Table of Content

Open Access iconOpen Access


A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing

Yongli Tang1, Huanhuan Lian1, Zemao Zhao2, Xixi Yan1,*

College of Computer Science and Technology, Henan Polytechnic University, Jiaozuo, 454000, China.
School of Engineering, Lishui University, Lishui, 323000, China.

* Corresponding Author: Xixi Yan. Email: email.

Computers, Materials & Continua 2018, 56(2), 339-352. 10.3970/cmc.2018.02965


With the widespread use of cloud computing technology, more and more users and enterprises decide to store their data in a cloud server by outsourcing. However, these huge amounts of data may contain personal privacy, business secrets and other sensitive information of the users and enterprises. Thus, at present, how to protect, retrieve, and legally use the sensitive information while preventing illegal accesses are security challenges of data storage in the cloud environment. A new proxy re-encryption with keyword search scheme is proposed in this paper in order to solve the problem of the low retrieval efficiency of the encrypted data in the cloud server. In this scheme, the user data are divided into files, file indexes and the keyword corresponding to the files, which are respectively encrypted to store. The improved scheme does not need to re-encrypt partial file cipher-text as in traditional schemes, but re-encrypt the cipher-text of keywords corresponding to the files. Therefore the scheme can improve the computational efficiency as well as resist chosen keyword attack. And the scheme is proven to be indistinguishable under Hash Diffie-Hellman assumption. Furthermore, the scheme does not need to use any secure channels, making it more effective in the cloud environment.


Cite This Article

APA Style
Tang, Y., Lian, H., Zhao, Z., Yan, X. (2018). A proxy re-encryption with keyword search scheme in cloud computing. Computers, Materials & Continua, 56(2), 339-352. 10.3970/cmc.2018.02965
Vancouver Style
Tang Y, Lian H, Zhao Z, Yan X. A proxy re-encryption with keyword search scheme in cloud computing. Comput Mater Contin. 2018;56(2):339-352 10.3970/cmc.2018.02965
IEEE Style
Y. Tang, H. Lian, Z. Zhao, and X. Yan "A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing," Comput. Mater. Contin., vol. 56, no. 2, pp. 339-352. 2018. 10.3970/cmc.2018.02965

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 2363


  • 1339


  • 0


Related articles

Share Link