Table of Content

Open Access

ARTICLE

Authorized Attribute-Based Encryption Multi-Keywords Search with Policy Updating

Muqadar Ali, Chungen Xu*, Abid Hussain
Department of Mathematics, School of Science, Nanjing University of Science and Technology, Nanjing, 210094, China
* Corresponding Author: Chungen Xu. Email:

Journal of New Media 2020, 2(1), 31-43. https://doi.org/10.32604/jnm.2020.09946

Received 03 February 2020; Accepted 08 February 2020; Issue published 14 August 2020

Abstract

Attribute-based encryption is cryptographic techniques that provide flexible data access control to encrypted data content in cloud storage. Each trusted authority needs proper management and distribution of secret keys to the user’s to only authorized user’s attributes. However existing schemes cannot be applied multiple authority that supports only a single keywords search compare to multi keywords search high computational burden or inefficient attribute’s revocation. In this paper, a ciphertext policy attribute-based encryption (CP-ABE) scheme has been proposed which focuses on multi-keyword search and attribute revocation by new policy updating feathers under multiple authorities and central authority. The data owner encrypts the keywords index under the initial access policy. Moreover, this paper addresses further issues such as data access, search policy, and confidentiality against unauthorized users. Finally, we provide the correctness analysis, performance analysis and security proof for chosen keywords attack and search trapdoor in general group model using DBDH and DLIN assumption.

Keywords

Attribute-based encryption; access control; multi-keywords search; policy updating

Cite This Article

M. Ali, C. Xu and A. Hussain, "Authorized attribute-based encryption multi-keywords search with policy updating," Journal of New Media, vol. 2, no.1, pp. 31–43, 2020.



This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2595

    View

  • 1165

    Download

  • 0

    Like

Share Link

WeChat scan