Skip to main content
Erschienen in:

31.07.2024

A multi-receiver certificateless public-key searchable encryption: Field-free subset conjunctive and disjunctive

verfasst von: Venkata Bhikshapathi Chenam, Kondepati Dhana Sree, Syed Taqi Ali

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 6/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Der Artikel stellt ein bahnbrechendes Verschlüsselungsschema für die Cloud-basierte Telemedizin vor, das der Notwendigkeit einer sicheren und effizienten Speicherung und Wiederherstellung von Daten Rechnung trägt. Es konzentriert sich auf ein zertifikatloses, mit öffentlichen Schlüsseln durchsuchbares Verschlüsselungssystem mit mehreren Empfängern, das feldfreie Suchen nach Konjunktiven und disjunktiven Schlüsselwörtern unterstützt. Das System nutzt fortschrittliche kryptographische Techniken, um Datensicherheit und Datenschutz zu gewährleisten, wodurch es für verschiedene Anwendungen im Gesundheitswesen geeignet ist. Die Autoren liefern eine umfassende Analyse der Sicherheit, Leistung und praktischen Implikationen des Systems und heben sein Potenzial hervor, das Datenmanagement in der Telemedizin zu revolutionieren.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Jin Z, Chen Y (2015) Telemedicine in the cloud era: Prospects and challenges. IEEE Pervasive Comput 14(1):54–61CrossRef Jin Z, Chen Y (2015) Telemedicine in the cloud era: Prospects and challenges. IEEE Pervasive Comput 14(1):54–61CrossRef
2.
Zurück zum Zitat Tang S, Li X, Huang X, Xiang Y, Xu L (2015) Achieving simple, secure and efficient hierarchical access control in cloud computing. IEEE Trans Comput 65(7):2325–2331MathSciNetCrossRef Tang S, Li X, Huang X, Xiang Y, Xu L (2015) Achieving simple, secure and efficient hierarchical access control in cloud computing. IEEE Trans Comput 65(7):2325–2331MathSciNetCrossRef
3.
Zurück zum Zitat Abbas A, Khan SU (2014) A review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE J Biomed Health Inform 18(4):1431–1441CrossRef Abbas A, Khan SU (2014) A review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE J Biomed Health Inform 18(4):1431–1441CrossRef
4.
Zurück zum Zitat Tang S, Xu L, Liu N, Huang X, Ding J, Yang Z (2014) Provably secure group key management approach based upon hyper-sphere. IEEE Trans Parallel Distrib Syst 25(12):3253–3263CrossRef Tang S, Xu L, Liu N, Huang X, Ding J, Yang Z (2014) Provably secure group key management approach based upon hyper-sphere. IEEE Trans Parallel Distrib Syst 25(12):3253–3263CrossRef
5.
Zurück zum Zitat Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S &P 2000, pp 44–55. IEEE Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S &P 2000, pp 44–55. IEEE
6.
Zurück zum Zitat Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. In: International conference on applied cryptography and network security, pp 31–45. Springer Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. In: International conference on applied cryptography and network security, pp 31–45. Springer
7.
Zurück zum Zitat Ge X, Yu J, Zhang H, Hu C, Li Z, Qin Z, Hao R (2019) Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Trans Depend Secure Comput 18(1):490–504CrossRef Ge X, Yu J, Zhang H, Hu C, Li Z, Qin Z, Hao R (2019) Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Trans Depend Secure Comput 18(1):490–504CrossRef
8.
Zurück zum Zitat Sun S-F, Yuan X, Liu JK, Steinfeld R, Sakzad A, Vo V, Nepal S (2018) Practical backward-secure searchable encryption from symmetric puncturable encryption. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, pp 763–780 Sun S-F, Yuan X, Liu JK, Steinfeld R, Sakzad A, Vo V, Nepal S (2018) Practical backward-secure searchable encryption from symmetric puncturable encryption. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, pp 763–780
9.
Zurück zum Zitat Chatterjee S, Kesarwani M, Modi J, Mukherjee S, Parshuram Puria SK, Shah A (2021) Secure and efficient wildcard search over encrypted data. Int J Inf Secur 20(2):199–244CrossRef Chatterjee S, Kesarwani M, Modi J, Mukherjee S, Parshuram Puria SK, Shah A (2021) Secure and efficient wildcard search over encrypted data. Int J Inf Secur 20(2):199–244CrossRef
10.
Zurück zum Zitat Park DJ, Kim K, Lee PJ (2005) Public key encryption with conjunctive field keyword search. In: Information security applications: 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers 5, pp 73–86. Springer Park DJ, Kim K, Lee PJ (2005) Public key encryption with conjunctive field keyword search. In: Information security applications: 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers 5, pp 73–86. Springer
11.
Zurück zum Zitat Byun JW, Lee DH, Lim J (2006) Efficient conjunctive keyword search on encrypted data storage system. In: EuroPKI, vol 4043, pp 184–196. Springer Byun JW, Lee DH, Lim J (2006) Efficient conjunctive keyword search on encrypted data storage system. In: EuroPKI, vol 4043, pp 184–196. Springer
12.
Zurück zum Zitat Hwang YH, Lee PJ (2007) Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: International conference on pairing-based cryptography, pp 2–22. Springer Hwang YH, Lee PJ (2007) Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: International conference on pairing-based cryptography, pp 2–22. Springer
13.
Zurück zum Zitat Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of cryptography conference, pp 535–554. Springer Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of cryptography conference, pp 535–554. Springer
14.
Zurück zum Zitat Wang P, Wang H, Pieprzyk J (2008) Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. In: Cryptology and network security: 7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings 7, pp 178–195. Springer Wang P, Wang H, Pieprzyk J (2008) Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. In: Cryptology and network security: 7th international conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings 7, pp 178–195. Springer
15.
Zurück zum Zitat Zhang B, Zhang F (2011) An efficient public key encryption with conjunctive-subset keywords search. J Netw Comput Appl 34(1):262–267CrossRef Zhang B, Zhang F (2011) An efficient public key encryption with conjunctive-subset keywords search. J Netw Comput Appl 34(1):262–267CrossRef
16.
Zurück zum Zitat Song C, Liu X, Yan Y (2015) Efficient public key encryption with field-free conjunctive keywords search. In: Trusted systems: 6th international conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers 6, pp 394–406. Springer Song C, Liu X, Yan Y (2015) Efficient public key encryption with field-free conjunctive keywords search. In: Trusted systems: 6th international conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers 6, pp 394–406. Springer
17.
Zurück zum Zitat Okamoto T, Takashima K (2012) Adaptively attribute-hiding (hierarchical) inner product encryption. In: Advances in cryptology–EUROCRYPT 2012: 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15-19, 2012. Proceedings 31, pp 591–608. Springer Okamoto T, Takashima K (2012) Adaptively attribute-hiding (hierarchical) inner product encryption. In: Advances in cryptology–EUROCRYPT 2012: 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15-19, 2012. Proceedings 31, pp 591–608. Springer
18.
Zurück zum Zitat Yanguo P, Jiangtao C, Changgen P, Zuobin Y (2014) Certificateless public key encryption with keyword search. China Commun 11(11):100–113CrossRef Yanguo P, Jiangtao C, Changgen P, Zuobin Y (2014) Certificateless public key encryption with keyword search. China Commun 11(11):100–113CrossRef
19.
Zurück zum Zitat Su Y, Li Y, Cao Q, Wu Z (2020) Authorized certificateless conjunctive keyword search on encrypted EHRs from WSNs. J Inf Sci Eng 36(4):879–894 Su Y, Li Y, Cao Q, Wu Z (2020) Authorized certificateless conjunctive keyword search on encrypted EHRs from WSNs. J Inf Sci Eng 36(4):879–894
20.
Zurück zum Zitat Kamble S, Bhikshapathi CV, Ali ST (2022) A study on fuzzy keywords search techniques and incorporating certificateless cryptography. In: 2022 International conference on computing, communication, security and intelligent systems (IC3SIS), pp 1–6 Kamble S, Bhikshapathi CV, Ali ST (2022) A study on fuzzy keywords search techniques and incorporating certificateless cryptography. In: 2022 International conference on computing, communication, security and intelligent systems (IC3SIS), pp 1–6
21.
Zurück zum Zitat Chenam VB, Ali ST (2023) Bidirectional certificateless searchable authenticated encryption for encrypted email application in iot. In: Rao UP, Alazab M, Gohil BN, Raj Chelliah P (eds) Security. Privacy and Data Analytics. Springer Nature Singapore, Singapore, pp 359–379 Chenam VB, Ali ST (2023) Bidirectional certificateless searchable authenticated encryption for encrypted email application in iot. In: Rao UP, Alazab M, Gohil BN, Raj Chelliah P (eds) Security. Privacy and Data Analytics. Springer Nature Singapore, Singapore, pp 359–379
22.
Zurück zum Zitat Ma M, Fan S, Feng D (2020) Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine. J Inf Secur Appl 55:102652 Ma M, Fan S, Feng D (2020) Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine. J Inf Secur Appl 55:102652
23.
Zurück zum Zitat Chenam VB, Ali ST (2022) A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA. Comput Stand Interfaces 81:103603CrossRef Chenam VB, Ali ST (2022) A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA. Comput Stand Interfaces 81:103603CrossRef
24.
Zurück zum Zitat Chenam VB, Ali ST (2023) A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment. J Inf Secur Appl 72:103377 Chenam VB, Ali ST (2023) A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment. J Inf Secur Appl 72:103377
25.
Zurück zum Zitat Chenam VB, Ali ST (2023) A certificateless authenticated searchable encryption with dynamic multi-receiver for cloud storage. Comput Commun 211:157–177CrossRef Chenam VB, Ali ST (2023) A certificateless authenticated searchable encryption with dynamic multi-receiver for cloud storage. Comput Commun 211:157–177CrossRef
26.
Zurück zum Zitat Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Advances in cryptology-EUROCRYPT 2004: international conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23, pp 506–522. Springer Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Advances in cryptology-EUROCRYPT 2004: international conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23, pp 506–522. Springer
27.
Zurück zum Zitat Anada H, Kanaoka A, Matsuzaki N, Watanabe Y (2020) Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments). Int J Inf Secur 19(1):15–38CrossRef Anada H, Kanaoka A, Matsuzaki N, Watanabe Y (2020) Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments). Int J Inf Secur 19(1):15–38CrossRef
28.
Zurück zum Zitat Chenam VB, Tummala SY, Ali ST (2024) Public key authenticated encryption with field-free subset conjunctive and disjunctive keyword search against keyword guessing attacks. Peer-to-Peer Netw Appl Chenam VB, Tummala SY, Ali ST (2024) Public key authenticated encryption with field-free subset conjunctive and disjunctive keyword search against keyword guessing attacks. Peer-to-Peer Netw Appl
29.
Zurück zum Zitat Zhang LH, Jiang F, Tang X (2021) Verifiable conjunctive keyword search with certificateless searchable. In: 2021 IEEE 20th International conference on trust, security and privacy in computing and communications (TrustCom), pp 9–16. IEEE Zhang LH, Jiang F, Tang X (2021) Verifiable conjunctive keyword search with certificateless searchable. In: 2021 IEEE 20th International conference on trust, security and privacy in computing and communications (TrustCom), pp 9–16. IEEE
30.
Zurück zum Zitat Farras O, Ribes-Gonzalez J (2019) Provably secure public-key encryption with conjunctive and subset keyword search. Int J Inf Secur 18(5):533–548CrossRef Farras O, Ribes-Gonzalez J (2019) Provably secure public-key encryption with conjunctive and subset keyword search. Int J Inf Secur 18(5):533–548CrossRef
31.
Zurück zum Zitat Li Y, Zhou F, Qin Y, Lin M, Xu Z (2018) Integrity-verifiable conjunctive keyword searchable encryption in cloud storage. Int J Inf Secur 17:549–568CrossRef Li Y, Zhou F, Qin Y, Lin M, Xu Z (2018) Integrity-verifiable conjunctive keyword searchable encryption in cloud storage. Int J Inf Secur 17:549–568CrossRef
32.
Zurück zum Zitat Chenam VB, Ali ST (2024) Journal of Information Security and Applications A Pairing-free Dynamic Multi-receiver Certificateless Authenticated Searchable Encryption for cloud storage. J Inf Secur Appl 83(June):103801 Chenam VB, Ali ST (2024) Journal of Information Security and Applications A Pairing-free Dynamic Multi-receiver Certificateless Authenticated Searchable Encryption for cloud storage. J Inf Secur Appl 83(June):103801
33.
Zurück zum Zitat Boneh D, Boyen X, Shacham H (2004) Short group signatures. In: Crypto, vol 3152, pp 41–55. Springer Boneh D, Boyen X, Shacham H (2004) Short group signatures. In: Crypto, vol 3152, pp 41–55. Springer
34.
Zurück zum Zitat Kiltz E (2006) Chosen-ciphertext security from tag-based encryption. In: Theory of cryptography: third theory of cryptography conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings 3, pp 581–600. Springer Kiltz E (2006) Chosen-ciphertext security from tag-based encryption. In: Theory of cryptography: third theory of cryptography conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings 3, pp 581–600. Springer
35.
Zurück zum Zitat Fan C-I, Huang L-Y, Ho P-H (2010) Anonymous multireceiver identity-based encryption. IEEE Trans Comput 59(9):1239–1249MathSciNetCrossRef Fan C-I, Huang L-Y, Ho P-H (2010) Anonymous multireceiver identity-based encryption. IEEE Trans Comput 59(9):1239–1249MathSciNetCrossRef
Metadaten
Titel
A multi-receiver certificateless public-key searchable encryption: Field-free subset conjunctive and disjunctive
verfasst von
Venkata Bhikshapathi Chenam
Kondepati Dhana Sree
Syed Taqi Ali
Publikationsdatum
31.07.2024
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 6/2024
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-024-01767-y