Abstract
Public key encryption with keyword search (PEKS) has long been a promising way for secure data validation, which tells one whether the coming entry contains the designated keyword without decryption. Despite the visible confidentiality benefits, existing PEKS schemes suffer serious performance issues while deployed in real-world applications. Specifically, when multiple keys/keywords are suggested, each coming datum should be tested repeatedly until all trapdoors have been verified. In this paper, we propose a new cryptographic primitive called multi-writer searchable encryption with aggregated keywords search that supports subset encrypted data validation. Specifically, one can perform fewer operations to identify all suggested keywords, thereby reducing the verifying cost. To demonstrate the advantages of the proposed scheme, extensive experiments are conducted on synthetic datasets, and the results show that our solution achieves considerable performance improvements with prior works.








Similar content being viewed by others
References
Song, X., Guo, Y., Li, N., & Zhang, L. (2021). Online traffic flow prediction for edge computing-enhanced autonomous and connected vehicles. IEEE Transactions on Vehicular Technology, 70(3), 2101–2111.
Ma, Z., Ma, J., Miao, Y., Liu, X., Choo, K.-K.R., Yang, R., & Wang, X. (2022). Lightweight privacy-preserving medical diagnosis in edge computing. IEEE Transactions on Services Computing, 15(3), 1606–1618.
Fu, W., Wan, Y., Qin, J., Kang, Y., & Li, L. (2022). Privacy-preserving optimal energy management for smart grid with cloud-edge computing. IEEE Transactions on Industrial Informatics, 18(6), 4029–4038.
Jovanovic, B. Internet of things statistics for 2022—taking things apart. Available: https://dataprot.net/statistics/iot-statistics/
Statista Research Department. Volume of data/information created, captured, copied, and consumed worldwide from 2010 to 2025. Available: https://www.statista.com/statistics/871513/worldwide-data-created/#:~:text=The%20total%20amount%20of%20data,replicated%20reached%20a%20new%20high
Boneh, D., Crescenzo, G. D., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In Proceedings of EUROCRYPT (pp. 506–522).
Kumar, C., Chowdary, C. R., & Shukla, D. (2022). Automatically detecting groups using locality-sensitive hashing in group recommendations. Information Sciences, 601, 207–223.
Boneh, D., & Waters, B. (2007). Conjunctive, subset, and range queries on encrypted data. In Proceedings of TCC (pp 535–554).
Zhang, Y., Xu, C., Ni, J., Li, H., & Shen, X. S. (2021). Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage. IEEE Transactions on Cloud Computing, 9(4), 1335–1348.
Lei, X., Duan, H., Zhou, A., Yuan, X., & Wang, C. (2021). Interpreting and mitigating leakage-abuse attacks in searchable symmetric encryption. IEEE Transactions on Information Forensics and Security, 16, 5310–5325.
Xu, L., Yuan, X., Wang, C., Wang, Q., & Xu, C. (2019). Hardening database padding for searchable encryption. In Proceedings of IEEE INFOCOM (pp. 2503–2511).
De Caro, A., Iovino, V. (2011). JPBC: Java pairing based cryptography. In Proceedings of IEEE ISCC (pp. 850–855).
Song, D. X., Wagner, D. A., & Perrig, A. (2000). Practical techniques for searches on encrypted data. In Proceedings of S &P (pp. 44–55).
Khader, D. (2006). Public key encryption with keyword search based on k-resilient IBE. In Proceedings of ICCSA (pp. 298–308).
Di Crescenzo, G., & Saraswat, V. (2007). Public key encryption with searchable keywords based on Jacobi symbols. In Proceedings of INDOCRYPT (pp. 282–296).
Park, D. J., Kim, K., & Lee, P. J. (2004). Public key encryption with conjunctive field keyword search. In Proceedings of WISA (pp. 73–86).
Byun, J W., Lee, D H., & Lim, J. (2006). Efficient conjunctive keyword search on encrypted data storage system. In Proceedings of EuroPKI (pp. 184–196).
Hwang, Y. H., & Lee, P. J. (2007). Public key encryption with conjunctive keyword search and its extension to a multi-user system. In Proceedings of PBC (pp. 2–22).
Shi, E., Bethencourt, J., Hubert Chan, T.-H., Song, D. X., & Perrig, A. (2007). Multi-dimensional range query over encrypted data. In Proceedings of IEEE S &P (pp. 350–364).
Lv, Z., Hong, C., Zhang, M., & Feng, D. (2014). Expressive and secure searchable encryption in the public key setting. In Proceedings of ISC, vol. 8783 (pp. 364–376).
Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., & Lou, W. (2010). Fuzzy keyword search over encrypted data in cloud computing. In Proceedings of INFOCOM (pp. 441–445).
Peng, X., Jin, H., Qianhong, W., & Wang, W. (2013). Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack. IEEE Transactions on Computers, 62(11), 2266–2277.
Cui, H., Wan, Z., Deng, R. H., Wang, G., & Li, Y. (2018). Efficient and expressive keyword search over encrypted data in cloud. IEEE Transactions on Dependable and Secure Computing, 15, 409–422.
Wang, J., Zhang, R., Li, J., & Xiao, Y. (2022). Owner-enabled secure authorized keyword search over encrypted data with flexible metadata. IEEE Transactions on Information Forensics and Security.
Jiang, P., Qiu, B., & Zhu, L. (2022). Report when malicious: Deniable and accountable searchable message-moderation system. IEEE Transactions on Information Forensics and Security, 17, 1597–1609.
Li, H., Huang, Q., & Susilo, W. (2022). A secure cloud data sharing protocol for enterprise supporting hierarchical keyword search. IEEE Transactions on Dependable and Secure Computing, 19, 1532–1543.
Zheng, Q., Xu, S., & Ateniese, G. (2014). VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. In Proceedings of INFOCOM (pp. 522–530).
Ge, C., Susilo, W., Liu, Z., Xia, J., Szalachowski, P., & Fang, L. (2021). Secure keyword search and data sharing mechanism for cloud computing. IEEE Transactions on Dependable and Secure Computing, 18, 2787–2800.
Miao, Y., Liu, X., Choo, K.-K.R., Deng, R. H., Li, J., Li, H., & Ma, J.-F. (2021). Privacy-preserving attribute-based keyword search in shared multi-owner setting. IEEE Transactions on Dependable and Secure Computing, 18, 1080–1094.
Zhang, K., Jiang, Z., Ning, J., & Huang, X. (2022). Subversion-resistant and consistent attribute-based keyword search for secure cloud storage. IEEE Transactions on Information Forensics and Security, 17, 1771–1784.
Byun, J. W., Rhee, H. S., Park, H.-A., & Lee, D. H. (2006). Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In Proceedings of SDM (pp. 75–83).
Yau, W.-C., Heng, S.-H., & Goi, B.-M. (2008). Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In Proceedings of ATC, vol. 5060 (pp. 100–105).
Chen, R., Yi, M., Yang, G., Guo, F., & Wang, X. (2016). Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Transactions on Information Forensics and Security, 11(4), 789–798.
Huang, Q., & Li, H. (2017). An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Information Sciences, 403, 1–14.
Behnia, R., Ozmen, M. O., & Yavuz, A. A. (2020). Lattice-based public key searchable encryption from experimental perspectives. IEEE Transactions on Dependable and Secure Computing, 17, 1269–1282.
Xu, L., Yuan, X., Steinfeld, R., Wang, C., & Xu, C. (2019). Multi-writer searchable encryption: An LWE-based realization and implementation. In Proceedings ACM AsiaCCS (pp. 122–133).
Zhang, X., Xu, C., Wang, H., Zhang, Y., & Wang, S. (2019). FS-PEKS: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial internet of things. IEEE Transactions on Dependable and Secure Computing.
Ma, M., He, D., Kumar, N., Choo, K.-K.R., & Chen, J. (2018). Certificateless searchable public key encryption scheme for industrial internet of things. IEEE Transactions on Industrial Informatics, 14, 759–767.
Bader, J., & Michala, A. L. (2021). Searchable encryption with access control in industrial internet of things (IIoT). Wireless Communications and Mobile Computing, 2021, 5555362:1-5555362:10.
Zhang, Y., Xu, C., Ni, J., Li, H., & Shen, X. S. (2019). Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage. IEEE Transactions on Cloud Computing.
Jiang, P., Guo, F., Liang, K., Lai, J., & Wen, Q. (2020). Searchain: Blockchain-based private keyword search in decentralized storage. Future Generation Computer Systems, 107, 781–792.
Acknowledgements
This work was supported in part by the Natural Science Foundation of Jiangsu Province under Grant BK20210330, BK20220935, by the National Natural Science Foundation of China under Grant 62072240, by the National Key Research and Development Program of China under Grant 2020YFB1804604, by the Fundamental Research Funds for the Central Universities under Grant 30922010917.
Funding
Funding was provided by Natural Science Foundation of Jiangsu Province (Grand no. BK20210330).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Xu, L., Xu, C., Liu, J. et al. Enabling privacy-preserving data validation from multi-writer encryption with aggregated keywords search. Wireless Netw 30, 4629–4642 (2024). https://doi.org/10.1007/s11276-022-03117-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-022-03117-3