Skip to main content
Log in

Fuzzy matching: multi-authority attribute searchable encryption without central authority

Soft Computing Aims and scope Submit manuscript

Abstract

Attribute-based keyword search (ABKS) supports the access control on the search result based upon fuzzy identity over encrypted data, when the search operation is performed over outsourced encrypted data in cloud. However, almost ABKS schemes trust a single authority to monitor the attribute key for users. In practice, we usually have different entities responsible for monitoring different attribute keys to a user. Thus, it is not realistic to trust a single authority to monitor all attributes keys for ABKS scheme in practical situation. Although a large body of ABKS schemes have been proposed, few works have been done on multi-authority attribute searchable encryption. We propose a multi-authority attribute searchable encryption without central authority in this paper. Comparing previous ABKS schemes, we extend the single-authority ABKS scheme to multi-authority ABKS scheme and remove the central authority in multi-authority ABKS scheme. We analyze our scheme in terms of security and efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1

References

  • Abdalla M, Bellare M, Catalano D et al (2008) Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. J Cryptol 21(3):350–391

    Article  MathSciNet  MATH  Google Scholar 

  • Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In: International conference on computational science and its applications. Lecture notes in computer science, vol 5072, pp 1249–1259

  • Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy, pp 321–334

  • Boneh D, Crescenzo GD, Ostrovsky R et al (2004) Public key encryption with keyword search. In: Advances in cryptology-EUROCRYPT 2004. Springer, Berlin, pp 506–522

  • Chang YC, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. Applied cryptography and network security. Springer, Berlin, pp 442–455

    MATH  Google Scholar 

  • Chase M, Chow SSM (2009) Improving privacy and security in multi-authority attribute-based encryption. In: ACM conference on computer and communications security. ACM, pp 121–130

  • Chow SM (2010) New privacy-preserving architectures for identity-attribute-based encryption. Dissertation, New York University

  • Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definition and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 79–88

  • Goh E (2003) Secure indexes. Technical Report, 2003/216, IACR ePrint Cryptography Archive. http://eprint.iacr.org/2003/216

  • Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. Lect Notes Comput Sci 3089:31–45

    Article  MATH  Google Scholar 

  • Goyal V, Pandey O, Sahai A et al (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: ACM conference on computer and communications security. ACM, pp 89–98

  • Han F, Qin J, Zhao H et al (2014) A general transformation from KP-ABE to searchable encryption. Future Gener Comput Syst 30(C):107–115

    Article  Google Scholar 

  • Koo D, Hur J, Yoon H (2013) Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comput Electr Eng 39(1):34–46

    Article  Google Scholar 

  • Li J, Zhang L (2014) Attribute-based keyword search and data access control in cloud. In: Tenth international conference on computational intelligence and security. IEEE, pp 382–386

  • Li J, Li X, Wang L et al (2017) Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption. Soft Comput. doi:10.1007/s00500-017-2482-1

  • Lin H, Cao Z, Liang X et al (2008) Secure threshold multi authority attribute based encryption without a central authority. In: International conference on cryptology in India: progress in cryptology. Springer, pp 426–436

  • Liu P, Wang J, Ma H et al (2014) Efficient verifiable public key encryption with keyword search based on KP-ABE. In: 2014 ninth international conference on broadband and wireless computing, communication and applications (BWCCA), pp 584–589

  • Liu Z, Weng J, Li J et al (2016) Cloud-based electronic health record system supporting fuzzy keyword search. Soft Comput 20(8):3243–3255

    Article  Google Scholar 

  • Ma S, Lai J, Deng RH et al (2016) Adaptable key-policy attribute-based encryption with time interval. Soft Comput. doi:10.1007/s00500-016-2177-z

  • Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: International conference on information security applications. Springer, pp 73–86

  • Rhee HS, Park JH, Susilo W et al (2010) Trapdoor security in a searchable public-key encryption scheme with a designated tester. J Syst Softw 83(5):763–771

    Article  Google Scholar 

  • Sahai A, Waters B (2005) Fuzzy identity-based encryption. Lect Notes Comput Sci 3494:457–473

    Article  MathSciNet  MATH  Google Scholar 

  • Shi Y, Liu J, Zhen H et al (2014) Attribute-based proxy re-encryption with keyword search. Plos One 9(12):e116325

    Article  Google Scholar 

  • Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: IEEE symposium on security and privacy. IEEE Computer Society, pp 44–55

  • Wang C, Li W, Li Y et al (2013) A ciphertext-policy attribute-based encryption scheme supporting keyword search function. In: Cyberspace safety and security. Lecture notes in computer science, vol 8300, pp 377–386

  • Wang H, He D, Shen J et al (2016) Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing. Soft Comput. doi:10.1007/s00500-016-2271-2

  • Wang H, He D, Shen J et al (2017) Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps. Soft Comput. doi:10.1007/s00500-017-2488-8

  • Xhafa F, Wang J, Chen X et al (2014) An efficient PHR service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795–1802

    Article  Google Scholar 

  • Xu J, Wen Q, Li W et al (2016) Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing. Soft Comput 21(18):5265–5279

    Article  MATH  Google Scholar 

  • Zheng Q, Xu S, Ateniese G (2014) VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014—IEEE conference on computer communications. IEEE, pp 522–530

  • Zhong H, Zhu W, Xu Y et al (2016) Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput. doi:10.1007/s00500-016-2330-8

Download references

Acknowledgements

This work is supported by the National Nature Science Foundation of China under Grant Nos. 61272091 and 61772311.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jing Qin.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Communicated by V. Loia.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhu, B., Sun, J., Qin, J. et al. Fuzzy matching: multi-authority attribute searchable encryption without central authority. Soft Comput 23, 527–536 (2019). https://doi.org/10.1007/s00500-017-2849-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-017-2849-3

Keywords

Navigation