• DocumentCode
    233275
  • Title

    Efficient Verifiable Public Key Encryption with Keyword Search Based on KP-ABE

  • Author

    Pengliang Liu ; Jianfeng Wang ; Hua Ma ; Haixin Nie

  • Author_Institution
    Sch. of Math. & Stat., Xidian Univ., Xi´an, China
  • fYear
    2014
  • fDate
    8-10 Nov. 2014
  • Firstpage
    584
  • Lastpage
    589
  • Abstract
    As a very attractive cryptographic primitive, the public key encryption with keyword search (PEKS) enables users to search on encrypted data, and hence is applicable to the setting of cloud computing. Although the existing PEKS schems can allow a user to search encrypted data confidentially, most of them failed to verify the searched result and the system did not specify the users who can make a request for encrypted data files stored on the cloud server. Recently, a novel cryptographic solution, called verifiable attribute-based keyword search (VABKS) was proposed by Zheng. It allows a data user, whose credentials satisfy the data owner\´s access control policy, to search the encrypted data file and verify the searched result. However, the scheme exists an unrealistic assumption of secure channel as in the Boneh\´s scheme. In this paper, we propose a new scheme which "removes secure channel" and construct a novel method for verifying the searched result from the cloud server based on key policy attribute-based keyword search (KP-ABKS) of VABKS. It can be effectively to verify the correctness and integrity of the data file which the data user desired for. By our simulation for the verification, it proves that our scheme is more practical than VABKS.
  • Keywords
    authorisation; cloud computing; public key cryptography; Bonehs scheme; KP-ABE; KP-ABKS; PEKS scheme; VABKS; access control policy; cloud computing; cloud server; cryptographic primitive; key policy attribute-based keyword search; keyword search; verifiable attribute-based keyword search; verifiable public key encryption; Access control; Encryption; Keyword search; Public key; Servers; Encryption with keyword search; Key policy attribute-based encryption; Keyword search; Public key; Verify;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Broadband and Wireless Computing, Communication and Applications (BWCCA), 2014 Ninth International Conference on
  • Conference_Location
    Guangdong
  • Print_ISBN
    978-1-4799-4174-2
  • Type

    conf

  • DOI
    10.1109/BWCCA.2014.119
  • Filename
    7016139