Abstract
Searchable encryption (SE) technology allows users to use keywords to retrieve encrypted data and ensure that useful plaintext information about encrypted data will not be disclosed. For a secure SE scheme, if it is able to meet the multi-trapdoor privacy (MTP), the security will be improved compared with the traditional SE scheme. However, there are few searchable encryption schemes that can meet the requirements of MTP. In addition to the security of the SE scheme, we should also strive to improve its practicability. Nowadays, many existing SE schemes use a single keyword to generate the keyword ciphertext and trapdoor for retrieving ciphertext, which will greatly reduce the accuracy of the search result. Another phenomenon deserves our attention. In recent years, public key cryptosystems such as certificateless cryptography (CLC) and public key infrastructure (PKI) have been widely used. If a SE scheme satisfies heterogeneity means that both sides of communication parties do not need to restrict the use of the same cryptosystems, the practicability of this scheme will be improved. Therefore, we propose a heterogeneous SE scheme that provides MTP. The new scheme supports multi-keyword search and allows the sender and receiver to be worked in different cryptosystems. Furthermore, it would obviously be impractical to use the same cryptographic system parameters between heterogeneous systems, so the communication parties in our scheme operate in different cryptosystems with different cryptographic system parameters. With the use of the random oracle model (ROM), we demonstrate the security of the proposed scheme, and we show the excellent performance of the proposed scheme at the end of the article.
Similar content being viewed by others
Data Availability
No dataset was generated or analyzed during this study.
References
Arfat Y, Usman S, Mehmood R, Katib I (2020) Big data tools, technologies, and applications: A survey. In: Mehmood R, See S, Katib I, Chlamtac I (eds) Smart Infrastructure and Applications. EAI/Springer Innovations in Communication and Computing 19:453–490. Springer, Cham. https://doi.org/10.1007/978-3-030-13705-2_19
Ashabi A, Sahibuddin SB, Haghighi MS (2020) Big Data: Current Challenges and Future Scope. 2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics, ISCAIE, Malaysia, April 18-19, 2020. IEEE, 2020, pp 131–134. https://doi.org/10.1109/ISCAIE47305.2020.9108826
Handa R, Krishna CR, Aggarwal N (2019) Searchable encryption: A survey on privacy-preserving search schemes on encrypted outsourced data. Concurr Comput Pract Exp 31:e5201. https://doi.org/10.1002/cpe.5201
Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. Proceeding 2000 IEEE symposium on security and privacy, S&P 2000, Berkeley, CA, USA, May 14-17, 2020. IEEE, pp 44–55. https://doi.org/10.1109/secpri.2000.848445
Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H (2008) Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. J Cryptol 21:350–391. https://doi.org/10.1007/s00145-007-9006-6
Priya N, Ponnavaikko M (2020) Keyword search with two-side verification in encrypted data using blockchain. 2020 International Conference on Computer Communication and Informatics, ICCCI 2020, Coimbatore, India, January 22-24, 2020. IEEE, pp. 1–5. https://doi.org/10.1109/ICCCI48352.2020.9104169
Das, D., Amin, R., Kalra, S (2020) Algorithm for multi keyword search over encrypted data in cloud environment. 2020 International Wireless Communications and Mobile Computing, IWCMC, Limassol, Cyprus, June 15-19, 2020. IEEE, pp 733–739. https://doi.org/10.1109/IWCMC48107.2020.9148472
Horváth M, Vajda I (2017) Searchable symmetric encryption: Sequential scan can be practical. 2017 25th International Conference on Software, Telecommunications and Computer Networks, SoftCOM, Split, Croatia, September 21-23, 2017. IEEE, pp 1–5. https://doi.org/10.23919/SOFTCOM.2017.8115532
Fouque PA, Martinet G, Poupard G (2003) Practical symmetric on-line encryption. In: Johansson T (eds) Fast Software Encryption, FSE 2003. Lecture Notes in Computer Science 2887:362–375. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39887-5_26
Shi Z, Fu X, Li X, Zhu K (2020) ESVSSE: Enabling efficient, secure, verifiable searchable symmetric encryption. IEEE Trans Knowl Data Eng 34(7):3241–3254. https://doi.org/10.1109/tkde.2020.3025348
Najafi A, Javadi HHS, Bayat M (2021) Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security. Multimed Tools Appl 80(17):26049–26068. https://doi.org/10.1007/s11042-021-10844-w
Zhang Y, Li Y, Wang Y (2020) Efficient searchable symmetric encryption supporting dynamic multikeyword ranked search. Secur Commun Networks vol 2020, Article ID 7298518. https://doi.org/10.1155/2020/7298518
Li L, Xu C, Liu Z, Mei L (2020) Forward secure conjunctive-keyword searchable symmetric encryption using shamir threshold secret sharing scheme. In: Batina L, Li G (eds) Applications and Techniques in Information Security, ATIS 2020. Commun Comput Inf Sci 1338:14–28. Springer, Singapore. https://doi.org/10.1007/978-981-33-4706-9_2
Braeken A (2022) Public key versus symmetric key cryptography in client–server authentication protocols. Int J Inf Secur 21(1):103–114. https://doi.org/10.1007/s10207-021-00543-w
Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Cachin C, Camenisch JL (eds) Advances in Cryptology - EUROCRYPT 2004, EUROCRYPT 2004. Lect Notes Comput Sci 3027:567–522. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24676-3_30
Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: Lim CH, Yung M (eds) Information Security Applications, WISA 2004. Lect Notes Comput Sci 3325:72–86. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31815-6_7
Zhang B, Zhang F (2011) An efficient public key encryption with conjunctive-subset keywords search. J Netw Comput Appl 34(1):262–267. https://doi.org/10.1016/j.jnca.2010.07.007
Zhang Y, Liu X, Lang X, Zhang Y, Wang C (2020) VCLPKES: Verifiable certificateless public key searchable encryption scheme for industrial internet of things. IEEE Access 8:20849–20861. https://doi.org/10.1109/ACCESS.2020.2968501
Olakanmi OO, Odeyemi KO (2021) A certificateless keyword searchable encryption scheme in multi-user setting for fog-enhanced Industrial Internet of Things. Trans Emerg Telecommun Technol 33(4):e4257. https://doi.org/10.1002/ett.4257
Byun JW, Rhee HS, Park HA, Lee DH (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Jonker W, Petković M (eds) Secure Data Management, SDM 2006. Lect Notes Comput Sci 4165:75–83. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11844662_6
Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In: Gervasi O, Murgante B, Laganà A, Taniar D, Mun Y, Gavrilova ML (eds) Computational Science and Its Applications – ICCSA 2008, ICCSA 2008. Lect Notes Comput Sci 5072:1249–1259. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69839-5_96
Lu Y, Li J, Zhang Y (2021) Secure channel free certificate-based searchable encryption withstanding outside and inside keyword guessing attacks. IEEE Trans Serv Comput 14(6):2041–2054. https://doi.org/10.1109/TSC.2019.2910113
Wu L, Zhang Y, Ma M, Kumar N, He D (2019) Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things. Ann Telecommun 74(7):423–434. https://doi.org/10.1007/s12243-018-00701-7
Wu B, Wang C, Yao H (2020) Security analysis and secure channel-free certificateless searchable public key authenticated encryption for a cloud-based Internet of things. PLoS ONE 15(4):e0230722. https://doi.org/10.1371/journal.pone.0230722
Ma M, Luo M, Fan S, Feng D (2020) An efficient pairing-free certificateless searchable public key encryption for cloud-based IIoT. Wirel Commun Mob Comput, vol 2020, Article ID 8850520. https://doi.org/10.1155/2020/8850520
Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci 403–404:1–14. https://doi.org/10.1016/j.ins.2017.03.038
Qin B, Chen Y, Huang Q, Liu X, Zheng D (2020) Public-key authenticated encryption with keyword search revisited: Security model and constructions. Inf Sci 516:515–528. https://doi.org/10.1016/j.ins.2019.12.063
Yang G, Guo J, Han L, Liu X, Tian C (2022) An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy. Peer-to-Peer Netw Appl 15(1):503–515. https://doi.org/10.1007/s12083-021-01253-9
Omala AA, Ali I, Li F (2018) Heterogeneous signcryption with keyword search for wireless body area network. Secur Priv 1(5):e25. https://doi.org/10.1002/spy2.25
Ballard L, Kamara S, Monrose F (2005) Achieving efficient conjunctive keyword searches over encrypted data. In: Qing S, Mao W, López J, Wang G (eds) Information and Communications Security, ICICS 2005. Lect Notes Comput Sci 3783:414–426. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11602897_35
Sharma D, Jinwala DC (2021) Multi-writer multi-reader conjunctive keyword searchable encryption. Int J Inf Comput Secur 15(2–3):141–162. https://doi.org/10.1504/IJICS.2021.116303
Uwizeye E, Wang J, Cheng Z, Li F (2019) Certificateless public key encryption with conjunctive keyword search and its application to cloud-based reliable smart grid system. Ann Telecommun 74(7):435–449. https://doi.org/10.1007/s12243-019-00716-8
Yang X, Chen G, Wang M, Li T, Wang C (2020) Multi-keyword certificateless searchable public key authenticated encryption scheme based on blockchain. IEEE Access 8:158765–158777. https://doi.org/10.1109/ACCESS.2020.3020841
Jiang P, Mu Y, Guo F, Wang X, Lai J (2016) Centralized keyword search on encrypted data for cloud applications. Secur Commun Networks 9(18):5064–5084. https://doi.org/10.1002/sec.1679
Jiang P, Mu Y, Guo F, Wen Q (2017) Private keyword-search for database systems against insider attacks. J Comput Sci Technol 32(3):599–617. https://doi.org/10.1007/s11390-017-1745-8
Chen Z, Wu A, Li Y, Xing Q, Geng S (2021) Blockchain-enabled public key encryption with multi-keyword search in cloud computing. Secur Commun Networks, vol 2021, Article ID 6619689. https://doi.org/10.1155/2021/6619689
Acknowledgements
The authors thank the anonymous reviewers for their valuable suggestions and comments.
Funding
This study was funded by the National Natural Science Foundation of China (grant number 62262041).
Ethics declarations
Ethical approval and consent to participate
Not applicable.
Human and animal ethics
This article does not contain any studies with human participants or animals performed by any of the authors.
Consent for publication
Not applicable.
Competing interests
The authors have no competing interests to declare that are relevant to the content of this article.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Luo, M., Huang, D. & Qiu, M. An enhanced heterogeneous public key searchable encryption scheme supporting multiple keywords. Peer-to-Peer Netw. Appl. 16, 383–394 (2023). https://doi.org/10.1007/s12083-022-01418-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-022-01418-0