Skip to main content
Erschienen in: Annals of Telecommunications 7-8/2019

08.05.2019

Certificateless public key encryption with conjunctive keyword search and its application to cloud-based reliable smart grid system

verfasst von: Erneste Uwizeye, Jiye Wang, Zhihua Cheng, Fagen Li

Erschienen in: Annals of Telecommunications | Ausgabe 7-8/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A public key encryption scheme with conjunctive keyword search allows a semi-trusted third party (or a cloud server) to search over an encrypted data after receiving a trapdoor generated from a conjunctive keyword set. Assume that a sender sends a number of data to a receiver and those data are all stored in the same cloud server. Normally, if the receiver uses one keyword or separate keywords to look for through hundreds of data, it might get in return a huge number of associated data and most of them are unwanted. In this paper, we design a new certificateless public key encryption scheme with conjunctive keyword search, which only returns the desired data. We also prove that the designed scheme is secure against adaptive chosen keyword attacks in the random oracle model under bilinear Diffie-Hellman (BDH) problem assumption. Experimental results show that our scheme has better performance during the testing phase and has a lower communication cost than two related schemes. The comparison about security properties also shows that our scheme is more secure than them. Finally, we give an application example of our scheme in a cloud-based reliable smart grid system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Li J, Chen X, Chow SSM, Huang Q, Wong DS, Liu Z (2018) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89– 96CrossRef Li J, Chen X, Chow SSM, Huang Q, Wong DS, Liu Z (2018) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89– 96CrossRef
2.
Zurück zum Zitat Li J, Chen X, Wong DS, Liu Z (2014) L-ENCDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl-Based Syst 79:18–26CrossRef Li J, Chen X, Wong DS, Liu Z (2014) L-ENCDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl-Based Syst 79:18–26CrossRef
3.
4.
Zurück zum Zitat Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy (SP 2000), pp 44–55 Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy (SP 2000), pp 44–55
5.
Zurück zum Zitat Chai Q, Gong G (2012) Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE international conference on communications (ICC 2012), pp 917–922 Chai Q, Gong G (2012) Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE international conference on communications (ICC 2012), pp 917–922
6.
Zurück zum Zitat Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security (CCS 2006), pp 79– 88 Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security (CCS 2006), pp 79– 88
7.
Zurück zum Zitat Jarecki S, Jutla C, Krawczyk H, Rosu M, Steiner M (2013) Outsourced symmetric private information retrieval. In: Proceedings of the 2013 ACM SIGSAC conference on Computer communications security (CCS 2013), pp 875–888 Jarecki S, Jutla C, Krawczyk H, Rosu M, Steiner M (2013) Outsourced symmetric private information retrieval. In: Proceedings of the 2013 ACM SIGSAC conference on Computer communications security (CCS 2013), pp 875–888
8.
Zurück zum Zitat Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM conference on Computer and communications security (CCS 2012), pp 965–976 Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM conference on Computer and communications security (CCS 2012), pp 965–976
9.
Zurück zum Zitat Kurosawa K, Ohtaki Y (2012) UC-Secure searchable symmetric encryption. In: International conference on financial cryptography and data security (FC 2012), pp 285–298 Kurosawa K, Ohtaki Y (2012) UC-Secure searchable symmetric encryption. In: International conference on financial cryptography and data security (FC 2012), pp 285–298
10.
Zurück zum Zitat Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques (EUROCRYPT 2004), pp 506–522 Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques (EUROCRYPT 2004), pp 506–522
11.
Zurück zum Zitat Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In: International conference on computational science and its applications (ICCSA 2008), pp 1249–1259 Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In: International conference on computational science and its applications (ICCSA 2008), pp 1249–1259
12.
Zurück zum Zitat Bakhtiari M, Nateghizad M, Zainal A (2013) Secure search over encrypted data in cloud computing. In: 2013 international conference on advanced computer science applications and technologies (ACSAT 2013), pp 290–295 Bakhtiari M, Nateghizad M, Zainal A (2013) Secure search over encrypted data in cloud computing. In: 2013 international conference on advanced computer science applications and technologies (ACSAT 2013), pp 290–295
13.
Zurück zum Zitat Duntao G, Dawei H, Haibin C, Xiaoyuan Y (2010) A new public key encryption with temporary keyword search. In: 2010 international conference on computer, mechatronics, control and electronic engineering (CMCE 2010), pp 80– 83 Duntao G, Dawei H, Haibin C, Xiaoyuan Y (2010) A new public key encryption with temporary keyword search. In: 2010 international conference on computer, mechatronics, control and electronic engineering (CMCE 2010), pp 80– 83
14.
Zurück zum Zitat Hu C, Liu P (2013) Public key encryption with ranked multi-keyword search. In: 5th international conference on intelligent networking and collaborative systems (INCoS 2013), pp 109– 113 Hu C, Liu P (2013) Public key encryption with ranked multi-keyword search. In: 5th international conference on intelligent networking and collaborative systems (INCoS 2013), pp 109– 113
15.
Zurück zum Zitat Li H, Liu D, Dai Y, Luan TH, Shen XS (2015) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage, pp 127–138 Li H, Liu D, Dai Y, Luan TH, Shen XS (2015) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage, pp 127–138
16.
Zurück zum Zitat Luo W, Tan J (2012) Public key encryption with keyword search based on factoring. In: 2012 IEEE 2nd international conference on cloud computing and intelligence systems (CCIS 2012), pp 1245–1247 Luo W, Tan J (2012) Public key encryption with keyword search based on factoring. In: 2012 IEEE 2nd international conference on cloud computing and intelligence systems (CCIS 2012), pp 1245–1247
17.
Zurück zum Zitat Tang Q, Chen X (2013) Towards asymmetric searchable encryption with message recovery and flexible search authorization. In: Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security (CCS 2013), pp 253– 264 Tang Q, Chen X (2013) Towards asymmetric searchable encryption with message recovery and flexible search authorization. In: Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security (CCS 2013), pp 253– 264
18.
Zurück zum Zitat Wu TY, Tsai TT, Tseng YM (2014) Efficient searchable id-based encryption with a designated server. Ann Telecommun 69(7-8):391–402CrossRef Wu TY, Tsai TT, Tseng YM (2014) Efficient searchable id-based encryption with a designated server. Ann Telecommun 69(7-8):391–402CrossRef
19.
Zurück zum Zitat Zheng Q, Xu S, Ateniese G (2014) VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: Proceedings of IEEE international conference on computer communications (INFOCOM 2014), pp 522–530 Zheng Q, Xu S, Ateniese G (2014) VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: Proceedings of IEEE international conference on computer communications (INFOCOM 2014), pp 522–530
20.
Zurück zum Zitat Wang C, Li W, Li Y, Xu X (2013) A ciphertext-policy attribute-based encryption scheme supporting keyword search function. In: 5th international symposium cyberspace safety and security (CSS 2013), pp 377–386 Wang C, Li W, Li Y, Xu X (2013) A ciphertext-policy attribute-based encryption scheme supporting keyword search function. In: 5th international symposium cyberspace safety and security (CSS 2013), pp 377–386
21.
Zurück zum Zitat Li J, Lin X, Zhang Y, Han J (2017) KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 10(5):715–725CrossRef Li J, Lin X, Zhang Y, Han J (2017) KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 10(5):715–725CrossRef
22.
Zurück zum Zitat Peng Y, Cui J, Peng C, Ying Z (2014) Certificateless public key encryption with keyword search. China Comm 11(11):100–113CrossRef Peng Y, Cui J, Peng C, Ying Z (2014) Certificateless public key encryption with keyword search. China Comm 11(11):100–113CrossRef
23.
Zurück zum Zitat Ma M, He D, Kumar N, Choo KKR, Chen J (2017) Certificateless searchable public key encryption scheme for industrial internet of things. IEEE Trans Ind Inf 14(2):759–767CrossRef Ma M, He D, Kumar N, Choo KKR, Chen J (2017) Certificateless searchable public key encryption scheme for industrial internet of things. IEEE Trans Ind Inf 14(2):759–767CrossRef
24.
Zurück zum Zitat Li T, Chen W, Tang Y, Yan H (2018) A homomorphic network coding signature scheme for multiple sources and its application in IoT. Security and Communication Networks, 2018, Article ID 9641273 Li T, Chen W, Tang Y, Yan H (2018) A homomorphic network coding signature scheme for multiple sources and its application in IoT. Security and Communication Networks, 2018, Article ID 9641273
25.
Zurück zum Zitat Zheng Q, Li X, Azgin A (2015) CLKS: certificateless keyword search on encrypted data. In: International conference on network and system security (NSS 2015), pp 239–253 Zheng Q, Li X, Azgin A (2015) CLKS: certificateless keyword search on encrypted data. In: International conference on network and system security (NSS 2015), pp 239–253
26.
Zurück zum Zitat Gao C, Lv S, Wei Y, Wang Z, Liu Z, cheng X (2018) M-SSE: an effective searchable symmetric encryption with enhanced security for mobile devices. IEEE Access 6:38860–38869CrossRef Gao C, Lv S, Wei Y, Wang Z, Liu Z, cheng X (2018) M-SSE: an effective searchable symmetric encryption with enhanced security for mobile devices. IEEE Access 6:38860–38869CrossRef
27.
Zurück zum Zitat Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: 9th international conference on the theory and application of cryptology and information security (ASIACRYPT 2003), pp 452–473 Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: 9th international conference on the theory and application of cryptology and information security (ASIACRYPT 2003), pp 452–473
28.
Zurück zum Zitat De Caro A, Iovino V (2011) JPBC: java pairing based cryptography. In: 2011 IEEE symposium on computers and communications (ISCC 2011), pp 850–855 De Caro A, Iovino V (2011) JPBC: java pairing based cryptography. In: 2011 IEEE symposium on computers and communications (ISCC 2011), pp 850–855
29.
Zurück zum Zitat Daemen J, Rijmen V (2013) The design of rijndael: AES-the advanced encryption standard. Springer, BerlinMATH Daemen J, Rijmen V (2013) The design of rijndael: AES-the advanced encryption standard. Springer, BerlinMATH
30.
Zurück zum Zitat Li F, Han Y, Jin C (2017) Certificateless online/offline signcryption for the internet of things. Wirel Netw 23(1):145–158CrossRef Li F, Han Y, Jin C (2017) Certificateless online/offline signcryption for the internet of things. Wirel Netw 23(1):145–158CrossRef
31.
Zurück zum Zitat Wen M, Lu R, Lei J, Liang X, Li H, Shen X (2013) ECQ: an efficient conjunctive query scheme over encrypted multidimensional data in smart grid. In: 2013 IEEE global communications conference (GLOBECOM 2013), pp 796–801 Wen M, Lu R, Lei J, Liang X, Li H, Shen X (2013) ECQ: an efficient conjunctive query scheme over encrypted multidimensional data in smart grid. In: 2013 IEEE global communications conference (GLOBECOM 2013), pp 796–801
32.
Zurück zum Zitat Wen M, Lu R, Zhang K, Lei J, Liang X, Shen X (2013) PARQ: a privacy-preserving range query scheme over encrypted metering data for smart grid. IEEE Trans Emerg Top Comput 1(1):178–191CrossRef Wen M, Lu R, Zhang K, Lei J, Liang X, Shen X (2013) PARQ: a privacy-preserving range query scheme over encrypted metering data for smart grid. IEEE Trans Emerg Top Comput 1(1):178–191CrossRef
Metadaten
Titel
Certificateless public key encryption with conjunctive keyword search and its application to cloud-based reliable smart grid system
verfasst von
Erneste Uwizeye
Jiye Wang
Zhihua Cheng
Fagen Li
Publikationsdatum
08.05.2019
Verlag
Springer International Publishing
Erschienen in
Annals of Telecommunications / Ausgabe 7-8/2019
Print ISSN: 0003-4347
Elektronische ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-019-00716-8

Weitere Artikel der Ausgabe 7-8/2019

Annals of Telecommunications 7-8/2019 Zur Ausgabe

Neuer Inhalt