Advertisement

Topics

Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage.

08:00 EDT 12th October 2018 | BioPortfolio

Summary of "Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage."

We propose an attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage environment, in which binary attributes and AND-gate access policy are used. Our proposal enjoys several advantages. Firstly, multi-keyword search is available, and only when a data user's attribute set satisfies access policy in keyword index, and keyword token generated by data user matches index successfully, then data user can obtain ciphertext containing keywords. In this way, more accurate keyword search is achievable. Secondly, the search privacy of data user is protected owing to cloud servers cannot obtain any knowledge of keywords which data user is interested in. Meanwhile, the ciphertext is able to be decrypted when data user's attribute set satisfies access policy specified in the ciphertext, which can both improve security of encryption and achieve secure fine-grained access control. Thirdly, the proposed scheme supports attribute revocation, in our scheme when a data user's attribute is revoked, the version number of attribute, non-revoked data users' secret keys and related ciphertexts will be updated, such that data user whose attribute is revoked does not decrypt updated ciphertext anymore. In addition, based on the assumption of decisional linear (DL) and decisional Diffie-Hellman (DDH), our scheme is proved to be secure against selectively chosen-keyword attacks and selectively chosen-plaintext attacks respectively, and it also ensures token privacy security.

Affiliation

Journal Details

This article was published in the following journal.

Name: PloS one
ISSN: 1932-6203
Pages: e0205675

Links

DeepDyve research library

PubMed Articles [18014 Associated PubMed Articles listed on BioPortfolio]

Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.

In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user may have multiple attributes, and each attribute may be shared simultaneously by many users. The decryption key of an attribut...

BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems.

The sharing of patients' locations is an important part in mobile medical services and modern smart healthcare. Although location sharing based on blockchains has advantages on decentralization and op...

Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters.

Revocation functionality and hierarchy key delegation are two necessary and crucial requirements to identity-based cryptosystems. Revocable hierarchical identity-based encryption (RHIBE) has attracted...

An efficient dynamic ID-based remote user authentication scheme using self-certified public keys for multi-server environments.

Recently, Li et al. proposed a novel smart card and dynamic ID-based remote user authentication scheme for multi-server environments. They claimed that their scheme can resist several types of attacks...

Edge-Based Efficient Search over Encrypted Data Mobile Cloud Storage.

Smart sensor-equipped mobile devices sense, collect, and process data generated by the edge network to achieve intelligent control, but such mobile devices usually have limited storage and computing r...

Clinical Trials [5779 Associated Clinical Trials listed on BioPortfolio]

Evaluation of a Physical Activity Referral Scheme

The study will evaluate the effectiveness of a co-developed exercise referral scheme. Participants will be recruited to one of three groups 1. Co-developed exercise referral scheme, 2. Usu...

Improving Communication During a Pandemic Flu Outbreak

During the last pandemic influenza antivirals were prescribed both as prophylaxis and treatment. However, adherence rates were suboptimal. This study assessed the effect of theory-based an...

Measuring and Understanding the Effects of a Performance Based Financing Scheme Applied to Nutrition Services in Burundi

The government of Burundi is implementing a new financing scheme in health centres. The objective is to provide additional financial compensations to health centres on the basis of their p...

Assessment of the HIV CNS Reservoir, Neurological and Neuro-cognitive Effects, and Source of Rebound HIV in CNS

This study aims to describe in depth the CNS, CNS HIV reservoir and CNS viral rebound in consenting SEARCH 019 subjects prior to, during and after the SEARCH 019 study intervention (VHM + ...

Development and Feasibility of an Incentive Scheme to Promote Walking/Cycling to School

The aim of this study is to investigate whether an incentive scheme is a feasible approach to increase walking/cycling to school.

Medical and Biotech [MESH] Definitions

The perceived attribute of a sound which corresponds to the physical attribute of intensity.

A scheme which provides reimbursement for the health services rendered, generally by an institution, and which provides added financial rewards if certain conditions are met. Such a scheme is intended to promote and reward increased efficiency and cost containment, with better care, or at least without adverse effect on the quality of the care rendered.

A multi- and interdisciplinary field concerned with improving health and achieving equity in health for all people. It transcends national boundaries, promotes cooperation and collaboration within and beyond health science fields, and combines population-based disease prevention with individually-based patient care.

Studies which start with the identification of persons with a disease of interest and a control (comparison, referent) group without the disease. The relationship of an attribute to the disease is examined by comparing diseased and non-diseased persons with regard to the frequency or levels of the attribute in each group.

Making information permanently non-identifiable that is associated with the identity of specific entities via encryption or other methods.

Advertisement
Quick Search
Advertisement
Advertisement

 


DeepDyve research library

Searches Linking to this Article