Abstract
Ciphertext policy attribute based encryption (CP-ABE) is a technique in which a user with secret key containing attributes is only able to decrypt the message if the attributes in the policy match with the attributes in secret key. Therefore, CP-ABE is suitable for some interesting applications such as cloud computing which requires both security assurances and access control over encrypted data simultaneously. However, we observed that all existing CP-ABE schemes entail a limitation that, if an authorized user wants to search for an encrypted file having particular keywords, then he has to first download and then decrypt the file before searching for particular keywords. When applied to an application involving a cloud, because the number of files on the cloud is likely to be huge, all these process results in large overhead for user.
Therefore, to overcome this limitation, we proposed a new searchable CP-ABE scheme in this paper, that allows the authorized user to check whether the ciphertext contains specific set of keywords or not, using his own token without decrypting the message. The label and keywords attached with ciphertext and secret key respectively, do not reveal any information about the data unless given the authorized token. In addition, our proposed scheme provides receiver anonymity also. The security analysis shows that privacy in this new solution is achieved with an overwhelmingly large probability. Equipping CP-ABE scheme with keyword-searching capability reduces the searching time of ciphertext having particular keywords. To the best of our knowledge ours is the first efficient collusion resistant searchable CP-ABE scheme with hidden ciphertext policy which uses few and fixed number of pairing operation in key word search as well as decryption algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. SIAM Journal on Computing 32(3), 586–615 (2003)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute Based Encryption for Fine-Grained Access Control of Encrypted Data. In: ACM Conference on Computer and Communications Security –ACM CCS, pp. 89–98. ACM (2006)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 321–334. IEEE Society Press, Los Alamitos (2007)
Cheung, L., Newport, C.: Provably secure Ciphertext police ABE. In: Proceedings of the 14th ACM Conference on Computer and Communications Security –CCS, pp. 456–465. ACM Press, New York (2007)
Herranz, J., Laguillaumie, F., Rà fols, C.: Constant Size Ciphertexts in Threshold Attribute-Based Encryption. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 19–34. Springer, Heidelberg (2010)
Okamoto, T., Takashima, K.: Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 191–208. Springer, Heidelberg (2010)
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62–91. Springer, Heidelberg (2010)
Daza, V., Herranz, J., Morillo, P., Rà fols, C.: Extended access structures and their cryptographic applications. Applicable Algebra in Engineering, Communication and Computing 21(4), 257–284 (2010)
Zhou, Z., Huang, D.: On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 753-755. ACM (2010)
Attrapadung, N., Libert, B.: Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 384–402. Springer, Heidelberg (2010)
Chen, C., Zhang, Z., Feng, D.: Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost. In: Boyen, X., Chen, X. (eds.) ProvSec 2011. LNCS, vol. 6980, pp. 84–101. Springer, Heidelberg (2011)
Doshi, N., Jinwala, D.: Constant Ciphertext Length in CP-ABE. IACR Cryptology ePrint Archive (2012)
Waters, B.: Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011)
Katz, J., Sahai, A., Waters, B.: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 146–162. Springer, Heidelberg (2008)
Nishide, T., Yoneyama, K., Ohta, K.: Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 111–129. Springer, Heidelberg (2008)
Balu, A., Kuppusamy, K.: Privacy Preserving Ciphertext Policy Attribute Based Encryption. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds.) CNSA 2010. CCIS, vol. 89, pp. 402–409. Springer, Heidelberg (2010)
Yu, S., Ren, R., Lou, W.: Attribute-Based Content Distribution with Hidden Policy. In: 4th Workshop on Secure Network Protocols – NPSec, pp. 39–44 (2008)
Doshi, N., Jinwala, D.: Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext. In: Thilagam, P.S., Pais, A.R., Chandrasekaran, K., Balakrishnan, N. (eds.) ADCONS 2011. LNCS, vol. 7135, pp. 515–523. Springer, Heidelberg (2012)
Emura, K., Miyaji, A., Nomura, A., Omote, K., Soshi, M.: Ciphertext- Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length. In: Bao, F., Li, H., Wang, G. (eds.) International Journal of Applied Cryptography – IJACT, vol. 2(1), pp. 46–59 (2010)
Müller, S., Katzenbeisser, S.: Hiding the Policy in Cryptographic Access Control. In: Meadows, C., Fernandez-Gago, C. (eds.) STM 2011. LNCS, vol. 7170, pp. 90–105. Springer, Heidelberg (2012)
Hsiao, H., Lei, C.: A Hidden Access Control Scheme Allowing Negative Constraints. Master Thesis, Electrical Engineering Department, National Taiwan University (2008)
Balu, A., Kuppusamy, K.: Ciphertext policy Attribute based Encryption with anonymous access policy. CoRR abs/1011.0527 (2010)
Rao, Y.S., Dutta, R.: Recipient Anonymous Ciphertext-Policy Attribute Based Encryption. In: Bagchi, A., Ray, I. (eds.) ICISS 2013. LNCS, vol. 8303, pp. 329–344. Springer, Heidelberg (2013)
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)
Chang, Y.C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005)
Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 79–88. ACM (2006)
Goh, E.: Secure Indexes. In: IACR Cryptology ePrint Archive 2003/216 (2003), doi 10.1.1.2.5433
Yang, Z., Zhong, S., Wright, R.N.: Privacy-preserving queries on encrypted data. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 479–495. Springer, Heidelberg (2006)
Hwang, Y.H., Lee, P.J.: Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 2–22. Springer, Heidelberg (2007)
Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: Improved definitions and efficient constructions. Journal of Computer Security 19(5), 895–934 (2011)
Wang, C., Li, W., Li, Y., Xu, X.: A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds.) CSS 2013. LNCS, vol. 8300, pp. 377–386. Springer, Heidelberg (2013)
Sun, W., Yu, S., Lou, W., Hou, Y.T., Li, H.: Protecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud. In: IEEE INFOCOM. IEEE (2014)
Xiong, A., Gan, Q., He, X., Zhao, Q.: A Searchable Encryption Of Cp-Abe Scheme In Cloud Storage. In: 10th International Computer Conference on Wavelet Active Media Technology and Information Processing –ICCWAMTIP, pp. 345–349. IEEE (2013)
Liao, Z., Wang, J., Lang, B.: Ciphertext-policy Hidden Vector Encryption for Multi-User Keyword Search. In: 3rd International Conference on Internet & Cloud Computing Technology – ICICCT (2013)
Zhang, M., Wang, X., Yang, X., Cai, W.: Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption. In: 5th International Conference on Intelligent Networking and Collaborative Systems–INCoS, pp. 438–442. IEEE (2013)
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Padhya, M., Jinwala, D. (2014). A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy. In: Prakash, A., Shyamasundar, R. (eds) Information Systems Security. ICISS 2014. Lecture Notes in Computer Science, vol 8880. Springer, Cham. https://doi.org/10.1007/978-3-319-13841-1_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-13841-1_10
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13840-4
Online ISBN: 978-3-319-13841-1
eBook Packages: Computer ScienceComputer Science (R0)