Journal of Computer Applications ›› 2021, Vol. 41 ›› Issue (11): 3266-3273.DOI: 10.11772/j.issn.1001-9081.2020121987

• Cyber security • Previous Articles     Next Articles

Adaptive secure outsourced attribute-based encryption scheme with keyword search

Lifeng GUO1,2(), Qianli WANG1   

  1. 1.School of Computer and Information Technology,Shanxi University,Taiyuan Shanxi 030006,China
    2.Institute of Big Data Science and Industry,Shanxi University,Taiyuan Shanxi 030006,China
  • Received:2020-12-17 Revised:2021-07-28 Accepted:2021-08-03 Online:2021-03-22 Published:2021-11-10
  • Contact: Lifeng GUO
  • About author:WU Guangfu,born in 1977,Ph. D.,associate professor. His research interests include information theory and channel coding, cryptography and network security,blockchain
    DAI Ziheng,born in 1995,M. S. candidate. His research interests include channel coding,cryptography and information security.
  • Supported by:
    the General Program of Natural Science Foundation of Shanxi(201901D111029);the Key Research and Development Program of Shanxi Province (International Science and Technology Cooperation)(201903D421003);the Science and Technology Innovation Project of Colleges and Universities of Shanxi Province(2019L0114)


郭丽峰1,2(), 王倩丽1   

  1. 1.山西大学 计算机与信息技术学院,太原 030006
    2.山西大学 大数据科学与产业研究院,太原 030006
  • 通讯作者: 郭丽峰
  • 作者简介:郭丽峰(1975—),女,山西忻州人,教授,博士,主要研究方向:密码学、网络安全
    王倩丽(1995—),女,山西汾阳人,硕士研究 生,主要研究方向:密码学。
  • 基金资助:


In order to solve the problems of high computational cost of Attribute-Based Encryption (ABE) scheme and low efficiency of data search in cloud servers simultaneously, an Outsourced Attribute-Based Encryption scheme with Keyword Search (OABE-KS) was proposed. Firstly, the outsourced computation technology was used for reducing the local computing cost of encryption and decryption users to the constant level. Then, the indexes and trapdoors of the corresponding keywords were generated by the encryption user and the decryption user respectively, and the cloud server was used to match them. After that, the successful matching results would be returned to the decryption user by the cloud server. The adaptive security of the proposed scheme was proved under the composite order group. According to the experimental analysis, when the number of attributes changes from 10 to 100, the running time of each stage of the proposed scheme is basically unchanged, showing that the running time of the proposed scheme in each stage does not vary with the number change of attributes. Experimental results show that, the proposed scheme is suitable for the application on resource-limited devices and is not affected by the number of attributes in practical applications.

Key words: cloud server, Attribute-Based Encryption (ABE), verifiable outsourced computation, keyword search, adaptive security, dual-system



关键词: 云服务器, 属性基加密, 可验证外包计算, 关键字搜索, 自适应安全, 双系统

CLC Number: