Certificateless public key encryption with conjunctive keyword search and its application to cloud-based reliable smart grid system

Abstract

A public key encryption scheme with conjunctive keyword search allows a semi-trusted third party (or a cloud server) to search over an encrypted data after receiving a trapdoor generated from a conjunctive keyword set. Assume that a sender sends a number of data to a receiver and those data are all stored in the same cloud server. Normally, if the receiver uses one keyword or separate keywords to look for through hundreds of data, it might get in return a huge number of associated data and most of them are unwanted. In this paper, we design a new certificateless public key encryption scheme with conjunctive keyword search, which only returns the desired data. We also prove that the designed scheme is secure against adaptive chosen keyword attacks in the random oracle model under bilinear Diffie-Hellman (BDH) problem assumption. Experimental results show that our scheme has better performance during the testing phase and has a lower communication cost than two related schemes. The comparison about security properties also shows that our scheme is more secure than them. Finally, we give an application example of our scheme in a cloud-based reliable smart grid system.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

References

  1. 1.

    Li J, Chen X, Chow SSM, Huang Q, Wong DS, Liu Z (2018) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89– 96

    Article  Google Scholar 

  2. 2.

    Li J, Chen X, Wong DS, Liu Z (2014) L-ENCDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl-Based Syst 79:18–26

    Article  Google Scholar 

  3. 3.

    Zhu Y, Zhang Y, Li X, Yan H, Li J (2018) Improved collusion-resisting secure nearest neighbor query over encrypted data in cloud. Concurrency and computation: practice and experience, online, https://doi.org/10.1002/cpe.4681

  4. 4.

    Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy (SP 2000), pp 44–55

  5. 5.

    Chai Q, Gong G (2012) Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE international conference on communications (ICC 2012), pp 917–922

  6. 6.

    Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security (CCS 2006), pp 79– 88

  7. 7.

    Jarecki S, Jutla C, Krawczyk H, Rosu M, Steiner M (2013) Outsourced symmetric private information retrieval. In: Proceedings of the 2013 ACM SIGSAC conference on Computer communications security (CCS 2013), pp 875–888

  8. 8.

    Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM conference on Computer and communications security (CCS 2012), pp 965–976

  9. 9.

    Kurosawa K, Ohtaki Y (2012) UC-Secure searchable symmetric encryption. In: International conference on financial cryptography and data security (FC 2012), pp 285–298

  10. 10.

    Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques (EUROCRYPT 2004), pp 506–522

  11. 11.

    Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In: International conference on computational science and its applications (ICCSA 2008), pp 1249–1259

  12. 12.

    Bakhtiari M, Nateghizad M, Zainal A (2013) Secure search over encrypted data in cloud computing. In: 2013 international conference on advanced computer science applications and technologies (ACSAT 2013), pp 290–295

  13. 13.

    Duntao G, Dawei H, Haibin C, Xiaoyuan Y (2010) A new public key encryption with temporary keyword search. In: 2010 international conference on computer, mechatronics, control and electronic engineering (CMCE 2010), pp 80– 83

  14. 14.

    Hu C, Liu P (2013) Public key encryption with ranked multi-keyword search. In: 5th international conference on intelligent networking and collaborative systems (INCoS 2013), pp 109– 113

  15. 15.

    Li H, Liu D, Dai Y, Luan TH, Shen XS (2015) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage, pp 127–138

  16. 16.

    Luo W, Tan J (2012) Public key encryption with keyword search based on factoring. In: 2012 IEEE 2nd international conference on cloud computing and intelligence systems (CCIS 2012), pp 1245–1247

  17. 17.

    Tang Q, Chen X (2013) Towards asymmetric searchable encryption with message recovery and flexible search authorization. In: Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security (CCS 2013), pp 253– 264

  18. 18.

    Wu TY, Tsai TT, Tseng YM (2014) Efficient searchable id-based encryption with a designated server. Ann Telecommun 69(7-8):391–402

    Article  Google Scholar 

  19. 19.

    Zheng Q, Xu S, Ateniese G (2014) VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: Proceedings of IEEE international conference on computer communications (INFOCOM 2014), pp 522–530

  20. 20.

    Wang C, Li W, Li Y, Xu X (2013) A ciphertext-policy attribute-based encryption scheme supporting keyword search function. In: 5th international symposium cyberspace safety and security (CSS 2013), pp 377–386

  21. 21.

    Li J, Lin X, Zhang Y, Han J (2017) KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 10(5):715–725

    Article  Google Scholar 

  22. 22.

    Peng Y, Cui J, Peng C, Ying Z (2014) Certificateless public key encryption with keyword search. China Comm 11(11):100–113

    Article  Google Scholar 

  23. 23.

    Ma M, He D, Kumar N, Choo KKR, Chen J (2017) Certificateless searchable public key encryption scheme for industrial internet of things. IEEE Trans Ind Inf 14(2):759–767

    Article  Google Scholar 

  24. 24.

    Li T, Chen W, Tang Y, Yan H (2018) A homomorphic network coding signature scheme for multiple sources and its application in IoT. Security and Communication Networks, 2018, Article ID 9641273

  25. 25.

    Zheng Q, Li X, Azgin A (2015) CLKS: certificateless keyword search on encrypted data. In: International conference on network and system security (NSS 2015), pp 239–253

  26. 26.

    Gao C, Lv S, Wei Y, Wang Z, Liu Z, cheng X (2018) M-SSE: an effective searchable symmetric encryption with enhanced security for mobile devices. IEEE Access 6:38860–38869

    Article  Google Scholar 

  27. 27.

    Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: 9th international conference on the theory and application of cryptology and information security (ASIACRYPT 2003), pp 452–473

  28. 28.

    De Caro A, Iovino V (2011) JPBC: java pairing based cryptography. In: 2011 IEEE symposium on computers and communications (ISCC 2011), pp 850–855

  29. 29.

    Daemen J, Rijmen V (2013) The design of rijndael: AES-the advanced encryption standard. Springer, Berlin

    Google Scholar 

  30. 30.

    Li F, Han Y, Jin C (2017) Certificateless online/offline signcryption for the internet of things. Wirel Netw 23(1):145–158

    Article  Google Scholar 

  31. 31.

    Wen M, Lu R, Lei J, Liang X, Li H, Shen X (2013) ECQ: an efficient conjunctive query scheme over encrypted multidimensional data in smart grid. In: 2013 IEEE global communications conference (GLOBECOM 2013), pp 796–801

  32. 32.

    Wen M, Lu R, Zhang K, Lei J, Liang X, Shen X (2013) PARQ: a privacy-preserving range query scheme over encrypted metering data for smart grid. IEEE Trans Emerg Top Comput 1(1):178–191

    Article  Google Scholar 

Download references

Funding

This work is supported by the science and technology programs of SGCC titled application research on improving the reliability guarantee capability of information systems (Grant No. 546803170005).

Author information

Affiliations

Authors

Corresponding authors

Correspondence to Erneste Uwizeye or Fagen Li.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Uwizeye, E., Wang, J., Cheng, Z. et al. Certificateless public key encryption with conjunctive keyword search and its application to cloud-based reliable smart grid system. Ann. Telecommun. 74, 435–449 (2019). https://doi.org/10.1007/s12243-019-00716-8

Download citation

Keywords

  • Certificateless cryptography
  • Conjunctive keyword search
  • Cloud computing
  • Smart grid