2018
DOI: 10.1371/journal.pone.0205675
|View full text |Cite
|
Sign up to set email alerts
|

Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage

Abstract: We propose an attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage environment, in which binary attributes and AND-gate access policy are used. Our proposal enjoys several advantages. Firstly, multi-keyword search is available, and only when a data user's attribute set satisfies access policy in keyword index, and keyword token generated by data user matches index successfully, then data user can obtain ciphertext containing keywords. In this way, mor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 31 publications
0
6
0
Order By: Relevance
“…The client’s software and hardware configuration include Windows 10 (64 bit); CPU: Intel Core i3–9100 CPU @ 3.6 GHz/4.2 GHz; Memory: 8.0 GB. In the performance and system function comparison experiment, the methods used are from [ 33 ] and [ 34 ], which are based on the attribute-based method. We use the Java Pairing-Based Cryptography library (JPBC) to reproduce [ 33 ] and [ 34 ], and our algorithm uses the data encryption function library OpenSSL (1.1.1c).…”
Section: Evaluation and Implementationmentioning
confidence: 99%
See 3 more Smart Citations
“…The client’s software and hardware configuration include Windows 10 (64 bit); CPU: Intel Core i3–9100 CPU @ 3.6 GHz/4.2 GHz; Memory: 8.0 GB. In the performance and system function comparison experiment, the methods used are from [ 33 ] and [ 34 ], which are based on the attribute-based method. We use the Java Pairing-Based Cryptography library (JPBC) to reproduce [ 33 ] and [ 34 ], and our algorithm uses the data encryption function library OpenSSL (1.1.1c).…”
Section: Evaluation and Implementationmentioning
confidence: 99%
“…Fig 5(a) shows the time chart for the encryption and decryption by using [ 33 , 34 ] and the HSEA, respectively. In this experiment, we set the number of attribute values to 8.…”
Section: Evaluation and Implementationmentioning
confidence: 99%
See 2 more Smart Citations
“…Cloud storage is now playing a most important role [1] in our everyday lives with the rapid growth of information technology. The confidential information transferred to the cloud server should be kept secret to maintain data protection that allows data users to encrypt confidential folders while transferring [2] [38].…”
Section: Introductionmentioning
confidence: 99%