2016
DOI: 10.1002/cpe.3754
|View full text |Cite
|
Sign up to set email alerts
|

A restricted proxy re‐encryption with keyword search for fine‐grained data access control in cloud storage

Abstract: SUMMARYFor fine-grained data access control in cloud computing, for the first time, we introduce a new concept called restricted proxy re-encryption with keyword search, which combines the function of proxy re-encryption with keyword search and that of threshold cryptosystem. To demonstrate this concept, we present the formal syntax for restricted proxy re-encryption with keyword search, the security model, and a concrete construction. In our scheme, we take advantage of the techniques of threshold cryptosyste… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…Projects like “Privacy Flag” should be encouraged in order to identify possible risks on disclosure of data with suitable countermeasures and actions. The project limits to crowdfunding privacy risk assessment but can be applicable to other applications 139,140 Choosing third party in case of consortium blockchain: We need a blockchain which not only solves the data processor and data controller propaganda but also supports the honest users.…”
Section: Key‐findings Of the Researchmentioning
confidence: 99%
“…Projects like “Privacy Flag” should be encouraged in order to identify possible risks on disclosure of data with suitable countermeasures and actions. The project limits to crowdfunding privacy risk assessment but can be applicable to other applications 139,140 Choosing third party in case of consortium blockchain: We need a blockchain which not only solves the data processor and data controller propaganda but also supports the honest users.…”
Section: Key‐findings Of the Researchmentioning
confidence: 99%
“…However, when the proxy obtains the re-encryption key, the proxy is capable to convert all the ciphertexts of the user without restriction. To strengthen the fine-grained control of right of the proxy and further improve data security, the schemes 31,[46][47][48] proposed limited right PRE scheme with keyword search. However, the above schemes only support search for ciphertext by the use of one keyword.…”
Section: Pre With Abstractearchmentioning
confidence: 99%
“…The data user is allowed to delegate the keyword search ability to multiple users. Next, Chen et al [93] proposed a restricted proxy re-encryption with keyword search scheme for fine-grained data access control to restrict the capability of the proxy cloud server. Subsequently, Hong et al [94] proposed an attribute-based proxy re-encryption scheme with keyword search, and it fully took advantage of the attribute-based re-encryption and keyword search supporting flexible data access control among users in data sharing scenario.…”
Section: Peks-pre Research and Progressmentioning
confidence: 99%