
Attribute-Based Proxy Re-Encryption with Keyword Search
Author(s) -
Yanfeng Shi,
Jiqiang Liu,
Zhen Han,
Qingji Zheng,
Rui Zhang,
Shuo Qiu
Publication year - 2014
Publication title -
plos one
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.99
H-Index - 332
ISSN - 1932-6203
DOI - 10.1371/journal.pone.0116325
Subject(s) - encryption , delegate , computer science , proxy re encryption , ciphertext , security token , cryptography , keyword search , proxy (statistics) , cloud computing , computer security , information retrieval , database , programming language , operating system , machine learning
Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search ( ), which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific,allows (i) the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii) the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy). We formalize the syntax and security definitions for, and propose two concrete constructions for: key-policyand ciphertext-policy. In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography.