title_short Attribute-Based Proxy Re-Encryption with Keyword Search
title_sort attribute-based proxy re-encryption with keyword search
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4280219/
https://www.ncbi.nlm.nih.gov/pubmed/25549257
http://dx.doi.org/10.1371/journal.pone.0116325
work_keys_str_mv AT shiyanfeng attributebasedproxyreencryptionwithkeywordsearch
AT liujiqiang attributebasedproxyreencryptionwithkeywordsearch
AT hanzhen attributebasedproxyreencryptionwithkeywordsearch
AT zhengqingji attributebasedproxyreencryptionwithkeywordsearch
AT zhangrui attributebasedproxyreencryptionwithkeywordsearch
AT qiushuo attributebasedproxyreencryptionwithkeywordsearch