Skip to main content
Log in

Efficient public key encryption with revocable keyword search in cloud computing

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Public key encryption with keyword search plays very important role in the outsourced data management. In most of public key encryption schemes with keyword search, the server can unlimitedly execute keyword search ability after obtaining a trapdoor information of a keyword. To restrict the ability of the server’s unlimited search, we propose a novel public key encryption with revocable keyword search by combining hash chain and anonymous multi-receiver encryption scheme in this paper. The scheme can not only achieve security property of the indistinguishability of ciphertexts against an adaptive chosen keywords attack, but also resist off-line keyword guess attack. By comparison with Yu et al.’s scheme, our scheme is more efficient in terms of computational cost and communication overhead for the whole system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Song, D., Wagner, D., Perrig, A.: Practical techniques for searching on encrypted data, In: Processing of the IEEE Symposium on Research in Security and Privacy. Berkeley, California, USA (2000), 44–55 (2000)

  2. Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: EUROCRYPT 2004, LNCS, vol. 3027, Springer: Interlaken, Switzerland, May 2–6 (2004), pp. 506–522

  3. Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Computational Science and Its Applications-ICCSA 2008. Lecture Notes in Computer Science, vol. 5072, pp. 1249–1259 (2008)

  4. Byun, J.W., Rhee, H.S., Park, H.A., Lee, D.H.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Jonker, W., Petkovic, M. (eds.) Secure Data Management, LNCS, vol. 4165, pp. 75–83. Springer, Berlin (2006)

  5. Fan, C.I., Huang, L.Y., Ho, P.H.: Anonymous multireceiver ID-based encryption. IEEE Trans. Comput. 59(9), 1239–1249 (2012)

    Article  MathSciNet  Google Scholar 

  6. Zhang, B., Zhang, F.G.: An efficient public key encryption with conjunctive-subset keywords search. J. Netw. Comput. Appl. 34(1), 262–267 (2011)

    Article  Google Scholar 

  7. Hu, C., Liu, P.: An enhanced searchable public key encryption scheme with a designated tester and its extensions. J. Comput. 7(3), 716C723 (2012)

    Article  Google Scholar 

  8. Mittelbach, F., Goossens, M.: The LaTeX Companion, 2nd ed. Addison-Wesley, Boston (2004)

    MATH  Google Scholar 

  9. Tang, Q., Chen, L.: Public-key encryption with registered keyword search. In: Martinelli, F., Preneel, B. (eds.) EuroPKI, vol. 6391. Lecture Notes in Computer Science, pp. 163–178. Springer, Berlin (2009)

    Google Scholar 

  10. Wang, B.J., Chen, T.H., Jeng, F.G.: Security improvement against malicious servers attack for a dPEKS scheme. Int. J. Inf. Educ. Technol. 1(4), 350–353 (2011)

    Article  Google Scholar 

  11. Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. In: CRYPTO’05 (2005) 350–391

  12. Yu, Y., Ni, J., Yang, H., Mu, Y., Susilo, W.: Efficient public key encryption with revocable keyword search. Secur. Commun. Netw. doi:10.1002/sec.790

  13. Tseng, Y.-M., Huang, Y.-H., Chang, H.-J. Privacy-preserving multireceiver ID-based encryption with provable security. Int. J. Commun. Systems. doi:10.1002/dac.2395

  14. Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Proc. Adv. CryptologyłCrypto, ser. LNCS, vol. 3152. New York: Springer, 2004, pp. 41–45

Download references

Acknowledgments

This work was supported by Beijing Municipal Natural Science Foundation (Nos. 4162020, 4132056) and The importation and development of High-Caliber Talents project of Beijing municipal Institutions (CIT&TCD201304004).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianhong Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, J., Mao, J. Efficient public key encryption with revocable keyword search in cloud computing. Cluster Comput 19, 1211–1217 (2016). https://doi.org/10.1007/s10586-016-0584-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-016-0584-7

Keywords

Navigation