2019
DOI: 10.1109/access.2019.2910828
|View full text |Cite
|
Sign up to set email alerts
|

Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage

Abstract: In attribute-based searchable encryption (ABSE) scheme, data owners can encrypt their data with access policy for security consideration, and encrypt keywords to obtain keyword index for privacy keyword search, and data users can search interesting keyword on keyword indexes by keyword search trapdoor. However, many existing searchable encryption schemes only support single keyword search and most of the existing attribute-based encryption (ABE) schemes have high computational costs at user client. These probl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
30
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(30 citation statements)
references
References 35 publications
0
30
0
Order By: Relevance
“…By combining the advantages of encryption and digital signature, Liu et al 12 proposed ciphertext‐policy attribute‐based signcryption to achieve data security and identity anonymity and collusion resistance for cloud environment. In Wang et al, 17 attribute‐based encryption is combined with the verifiability of outsourced private key and multi‐keyword search to realize privacy preservation and secure multi‐keyword search.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…By combining the advantages of encryption and digital signature, Liu et al 12 proposed ciphertext‐policy attribute‐based signcryption to achieve data security and identity anonymity and collusion resistance for cloud environment. In Wang et al, 17 attribute‐based encryption is combined with the verifiability of outsourced private key and multi‐keyword search to realize privacy preservation and secure multi‐keyword search.…”
Section: Related Workmentioning
confidence: 99%
“…Although they purse similar security goals for data sharing, the works of Wang et al 17 and Ameri et al 22 and the proposed scheme establish system models with minor differences. In order to compare them on the same benchmark, we have the following settings: In Wang et al, 17 the entities AA and OKGSP take the same role as the TTP in our proposed scheme.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…Integrating such a model with SE increases the complexity of the key management when the user accesses a large number of files. Recently, in [17]- [20], an attribute based SE scheme was implemented which result in huge computational cost because of the security assumption, which is based on BDH (Bi-linear Diffie-Hellman) assumption due to the usage of bi-linear mapping. Further, in [2], [9], [10], finegrained access control and multi-field search query were implemented in SE with ABAC during file access in the cloud.…”
Section: Related Workmentioning
confidence: 99%
“…One of the issues is that the high computation requirements of a CP-ABE scheme [6], [7], which directly affects the performance of realizing fine-grained sharing of private data in blockchain. Some previous works [8]- [12] attempted to reduce the computation burden of users' systems by outsourcing certain computations in CP-ABE schemes to cloud. Also, since the attribute-based encryption scheme realizes one-to-many encryption, the key contains only the attributes information of data users rather than information related to a specific user's identity.…”
Section: Introductionmentioning
confidence: 99%