File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1002/sec.1671
- Scopus: eid_2-s2.0-85002245087
- WOS: WOS:000398221800014
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: ABKS-CSC: attribute-based keyword search with constant-size ciphertexts
Title | ABKS-CSC: attribute-based keyword search with constant-size ciphertexts |
---|---|
Authors | |
Keywords | cloud computing attribute-based encryption access control security attribute-based keyword search |
Issue Date | 2016 |
Citation | Security and Communication Networks, 2016, v. 9, n. 18, p. 5003-5015 How to Cite? |
Abstract | Copyright © 2016 John Wiley & Sons, Ltd. Attribute-based keyword search (ABKS) was proposed to enable a third party to search encrypted keywords without compromising the security of the original data. Because it can express flexible access policy, ABKS has attracted a lot of attention. Existing ABKS schemes mainly focused on the expression of access structures, while the computation cost and communication cost are linear with the number of required attributes. Therefore, existing ABKS schemes are unsuitable to the devices that have constrained space and computing power, such as smart phone and tablet. In this paper, an ABKS with constant-size ciphertext scheme is proposed. The proposed scheme captures the following nice features: (1) The index encryption algorithm has constant computation cost; (2) the searchable ciphertexts are constant size; (3) the trapdoors for keywords are constant size; and (4) the test algorithm has constant computation cost. To the best of our knowledge, it is the first time that an ABKS with constant-size ciphertext scheme is proposed. Copyright © 2016 John Wiley & Sons, Ltd. |
Persistent Identifier | http://hdl.handle.net/10722/260228 |
ISSN | 2021 Impact Factor: 1.968 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yang, Ye | - |
dc.contributor.author | Han, Jinguang | - |
dc.contributor.author | Susilo, Willy | - |
dc.contributor.author | Yuen, Tsz Hon | - |
dc.contributor.author | Li, Jiguo | - |
dc.date.accessioned | 2018-09-12T02:00:50Z | - |
dc.date.available | 2018-09-12T02:00:50Z | - |
dc.date.issued | 2016 | - |
dc.identifier.citation | Security and Communication Networks, 2016, v. 9, n. 18, p. 5003-5015 | - |
dc.identifier.issn | 1939-0114 | - |
dc.identifier.uri | http://hdl.handle.net/10722/260228 | - |
dc.description.abstract | Copyright © 2016 John Wiley & Sons, Ltd. Attribute-based keyword search (ABKS) was proposed to enable a third party to search encrypted keywords without compromising the security of the original data. Because it can express flexible access policy, ABKS has attracted a lot of attention. Existing ABKS schemes mainly focused on the expression of access structures, while the computation cost and communication cost are linear with the number of required attributes. Therefore, existing ABKS schemes are unsuitable to the devices that have constrained space and computing power, such as smart phone and tablet. In this paper, an ABKS with constant-size ciphertext scheme is proposed. The proposed scheme captures the following nice features: (1) The index encryption algorithm has constant computation cost; (2) the searchable ciphertexts are constant size; (3) the trapdoors for keywords are constant size; and (4) the test algorithm has constant computation cost. To the best of our knowledge, it is the first time that an ABKS with constant-size ciphertext scheme is proposed. Copyright © 2016 John Wiley & Sons, Ltd. | - |
dc.language | eng | - |
dc.relation.ispartof | Security and Communication Networks | - |
dc.subject | cloud computing | - |
dc.subject | attribute-based encryption | - |
dc.subject | access control | - |
dc.subject | security | - |
dc.subject | attribute-based keyword search | - |
dc.title | ABKS-CSC: attribute-based keyword search with constant-size ciphertexts | - |
dc.type | Article | - |
dc.description.nature | link_to_OA_fulltext | - |
dc.identifier.doi | 10.1002/sec.1671 | - |
dc.identifier.scopus | eid_2-s2.0-85002245087 | - |
dc.identifier.volume | 9 | - |
dc.identifier.issue | 18 | - |
dc.identifier.spage | 5003 | - |
dc.identifier.epage | 5015 | - |
dc.identifier.eissn | 1939-0122 | - |
dc.identifier.isi | WOS:000398221800014 | - |
dc.identifier.issnl | 1939-0122 | - |