Authorization of Searchable CP-ABE Scheme with Attribute Revocation in Cloud Computing
Title | Authorization of Searchable CP-ABE Scheme with Attribute Revocation in Cloud Computing |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Wang, Fucai, Shi, Ting, Li, Shijin |
Conference Name | 2019 IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC) |
Date Published | May 2019 |
Publisher | IEEE |
ISBN Number | 978-1-5386-8178-7 |
Keywords | attribute revocation, authorisation, Authorization, authorization information, authorization server, ciphertext information, cloud computing, cloud computing environment, cloud service provider, Collaboration, CP-ABE, cryptography, data privacy, data user, Encryption, multi-keyword search, policy-based governance, provable security, pubcrawl, Public key, revocation stage, Scalability, searchable attribute-based encryption schemes, searchable CP-ABE scheme, Servers, user attribute |
Abstract | Most searchable attribute-based encryption schemes only support the search for single-keyword without attribute revocation, the data user cannot quickly detect the validity of the ciphertext returned by the cloud service provider. Therefore, this paper proposes an authorization of searchable CP-ABE scheme with attribute revocation and applies the scheme to the cloud computing environment. The data user to send the authorization information to the authorization server for authorization, assists the data user to effectively detect the ciphertext information returned by the cloud service provider while supporting the revocation of the user attribute in a fine-grained access control structure without updating the key during revocation stage. In the random oracle model based on the calculation of Diffie-Hellman problem, it is proved that the scheme can satisfy the indistinguishability of ciphertext and search trapdoor. Finally, the performance analysis shows that the scheme has higher computational efficiency. |
URL | https://ieeexplore.ieee.org/document/8785559 |
DOI | 10.1109/ITAIC.2019.8785559 |
Citation Key | wang_authorization_2019 |
- data user
- user attribute
- Servers
- searchable CP-ABE scheme
- searchable attribute-based encryption schemes
- Scalability
- revocation stage
- Public key
- pubcrawl
- provable security
- policy-based governance
- multi-keyword search
- encryption
- attribute revocation
- data privacy
- Cryptography
- CP-ABE
- collaboration
- cloud service provider
- cloud computing environment
- Cloud Computing
- ciphertext information
- authorization server
- authorization information
- authorization
- authorisation