Skip to main content
Log in

An enhanced heterogeneous public key searchable encryption scheme supporting multiple keywords

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Searchable encryption (SE) technology allows users to use keywords to retrieve encrypted data and ensure that useful plaintext information about encrypted data will not be disclosed. For a secure SE scheme, if it is able to meet the multi-trapdoor privacy (MTP), the security will be improved compared with the traditional SE scheme. However, there are few searchable encryption schemes that can meet the requirements of MTP. In addition to the security of the SE scheme, we should also strive to improve its practicability. Nowadays, many existing SE schemes use a single keyword to generate the keyword ciphertext and trapdoor for retrieving ciphertext, which will greatly reduce the accuracy of the search result. Another phenomenon deserves our attention. In recent years, public key cryptosystems such as certificateless cryptography (CLC) and public key infrastructure (PKI) have been widely used. If a SE scheme satisfies heterogeneity means that both sides of communication parties do not need to restrict the use of the same cryptosystems, the practicability of this scheme will be improved. Therefore, we propose a heterogeneous SE scheme that provides MTP. The new scheme supports multi-keyword search and allows the sender and receiver to be worked in different cryptosystems. Furthermore, it would obviously be impractical to use the same cryptographic system parameters between heterogeneous systems, so the communication parties in our scheme operate in different cryptosystems with different cryptographic system parameters. With the use of the random oracle model (ROM), we demonstrate the security of the proposed scheme, and we show the excellent performance of the proposed scheme at the end of the article.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Data Availability

No dataset was generated or analyzed during this study.

References

  1. Arfat Y, Usman S, Mehmood R, Katib I (2020) Big data tools, technologies, and applications: A survey. In: Mehmood R, See S, Katib I, Chlamtac I (eds) Smart Infrastructure and Applications. EAI/Springer Innovations in Communication and Computing 19:453–490. Springer, Cham. https://doi.org/10.1007/978-3-030-13705-2_19

  2. Ashabi A, Sahibuddin SB, Haghighi MS (2020) Big Data: Current Challenges and Future Scope. 2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics, ISCAIE, Malaysia, April 18-19, 2020. IEEE, 2020, pp 131–134. https://doi.org/10.1109/ISCAIE47305.2020.9108826

  3. Handa R, Krishna CR, Aggarwal N (2019) Searchable encryption: A survey on privacy-preserving search schemes on encrypted outsourced data. Concurr Comput Pract Exp 31:e5201. https://doi.org/10.1002/cpe.5201

    Article  Google Scholar 

  4. Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. Proceeding 2000 IEEE symposium on security and privacy, S&P 2000, Berkeley, CA, USA, May 14-17, 2020. IEEE, pp 44–55. https://doi.org/10.1109/secpri.2000.848445

  5. Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H (2008) Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. J Cryptol 21:350–391. https://doi.org/10.1007/s00145-007-9006-6

    Article  MathSciNet  MATH  Google Scholar 

  6. Priya N, Ponnavaikko M (2020) Keyword search with two-side verification in encrypted data using blockchain. 2020 International Conference on Computer Communication and Informatics, ICCCI 2020, Coimbatore, India, January 22-24, 2020. IEEE, pp. 1–5. https://doi.org/10.1109/ICCCI48352.2020.9104169

  7. Das, D., Amin, R., Kalra, S (2020) Algorithm for multi keyword search over encrypted data in cloud environment. 2020 International Wireless Communications and Mobile Computing, IWCMC, Limassol, Cyprus, June 15-19, 2020. IEEE, pp 733–739. https://doi.org/10.1109/IWCMC48107.2020.9148472

  8. Horváth M, Vajda I (2017) Searchable symmetric encryption: Sequential scan can be practical. 2017 25th International Conference on Software, Telecommunications and Computer Networks, SoftCOM, Split, Croatia, September 21-23, 2017. IEEE, pp 1–5. https://doi.org/10.23919/SOFTCOM.2017.8115532

  9. Fouque PA, Martinet G, Poupard G (2003) Practical symmetric on-line encryption. In: Johansson T (eds) Fast Software Encryption, FSE 2003. Lecture Notes in Computer Science 2887:362–375. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39887-5_26

  10. Shi Z, Fu X, Li X, Zhu K (2020) ESVSSE: Enabling efficient, secure, verifiable searchable symmetric encryption. IEEE Trans Knowl Data Eng 34(7):3241–3254. https://doi.org/10.1109/tkde.2020.3025348

    Article  Google Scholar 

  11. Najafi A, Javadi HHS, Bayat M (2021) Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security. Multimed Tools Appl 80(17):26049–26068. https://doi.org/10.1007/s11042-021-10844-w

    Article  Google Scholar 

  12. Zhang Y, Li Y, Wang Y (2020) Efficient searchable symmetric encryption supporting dynamic multikeyword ranked search. Secur Commun Networks vol 2020, Article ID 7298518. https://doi.org/10.1155/2020/7298518

  13. Li L, Xu C, Liu Z, Mei L (2020) Forward secure conjunctive-keyword searchable symmetric encryption using shamir threshold secret sharing scheme. In: Batina L, Li G (eds) Applications and Techniques in Information Security, ATIS 2020. Commun Comput Inf Sci 1338:14–28. Springer, Singapore. https://doi.org/10.1007/978-981-33-4706-9_2

  14. Braeken A (2022) Public key versus symmetric key cryptography in client–server authentication protocols. Int J Inf Secur 21(1):103–114. https://doi.org/10.1007/s10207-021-00543-w

  15. Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Cachin C, Camenisch JL (eds) Advances in Cryptology - EUROCRYPT 2004, EUROCRYPT 2004. Lect Notes Comput Sci 3027:567–522. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24676-3_30

  16. Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: Lim CH, Yung M (eds) Information Security Applications, WISA 2004. Lect Notes Comput Sci 3325:72–86. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31815-6_7

  17. Zhang B, Zhang F (2011) An efficient public key encryption with conjunctive-subset keywords search. J Netw Comput Appl 34(1):262–267. https://doi.org/10.1016/j.jnca.2010.07.007

    Article  Google Scholar 

  18. Zhang Y, Liu X, Lang X, Zhang Y, Wang C (2020) VCLPKES: Verifiable certificateless public key searchable encryption scheme for industrial internet of things. IEEE Access 8:20849–20861. https://doi.org/10.1109/ACCESS.2020.2968501

    Article  Google Scholar 

  19. Olakanmi OO, Odeyemi KO (2021) A certificateless keyword searchable encryption scheme in multi-user setting for fog-enhanced Industrial Internet of Things. Trans Emerg Telecommun Technol 33(4):e4257. https://doi.org/10.1002/ett.4257

    Article  Google Scholar 

  20. Byun JW, Rhee HS, Park HA, Lee DH (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Jonker W, Petković M (eds) Secure Data Management, SDM 2006. Lect Notes Comput Sci 4165:75–83. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11844662_6

  21. Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In: Gervasi O, Murgante B, Laganà A, Taniar D, Mun Y, Gavrilova ML (eds) Computational Science and Its Applications – ICCSA 2008, ICCSA 2008. Lect Notes Comput Sci 5072:1249–1259. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69839-5_96

  22. Lu Y, Li J, Zhang Y (2021) Secure channel free certificate-based searchable encryption withstanding outside and inside keyword guessing attacks. IEEE Trans Serv Comput 14(6):2041–2054. https://doi.org/10.1109/TSC.2019.2910113

    Article  Google Scholar 

  23. Wu L, Zhang Y, Ma M, Kumar N, He D (2019) Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things. Ann Telecommun 74(7):423–434. https://doi.org/10.1007/s12243-018-00701-7

    Article  Google Scholar 

  24. Wu B, Wang C, Yao H (2020) Security analysis and secure channel-free certificateless searchable public key authenticated encryption for a cloud-based Internet of things. PLoS ONE 15(4):e0230722. https://doi.org/10.1371/journal.pone.0230722

    Article  Google Scholar 

  25. Ma M, Luo M, Fan S, Feng D (2020) An efficient pairing-free certificateless searchable public key encryption for cloud-based IIoT. Wirel Commun Mob Comput, vol 2020, Article ID 8850520. https://doi.org/10.1155/2020/8850520

    Article  Google Scholar 

  26. Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci 403–404:1–14. https://doi.org/10.1016/j.ins.2017.03.038

  27. Qin B, Chen Y, Huang Q, Liu X, Zheng D (2020) Public-key authenticated encryption with keyword search revisited: Security model and constructions. Inf Sci 516:515–528. https://doi.org/10.1016/j.ins.2019.12.063

    Article  MathSciNet  MATH  Google Scholar 

  28. Yang G, Guo J, Han L, Liu X, Tian C (2022) An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy. Peer-to-Peer Netw Appl 15(1):503–515. https://doi.org/10.1007/s12083-021-01253-9

    Article  Google Scholar 

  29. Omala AA, Ali I, Li F (2018) Heterogeneous signcryption with keyword search for wireless body area network. Secur Priv 1(5):e25. https://doi.org/10.1002/spy2.25

    Article  Google Scholar 

  30. Ballard L, Kamara S, Monrose F (2005) Achieving efficient conjunctive keyword searches over encrypted data. In: Qing S, Mao W, López J, Wang G (eds) Information and Communications Security, ICICS 2005. Lect Notes Comput Sci 3783:414–426. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11602897_35

  31. Sharma D, Jinwala DC (2021) Multi-writer multi-reader conjunctive keyword searchable encryption. Int J Inf Comput Secur 15(2–3):141–162. https://doi.org/10.1504/IJICS.2021.116303

    Article  Google Scholar 

  32. Uwizeye E, Wang J, Cheng Z, Li F (2019) Certificateless public key encryption with conjunctive keyword search and its application to cloud-based reliable smart grid system. Ann Telecommun 74(7):435–449. https://doi.org/10.1007/s12243-019-00716-8

    Article  Google Scholar 

  33. Yang X, Chen G, Wang M, Li T, Wang C (2020) Multi-keyword certificateless searchable public key authenticated encryption scheme based on blockchain. IEEE Access 8:158765–158777. https://doi.org/10.1109/ACCESS.2020.3020841

    Article  Google Scholar 

  34. Jiang P, Mu Y, Guo F, Wang X, Lai J (2016) Centralized keyword search on encrypted data for cloud applications. Secur Commun Networks 9(18):5064–5084. https://doi.org/10.1002/sec.1679

    Article  Google Scholar 

  35. Jiang P, Mu Y, Guo F, Wen Q (2017) Private keyword-search for database systems against insider attacks. J Comput Sci Technol 32(3):599–617. https://doi.org/10.1007/s11390-017-1745-8

    Article  MathSciNet  Google Scholar 

  36. Chen Z, Wu A, Li Y, Xing Q, Geng S (2021) Blockchain-enabled public key encryption with multi-keyword search in cloud computing. Secur Commun Networks, vol 2021, Article ID 6619689. https://doi.org/10.1155/2021/6619689

    Article  Google Scholar 

Download references

Acknowledgements

The authors thank the anonymous reviewers for their valuable suggestions and comments.

Funding

This study was funded by the National Natural Science Foundation of China (grant number 62262041).

Author information

Authors and Affiliations

Authors

Contributions

Ming Luo and Dashi Huang wrote the main manuscript text, Minrong Qiu prepared Tables 1, 2, 3, and 4 and Fig. 1. All authors reviewed and approved the final version of the manuscript.

Corresponding author

Correspondence to Ming Luo.

Ethics declarations

Ethical approval and consent to participate

Not applicable.

Human and animal ethics

This article does not contain any studies with human participants or animals performed by any of the authors.

Consent for publication

Not applicable.

Competing interests

The authors have no competing interests to declare that are relevant to the content of this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Luo, M., Huang, D. & Qiu, M. An enhanced heterogeneous public key searchable encryption scheme supporting multiple keywords. Peer-to-Peer Netw. Appl. 16, 383–394 (2023). https://doi.org/10.1007/s12083-022-01418-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-022-01418-0

Keywords

Navigation