Paper 2019/874

ABDKS Attribute-Based Encryption with Dynamic Keyword Search in Fog Computing

Fei Meng and Mingqiang Wang

Abstract

Attribute-based encryption with keyword search (ABKS) achieves both fine-grained access control and keyword search. However, in the previous ABKS schemes, the search algorithm requires that each keyword between the target keyword set and the ciphertext keyword set be the same, otherwise the algorithm doesn't output any search result, which is not conducive to use. Moreover, the previous ABKS schemes are vulnerable to what we call a \emph{peer-decryption attack}, that is, the ciphertext may be eavesdropped and decrypted by an adversary who has sufficient authorities but no information about the ciphertext keywords. In this paper, we provide a new system in fog computing, the ciphertext-policy attribute-based encryption with dynamic keyword search (ABDKS). In ABDKS, the search algorithm requires only \emph{one} keyword to be identical between the two keyword sets and outputs the corresponding correlation which reflects the number of the same keywords in those two sets. In addition, our ABDKS is resistant to peer-decryption attack, since the decryption requires not only sufficient authority but also at least one keyword of the ciphertext. Beyond that, the ABDKS shifts most computational overheads from resource constrained users to fog nodes. The security analysis shows that the ABDKS can resist Chosen-Plaintext Attack (CPA) and Chosen-Keyword Attack (CKA).

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint. MAJOR revision.
Keywords
Fog computingOutsourcingAccess controlAttribute-based encryptionKeyword search
Contact author(s)
mengfei_sdu @ 163 com
History
2020-10-03: last of 6 revisions
2019-08-01: received
See all versions
Short URL
https://ia.cr/2019/874
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/874,
      author = {Fei Meng and Mingqiang Wang},
      title = {{ABDKS} Attribute-Based Encryption with Dynamic Keyword Search in Fog Computing},
      howpublished = {Cryptology {ePrint} Archive, Paper 2019/874},
      year = {2019},
      url = {https://eprint.iacr.org/2019/874}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.