咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >ABDKS:attribute-based encrypti... 收藏

ABDKS:attribute-based encryption with dynamic keyword search in fog computing

作     者:Fei MENG Leixiao CHENG Mingqiang WANG Fei MENG;Leixiao CHENG;Mingqiang WANG

作者机构:School of MathematicsShandong UniversityJinan 250100China Key Laboratory of Cryptologic Technology and Information SecurityMinistry of EducationJinan 250100China School of Mathematical SciencesFudan UniversityShanghai 200433China 

出 版 物:《Frontiers of Computer Science》 (中国计算机科学前沿(英文版))

年 卷 期:2021年第15卷第5期

页      面:187-195页

核心收录:

学科分类:0839[工学-网络空间安全] 08[工学] 081201[工学-计算机系统结构] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:National Cryptography Development Fund(MMJJ20180210) the National Natural Science Foundation of China(Grant Nos.61832012 and 61672019) 

主  题:access control attribute-based encryption keyword search fog computing outsourcing 

摘      要:Attribute-based encryption with keyword search(ABKS)achieves both fine-grained access control and keyword ***,in the previous ABKS schemes,the search algorithm requires that each keyword to be identical between the target keyword set and the ciphertext keyword set,otherwise the algorithm does not output any search result,which is not conducive to ***,the previous ABKS schemes are vulnerable to what we call a peer-decryption attack,that is,the ciphertext may be eavesdropped and decrypted by an adversary who has sufficient authorities but no information about the ciphertext *** this paper,we provide a new system in fog computing,the ciphertext-policy attribute-based encryption with dynamic keyword search(ABDKS).In ABDKS,the search algorithm requires only one keyword to be identical between the two keyword sets and outputs the corresponding correlation which reflects the number of the same keywords in those two *** addition,our ABDKS is resistant to peer-decryption attack,since the decryption requires not only sufficient authority but also at least one keyword of the *** that,the ABDKS shifts most computational overheads from resource constrained users to fog *** security analysis shows that the ABDKS can resist Chosen-Plaintext Attack(CPA)and Chosen-Keyword Attack(CKA).

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分