IDEAS home Printed from https://ideas.repec.org/a/igg/jesma0/v11y2019i4p16-38.html
   My bibliography  Save this article

Dynamic Policy Attribute Based Encryption and its Application in Generic Construction of Multi-Keyword Search

Author

Listed:
  • Mamta

    (National Institute of Technology, Kurukshetra, India)

  • Brij B. Gupta

    (National Institute of Technology, Kurukshetra, India)

  • Syed Taqi Ali

    (Visvesvaraya National Institute of Technology Nagpur, Nagpur, India)

Abstract

Attribute based encryption (ABE) is an encryption technique which provides a good solution to the security issues in the cloud environment. Through ABE, a data owner can achieve the fine-grained sharing of data encrypted under attributes or an access policy which they possess. The relation among these attributes is represented by the access policy which is expressed as an access tree. In this article, the authors first present an ABE scheme which supports frequent changes in the access tree and hence, it is named a dynamic policy ABE. Also, the proposed scheme generates secret keys of constant size which can save bandwidth. The proposed scheme is based on key-policy design and supports monotonic access structure that consists of AND, OR and Threshold gates. Inspired by the proposed dynamic policy ABE scheme the authors then present a multi-keyword search scheme which inherits all the features of the proposed ABE scheme. Therefore, it provides a constant size trapdoor and support for fast search. The construction of a multi-keyword search scheme is generic in nature and any ABE scheme can be converted to the multi-keyword search scheme using the transformation method given in the paper. Finally, the proposed schemes are proven to be secure under Decisional Bilinear Diffie-Hellman (DBDH) assumption.

Suggested Citation

  • Mamta & Brij B. Gupta & Syed Taqi Ali, 2019. "Dynamic Policy Attribute Based Encryption and its Application in Generic Construction of Multi-Keyword Search," International Journal of E-Services and Mobile Applications (IJESMA), IGI Global, vol. 11(4), pages 16-38, October.
  • Handle: RePEc:igg:jesma0:v:11:y:2019:i:4:p:16-38
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJESMA.2019100102
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jesma0:v:11:y:2019:i:4:p:16-38. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.