Affiliation:
1. Information and Telecommunication Company, State Grid Shandong Electric Power Company, Jinan 250013, China
2. College of Information Science and Engineering, Ocean University of China, Qingdao 266400, China
Abstract
With the advent of the big data era, the size and complexity of data continue to increase, which makes the requirement for data privacy and security increasingly urgent. However, traditional encryption methods cannot meet the demand for efficient searching in large-scale datasets. To solve this problem and enable users to search within encryped data and without decrypting the entire dataset, trapdoor functions and other cryptograhic techniques are introduced in searchable encryption. However, searchable encryption still cannot meet the needs in the real world. Therefore, researchers have introduced the concept of attribute-based encryption into searchable encryption, resulting in attribute-based searchable encryption (ABSE). This approach aims to achieve efficient search by attributes in encrypted datasets. ABSE has a wide range of applications in the fields of privacy protection, data sharing, and cloud computing. In this paper, we describe the trends in development, focusing on enhancing security, improving computational efficiency, and increasing flexibility. We also present the related schemes. In addition, several common application areas are introduced and the relevant schemes proposed by researchers are summarized. Moreover, the challenges and future directions of ABSE are discussed in this paper.
Funder
National Key Research and Development Program of China
State Grid Shandong Electric Power Company Technology Project
Reference118 articles.
1. Song, D.X., Wagner, D., and Perrig, A. (2000, January 14–17). Practical techniques for searches on encrypted data. Proceedings of the 2000 IEEE Symposium on Security and Privacy. S&P 2000, Berkeley, CA, USA.
2. Cachin, C., and Camenisch, J.L. (2004, January 2–6). Public Key Encryption with Keyword Search. Proceedings of the Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland.
3. A scoping review of searchable encryption schemes in cloud computing: Taxonomy, methods, and recent developments;Varri;J. Supercomput.,2019
4. Cramer, R. (2005, January 22–26). Fuzzy Identity-Based Encryption. Proceedings of the Advances in Cryptology—EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark.
5. Attribute-based encryption for fine-grained access control of encrypted data;Goyal;IACR Cryptol. ePrint Arch.,2006