Advertisement

Annals of Telecommunications

, Volume 74, Issue 7–8, pp 435–449 | Cite as

Certificateless public key encryption with conjunctive keyword search and its application to cloud-based reliable smart grid system

  • Erneste UwizeyeEmail author
  • Jiye Wang
  • Zhihua Cheng
  • Fagen LiEmail author
Article

Abstract

A public key encryption scheme with conjunctive keyword search allows a semi-trusted third party (or a cloud server) to search over an encrypted data after receiving a trapdoor generated from a conjunctive keyword set. Assume that a sender sends a number of data to a receiver and those data are all stored in the same cloud server. Normally, if the receiver uses one keyword or separate keywords to look for through hundreds of data, it might get in return a huge number of associated data and most of them are unwanted. In this paper, we design a new certificateless public key encryption scheme with conjunctive keyword search, which only returns the desired data. We also prove that the designed scheme is secure against adaptive chosen keyword attacks in the random oracle model under bilinear Diffie-Hellman (BDH) problem assumption. Experimental results show that our scheme has better performance during the testing phase and has a lower communication cost than two related schemes. The comparison about security properties also shows that our scheme is more secure than them. Finally, we give an application example of our scheme in a cloud-based reliable smart grid system.

Keywords

Certificateless cryptography Conjunctive keyword search Cloud computing Smart grid 

Notes

Funding information

This work is supported by the science and technology programs of SGCC titled application research on improving the reliability guarantee capability of information systems (Grant No. 546803170005).

References

  1. 1.
    Li J, Chen X, Chow SSM, Huang Q, Wong DS, Liu Z (2018) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89– 96CrossRefGoogle Scholar
  2. 2.
    Li J, Chen X, Wong DS, Liu Z (2014) L-ENCDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl-Based Syst 79:18–26CrossRefGoogle Scholar
  3. 3.
    Zhu Y, Zhang Y, Li X, Yan H, Li J (2018) Improved collusion-resisting secure nearest neighbor query over encrypted data in cloud. Concurrency and computation: practice and experience, online,  https://doi.org/10.1002/cpe.4681
  4. 4.
    Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy (SP 2000), pp 44–55Google Scholar
  5. 5.
    Chai Q, Gong G (2012) Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE international conference on communications (ICC 2012), pp 917–922Google Scholar
  6. 6.
    Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security (CCS 2006), pp 79– 88Google Scholar
  7. 7.
    Jarecki S, Jutla C, Krawczyk H, Rosu M, Steiner M (2013) Outsourced symmetric private information retrieval. In: Proceedings of the 2013 ACM SIGSAC conference on Computer communications security (CCS 2013), pp 875–888Google Scholar
  8. 8.
    Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM conference on Computer and communications security (CCS 2012), pp 965–976Google Scholar
  9. 9.
    Kurosawa K, Ohtaki Y (2012) UC-Secure searchable symmetric encryption. In: International conference on financial cryptography and data security (FC 2012), pp 285–298Google Scholar
  10. 10.
    Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques (EUROCRYPT 2004), pp 506–522Google Scholar
  11. 11.
    Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In: International conference on computational science and its applications (ICCSA 2008), pp 1249–1259Google Scholar
  12. 12.
    Bakhtiari M, Nateghizad M, Zainal A (2013) Secure search over encrypted data in cloud computing. In: 2013 international conference on advanced computer science applications and technologies (ACSAT 2013), pp 290–295Google Scholar
  13. 13.
    Duntao G, Dawei H, Haibin C, Xiaoyuan Y (2010) A new public key encryption with temporary keyword search. In: 2010 international conference on computer, mechatronics, control and electronic engineering (CMCE 2010), pp 80– 83Google Scholar
  14. 14.
    Hu C, Liu P (2013) Public key encryption with ranked multi-keyword search. In: 5th international conference on intelligent networking and collaborative systems (INCoS 2013), pp 109– 113Google Scholar
  15. 15.
    Li H, Liu D, Dai Y, Luan TH, Shen XS (2015) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage, pp 127–138Google Scholar
  16. 16.
    Luo W, Tan J (2012) Public key encryption with keyword search based on factoring. In: 2012 IEEE 2nd international conference on cloud computing and intelligence systems (CCIS 2012), pp 1245–1247Google Scholar
  17. 17.
    Tang Q, Chen X (2013) Towards asymmetric searchable encryption with message recovery and flexible search authorization. In: Proceedings of the 8th ACM SIGSAC symposium on information, computer and communications security (CCS 2013), pp 253– 264Google Scholar
  18. 18.
    Wu TY, Tsai TT, Tseng YM (2014) Efficient searchable id-based encryption with a designated server. Ann Telecommun 69(7-8):391–402CrossRefGoogle Scholar
  19. 19.
    Zheng Q, Xu S, Ateniese G (2014) VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: Proceedings of IEEE international conference on computer communications (INFOCOM 2014), pp 522–530Google Scholar
  20. 20.
    Wang C, Li W, Li Y, Xu X (2013) A ciphertext-policy attribute-based encryption scheme supporting keyword search function. In: 5th international symposium cyberspace safety and security (CSS 2013), pp 377–386Google Scholar
  21. 21.
    Li J, Lin X, Zhang Y, Han J (2017) KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 10(5):715–725CrossRefGoogle Scholar
  22. 22.
    Peng Y, Cui J, Peng C, Ying Z (2014) Certificateless public key encryption with keyword search. China Comm 11(11):100–113CrossRefGoogle Scholar
  23. 23.
    Ma M, He D, Kumar N, Choo KKR, Chen J (2017) Certificateless searchable public key encryption scheme for industrial internet of things. IEEE Trans Ind Inf 14(2):759–767CrossRefGoogle Scholar
  24. 24.
    Li T, Chen W, Tang Y, Yan H (2018) A homomorphic network coding signature scheme for multiple sources and its application in IoT. Security and Communication Networks, 2018, Article ID 9641273Google Scholar
  25. 25.
    Zheng Q, Li X, Azgin A (2015) CLKS: certificateless keyword search on encrypted data. In: International conference on network and system security (NSS 2015), pp 239–253Google Scholar
  26. 26.
    Gao C, Lv S, Wei Y, Wang Z, Liu Z, cheng X (2018) M-SSE: an effective searchable symmetric encryption with enhanced security for mobile devices. IEEE Access 6:38860–38869CrossRefGoogle Scholar
  27. 27.
    Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: 9th international conference on the theory and application of cryptology and information security (ASIACRYPT 2003), pp 452–473Google Scholar
  28. 28.
    De Caro A, Iovino V (2011) JPBC: java pairing based cryptography. In: 2011 IEEE symposium on computers and communications (ISCC 2011), pp 850–855Google Scholar
  29. 29.
    Daemen J, Rijmen V (2013) The design of rijndael: AES-the advanced encryption standard. Springer, BerlinzbMATHGoogle Scholar
  30. 30.
    Li F, Han Y, Jin C (2017) Certificateless online/offline signcryption for the internet of things. Wirel Netw 23(1):145–158CrossRefGoogle Scholar
  31. 31.
    Wen M, Lu R, Lei J, Liang X, Li H, Shen X (2013) ECQ: an efficient conjunctive query scheme over encrypted multidimensional data in smart grid. In: 2013 IEEE global communications conference (GLOBECOM 2013), pp 796–801Google Scholar
  32. 32.
    Wen M, Lu R, Zhang K, Lei J, Liang X, Shen X (2013) PARQ: a privacy-preserving range query scheme over encrypted metering data for smart grid. IEEE Trans Emerg Top Comput 1(1):178–191CrossRefGoogle Scholar

Copyright information

© Institut Mines-Télécom and Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Center for Cyber Security, School of Computer Science and EngineeringUniversity of Electronic Science and Technology of ChinaChengduPeople’s Republic of China
  2. 2.State Grid Corporation of ChinaBeijingPeople’s Republic of China

Personalised recommendations