Skip to main content
Log in

Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Most traditional Public-Key Encryption with keyword Search (PEKS) schemes are suffering a tremendous threat occasioned by the burgeoning of quantum computing since these schemes are derived from the bilinear pairing. For the sake of preserving the security of data outsourced by the Industrial Internet of Things (IIoT), a novel efficient PEKS scheme based on lattice assumption is proffered, and it can achieve security against quantum computing attacks. Also, it supports both multi-user and conjunctive keyword search. Besides, we adopt broadcast encryption technology to address the enormous storage cost of keywords ciphertext in a multi-user setting. Our scheme only needs to generate one ciphertext for all data users, thus significantly reducing the storage cost. Lastly, its performance is analyzed theoretically and experimentally. Experimental simulation results demonstrated the superiority of our algorithms in multi-user and multi-keyword scenarios. The scenario of 100 keywords in keyword encryption for 10–100 users always costs about 0.0204 s, and the storage cost keeps at 81.7 KB–84.7 KB.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. He, H.: The security challenges in the IOT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. In: 2016 IEEE Congress on Evolutionary Computation (CEC) (2016)

  2. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques, Springer, pp. 506–522 (2004)

  3. Park, D.J, Kim, K., Lee, P.J.: Public key encryption with conjunctive field keyword search. In: International workshop on information security applications, Springer, pp. 73–86 (2004)

  4. Ameri, M.H., Delavar, M., Mohajeri, J., Salmasizadeh, M.: A key-policy attribute-based temporary keyword search scheme for secure cloud storage. IEEE Trans. Cloud Comput. 8(3), 660–671 (2018)

    Article  Google Scholar 

  5. Zhou, R., Zhang, X., Du, X., Wang, X., Yang, G., Guizani, M.: File-centric multi-key aggregate keyword searchable encryption for industrial internet of things. IEEE Trans. Indust. Inform. 14(8), 3648–3658 (2018)

    Article  Google Scholar 

  6. Zeng, M., Qian, H.F., Chen, J., Zhang, K.: Forward secure public key encryption with keyword search for outsourced cloud storage. In: IEEE transactions on cloud computing (2019)

  7. Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM (JACM) 56(6), 1–40 (2009)

    Article  MathSciNet  Google Scholar 

  8. Wang, P., Xiang, T., Li, X., Xiang, H.: Public key encryption with conjunctive keyword search on lattice. J. Inform. Secur. Appl. 51, 102433 (2020)

    Google Scholar 

  9. Agrawal, S., Boneh, D., Boyen, X.: Efficient lattice (H) IBE in the standard model. In: Annual international conference on the theory and applications of cryptographic techniques, Springer, pp. 553–572 (2010)

  10. Gu, C., Zheng, Y., Kang, F., Xin, D.: Keyword search over encrypted data in cloud computing from lattices in the standard model. In: Second international conference on cloud computing and big data in Asia, Springer, pp. 335–343 (2015)

  11. Kuchta, V., Markowitch, O.: Multi-authority distributed attribute-based encryption with application to searchable encryption on lattices. In: International conference on cryptology in Malaysia, Springer, pp. 409–435 (2016)

  12. Yang, Y., Ma, M.: Semantic searchable encryption scheme based on lattice in quantum-era. J. Inf. Sci. Eng. 32(2), 425–438 (2016)

    MathSciNet  Google Scholar 

  13. Behnia, R., Ozmen, M.O., Yavuz, A.A.: Lattice-based public key searchable encryption from experimental perspectives. IEEE Trans. Dependable Secure Comput. 17(6), 1269–1282 (2018)

    Article  Google Scholar 

  14. Xu, L., Yuan, X., Steinfeld, R., Wang, C., Xu, C.: Multi-writer searchable encryption: an LWE-based realization and implementation. In: Proceedings of the 2019 ACM Asia conference on computer and communications security, pp. 122–133 (2019)

  15. Zhang, X., Xu, C.: Trapdoor security lattice-based public-key searchable encryption with a designated cloud server. Wireless Personal Commun. 100(3), 907–921 (2018)

    Article  Google Scholar 

  16. Xie, R., Xu, C., He, C., Zhang, X.: Lattice-based searchable public-key encryption scheme for secure cloud storage. Int. J. Web Grid Serv. 14(1), 3–20 (2018)

    Article  Google Scholar 

  17. Mao, Y., Fu, X., Guo, C., Wu, G.: Public key encryption with conjunctive keyword search secure against keyword guessing attack from lattices. Trans. Emerg. Telecommun. Technol. 30(11), e3531 (2019)

    Google Scholar 

  18. Zhang, X., Tang, Y., Wang, H., Xu, C., Miao, Y., Cheng, H.: Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage. Inform. Sci. 494, 193–207 (2019)

    Article  MathSciNet  Google Scholar 

  19. Zhang, X., Xu, C., Wang, H., Zhang, Y., Wang, S.: FS-PEKS: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial internet of things. In: IEEE Transactions on dependable and secure computing (2019b)

  20. Yu, X., Xu, C., Xu, L., Wang, Y.: Lattice-based searchable encryption scheme against inside keywords guessing attack. CMC-Comput. Mater. Continua 64(2), 1107–1125 (2020)

    Article  Google Scholar 

  21. Wu, D., Wang, X., Gan, Q., et al.: Public key encryption with keyword search from lattices in multiuser environments. Math. Probl. Eng. 2016, 1–7 (2016)

    Google Scholar 

  22. Yang, Y., Zheng, X., Chang, V., Tang, C.: Semantic keyword searchable proxy re-encryption for postquantum secure cloud storage. Concurr. Comput. 29(19), e4211 (2017)

    Article  Google Scholar 

  23. Yang, Y., Zheng, X., Chang, V., Ye, S., Tang, C.: Lattice assumption based fuzzy information retrieval scheme support multi-user for secure multimedia cloud. Multimedia Tools Appl. 77(8), 9927–9941 (2018)

    Article  Google Scholar 

  24. Zeng, F., Xu, C., et al.: A novel model for lattice-based authorized searchable encryption with special keyword. Math. Probl. Eng. 2015, 1–7 (2015)

    MATH  Google Scholar 

  25. Liu, L., Wang, S., He, B., Zhang, D.: A keyword-searchable ABE scheme from lattice in cloud storage environment. IEEE Access 7, 109038–109053 (2019)

    Article  Google Scholar 

  26. Li, J., Ma, M., Zhang, J., Fan, S., Li, S.: Attribute-based keyword search from lattices. In: International conference on information security and cryptology, Springer, pp. 66–85 (2019)

  27. Cash, D., Hofheinz, D., Kiltz, E., Peikert, C.: Bonsai trees, or how to delegate a lattice basis. In: Annual international conference on the theory and applications of cryptographic techniques, Springer, pp. 523–552 (2010)

  28. Peikert, C.: Public-key cryptosystems from the worst-case shortest vector problem. In: Proceedings of the forty-first annual ACM symposium on Theory of computing, pp 333–342 (2009)

  29. Delerablée, C.: Identity-based broadcast encryption with constant size ciphertexts and private keys. In: International conference on the theory and application of cryptology and information security, Springer, pp. 200–215 (2007)

Download references

Acknowledgements

This work was supported by the Research Foundation of Young Core Instructor in Henan province under Grant 2018GGJS058.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xixi Yan.

Ethics declarations

Author contributions

All authors contributed to the study conception, the design of the experiments, and the paper’s structure. Yongli Tang and Yanpeng Ba performed experiment analysis. Yanpeng Ba wrote the first draft of the manuscript, and all authors commented on previous versions of the manuscript. All authors participated in the revision and proofreading of the paper and approved the final manuscript.

Data availability

Data sharing does not apply to this article as no datasets were generated or analyzed during the current study.

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tang, Y., Ba, Y., Li, L. et al. Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT. Cluster Comput 25, 2305–2316 (2022). https://doi.org/10.1007/s10586-021-03488-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-021-03488-w

Keywords

Navigation