Multi-User Searchable Encryption Scheme with User Revocation

Authors

  • Chia-Chi Wu Department of Information Management, National Defense University, Taoyuan, R.O.C
  • Iuon-Chang Lin Department of Management Information Systems, Nation Chung Hsing University, Taichung,Taiwan R.O.C; Department of Photonics and Communication Engineering, Asia University, Taichung, Taiwan, R.O.C
  • Ya-Hui Liu Department of Management Information Systems, Nation Chung Hsing University, Taichung,Taiwan R.O.C

DOI:

https://doi.org/10.18488/journal.63/2016.4.4/63.4.68.74

Abstract

We improve the previous method to add the function of user revocation in searchable encryption scheme. When document owner doesn’t want to share someone he had shared, he can revoke the user who can’t retrieve the specific document. More importantly, the revocation process must not affect other authorized users, the scheme has to keep a low maintenance cost.

Keywords:

Access control, Cloud computing, Information security, Multi-user, Searchable encryption, Privacy

Abstract Video

Published

2016-11-08

How to Cite

Wu, C.-C. ., Lin, I.-C. ., & Liu, Y.-H. . (2016). Multi-User Searchable Encryption Scheme with User Revocation. International Journal of Natural Sciences Research, 4(4), 68–74. https://doi.org/10.18488/journal.63/2016.4.4/63.4.68.74

Issue

Section

Articles