Abstract | ||
---|---|---|
Attribute-based keyword search (ABKS) was proposed to enable a third party to search encrypted keywords without compromising the security of the original data. Because it can express flexible access policy, ABKS has attracted a lot of attention. Existing ABKS schemes mainly focused on the expression of access structures, while the computation cost and communication cost are linear with the number of required attributes. Therefore, existing ABKS schemes are unsuitable to the devices that have constrained space and computing power, such as smart phone and tablet. In this paper, an ABKS with constant-size ciphertext scheme is proposed. The proposed scheme captures the following nice features: (1) The index encryption algorithm has constant computation cost; (2) the searchable ciphertexts are constant size; (3) the trapdoors for keywords are constant size; and (4) the test algorithm has constant computation cost. To the best of our knowledge, it is the first time that an ABKS with constant-size ciphertext scheme is proposed. Copyright (C) 2016 John Wiley & Sons, Ltd. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1002/sec.1671 | SECURITY AND COMMUNICATION NETWORKS |
Keywords | Field | DocType |
attribute-based keyword search,attribute-based encryption,cloud computing,access control,security | Computer security,Computer science,Keyword search,Attribute-based encryption,Encryption,Access control,Ciphertext,Smart phone,Cloud computing,Computation | Journal |
Volume | Issue | ISSN |
9.0 | 18.0 | 1939-0114 |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ye Yang | 1 | 11 | 6.02 |
Jinguang Han | 2 | 293 | 19.04 |
Willy Susilo | 3 | 4823 | 353.18 |
Tsz Hon Yuen | 4 | 507 | 33.86 |
Jiguo Li | 5 | 594 | 55.71 |