Abstract | ||
---|---|---|
The task of searchable encryption schemes in multi-user setting is to handle the problem of dynamical user injection and revocation with consideration of feasibility. Especially, we have to make sure that user revocation will not cause security problem, such as leakage of secret key. Recently, fine-grained access control using trusted third party is proposed to resolve this issue. However, it increases the management complexity for maintaining massive authentication information of users. We present a new concept of coarse-grained access control for the first time and use it to construct a multi-user searchable encryption model in hybrid cloud. In our construction, there are two typical schemes, one is broadcast encryption BE scheme to simplify access control, the other is a single-user searchable encryption scheme, which supports two-phases operation and is secure when untrustful server colludes with the adversary. Moreover, we implement such a practical scheme using an improved searchable symmetric encryption scheme, and security analysis support our scheme. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1007/978-3-662-49017-4_9 | Trans. Computational Collective Intelligence |
Keywords | Field | DocType |
Multi-user searchable encryption, Identity-based broadcast encryption, Coarse-grained access control, Hybrid cloud | Broadcast encryption,Multiple encryption,Client-side encryption,Computer science,Computer security,Attribute-based encryption,Computer network,Encryption,Probabilistic encryption,40-bit encryption,On-the-fly encryption | Journal |
Volume | ISSN | Citations |
19 | 0302-9743 | 1 |
PageRank | References | Authors |
0.35 | 17 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Zheli Liu | 1 | 356 | 28.79 |
Chuan Fu | 2 | 30 | 2.56 |
Jun Yang | 3 | 421 | 20.07 |
Zhusong Liu | 4 | 110 | 10.10 |
Lingling Xu | 5 | 6 | 1.83 |