Flexible Attribute-Based Keyword Search via Two Access Policies

  • Peilin ZhouEmail author
  • Zhenhua Liu
  • Shuhong Duan
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 2)


Attribute-based keyword search (ABKS) allows users, whose credentials satisfy the owner’s access control policy, to search over the encrypted data in cloud environment. However, most current schemes can not simultaneously achieve that owners dominate the data while users retrieve the interested files more accurately, either in ciphertext policy or key policy setting. Furthermore, majority of ABKS schemes ignore the decryption of retrieved files, or focus little about decryption efficiency. Therefore, aiming at these limitations, we propose a flexible attribute based keyword search scheme via two access policies, which allows: (1) the data owner to control the access policy in order to gain control over their data and specify who can access the files; (2) the user to define the search policy so that he can search the interested encrypted files more accurately. In addition, we employ an online/offline technique to improve the efficiency. And the ciphertexts can be decrypted with two pairings while it grows linear with the number of attributes in most existing schemes. Our system is selectively secure against chosen-plaintext attack and chosen-keyword attack, and it also achieves keyword secrecy.


Cloud Server Access Structure Data Owner Access Policy Random Oracle Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Alderman, J., Janson, C., Martin, K. M., & Renwick, S. L. (2015). Extended functionality in verifiable searchable encryption. In International Conference on Cryptography and Information Security in the Balkans (pp. 187-205).Google Scholar
  2. 2.
    Chaudhari, P., & Das, M. (2015). Privacy-preserving attribute based searchable encryption. IACR Cryptol ePrint Arch, 899.Google Scholar
  3. 3.
    Dong, Q., Guan, Z., & Chen, Z. (2015). Attribute-based keyword search efficiency enhancement via an online/offline approach. In Parallel and Distributed Systems (pp. 298-305).Google Scholar
  4. 4.
    Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for finegrained access control of encrypted data. In Proceedings of the 13th ACM conference on Computer and communications security (pp. 89-98).Google Scholar
  5. 5.
    Li, J., & Zhang, L. (2014). Attribute-based keyword search and data access control in cloud. In Computational Intelligence and Security (CIS)(pp. 382-386).Google Scholar
  6. 6.
    Jiang, P., Mu, Y., Guo, F., Wang, X., & Wen, Q. (2015). Online/offline ciphertext retrieval on resource constrained devices. The Computer Journal, bxv099.Google Scholar
  7. 7.
    Waters, B. (2011). Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Public Key Cryptography (pp. 53-70).Google Scholar
  8. 8.
    Padhya, M., & Jinwala, D. (2014). A novel approach for searchable CP-ABE with hidden ciphertext-policy. In International Conference on Information Systems Security (pp. 167-184).Google Scholar
  9. 9.
    Sahai, A., &Waters, B. (2005). Fuzzy identity-based encryption. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 457-473).Google Scholar
  10. 10.
    Zheng, Q., Xu, S., & Ateniese, G. (2014). VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In IEEE INFOCOM 2014-IEEE Conference on Computer Communications (pp. 522-530).Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.School of Mathematics and StatisticsXidian UniversityXi’anP.R. China

Personalised recommendations