Abstract
Industrial Internet of Things (IIoT) is a cloud-based system that collects data from devices, and key policy attribute-based keyword search (KP-ABKS) scheme enables fine-grained keyword search over the encrypted data obtained from IIoT devices. However, in existing KP-ABKS schemes, the trapdoor’s lifetime is generally infinite, meaning that the trapdoor can be used for searching at any time. This poses a risk to the disclosure of the keyword in the trapdoor. Additionally, the inherent computational and storage requirements of KP-ABKS impose a significant burden on IIoT terminal devices. In this paper, we propose a new cryptographic primitive called forward secure online/offline key policy attribute-based keyword search (FS-OO-KPABKS), which supports both forward security and online/offline secret key generation and encryption. We provide a rigorous security model that the FS-OO-KPABKS scheme achieves selective security against chosen keyword attacks (SCKA) in the standard model. Furthermore, theoretical analysis demonstrates that our scheme exhibits remarkable efficiency in online secret key generation and, online encryption and search execution, and hence shows good adaptability in the IIoT thanks to its unbounded attribute universe.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_30
Cui, J., Zhou, H., Xu, Y., Zhong, H.: OOABKS: online/offline attribute-based encryption for keyword search in mobile cloud. Inf. Sci. 489, 63–77 (2019)
Hohenberger, S., Waters, B.: Online/offline attribute-based encryption. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 293–310. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-54631-0_17
Kim, H., Hahn, C., Hur, J.: Forward secure public key encryption with keyword search for cloud-assisted IoT. In: 2020 IEEE 13th International Conference on Cloud Computing (CLOUD), pp. 549–556. IEEE (2020)
Miao, Y., Tong, Q., Choo, K.K.R., Liu, X., Deng, R.H., Li, H.: Secure online/offline data sharing framework for cloud-assisted industrial internet of things. IEEE Internet Things J. 6(5), 8681–8691 (2019)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27
Zeng, M., Qian, H., Chen, J., Zhang, K.: Forward secure public key encryption with keyword search for outsourced cloud storage. IEEE Trans. Cloud Comput. 10(01), 426–438 (2022)
Zhang, X., Xu, C., Wang, H., Zhang, Y., Wang, S.: FS-PEKS: lattice-based forward secure public-key encryption with keyword search for cloud-assisted Industrial Internet of Things. IEEE Trans. Dependable Secure Comput. 18, 1019–1032 (2021)
Zheng, Q., Xu, S., Ateniese, G.: VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 522–530. IEEE (2014)
Acknowledgements
This work is supported in part by the National Natural Science Foundation of China under Grant 61872409, Grant 61872152 and Grant 62272174, in part by Guangdong Basic and Applied Basic Research Foundation under Grant 2020A1515010751, in part by the Guangdong Major Project of Basic and Applied Basic Research under Grant 2019B030302008, and in part by the Science and Technology Program of Guangzhou under Grant 201902010081.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Yang, H., Ma, S., Zhou, P., Yang, G., Huang, Q. (2024). Forward Secure Online/Offline Key Policy Attribute-Based Encryption with Keyword Search. In: Ge, C., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2023. Lecture Notes in Computer Science, vol 14527. Springer, Singapore. https://doi.org/10.1007/978-981-97-0945-8_21
Download citation
DOI: https://doi.org/10.1007/978-981-97-0945-8_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-0944-1
Online ISBN: 978-981-97-0945-8
eBook Packages: Computer ScienceComputer Science (R0)