2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID) 2020
DOI: 10.1109/ccgrid49817.2020.00-48
|View full text |Cite
|
Sign up to set email alerts
|

Key-Escrow Free Attribute-Based Multi-Keyword Search with Dynamic Policy Update in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 18 publications
2
6
0
Order By: Relevance
“…In the traditional ABE scheme, the key generation center (KGC) generates the decryption keys for the users, which means that the KGC has the ability to access and decrypt data. To overcome this issue, the schemes in [23,24] generate decryption keys for users by introducing multiple authorization centers, each of which can only calculate partial keys. The scheme in [25] used an unmanaged key issue protocol executed between the CSP and the KGC, but the computational cost is too high.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the traditional ABE scheme, the key generation center (KGC) generates the decryption keys for the users, which means that the KGC has the ability to access and decrypt data. To overcome this issue, the schemes in [23,24] generate decryption keys for users by introducing multiple authorization centers, each of which can only calculate partial keys. The scheme in [25] used an unmanaged key issue protocol executed between the CSP and the KGC, but the computational cost is too high.…”
Section: Related Workmentioning
confidence: 99%
“…The functional analysis between our scheme and the schemes in [21,24,26] is shown in Table 2. None of the comparison schemes can simultaneously meet the three functional requirements listed in the table, that is, cannot simultaneously meet integrity, key escrow, and revocation.…”
Section: Functional Analysismentioning
confidence: 99%
“…The computation and communication cost are subject to the policy size. Recently, Varri et al [17] proposed a multi-keyword search over CP-ABE with dynamic policy update. This scheme uses the encryption information of the old policy to update the policy without choosing the new secret value.…”
Section: A Ciphertext Updatementioning
confidence: 99%
“…at is, fine-grained access control is needed for PHR. us, attribute-based keyword search has been implemented by many researchers [1][2][3][4][5][6][7][8][9][10][11][12]. In these schemes, data owners can encrypt their data with predefined access control policies.…”
Section: Introductionmentioning
confidence: 99%
“…However, there are some limitations in existing schemes. Firstly, in the schemes [7][8][9][10], each user's attributes are organized in a single set, which cannot support the compounded attributes. For example, consider a user who is a "Researcher" working in "College A" and serves as both "Director" of "Department of Medicine" and "Professor" of "Department of Chemistry," and the above attributes are both valid and are likely to be used to describe him.…”
Section: Introductionmentioning
confidence: 99%