We improve the previous method to add the function of user revocation in
searchable encryption scheme. When document owner doesn’t want to share
someone he had shared, he can revoke the user who can’t retrieve the
specific document. More importantly, the revocation process must not
affect other authorized users, the scheme has to keep a low maintenance
This study contributes in the existing literature are to provide a
searchable keyword encryption scheme and the document owner can
dynamically authorize a user to retrieve documents or revoke the
authorization. The maintenance cost of the revocation process is low.
Access control, Cloud computing, Information security, Multi-user, Searchable encryption, Privacy.
Y. C. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data," Applied Cryptography and Network Security, vol. 3531, pp. 442–455, 2005.
[D. Boneh, G. di Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," presented at the Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2004.
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, pp. 120-126, 1978.
This study received no specific financial support.
The authors declare that they have no competing interests.
All authors contributed equally to the conception and design of the study.