Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

In cloud, sensitive data is stored in an encrypted form, and searchable encryption is a technique which allows user to search over encrypted data by keyword and it leaks no useful information. However, the secure searchable encryption scheme which can prevent inside keyword guessing attacks (IKGA) and satisfy multi-trapdoor privacy has not been proposed. We first review the security of Wu et al.’s scheme and demonstrate that their scheme is insecure under IKGA and multi-keyword guessing attacks in this paper. To solve these issues, we propose an improved certificateless public key searchable encryption scheme. Furthermore, we give the proof of the security of our scheme under the computational bilinear Diffie-Hellman assumption. It shows that our scheme can resist IKGA successfully, and provides multi-ciphertext indistinguishability and multi-trapdoor privacy. The better performance is shown in our experiment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Song D, Wagner D, Perrig A Practical techniques for searching on encrypted data. In IEEE Symposium on Research in Security and Privacy, pages 44–55

  2. Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques, pages 506–522. Springer

  3. Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In International conference on Computational Science and Its Applications, pages 1249–1259. Springer

  4. Byun JW, Rhee HS, Park H-A, Lee DH (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In Workshop on secure data management, pages 75–83. Springer

  5. Yau W-C, Heng S-H, G B-M (2008) Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In International Conference on Autonomic and Trusted Computing, pages 100–105. Springer

  6. Yau W-C, Raphael Phan C-W, Heng S-H, Goi B-M (2013) Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. Int J Comp Math 90(12):2581–2587

  7. Rhee HS, Park JH, Susilo W, Lee DH (2010) Trapdoor security in a searchable public-key encryption scheme with a designated tester. J Syst Softw 83(5):763–771

  8. Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci 403:1–14

    Article  Google Scholar 

  9. Libing W, Chen B, Zeadally S, He D (2018) An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage. Soft Comput 22(23):7685–7696

    Article  Google Scholar 

  10. Peng X, Jin H, Qianhong W, Wang W (2012) Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack. IEEE Transactions on computers 62(11):2266–2277

    MathSciNet  MATH  Google Scholar 

  11. Baodong Qin Y, Chen QH, Liu X, Zheng D (2020) Public-key authenticated encryption with keyword search revisited: Security model and constructions. Inform Sci 516:515–528

    Article  MathSciNet  Google Scholar 

  12. Sattam S, Al-Riyami, Paterson KG (2003) Certificateless public key cryptography. In International conference on the theory and application of cryptology and information security, pages 452–473. Springer

  13. Yanguo P, Jiangtao C, Changgen P, Zuobin Y (2014) Certificateless public key encryption with keyword search. China Commun 11(11):100–113

    Article  Google Scholar 

  14. Wu T-Y, Chen C-M, Wang K-H, Meng C, Wang EK (2019) A provably secure certificateless public key encryption with keyword search. J Chin Inst Eng 42(1):20–28

  15. Wu T-Y, Meng F, Chen C-M, Liu S, Pan J-S (2016) On the security of a certificateless searchable public key encryption scheme. In International Conference on Genetic and Evolutionary Computing, pages 113–119. Springer

  16. Ma M, He D, Kumar N, Choo K-KR, Chen J (2017) Certificateless searchable public key encryption scheme for industrial internet of things. IEEE Trans Industr Inform 14(2):759–767

  17. Wu T-Y, Chen C-M, Wang K-H, Wu JM-T (2019) Security analysis and enhancement of a certificateless searchable public key encryption scheme for iiot environments. IEEE Access, 7:49232–49239

  18. Tang Q, Chen L (2009) Public-key encryption with registered keyword search. In European Public Key Infrastructure Workshop, pages 163–178. Springer

  19. He D, Ma M, Zeadally S, Kumar N, Liang K (2017) Certificateless public key authenticated encryption with keyword search for industrial internet of things. IEEE Trans Industr Inform 14(8):3618–3627

    Article  Google Scholar 

  20. Liu X, Li H, Yang G, Susilo W, Tonien J, Huang Q (2019) Towards enhanced security for certificateless public-key authenticated encryption with keyword search. In International Conference on Provable Security, pages 113–129. Springer

  21. Bin W, Wang C, Yao H (2020) Security analysis and secure channel-free certificateless searchable public key authenticated encryption for a cloud-based internet of things. PloS One 15(4):e0230722

    Article  Google Scholar 

  22. Yang L, Li J (2019) Constructing certificateless encryption with keyword search against outside and inside keyword guessing attacks. China Commun 16(7):156–173

    Article  Google Scholar 

  23. Ma M, Luo M, Fan S, Feng D (2020) An efficient pairing-free certificateless searchable public key encryption for cloud-based iiot. Wirel Commun Mob Comput 2020

  24. Ma M, He D, Fan S, Feng D (2020) Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare. J Inf Secur App 50:102429

    Google Scholar 

  25. Ma M, He D, Khan MK, Chen J (2018) Certificateless searchable public key encryption scheme for mobile healthcare system. Comput Electr Eng 65:413–424

  26. Wu T-Y, Meng C, Chen C-M, Wang K-H, Pan J-S. On the security of a certificateless public key encryption with keyword search. In International conference on intelligent information hiding and multimedia signal processing, pages 191–197. Springer

  27. Yang X, Chen G, Wang M, Pei X (2019) Lightweight searchable encryption scheme based on certificateless cryptosystem. In 2019 4th International Conference on Mechanical, Control and Computer Engineering (ICMCCE), pages 669–6693. IEEE

  28. Zheng Q, Li X,  Aytac A (2015) Clks: Certificateless keyword search on encrypted data. In International Conference on Network and System Security, pages 239–253. Springer

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lidong Han.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, G., Guo, J., Han, L. et al. An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy. Peer-to-Peer Netw. Appl. 15, 503–515 (2022). https://doi.org/10.1007/s12083-021-01253-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-021-01253-9

Keywords

Navigation