Abstract:Attribute-based proxy re-encryption mechanism can not only realize data sharing but also achieve data forwarding. However, this mechanism can not support the functionality of data retrieval, which hinders the applications of attribute-based proxy re-encryption. In order to solve the issue, this paper proposes a ciphertext- policy attribute-based proxy re-encryption scheme with keyword search. By dividing a secret key into an attribute key and a search key, the new scheme can not only achieve the keyword search, but also support proxy re- encryption. In the test phase, while conducting the keywords matching algorithm, the cloud server can do partial decryption of the original ciphertext and the re-encrypted ciphertext, which can reduce the computational burden for users. The security analysis indicates that the proposed scheme can achieve data security, hidden keywords, query isolation and collusion resistance.
YANG Chaowei, HUANG Qunying, LI Zhenlong, et al. Big data and cloud computing: Innovation opportunities and challenges[J]. International Journal of Digital Earth, 2017, 10(1): 13-53. doi: 10.1080/17538947.2016.1239771.
HUANG Haiping, DU Jianpeng, DAI Hua, et al. Multi-sever multi-keyword searchable encryption scheme based on cloud storage. Journal of Electronics & Information Technology, 2017, 39(2): 389-396. doi: 10.11999/JEIT160338.
WANG Guangbo and WANG Jianhua. Research on cloud storage scheme with attribute-based encryption[J]. Journal of Electronics & Information Technology, 2016, 38(11): 2931-2939. doi: 10.11999/JEIT160064.
[4]
ATTRAPADUNG N, HANAOKA G, MATSUMOTO T, et al. Attribute based encryption with direct efficiency tradeoff[C]. Proceedings of the 14th International Conference on Applied Cryptography and Network Security, London, United Kindom, 2016: 249-266. doi: 10.1007/978-3-319-39555-5_14.
[5]
SAHAI A and WATERS B. Fuzzy identity-based encryption[C]. Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 2005: 457-473. doi: 10.1007 /11426639_27.
[6]
GOYAL V, PANDEY O, SAHAI A, et al. Attribute-based encryption for fine-grained access control of encrypted data[C]. Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, 2006: 89-98. doi: 10.1145/1180405.1180418.
[7]
WATERS B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization[C]. Proceedings of 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, 2011: 53-70. doi: 10.1007/978-3-642-19379-8_4.
[8]
GUO Shanqing, ZENG Yingpei, WEI Juan, et al. Attribute- based re-encryption scheme in the standard model[J]. Wuhan University Journal of Natural Sciences, 2008, 13(5): 621-625. doi: 10.1007/s11859-008-0522-5.
[9]
LIANG Xiaohui, CAO Zhenfu, LIN Huang, et al. Attribute based proxy re-encryption with delegating capabilities[C]. Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia, 2009: 276-286. doi: 10.1145/1533057. 1533094.
[10]
LIANG Kaitai, FANG Liming, SUSILO W, et al. A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security[C]. Proceedings of the 5th Intelligent Networking and Collaborative Systems (INCoS), Xi’an, China, 2013: 552-559. doi: 10.1109/INCoS.2013.103.
[11]
GE Chunpeng, SUSILO W, WANG Jiandong, et al. A key- policy aattribute-based proxy re-encryption without random oracles[J]. The Computer Journal, 2016, 59(7): 970-982. doi: 10.1093/comjnl/bxv100.
[12]
ZHANG Yinghui, LI Jin, CHEN Xiaofeng, et al. Anonymous attribute-based proxy re-encryption for access control in cloud computing[J]. Security and Communication Networks, 2016, 9(14): 2397-2411. doi: 10.1002/sec.1509.
[13]
SHI Yanfeng, LIU Jiqiang, HAN Zhen, et al. Attribute-based proxy re-rncryption with keyword search[J]. PloS One, 2014, 9(12): e116325(1-24). doi: 10.1371/journal.pone.0116325.
[14]
LIANG Kaitai and SUSILO W. Searchable attribute-based mechanism with efficient data sharing for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9): 1981-1992. doi: 10.1109/TIFS.2015. 2442215.
[15]
WANG Changji, LI Wentao, LI Yuan, et al. A ciphertext- policy attribute-based encryption scheme supporting keyword search function[C]. Proceedings of the 5th International Symposium on Cyberspace Safety and Security (CSS), Hunan, China, 2013: 377-386. doi: 10.1007/978-3-319- 03584-0_28.
[16]
LI Jiazhi and ZHANG Lei. Attribute-based keyword search and data access control in cloud[C]. Proceedings of the 10th International Conference on Computational Intelligence and Security, Kunming, China, 2014: 382-386. doi: 10.1109/CIS. 2014.113.
[17]
ZHENG Qingji, XU Shouhuai, and ATENIESE G. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data[C]. Proceedings of the IEEE Conference on Computer Communications, Toronto, Canada, 2014: 522-530. doi: 10.1109/INFOCOM.2014.6847976.
[18]
SHAO Jun, CAO Zhenfu, LIANG Xiaohui, et al. Proxy re-encryption with keyword search[J]. Information Sciences, 2010, 180(13): 2576-2587. doi: 10.1016/j.ins.2010.03.026.