期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Searchable Attribute-Based Encryption with Multi-Keyword Fuzzy Matching for Cloud-Based IoT
1
作者 He Duan Shi Zhang Dayu Li 《Computers, Materials & Continua》 2026年第2期872-896,共25页
Internet of Things(IoT)interconnects devices via network protocols to enable intelligent sensing and control.Resource-constrained IoT devices rely on cloud servers for data storage and processing.However,this cloudass... Internet of Things(IoT)interconnects devices via network protocols to enable intelligent sensing and control.Resource-constrained IoT devices rely on cloud servers for data storage and processing.However,this cloudassisted architecture faces two critical challenges:the untrusted cloud services and the separation of data ownership from control.Although Attribute-based Searchable Encryption(ABSE)provides fine-grained access control and keyword search over encrypted data,existing schemes lack of error tolerance in exact multi-keyword matching.In this paper,we proposed an attribute-based multi-keyword fuzzy searchable encryption with forward ciphertext search(FCS-ABMSE)scheme that avoids computationally expensive bilinear pairing operations on the IoT device side.The scheme supportsmulti-keyword fuzzy search without requiring explicit keyword fields,thereby significantly enhancing error tolerance in search operations.It further incorporates forward-secure ciphertext search to mitigate trapdoor abuse,as well as offline encryption and verifiable outsourced decryption to minimize user-side computational costs.Formal security analysis proved that the FCS-ABMSE scheme meets both indistinguishability of ciphertext under the chosen keyword attacks(IND-CKA)and the indistinguishability of ciphertext under the chosen plaintext attacks(IND-CPA).In addition,we constructed an enhanced variant based on type-3 pairings.Results demonstrated that the proposed scheme outperforms existing ABSE approaches in terms of functionalities,computational cost,and communication cost. 展开更多
关键词 Cloud computing Internet of Things ABSE multi-keyword fuzzy matching outsourcing decryption
在线阅读 下载PDF
Traceable and revocable multi-authority ABE supporting decryption outsourcing and policy update for cloud data access control
2
作者 Yan-Qing YAO Yun-Jia ZHANG +3 位作者 Zhi-Yi LIU Yu-Xuan WANG Xin-Yu TAN Zhengde ZHAI 《Frontiers of Computer Science》 2026年第4期103-119,共17页
Nowadays,vast and rapidly growing information acts as digital records of social activities and is widely collected and stored as economic assets.To reduce the difficulty and local data management’s cost significantly... Nowadays,vast and rapidly growing information acts as digital records of social activities and is widely collected and stored as economic assets.To reduce the difficulty and local data management’s cost significantly,cloud storage services provide a highly available,highperformance,and low-cost solution for user data hosting,enabling remote access,backup,and sharing of data stored by the cloud.However,this service model is not without security risks,including user privacy exposure,low trustworthiness of data,and unauthorized access.To address these concerns,attribute-based encryption(ABE)schemes allow for the implementation of fine-grained access policies while ensure the confidentiality and availability of data stored under the cloud environment.The issues of collusion among authorities,excessive decryption computation overhead,and high complexity in attribute revocation have aroused many researchers’attention,and many works have emerged.However,expanding the functionality of ABE schemes to satisfy multiple requirements and improving existing functionality of ABE schemes are still urgent problems to be solved.Motivated by these problems,here we propose a novel multi-functional multi-authority ABE scheme that incorporates functional features such as multi-authority key generation,outsourced decryption,malicious user tracking,flexible attribute revocation,and real-time policy updates,thereby providing fine-grained access control as well as confidentiality for data stored under cloud environments.Similar to prior works,we have analyzed the static security,forward security,and resistance to collusion attacks of our proposed scheme for completeness.Storage and computational efficiency evaluation shows that our proposed scheme achieves lower storage costs and computational overhead compared to existing schemes with similar functionalities. 展开更多
关键词 multi-authority attribute-based encryption CP-ABE decryption outsourcing policy update attribute revocation white-box traceability access control
原文传递
Substring-searchable attribute-based encryption and its application for IoT devices 被引量:3
3
作者 Xi Sun Hao Wang +4 位作者 Xiu Fu Hong Qin Mei Jiang Likun Xue Xiaochao Wei 《Digital Communications and Networks》 SCIE CSCD 2021年第2期277-283,共7页
With the development of big data and cloud computing technology,more and more users choose to store data on cloud servers,which brings much convenience to their management and use of data,and also the risk of data lea... With the development of big data and cloud computing technology,more and more users choose to store data on cloud servers,which brings much convenience to their management and use of data,and also the risk of data leakage.A common method to prevent data leakage is to encrypt the data before uploading it,but the traditional encryption method is often not conducive to data sharing and querying.In this paper,a new kind of Attribute-Based Encryption(ABE)scheme,which is called the Sub-String Searchable ABE(SSS-ABE)scheme,is proposed for the sharing and querying of the encrypted data.In the SSS-ABE scheme,the data owner encrypts the data under an access structure,and only the data user who satisfies the access structure can query and decrypt it.The data user can make a substring query on the whole ciphertext without setting keywords in advance.In addition,the outsourcing method is also introduced to reduce the local computation of the decryption process so that the outsourcing SSS-ABE scheme can be applied to IoT devices. 展开更多
关键词 Attribute-based encryption Searchable encryption outsourcing decryption IoT divices
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部