计算机科学 ›› 2024, Vol. 51 ›› Issue (11A): 231100137-12.doi: 10.11896/jsjkx.231100137

• 信息安全 • 上一篇    下一篇

基于属性的可搜索加密综述

严莉1, 殷田2, 刘培顺2, 冯洪新2, 王高洲1, 张闻彬1, 呼海林1, 潘法定1   

  1. 1 国网山东省电力公司信息通信公司 济南 250013
    2 中国海洋大学信息科学与工程学部 山东 青岛 266400
  • 出版日期:2024-11-16 发布日期:2024-11-13
  • 通讯作者: 殷田(yintian@stu.ouc.edu.cn)
  • 作者简介:(617498012@qq.com)
  • 基金资助:
    国网山东省电力公司科技项目(520627230004)

Overview of Attribute-based Searchable Encryption

YAN Li1, YIN Tian2, LIU Peishun2, FENG Hongxin2, WANG Gaozhou1, ZHANG Wenbin1, HU Hailin1, PAN Fading1   

  1. 1 Information and Telecommunication Company,State Grid Shandong Electric Power Company,Jinan 250013,China
    2 Faculty of Information Science and Engineering,Ocean University of China,Qingdao,Shandong 266400,China
  • Online:2024-11-16 Published:2024-11-13
  • About author:YAN Li,born in 1975,master.Her main research interests include smart grid,data analytics and artificial intelligence.
    YIN Tian,born in 2001,postgraduate.Her main research interests include information security and cryptography.
  • Supported by:
    State Grid Shandong Electric Power Company Technology Project(520627230004).

摘要: 随着大数据时代的到来,数据规模和复杂性持续增加,对数据隐私和安全保障的需求也日益迫切。然而,传统的加密方法无法满足在大规模数据集中进行高效搜索的需求。为了解决这一问题,可搜索加密技术引入了陷门函数和其他密码学技术,使得无需解密整个数据集即可在加密的数据中进行搜索。然而,单独采用可搜索加密仍无法满足现实世界中复杂的数据访问控制需求。因此,研究人员将属性基加密的概念引入可搜索加密,从而实现了属性基可搜索加密体制,旨在实现在加密的数据集合中按属性进行高效搜索的功能。属性基可搜索加密在隐私保护、数据共享和云计算等领域具有广泛的应用前景,从隐私保护增强、计算效率提升以及灵活性增强3个方面对其发展趋势进行了阐述,并介绍了涉及到的相关方案。在隐私保护增强方面,主要讨论了策略隐藏技术、权限管理技术以及安全性增强技术;针对效率优化的方案主要涉及外包计算、在线/离线加密机制以及索引结构优化等。同时,在灵活增强方面讨论了属性基可搜索加密在访问策略表达能力和搜索能力方面的提升。此外,还介绍了几个常见的应用领域,并总结了研究人员提出的相关方案。最后,讨论了属性基可搜索加密面临的挑战以及未来方向。

关键词: 基于属性的加密, 可搜索加密, 属性基可搜索加密, 隐私保护, 数据共享, 云计算

Abstract: With the advent of the big data era,the size and complexity of data continue to increase,which makes the requirement for data privacy and security increasingly urgent.However,traditional encryption methods cannot meet the demand for efficient searching in large-scale datasets.To address this problem,searchable encryption introduces trapdoor functions and other cryptographic techniques that allow searching in encrypted data without decrypting the entire dataset.However,searchable encryption alone still cannot meet the complex data access control needs in the real world.Therefore,researchers have introduced the concept of attribute-based encryption into searchable encryption,resulting in attribute-based searchable encryption.This approach aims to achieve efficient search by attributes in encrypted data sets.Attribute-based searchable encryption has a wide range of applications in the fields of privacy protection,data sharing and cloud computing.In this paper,we describe the development trends in terms of enhancing privacy protection,improving computational efficiency,and increasing flexibility.We also present the related schemes involved.In terms of enhancing privacy protection,we discusstechniques such as policy hiding,permission management,and securi-ty enhancement.The current methods for optimizing efficiency primarily involve outsourcing computation,online/offline encryption mechanisms,and index structure optimization,among others.Additionally,the improvement of the attribute-based searchable encryption scheme in terms of access policy expression ability and search capability is discussed.In addition,this paper introduces several common application areas and summarizes the relevant schemes proposed by researchers.In addition,it discusses the challenges and future directions of attribute-based searchable encryption.

Key words: Attribute-based encryption, Searchable encryption, Attribute-based searchable encryption, Privacy preservation, Data sharing, Cloud computing

中图分类号: 

  • TP309
[1]ZHANG Y,WANG X,LIU X,et al.Survey on Cloud Computing Security [J].Journal of Software,2016,27(6):1328-1348.
[2]SONG D X D,WAGNER D,PERRIG A,et al.Practical techniques for searches on encrypted data[C]//Proceedings of the 2000 IEEE Symposium on Security and Privacy(S&P 2000).Berkeley,CA,USA,2000:14-17.
[3]BONEH D,DI CRESCENZO G,OSTROVSKY R,et al.Public key encryption with keyword search [C]//Advances in Crypto-logy-Eurocrypt 2004,2004:506-522.
[4]SAHAI A,WATERS B.Fuzzy identity-based encryption [C]//Advances in Cryptology-Eurocrypt 2005.2005:457-473.
[5]GOYAL V,PANDEY O,SAHAI A,et al.Attribute-based en-cryption for fine-grained access control of encrypted data [C]//Proceedings of the 13th ACM conference on Computer and Communications Security.2006
[6]BETHENCOURT J,SAHAI A,WATERS B,et al.Ciphertext-policy attribute-based encryption [C]//Proceedings of the IEEE Symposium on Security and Privacy(S&P 2007).Berkeley,CA,2007:20-23.
[7]KHADER D.Introduction to Attribute Based Searchable En-cryption[C]//Proceedings of the 15th Joint IFIP TC-6 and TC-11 International Conference on Communications and Multimedia Security(CMS).Univ Aveiro,Aveiro,PORTUGAL,2014:25-26.
[8]ZHENG Q,XU S,ATENIESE G,et al.VABKS:Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data[C]//Proceedings of the 33rd IEEE Annual Conference on Computer Communications(IEEE INFOCOM).Toronto,CANADA,2014.
[9]WATERS B.Ciphertext-Policy Attribute-Based Encryption:An Expressive,Efficient,and Provably Secure Realization [C]//Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography(PKC 2011).Taormina,ITALY,2011:6-9.
[10]LEWKO A,WATERS B.New Proof Methods for Attribute-Based Encryption:Achieving Full Security through Selective Techniques[C]//Proceedings of the 32nd Annual International Cryptology Conference(CRYPTO).Santa Barbara,CA,2012:19-23.
[11]WANG S,WANG J,DONG Q,et al.A Survey of Attribute-based Encryption Technology [J].Netinfo Security,2019(9):76-80.
[12]NISHIDE T,YONEYAMA K,OHTA K.Attribute-based encryption with partially hidden encryptor-specified access structures[C]//Proceedings of the 5th International Conference on Applied Cryptography and Network Security.New York,NY,2008:3-6.
[13]LAI J,DENG R H,LI Y.Fully secure cipertext-policy hidingCP-ABE[C]//proceedings of the Information Security Practice and Experience:7th International Conference(ISPEC 2011).Guangzhou,China,2011.
[14]BALU A,KUPPUSAMY K.Privacy Preserving Ciphertext Policy Attribute Based Encryption [C]//Proceedings of the 3rd International Conference on Network Security and Applications.Chennai,INDIA,2010:23-25.
[15]LAI J,DENG R H,LI Y,et al.Expressive CP-ABE with Partially Hidden Access Structures[C]//Proceedings of the 7th ACM Symposium on Information,Computer and Communications Security(ASIACCS).Korea Federat Sci & Technol Soc,Seoul,SOUTH AFRICA,2012:2-4.
[16]ZHANG Y,DENG R H,HAN G,et al.Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things [J].Journal of Network and Computer Applications,2018,123:89-100.
[17]KOO D,HUR J,YOON H.Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage [J].Computers & Electrical Engineering,2013,39(1):34-46.
[18]CHAUDHARI P,DAS M L.On the security of a searchableanonymous attribute based encryption[C]//Proceedings of the Mathematics and Computing:Third International Conference(ICMC 2017).Haldia,India,2017:17-21.
[19]SHI J,LAI J,LI Y,et al.Authorized Keyword Search on Encrypted Data[C]//Proceedings of the 19th European Symposium on Research in Computer Security(ESORICS).Wroclaw Univ Technol,Wroclaw,2014:7-11.
[20]WANG H,DONG X,CAO Z.Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search [J].IEEE Transactions on Services Computing,2020,13(6):1142-1151.
[21]CHAUDHARI P,DAS M L.KeySea:Keyword-Based SearchWith Receiver Anonymity in Attribute-Based Searchable Encryption [J].IEEE Transactions on Services Computing,2022,15(2):1036-1044.
[22]MIAO Y,LIU X,CHOO K K R,et al.Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting [J].IEEE Transactions on Dependable and Secure Computing,2021,18(3):1080-1094.
[23]SUN J,XIONG H,NIE X,et al.On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-Owner Setting [J].IEEE Transactions on Dependable and Secure Computing,2021,18(5):2518-2519.
[24]LIU Z,CAO Z,WONG D S.Traceable CP-ABE:How to Trace Decryption Devices Found in the Wild [J].IEEE Transactions on Information Forensics and Security,2015,10(1):55-68.
[25]HINEK M,JIANG S,SAFAVI-NAINI R,et al.Attribute basedencryption with key cloning protection:Report 2008/478 [R].2008.
[26]YU S,REN K,LOU W,et al.Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems[C]//Proceedings of the 5th International ICST Conference on Security and Privacy in Communication Networks.Athens,GREECE,2009:14-17.
[27]KATZ J,SCHRÖDER D.Tracing insider attacks in the context of predicate encryption schemes [C]//Proceedings of the Proc ACITA.2011.
[28]LIU Z,CAO Z,WONG D S.White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures [J].IEEE Transactions on Information Forensics and Security,2013,8(1):76-88.
[29]LIU Z,CAO Z,WONG D S.Blackbox traceable CP-ABE:how to catch people leaking their keys by selling decryption devices on ebay[C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security.2013.
[30]LIU Z,WONG D S.Traceable CP-ABE on prime order groups:Fully secure and fully collusion-resistant blackbox traceable[C]//Proceedings of the International Conference on Information and Communications Security.Springer,2015.
[31]ZIEGLER D,MARSALEK A,PALFINGER G.White-BoxTraceable Attribute-Based Encryption with Hidden Policies and Outsourced Decryption [C]//Proceedings of the 20th IEEE International Conference on Trust,Security and Privacy in Computing and Communications(IEEE TrustCom).Shenyang,2021:20-22.
[32]LUO F,AL-KUWARI S.Generic Construction of Black-BoxTraceable Attribute-Based Encryption [J].IEEE Transactions on Cloud Computing,2023,11(1):942-955.
[33]YANG Y,LIU X,DENG R H,et al.Lightweight Sharable andTraceable Secure Mobile Health System [J].IEEE Transactions on Dependable and Secure Computing,2020,17(1):78-91.
[34]VARRI U S,KASANI S,PASUPULETI S K,et al.FELT-ABKS:Fog-Enabled Lightweight Traceable Attribute-Based Keyword Search Over Encrypted Data [J].IEEE Internet of Things Journal,2022,9(10):7559-71.
[35]LI L,ZHU J,YANG C.Overview of Research on the Revocable Mechanism of Attribute-Based Encryption [J].Netinfo Security,2023(4):39-50.
[36]PIRRETTI M,TRAYNOR P,MCDANIEL P,et al.Secure attribute-based systems [C]//Proceedings of the 13th ACM conference on Computer and Communications Security.2006.
[37]OSTROVSKY R,SAHAI A,WATERS B.Attribute-Based Encryption with Non-Monotonic Access Structures[C]//Proceedings of the 14th ACM Conference on Computer and Communication Security.Alexandria,VA,2007:29.
[38]ATTRAPADUNG N,IMAI H.Conjunctive Broadcast and Attribute-Based Encryption[C]//Proceedings of the 3rd International Conference on Paring-Based Cryptography.Stanford Univ,Palo Alto,CA,2009:12-14.
[39]WANG S,ZHANG X,ZHANG Y.Efficient revocable andgrantable attribute-based encryption from lattices with fine-grained access control [J].IET Information Security,2018,12(2):141-149.
[40]TU S,WAQAS M,HUANG F,et al.A revocable and out-sourced multi-authority attribute-based encryption scheme in fog computing [J].Computer Networks,2021,195.
[41]DONG X,ZHANG Y,WANG B,et al.Server-Aided Revocable Attribute-Based Encryption from Lattices [J].Security and Communication Networks,2020.
[42]WEI J,CHEN X,HUANG X,et al.RS-HABE:Revocable-Stora-ge and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud [J].IEEE Transactions on Dependable and Secure Computing,2021,18(5):2301-2315.
[43]BAO Y,QIU W,TANG P,et al.Efficient,Revocable,and Privacy-Preserving Fine-Grained Data Sharing With Keyword Search for the Cloud-Assisted Medical IoT System [J].IEEE Journal of Biomedical and Health Informatics,2022,26(5):2041-2051.
[44]MIAO Y,LI F,LI X H,et al.Time-controllable keyword search scheme with efficient revocation in mobile e-health cloud [J].IEEE Transactions on Mobile Computing,2024,23(5):3650-3665.
[45]LIU S,YU J,XIAO Y,et al.BC-SABE:Blockchain-AidedSearchable Attribute-Based Encryption for Cloud-IoT [J].IEEE Internet of Things Journal,2020,7(9):7851-7867.
[46]LIU S,CHEN L,WU G,et al.Blockchain-Backed SearchableProxy Signcryption for Cloud Personal Health Records [J].IEEE Transactions on Services Computing,2023,16(5):3210-3223.
[47]YU J,LIU S,XU M,et al.An Efficient Revocable and Searchable MA-ABE Scheme With Blockchain Assistance for C-IoT [J].IEEE Internet of Things Journal,2023,10(3):2754-2766.
[48]MIAO Y,MA J,LIU X,et al.Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing [J].IEEE Internet of Things Journal,2018,5(4):3008-3018.
[49]ZHANG K,LONG J,WANG X,et al.Lightweight SearchableEncryption Protocol for Industrial Internet of Things [J].IEEE Transactions on Industrial Informatics,2021,17(6):4248-4259.
[50]WANG H,FAN K,ZHANG K,et al.Secure and efficient data-privacy-preserving scheme for mobile cyber-physical systems [J].IEEE Internet of Things Journal,2022,9(22):22375-22388.
[51]GAO H,HUANG H,XUE L,et al.Blockchain-enabled fine-grained searchable encryption with cloud-edge computing for electronic health records sharing [J].IEEE Internet of Things Journal,2023,10(20):18414-18425.
[52]LIU J,FAN Y,SUN R,et al.Blockchain-aided privacy-preserving medical data sharing scheme for e-healthcare system [J].IEEE Internet of Things Journal,2023,10(24):21377-21388.
[53]NIU S,HU Y,ZHOU S,et al.Attribute-Based Searchable Encryption in Edge Computing for Lightweight Devices [J].Ieee Systems Journal,2023,17(3):3503-3514.
[54]CUI H,WAN Z,DENG R H,et al.Efficient and ExpressiveKeyword Search Over Encrypted Data in Cloud [J].IEEE Transactions on Dependable and Secure Computing,2018,15(3):409-422.
[55]YU Y,SHI J,LI H,et al.Key-Policy Attribute-Based Encryption With Keyword Search in Virtualized Environments [J].IEEE Journal on Selected Areas in Communications,2020,38(6):1242-1251.
[56]SHI J,YU Y,YU Q,et al.Toward Data Security in 6G Networks:A Public-Key Searchable Encryption Approach [J].IEEE Network,2022,36(4):166-713.
[57]ZHANG D,WANG S,ZHANG Q,et al.Attribute-based conjunctive keywords search with verifiability and fair payment using blockchain [J]. IEEE Transactions on Services Computing,2023,16(6): 4168-4182.
[59]MIAO Y,DENG R H,LIU X,et al.Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data [J].IEEE Transactions on Dependable and Secure Computing,2021,18(4):1667-1680.
[60]ZHANG P,CHUI Y,LIU H,et al.Efficient and Privacy-Preserving Search Over Edge-Cloud Collaborative Entity in IoT [J].IEEE Internet of Things Journal,2023,10(4):3192-3205.
[61]LIU X,YANG X,LUO Y,et al.Verifiable Multikeyword Search Encryption Scheme With Anonymous Key Generation for Medical Internet of Things [J].IEEE Internet of Things Journal,2022,9(22):22315-22326.
[62]BAO Y,QIU W,CHENG X.Secure and Lightweight Fine-Grained Searchable Data Sharing for IoT-Oriented and Cloud-Assisted Smart Healthcare System [J].IEEE Internet of Things Journal,2022,9(4):2513-2526.
[63]WANG J,LIN X,WU Y,et al.Blockchain-Enabled LightweightFine-Grained Searchable Knowledge Sharing for Intelligent IoT [J].IEEE Internet of Things Journal,2023:1-.
[64]EVEN S,GOLDREICH O,MICALI S.On-line/off-line digitalsignatures [J].Journal of Cryptology,1996,9(1):35-67.
[65]HOHENBERGER S,WATERS B.Online/Offline Attribute-Based Encryption[C]//Proceedings of the 17th Annual IACR International Conference on Practice and Theory of Public-Key Cryptography(PKC).Buenos Aires,ARGENTINA,2014:26-28.
[66]DATTA P,DUTTA R,MUKHOPADHYAY S.Fully Secure Online/Offline Predicate and Attribute-Based Encryption[C]//Proceedings of the 11th International Conference on Information Security Practice and Experience(ISPEC).Beijing,China,2015:5-8.
[67]LIU Y,ZHANG Y,LING J,et al.Secure and fine-grained access control on e-healthcare records in mobile cloud computing [J].Future Generation Computer Systems-the International Journal of Escience,2018,78:1020-12206.
[68]CUI J,ZHOU H,XU Y,et al.OOABKS:Online/offline attri-bute-based encryption for keyword search in mobile cloud [J].Information Sciences,2019,489:63-77.
[69]LIU J,LI Y,SUN R,et al.EMK-ABSE:Efficient MultikeywordAttribute-Based Searchable Encryption Scheme Through Cloud-Edge Coordination [J].IEEE Internet of Things Journal,2022,9(19):18650-18662.
[70]WANG B,LI M,WANG H.Geometric Range Search on En-crypted Spatial Data [J].IEEE Transactions on Information Forensics and Security,2016,11(4):704-719.
[71]XIA Z,WANG X,SUN X,et al.A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data [J].IEEE Transactions on Parallel and Distributed Systems,2016,27(2):340-352.
[72]CURTMOLA R,GARAY J,KAMARA S,et al.Searchablesymmetric encryption:improved definitions and efficient constructions[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security.2006.
[73]CASH D,JARECKI S,JUTLA C,et al.Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries[C]//Proceedings of the 33rd Annual International Cryptology Conference(CRYPTO).Santa Barbara,CA,2013:18-22.
[74]ZHANG K,WEN M,LU R,et al.Multi-client sub-linear Boolean keyword searching for encrypted cloud storage with owner-enforced authorization [J] IEEE Transactions on Dependable and Secure Computing,2021,18(6):2875-2887.
[75]YIN H,QIN Z,ZHANG J,et al.A fine-grained authorized keyword secure search scheme with efficient search permission update in cloud computing [J].Journal of Parallel and Distributed Computing,2020,135:56-69.
[76]YIN H,LI Y,DENG H,et al.Practical and Dynamic Attribute-Based Keyword Search Supporting Numeric Comparisons Over Encrypted Cloud Data [J].Ieee Transactions on Services Computing,2023,16(4):2855-2867.
[77]MIAO Y,MA J,LIU X,et al.Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing [J].IEEE Transactions on Services Computing,2020,13(6):985-998.
[78]GOLLE P,STADDON J,WATERS B.Secure conjunctive keyword search over encrypted data [C]//Applied Cryptography and Network Security.2004:31-45.
[79]PARK D J,KIM K,LEE P J.Public key encryption with conjunctive field keyword search [C]//Information Security Applications.2005:73-86.
[80]ZHANG K,WANG X,NING J,et al.Multi-client Boolean file retrieval with adaptable authorization switching for secure cloud search services [J].IEEE Transactions on Dependable and Secure Computing,2023,20(6):4621-4636.
[81]HE K,GUO J,WENG J,et al.Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data [J].IEEE Transactions on Dependable and Secure Computing,2020,17(6):1207-1217.
[82]HUANG Q,YAN G,WEI Q.Attribute-Based Expressive and Ranked Keyword Search Over Encrypted Documents in Cloud Computing [J].IEEE Transactions on Services Computing,2023,16(2):957-968.
[83]SHAMIR A.How to share a secret [J].Communications of the ACM,1979,22(11):612-613.
[84]CHEUNG L,NEWPORT C.Provably Secure Ciphertext Policy ABE[C]//Proceedings of the 14th ACM Conference on Computer and Communication Security.Alexandria,2007.
[85]CHEN Y.Research on Attribute-Based Encryption Systems and Its Applications [D].Nanjing:Nanjing University of Posts and Telecommunications,2014.
[86]LAI J,DENG R H,YANG Y,et al.Adaptable ciphertext-policy attribute-based encryption [C]//Proceedings of the Pairing-Based Cryptography-Pairing 2013:6th International Conference.Beijing,China,2013:22-24.
[87]XUE K,HONG J,XUE Y,et al.CABE:A New Comparable At-tribute-Based Encryption Construction with 0-Encoding and 1-Encoding [J].IEEEE Transactions on Computers,2017,66(9):1491-1503.
[88]ZHANG K,WANG X,NING J,et al.Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control [J].IEEE Transactions on Information Forensics and Security,2023,18:5286-5301.
[89]LEWKO A,WATERS B.Unbounded HIBE and Attribute-Based Encryption[C]//Proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques.Tallinn,ESTONIA,2011:15-19.
[90]ROUSELAKIS Y,WATERS B.Practical constructions and new proof methods for large universe attribute-based encryption [C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer C Sommunications Scurity.2013.
[91]ZHANG T,LIN W,WANG Y,et al.The design of information security protection framework to support smart grid[C]//Proceedings of the 2010 International Conference on Power System Technology.IEEE,2010.
[92]ROGERS K M,KLUMP R,KHURANA H,et al.An Authenticated Control Framework for Distributed Voltage Support on the Smart Grid [J].IEEE Transactions on Smart Grid,2010,1(1):40-47.
[93]SU Q,ZHANG R,XUE R,et al.Distributed Attribute-Based SignatureWith Attribute Dynamic Update for Smart Grid [J].IEEE Transactions on Industrial Informatics,2023,19(9):9424-9435.
[94]GE J,WEN M,WANG L,et al.Attribute-Based CollaborativeAccess Control Scheme with Constant Ciphertext Length for Smart Grid[C]//Proceedings of the IEEE International Conference on Communications(ICC).Seoul,SOUTH KOREA,2022:16-20.
[95]LI J,NIU X,SUN J S,et al.A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data[C]//Proceedings of the IEEE International Conference on Communications(IEEE ICC).2019.
[96]ELTAYIEB N,ELHABOB R,HASSAN A,et al.An efficient a-ttribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid [J].Journal of Systems Architecture,2019,98:165-172.
[97]GE X,YU J,HAO R,et al.Verifiable Keyword Search Supporting Sensitive Information Hiding for the Cloud-Based Healthcare Sharing System [J].IEEE Transactions on Industrial Informatics,2022,18(8):5573-5583.
[98]MAMTA,GUPTA B B,LI K C,et al.Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System [J].IEEE-CAA Journal of Automatica Sinica,2021,8(12):1877-1890.
[99]WANG W,XU P,LIU D,et al.Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices [J].IEEE Transactions on Industrial Informatics,2020,16(6):4221-4230.
[100]ALI M,SADEGHI M R,LIU X,et al.Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things [J].Journal of Information Security and Applications,2022,65(C):103101.
[101]ZHOU R,ZHANG X,WANG X,et al.Device-Oriented Keyword-Searchable Encryption Scheme for Cloud-Assisted Industrial IoT [J].IEEE Internet of Things Journal,2022,9(18):17098-17109.
[102]YIN H,ZHANG W,DENG H,et al.An Attribute-BasedSearchable Encryption Scheme for Cloud-Assisted IIoT [J].IEEE Internet of Things Journal,2023,10(12):11014-11023.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!