Title: Fully secure hierarchical inner product encryption for privacy preserving keyword searching in cloud

Authors: Leyou Zhang; Zhuanning Wang; Yi Mu; Yupu Hu

Addresses: School of Mathematics and Statistics, Xidian University, Xi'an, 710071, Shaanxi, China ' School of Mathematics and Statistics, Xidian University, Xi'an, 710071, Shaanxi, China ' School of Computer Science and Engineering, University of Wollongong, 2500, Wollongong, Australia ' School of Telecommunications Engineering, Xidian University, Xi'an, 710071, Shaanxi, China

Abstract: Cloud computing provides dynamically scalable resources provisioned as a service over networks. But untrustworthy cloud service provider (CSP) offers a big obstacle for the adoption of the cloud service since CSP can access data in cloud without data owner's permission. Hierarchical inner product encryption (HIPE) covers all applications of anonymous encryption, fully private communication and search on encrypted data, which provide trusted data access control policy to CSP. However, the existing works only achieve either selectively attribute-hiding or adaptively attribute-hiding under some strong assumptions in the public key setting. These schemes only support limited class of functions and can not protect the privacy of the query. To overcome these shortcomings, a novel HIPE in private key setting is issued. The proposed scheme achieves both fully secure and security reduction under the decisional linear (DLIN) assumption in the standard model. It has longer-size secret keys and size ciphertexts and brings the high computational complexity. Therefore, a variant of the basic scheme is presented with the same security but shorter ciphertexts.

Keywords: cloud security; searching encryption; hierarchical inner product encryption; HIPE; the DLIN assumption.

DOI: 10.1504/IJHPCN.2018.088878

International Journal of High Performance Computing and Networking, 2018 Vol.11 No.1, pp.45 - 54

Received: 29 Sep 2015
Accepted: 30 Jan 2016

Published online: 22 Dec 2017 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article