Abstract
Data sharing and searching are important functionalities in cloud storage. In this paper, we show how to securely and flexibly search and share cloud data among a group of users without a group manager. We formalize a novel cryptosystem: secure channel free searchable encryption in a peer-to-peer group, which features with the secure cloud data sharing and searching for group members in an identity-based setting. Our scheme allows group members to join or leave the group dynamically. We present two schemes: basic scheme and enhanced scheme. We formally prove that our basic scheme achieves consistency and indistinguishability against the chosen keyword and ciphertext attack and the outsider’s keyword guessing attack, respectively. An enhanced scheme is also proposed to achieve forward secrecy, which allows to revoke user search right over the former shared data.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Boneh D, Crescenzo G D, Ostrovsky R, Persiano G. Public key encryption with keyword search. In Proc. the International Conference on the Theory and Applications of Cryptographic Techniques, May 2004, pp.506-522.
Baek J, Safavi-Naini R, Susilo W. Public key encryption with keyword search revisited. In Proc. the 16th International Conference on Computational Science and Its Applications, June 30-July 3, 2008, pp.1249-1259.
Rhee H S, Park J H, Susilo W, Lee D H. Trapdoor security in a searchable public-key encryption scheme with a designated tester. Journal of Systems and Software, 2010, 83(5): 763-771.
Golle P, Staddon J, Waters B R. Secure conjunctive keywords earch over encrypted data. In Proc. the 2nd International Conference on Applied Cryptography and Network Security, June 2004, pp.31-45.
Park D J, Kim K, Lee P J. Public key encryption with conjunctive field keyword search. In Proc. the 5th International Workshop of Information Security Applications, August 2004, pp.73-86.
Zhang B, Zhang F. An efficient public key encryption with conjunctive-subset keywords search. J. Network and Computer Applications, 2011, 34(1): 262-267.
Boneh D, Waters B. Conjunctive, subset, and range queries on encrypted data. In Proc. the 4th Theory of Cryptography Conference, February 2007, pp.535-554.
Baek J, Safavi-Naini R, Susilo W. On the integration of public key data encryption and public key encryption with keyword search. In Proc. the 9th International Conference on Information Security, August 30-September 2, 2006, pp.217-232.
Fuhr T, Paillier P. Decryptable searchable encryption. In Proc. the 1st International Conference on Provable Security, November 2007, pp.228-236.
Zhang R, Imai H. Generic combination of public key encryption with keyword search and public key encryption. In Proc. the 6th International Conference on Cryptology and Network Security, December 2007, pp.159-174.
Rhee H S, Park J H, Lee D H. Generic construction of designated tester public-key encryption with keyword search. Inf. Sci., 2012, 205: 93-109.
Shao J, Cao Z, Liang X, Lin H. Proxy re-encryption with keyword search. Inf. Sci., 2010, 180(13): 2576-2587.
Gu C, Zhu Y, Pan H. Efficient public key encryption with keyword search schemes from pairings. In Proc. the 3rd SKLOIS Conference on Information Security and Cryptology, August 31-September 5, 2007, pp.372-383.
Fang L, Susilo W, Ge C, Wang J. A secure channel free public key encryption with keyword search scheme without random oracle. In Proc. the 8th International Conference on Cryptology and Network Security, December 2009, pp.248-258.
Rhee H S, Park J H, Susilo W, Lee D H. Improved searchable public key encryption with designated tester. In Proc. the 4th ACM Symposium on Information, Computer and Communications Security, March 2009, pp.376-379.
Byun J W, Rhee H S, Park H, Lee D H. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In Proc. the 3rd VLDB Workshop of Secure Data Management, September 2006, pp.75-83.
YauW, Heng S, Goi B. Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In Proc. the 5th International Conference on Autonomic and Trusted Computing, June 2008, pp.100-105.
Fang L, Susilo W, Ge C, Wang J. Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Inf. Sci., 2013, 238: 221-241.
Chang Y, Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data. In Proc. the 3rd International Conference on Applied Cryptography and Network Security, June 2005, pp.442-455.
Curtmola R, Garay J A, Kamara S, Ostrovsky R. Searchable symmetric encryption: Improved definitions and efficient constructions. In Proc. the 13th ACM Conference on Computer and Communications Security, October 2006, pp.79-88.
Bao F, Deng R H, Ding X, Yang Y. Private query on encrypted data in multi-user settings. In Proc. the 4th International Conference on Information Security Practice and Experience, April 2008, pp.71-85.
Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing. In Proc. the 7th International Conference on the Theory and Application of Cryptology and Information Security, December 2001, pp.514-532.
Ivan A, Dodis Y. Proxy cryptography revisited. In Proc. the 10th Annual Network and Distributed System Security Symposium, February 2003.
Fang L, Susilo W, Ren Y, Ge C, Wang J. Chosen public key and ciphertext secure proxy re-encryption schemes. JDCTA, 2010, 4(9): 151-160.
Dong C, Russello G, Dulay N. Shared and searchable encrypted data for untrusted servers. In Proc. the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, July 2008, pp.127-143.
Dong C, Russello G, Dulay N. Shared and searchable encrypted data for untrusted servers. Journal of Computer Security, 2011, 19(3): 367-397.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, XF., Mu, Y., Chen, R. et al. Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group. J. Comput. Sci. Technol. 31, 1012–1027 (2016). https://doi.org/10.1007/s11390-016-1676-9
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11390-016-1676-9