Advertisement

Journal of Computer Science and Technology

, Volume 31, Issue 5, pp 1012–1027 | Cite as

Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group

  • Xiao-Fen Wang
  • Yi Mu
  • Rongmao Chen
  • Xiao-Song Zhang
Regular Paper

Abstract

Data sharing and searching are important functionalities in cloud storage. In this paper, we show how to securely and flexibly search and share cloud data among a group of users without a group manager. We formalize a novel cryptosystem: secure channel free searchable encryption in a peer-to-peer group, which features with the secure cloud data sharing and searching for group members in an identity-based setting. Our scheme allows group members to join or leave the group dynamically. We present two schemes: basic scheme and enhanced scheme. We formally prove that our basic scheme achieves consistency and indistinguishability against the chosen keyword and ciphertext attack and the outsider’s keyword guessing attack, respectively. An enhanced scheme is also proposed to achieve forward secrecy, which allows to revoke user search right over the former shared data.

Keywords

searchable encryption forward secrecy data sharing peer-to-peer group 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Boneh D, Crescenzo G D, Ostrovsky R, Persiano G. Public key encryption with keyword search. In Proc. the International Conference on the Theory and Applications of Cryptographic Techniques, May 2004, pp.506-522.Google Scholar
  2. 2.
    Baek J, Safavi-Naini R, Susilo W. Public key encryption with keyword search revisited. In Proc. the 16th International Conference on Computational Science and Its Applications, June 30-July 3, 2008, pp.1249-1259.Google Scholar
  3. 3.
    Rhee H S, Park J H, Susilo W, Lee D H. Trapdoor security in a searchable public-key encryption scheme with a designated tester. Journal of Systems and Software, 2010, 83(5): 763-771.CrossRefGoogle Scholar
  4. 4.
    Golle P, Staddon J, Waters B R. Secure conjunctive keywords earch over encrypted data. In Proc. the 2nd International Conference on Applied Cryptography and Network Security, June 2004, pp.31-45.Google Scholar
  5. 5.
    Park D J, Kim K, Lee P J. Public key encryption with conjunctive field keyword search. In Proc. the 5th International Workshop of Information Security Applications, August 2004, pp.73-86.Google Scholar
  6. 6.
    Zhang B, Zhang F. An efficient public key encryption with conjunctive-subset keywords search. J. Network and Computer Applications, 2011, 34(1): 262-267.CrossRefGoogle Scholar
  7. 7.
    Boneh D, Waters B. Conjunctive, subset, and range queries on encrypted data. In Proc. the 4th Theory of Cryptography Conference, February 2007, pp.535-554.Google Scholar
  8. 8.
    Baek J, Safavi-Naini R, Susilo W. On the integration of public key data encryption and public key encryption with keyword search. In Proc. the 9th International Conference on Information Security, August 30-September 2, 2006, pp.217-232.Google Scholar
  9. 9.
    Fuhr T, Paillier P. Decryptable searchable encryption. In Proc. the 1st International Conference on Provable Security, November 2007, pp.228-236.Google Scholar
  10. 10.
    Zhang R, Imai H. Generic combination of public key encryption with keyword search and public key encryption. In Proc. the 6th International Conference on Cryptology and Network Security, December 2007, pp.159-174.Google Scholar
  11. 11.
    Rhee H S, Park J H, Lee D H. Generic construction of designated tester public-key encryption with keyword search. Inf. Sci., 2012, 205: 93-109.MathSciNetCrossRefzbMATHGoogle Scholar
  12. 12.
    Shao J, Cao Z, Liang X, Lin H. Proxy re-encryption with keyword search. Inf. Sci., 2010, 180(13): 2576-2587.MathSciNetCrossRefzbMATHGoogle Scholar
  13. 13.
    Gu C, Zhu Y, Pan H. Efficient public key encryption with keyword search schemes from pairings. In Proc. the 3rd SKLOIS Conference on Information Security and Cryptology, August 31-September 5, 2007, pp.372-383.Google Scholar
  14. 14.
    Fang L, Susilo W, Ge C, Wang J. A secure channel free public key encryption with keyword search scheme without random oracle. In Proc. the 8th International Conference on Cryptology and Network Security, December 2009, pp.248-258.Google Scholar
  15. 15.
    Rhee H S, Park J H, Susilo W, Lee D H. Improved searchable public key encryption with designated tester. In Proc. the 4th ACM Symposium on Information, Computer and Communications Security, March 2009, pp.376-379.Google Scholar
  16. 16.
    Byun J W, Rhee H S, Park H, Lee D H. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In Proc. the 3rd VLDB Workshop of Secure Data Management, September 2006, pp.75-83.Google Scholar
  17. 17.
    YauW, Heng S, Goi B. Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In Proc. the 5th International Conference on Autonomic and Trusted Computing, June 2008, pp.100-105.Google Scholar
  18. 18.
    Fang L, Susilo W, Ge C, Wang J. Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Inf. Sci., 2013, 238: 221-241.MathSciNetCrossRefzbMATHGoogle Scholar
  19. 19.
    Chang Y, Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data. In Proc. the 3rd International Conference on Applied Cryptography and Network Security, June 2005, pp.442-455.Google Scholar
  20. 20.
    Curtmola R, Garay J A, Kamara S, Ostrovsky R. Searchable symmetric encryption: Improved definitions and efficient constructions. In Proc. the 13th ACM Conference on Computer and Communications Security, October 2006, pp.79-88.Google Scholar
  21. 21.
    Bao F, Deng R H, Ding X, Yang Y. Private query on encrypted data in multi-user settings. In Proc. the 4th International Conference on Information Security Practice and Experience, April 2008, pp.71-85.Google Scholar
  22. 22.
    Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing. In Proc. the 7th International Conference on the Theory and Application of Cryptology and Information Security, December 2001, pp.514-532.Google Scholar
  23. 23.
    Ivan A, Dodis Y. Proxy cryptography revisited. In Proc. the 10th Annual Network and Distributed System Security Symposium, February 2003.Google Scholar
  24. 24.
    Fang L, Susilo W, Ren Y, Ge C, Wang J. Chosen public key and ciphertext secure proxy re-encryption schemes. JDCTA, 2010, 4(9): 151-160.CrossRefGoogle Scholar
  25. 25.
    Dong C, Russello G, Dulay N. Shared and searchable encrypted data for untrusted servers. In Proc. the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, July 2008, pp.127-143.Google Scholar
  26. 26.
    Dong C, Russello G, Dulay N. Shared and searchable encrypted data for untrusted servers. Journal of Computer Security, 2011, 19(3): 367-397.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  • Xiao-Fen Wang
    • 1
    • 2
    • 3
  • Yi Mu
    • 3
  • Rongmao Chen
    • 3
    • 4
  • Xiao-Song Zhang
    • 1
    • 2
  1. 1.College of Computer Science and EngineeringUniversity of Electronic Science and Technology of ChinaChengduChina
  2. 2.Big Data Research CenterUniversity of Electronic Science and Technology of ChinaChengduChina
  3. 3.School of Computing and Information TechnologyUniversity of WollongongWollongongAustralia
  4. 4.College of ComputerNational University of Defense TechnologyChangshaChina

Personalised recommendations