Skip to main content
Log in

Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group

  • Regular Paper
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

Data sharing and searching are important functionalities in cloud storage. In this paper, we show how to securely and flexibly search and share cloud data among a group of users without a group manager. We formalize a novel cryptosystem: secure channel free searchable encryption in a peer-to-peer group, which features with the secure cloud data sharing and searching for group members in an identity-based setting. Our scheme allows group members to join or leave the group dynamically. We present two schemes: basic scheme and enhanced scheme. We formally prove that our basic scheme achieves consistency and indistinguishability against the chosen keyword and ciphertext attack and the outsider’s keyword guessing attack, respectively. An enhanced scheme is also proposed to achieve forward secrecy, which allows to revoke user search right over the former shared data.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Boneh D, Crescenzo G D, Ostrovsky R, Persiano G. Public key encryption with keyword search. In Proc. the International Conference on the Theory and Applications of Cryptographic Techniques, May 2004, pp.506-522.

  2. Baek J, Safavi-Naini R, Susilo W. Public key encryption with keyword search revisited. In Proc. the 16th International Conference on Computational Science and Its Applications, June 30-July 3, 2008, pp.1249-1259.

  3. Rhee H S, Park J H, Susilo W, Lee D H. Trapdoor security in a searchable public-key encryption scheme with a designated tester. Journal of Systems and Software, 2010, 83(5): 763-771.

    Article  Google Scholar 

  4. Golle P, Staddon J, Waters B R. Secure conjunctive keywords earch over encrypted data. In Proc. the 2nd International Conference on Applied Cryptography and Network Security, June 2004, pp.31-45.

  5. Park D J, Kim K, Lee P J. Public key encryption with conjunctive field keyword search. In Proc. the 5th International Workshop of Information Security Applications, August 2004, pp.73-86.

  6. Zhang B, Zhang F. An efficient public key encryption with conjunctive-subset keywords search. J. Network and Computer Applications, 2011, 34(1): 262-267.

    Article  Google Scholar 

  7. Boneh D, Waters B. Conjunctive, subset, and range queries on encrypted data. In Proc. the 4th Theory of Cryptography Conference, February 2007, pp.535-554.

  8. Baek J, Safavi-Naini R, Susilo W. On the integration of public key data encryption and public key encryption with keyword search. In Proc. the 9th International Conference on Information Security, August 30-September 2, 2006, pp.217-232.

  9. Fuhr T, Paillier P. Decryptable searchable encryption. In Proc. the 1st International Conference on Provable Security, November 2007, pp.228-236.

  10. Zhang R, Imai H. Generic combination of public key encryption with keyword search and public key encryption. In Proc. the 6th International Conference on Cryptology and Network Security, December 2007, pp.159-174.

  11. Rhee H S, Park J H, Lee D H. Generic construction of designated tester public-key encryption with keyword search. Inf. Sci., 2012, 205: 93-109.

    Article  MathSciNet  MATH  Google Scholar 

  12. Shao J, Cao Z, Liang X, Lin H. Proxy re-encryption with keyword search. Inf. Sci., 2010, 180(13): 2576-2587.

    Article  MathSciNet  MATH  Google Scholar 

  13. Gu C, Zhu Y, Pan H. Efficient public key encryption with keyword search schemes from pairings. In Proc. the 3rd SKLOIS Conference on Information Security and Cryptology, August 31-September 5, 2007, pp.372-383.

  14. Fang L, Susilo W, Ge C, Wang J. A secure channel free public key encryption with keyword search scheme without random oracle. In Proc. the 8th International Conference on Cryptology and Network Security, December 2009, pp.248-258.

  15. Rhee H S, Park J H, Susilo W, Lee D H. Improved searchable public key encryption with designated tester. In Proc. the 4th ACM Symposium on Information, Computer and Communications Security, March 2009, pp.376-379.

  16. Byun J W, Rhee H S, Park H, Lee D H. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In Proc. the 3rd VLDB Workshop of Secure Data Management, September 2006, pp.75-83.

  17. YauW, Heng S, Goi B. Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In Proc. the 5th International Conference on Autonomic and Trusted Computing, June 2008, pp.100-105.

  18. Fang L, Susilo W, Ge C, Wang J. Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Inf. Sci., 2013, 238: 221-241.

    Article  MathSciNet  MATH  Google Scholar 

  19. Chang Y, Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data. In Proc. the 3rd International Conference on Applied Cryptography and Network Security, June 2005, pp.442-455.

  20. Curtmola R, Garay J A, Kamara S, Ostrovsky R. Searchable symmetric encryption: Improved definitions and efficient constructions. In Proc. the 13th ACM Conference on Computer and Communications Security, October 2006, pp.79-88.

  21. Bao F, Deng R H, Ding X, Yang Y. Private query on encrypted data in multi-user settings. In Proc. the 4th International Conference on Information Security Practice and Experience, April 2008, pp.71-85.

  22. Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing. In Proc. the 7th International Conference on the Theory and Application of Cryptology and Information Security, December 2001, pp.514-532.

  23. Ivan A, Dodis Y. Proxy cryptography revisited. In Proc. the 10th Annual Network and Distributed System Security Symposium, February 2003.

  24. Fang L, Susilo W, Ren Y, Ge C, Wang J. Chosen public key and ciphertext secure proxy re-encryption schemes. JDCTA, 2010, 4(9): 151-160.

    Article  Google Scholar 

  25. Dong C, Russello G, Dulay N. Shared and searchable encrypted data for untrusted servers. In Proc. the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, July 2008, pp.127-143.

  26. Dong C, Russello G, Dulay N. Shared and searchable encrypted data for untrusted servers. Journal of Computer Security, 2011, 19(3): 367-397.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiao-Fen Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, XF., Mu, Y., Chen, R. et al. Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group. J. Comput. Sci. Technol. 31, 1012–1027 (2016). https://doi.org/10.1007/s11390-016-1676-9

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11390-016-1676-9

Keywords

Navigation