Cargando…
Attribute-Based Proxy Re-Encryption with Keyword Search
Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption w...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2014
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4280219/ https://www.ncbi.nlm.nih.gov/pubmed/25549257 http://dx.doi.org/10.1371/journal.pone.0116325 |
_version_ | 1782350827499814912 |
---|---|
author | Shi, Yanfeng Liu, Jiqiang Han, Zhen Zheng, Qingji Zhang, Rui Qiu, Shuo |
author_facet | Shi, Yanfeng Liu, Jiqiang Han, Zhen Zheng, Qingji Zhang, Rui Qiu, Shuo |
author_sort | Shi, Yanfeng |
collection | PubMed |
description | Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search ([Image: see text]), which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, [Image: see text] allows (i) the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii) the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy). We formalize the syntax and security definitions for [Image: see text], and propose two concrete constructions for [Image: see text]: key-policy [Image: see text] and ciphertext-policy [Image: see text]. In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography. |
format | Online Article Text |
id | pubmed-4280219 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2014 |
publisher | Public Library of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-42802192015-01-07 Attribute-Based Proxy Re-Encryption with Keyword Search Shi, Yanfeng Liu, Jiqiang Han, Zhen Zheng, Qingji Zhang, Rui Qiu, Shuo PLoS One Research Article Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search ([Image: see text]), which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, [Image: see text] allows (i) the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii) the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy). We formalize the syntax and security definitions for [Image: see text], and propose two concrete constructions for [Image: see text]: key-policy [Image: see text] and ciphertext-policy [Image: see text]. In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography. Public Library of Science 2014-12-30 /pmc/articles/PMC4280219/ /pubmed/25549257 http://dx.doi.org/10.1371/journal.pone.0116325 Text en © 2014 Shi et al http://creativecommons.org/licenses/by/4.0/ This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are properly credited. |
spellingShingle | Research Article Shi, Yanfeng Liu, Jiqiang Han, Zhen Zheng, Qingji Zhang, Rui Qiu, Shuo Attribute-Based Proxy Re-Encryption with Keyword Search |
title | Attribute-Based Proxy Re-Encryption with Keyword Search |
title_full | Attribute-Based Proxy Re-Encryption with Keyword Search |
title_fullStr | Attribute-Based Proxy Re-Encryption with Keyword Search |
title_full_unstemmed | Attribute-Based Proxy Re-Encryption with Keyword Search |
title_short | Attribute-Based Proxy Re-Encryption with Keyword Search |
title_sort | attribute-based proxy re-encryption with keyword search |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4280219/ https://www.ncbi.nlm.nih.gov/pubmed/25549257 http://dx.doi.org/10.1371/journal.pone.0116325 |
work_keys_str_mv | AT shiyanfeng attributebasedproxyreencryptionwithkeywordsearch AT liujiqiang attributebasedproxyreencryptionwithkeywordsearch AT hanzhen attributebasedproxyreencryptionwithkeywordsearch AT zhengqingji attributebasedproxyreencryptionwithkeywordsearch AT zhangrui attributebasedproxyreencryptionwithkeywordsearch AT qiushuo attributebasedproxyreencryptionwithkeywordsearch |