Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage
To address fine-grained access control, secure sharing, and encrypted key updates in a one-to-many model, a multi-keyword attribute-based searchable encryption scheme with proxy re-encryption for cloud storage was proposed. The access tree was enhanced with node information for fine-grained control...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2024-09-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024150/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539222806200320 |
---|---|
author | ZHANG Kejun WANG Wenbin XU Shaofei YU Xinying WANG Jun LI Pengcheng QIAN Rong |
author_facet | ZHANG Kejun WANG Wenbin XU Shaofei YU Xinying WANG Jun LI Pengcheng QIAN Rong |
author_sort | ZHANG Kejun |
collection | DOAJ |
description | To address fine-grained access control, secure sharing, and encrypted key updates in a one-to-many model, a multi-keyword attribute-based searchable encryption scheme with proxy re-encryption for cloud storage was proposed. The access tree was enhanced with node information for fine-grained control over ciphertext read and write permissions. The keyword encryption process was optimized for trapdoor indistinguishability and restricted user search capabilities. Re-encryption updated ciphertext and keys, preventing malicious access by revoked users. A blockchain-based verification algorithm was designed to detect tampering of third-party data. The DBDH and DDH hard problems proved the scheme’s keyword ciphertext security and trapdoor security. Experiments show the proposed scheme secures data and keys during key generation, trapdoor, and index generation, and correctness verification. It also demonstrates higher efficiency in time overhead, ensuring privacy and key safety while maintaining high efficiency. |
format | Article |
id | doaj-art-aacb90e21b8041f0bcdaf6a2d778de41 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2024-09-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-aacb90e21b8041f0bcdaf6a2d778de412025-01-14T07:25:00ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2024-09-014524425773358964Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storageZHANG KejunWANG WenbinXU ShaofeiYU XinyingWANG JunLI PengchengQIAN RongTo address fine-grained access control, secure sharing, and encrypted key updates in a one-to-many model, a multi-keyword attribute-based searchable encryption scheme with proxy re-encryption for cloud storage was proposed. The access tree was enhanced with node information for fine-grained control over ciphertext read and write permissions. The keyword encryption process was optimized for trapdoor indistinguishability and restricted user search capabilities. Re-encryption updated ciphertext and keys, preventing malicious access by revoked users. A blockchain-based verification algorithm was designed to detect tampering of third-party data. The DBDH and DDH hard problems proved the scheme’s keyword ciphertext security and trapdoor security. Experiments show the proposed scheme secures data and keys during key generation, trapdoor, and index generation, and correctness verification. It also demonstrates higher efficiency in time overhead, ensuring privacy and key safety while maintaining high efficiency.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024150/searchable encryptionattribute-based encryptionread/write nodeproxy re-encryptionaccess control |
spellingShingle | ZHANG Kejun WANG Wenbin XU Shaofei YU Xinying WANG Jun LI Pengcheng QIAN Rong Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage Tongxin xuebao searchable encryption attribute-based encryption read/write node proxy re-encryption access control |
title | Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage |
title_full | Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage |
title_fullStr | Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage |
title_full_unstemmed | Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage |
title_short | Multi-keyword attribute-based searchable encryption scheme supporting re-encryption for cloud storage |
title_sort | multi keyword attribute based searchable encryption scheme supporting re encryption for cloud storage |
topic | searchable encryption attribute-based encryption read/write node proxy re-encryption access control |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024150/ |
work_keys_str_mv | AT zhangkejun multikeywordattributebasedsearchableencryptionschemesupportingreencryptionforcloudstorage AT wangwenbin multikeywordattributebasedsearchableencryptionschemesupportingreencryptionforcloudstorage AT xushaofei multikeywordattributebasedsearchableencryptionschemesupportingreencryptionforcloudstorage AT yuxinying multikeywordattributebasedsearchableencryptionschemesupportingreencryptionforcloudstorage AT wangjun multikeywordattributebasedsearchableencryptionschemesupportingreencryptionforcloudstorage AT lipengcheng multikeywordattributebasedsearchableencryptionschemesupportingreencryptionforcloudstorage AT qianrong multikeywordattributebasedsearchableencryptionschemesupportingreencryptionforcloudstorage |