Transforming Attribute-Based Encryption schemes into Asymmetric Searchable Encryption schemes
Elisa Giurgea
DOI: http://dx.doi.org/10.15439/2024F3018
Citation: Position Papers of the 19th Conference on Computer Science and Intelligence Systems, M. Bolanowski, M. Ganzha, L. Maciaszek, M. Paprzycki, D. Ślęzak (eds). ACSIS, Vol. 40, pages 17–24 (2024)
Abstract. Attribute-Based Encryption (ABE) and Asymmetric Searchable Encryption (ASE) are two highly useful Public-Key Encryption (PKE) technologies in today's cloud computing landscape. By leveraging the idea that the attributes from ABE can serve as keywords for ASE, we propose an efficient technique to translate any ABE schemes into ASE schemes. We addresses both the case of Ciphertext-Policy Attribute-Based Searchable Encryption (CP-ABSE) and Key-Policy Attribute-Based Searchable Encryption (KP-ABSE) schemes. Our main goal with these schemes is to maintain the security properties of ABE while introducing efficient search capabilities, thereby facilitating further advancements in ASE development. To validate our theoretical proposals, we have analyzed their practical applicability using existing ABE implementations.
References
- Dawn Xiaoding Song, D. Wagner and A. Perrig, Practical techniques for searches on encrypted data, in Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, Berkeley, CA, USA, pp. 44-55, 2000, https://dx.doi.org/10.1109/SECPRI.2000.848445
- D. Boneh, G. Di Crescenzo, R. Ostrovsky and G. Persiano, Public Key Encryption with Keyword Search, in: Cachin, C., Camenisch, J.L. (eds) Advances in Cryptology - EUROCRYPT 2004. EUROCRYPT (Lecture Notes in Computer Science), vol 3027. Springer, Berlin, Heidelberg, 2004, https://doi.org/10.1007/978-3-540-24676-3_30
- B. G. Pillai and N. Dayanand Lal, Blockchain-Based Searchable Asymmetric Encryption Scheme in Cloud Environment, in 2023 International Conference on Applied Intelligence and Sustainable Computing (ICAISC), Dharwad, India, pp. 1-6, 2023 https://dx.doi.org/10.1109/ICAISC58445.2023.10201090
- M. Wang, L. Rui, S. Xu, Z. Gao, H. Liu and S. Guo, Shaoyong, A multikeyword searchable encryption sensitive data trusted sharing scheme in multi-user scenario, in Elsevier North-Holland, Inc., USA, vol. 237, no. C, 2023 https://doi.org/10.1016/j.comnet.2023.110045
- M. Wang, L. Rui, S. Xu, Z. Gao, H. Liu and S. Guo, Shaoyong, A multi-keyword searchable encryption sensitive data trusted sharing scheme in multi-user scenario, in Elsevier North-Holland, Inc., USA, vol. 237, no. C, 2023 https://doi.org/10.1016/j.comnet.2023.110045
- R. Zhang, R. Xue, T. Yu and L. Liu, PVSAE: A Public Verifiable Searchable Encryption Service Framework for Outsourced Encrypted Data, in 2016 IEEE International Conference on Web Services (ICWS), San Francisco, CA, USA, pp. 428-435, 2016, https://dx.doi.org/10.1109/ICWS.2016.62
- L. Meng, L. Chen, Y. Tian, M. Manulis and S. Liu, FEASE: Fast and Expressive Asymmetric Searchable Encryption, in Cryptology ePrint Archive, Paper 2024/054, 2024, https://eprint.iacr.org/2024/054, in press
- T. Yarl, B.M. Goi, R. Komiya and S.Y. Tan, A Study of Attribute-Based Encryption for Body Sensor Networks, in Informatics Engineering and Information Science, vol. 251, pp. 238-247, 2011, https://doi.org/10.1007/978-3-642-25327-0_21
- K. Yang, X. Jia, K. Ren and B. Zhang, DAC-MACS: Effective data access control for multi-authority cloud storage systems, in 2013 Proceedings - IEEE INFOCOM, Turin, Italy, pp. 2895-2903, 2013, https://dx.doi.org/10.1109/INFCOM.2013.6567100
- K. Yang, X. Jia, Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage, in 2014 IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 7, pp. 1735-1744, 2014, https://dx.doi.org/10.1109/TPDS.2013.253
- X. Yao, Z. Chen, Y. Tian, A Lightweight Attribute-Based Encryption Scheme for the Internet of Things, Future Generation Computer Systems, vol. 49, pp. 104-112, 2015, https://dx.doi.org/10.1016/j.future.2014.10. 010
- J. Li, Y. Zhang, J. Ning, X. Huang, G. S. Poh, D. Wang, Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT, in 2022 IEEE Transactions on Cloud Computing, vol. 10, no. 2, pp. 762-773, 2022, https://dx.doi.org/10.1109/TCC.2020.2975184
- J. Bethencourt, A. Sahai, B. Waters, Ciphertext-Policy Attribute-Based Encryption, in 2007 IEEE Symposium on Security and Privacy (SP), pp. 321-334, 2007, https://dx.doi.org/10.1109/SP.2007.11
- Y. Rouselakis and B. Waters, Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption, in Financial Cryptography and Data Security (Lecture Notes in Computer Science), vol. 8975, Springer, Berlin, Heidelberg, Germany, 2015, https://dx.doi.org/10.1007/978-3-662-47854-7_19
- Charm: A Framework for Rapidly Prototyping Cryptosystems, https://github.com/JHUISI/charm/blob/dev/LICENSE.txt
- John Hopkins University: Advanced Research in Cryptography laboratory, https://arc.isi.jhu.edu/
- Charm ABENC schemes package, https://github.com/JHUISI/charm/tree/dev/charm/schemes/abenc
- M. Grigutytė, What is bcrypt and how does it work? , in NordVPN Blog, 2023, https://nordvpn.com/blog/what-is-bcrypt/
- PyCharm, https://www.jetbrains.com/pycharm/
- Parallels, https://www.parallels.com/