A certificateless and KGA-secure searchable encryption scheme with constant trapdoors in smart city

Hongjun Li , Debiao He , P. Vijayakumar , Fayez Alqahtani , Amr Tolba

›› 2026, Vol. 12 ›› Issue (1) : 198 -209.

PDF
›› 2026, Vol. 12 ›› Issue (1) :198 -209. DOI: 10.1016/j.dcan.2024.08.005
Special issue on cyber-physical systems for intelligent transportation and smart cities
research-article

A certificateless and KGA-secure searchable encryption scheme with constant trapdoors in smart city

Author information +
History +
PDF

Abstract

Smart cities, as a typical application in the field of the Internet of Things, can combine cloud computing to realize the intelligent control of objects and process massive data. While cloud computing brings convenience to smart city services, a serious problem is ensuring that confidential data cannot be leaked to malicious adversaries. Considering the security and privacy of data, data owners transmit sensitive data in its encrypted form to cloud server, which seriously hinders the improvements of potential utilization and efficient sharing. Public key searchable encryption ensures that users can securely retrieve the encrypted data without decryption. However, most existing schemes cannot resist keyword guessing attacks or the size of trapdoors linearly increases with the number of data owners. In this work, by utilizing certificateless encryption and proxy re-encryption, we design an authenticated searchable encryption scheme with constant trapdoors. The designed scheme preserves the privacy of index ciphertexts and keyword trapdoors, and can resist keyword guessing attacks. In addition, data users can generate and upload trapdoors with lower computation and communication overheads. We show that the proposed scheme is suitable for smart city implementations and applications by experimentally evaluating its performance.

Keywords

Smart city / Data retrieval / Privacy protection / Certificateless cryptography

Cite this article

Download citation ▾
Hongjun Li, Debiao He, P. Vijayakumar, Fayez Alqahtani, Amr Tolba. A certificateless and KGA-secure searchable encryption scheme with constant trapdoors in smart city. , 2026, 12(1): 198-209 DOI:10.1016/j.dcan.2024.08.005

登录浏览全文

4963

注册一个新账户 忘记密码

CRediT authorship contribution statement

Hongjun Li: Writing-original draft, Methodology. Debiao He: Writing-review & editing, Supervision, Funding acquisition. P. Vi-jayakumar: Writing-review & editing, Validation. Fayez Alqahtani: Validation, Formal analysis. Amr Tolba: Visualization, Software, Inves-tigation.

Declaration of competing interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Data availability

The data used to support the findings of this study are available from the corresponding author upon request.

Acknowledgements

The work was supported by the Shandong Provincial Key Research and Development Program (No. 2021CXGC010107), the National Nat-ural Science Foundation of China (Nos. U21A20466, 62325209), the New 20 Project of Higher Education of Jinan (No. 202228017), the Spe-cial Project on Science and Technology Program of Hubei Province (No. 2021BAA025), the Fundamental Research Funds for the Central Univer-sities (Nos. 2042023kf0203, 20420241013) and the Researchers Sup-porting Project Number (RSP2024R509), King Saud University, Riyadh, Saudi Arabia.

References

[1]

T.-h. Kim, C. Ramos, S. Mohammed, Smart city and IoT, Future Gener. Comput. Syst. 76 (2017) 159-162.

[2]

M. Malik, C. Prabha, P. Soni, V. Arya, W.A. Alhalabi, B.B. Gupta, A.A. Albeshri, A. Almomani, Machine learning-based automatic litter detection and classification using neural networks in smart cities, Int. J. Semantic Web Inf. Syst. 19 (1) (2023) 1-20.

[3]

H. Zhou, Z. Wang, H. Zheng, S. He, M. Dong, Cost minimization-oriented computa-tion offloading and service caching in mobile cloud-edge computing: an A3C-based approach, IEEE Trans. Netw. Sci. Eng. 10 (3) (2023) 1326-1338.

[4]

S. Chen, H. Xu, D. Liu, B. Hu, H. Wang, A vision of IoT: applications, challenges, and opportunities with China perspective, IEEE Int. Things J. 1 (4) (2014) 349-359.

[5]

M. Shafi, A.F. Molisch, P.J. Smith, T. Haustein, P. Zhu, P. De Silva, F. Tufvesson, A. Benjebbour, G. Wunder, 5G: a tutorial overview of standards, trials, challenges, deployment, and practice, IEEE J. Sel. Areas Commun. 35 (6) (2017) 1201-1221.

[6]

B. Joshi, B. Joshi, A. Mishra, V. Arya, A.K. Gupta, D. Peraković, A comparative study of privacy-preserving homomorphic encryption techniques in cloud computing, Int. J. Cloud Appl. Comput. 12 (1) (2022) 1-11.

[7]

L. Lv, Z. Wu, L. Zhang, B.B. Gupta, Z. Tian, An edge-AI based forecasting approach for improving smart microgrid efficiency, IEEE Trans. Ind. Inform. 18 (11) (2022) 7946-7954.

[8]

W. Cao, W. Shen, Z. Zhang, J. Qin, Privacy-preserving healthcare monitoring for IoT devices under edge computing, Comput. Secur. 134 (2023) 103464.

[9]

J. Li, X. Zhang, B. Ma, M. Yang, C. Wang, Y. Liu, X. Cui, X. Yang, PRNU anonymous algorithm used for privacy protection in biometric authentication systems, Int. J. Semantic Web Inf. Syst. 19 (1) (2023) 1-19.

[10]

W. Shen, J. Yu, M. Yang, J. Hu, Efficient identity-based data integrity auditing with key-exposure resistance for cloud storage, IEEE Trans. Dependable Secure Comput. 20 (6) (2023) 4593-4606.

[11]

X. Ge, J. Yu, R. Hao, Privacy-preserving graph matching query supporting quick sub-graph extraction, IEEE Trans. Dependable Secure Comput. 21 (3) (2024) 1286-1300.

[12]

Y. Liang, J. Ma, Y. Miao, D. Kuang, X. Meng, R.H. Deng, Privacy-preserving bloom filter-based keyword search over large encrypted cloud data, IEEE Trans. Comput. 72 (11) (2023) 3086-3098.

[13]

D. Boneh, C.G. Di, R. Ostrovsky, G. Persiano, Public key encryption with keyword search, in: Advances in Cryptology-EUROCRYPT 2004, Springer Berlin Heidelberg, 2004, pp. 506-522.

[14]

Z. Xu, D. He, P. Vijayakumar, B.B. Gupta, J. Shen, Certificateless public auditing scheme with data privacy and dynamics in group user model of cloud-assisted med-ical WSNs, IEEE J. Biomed. Health Inform. 27 (5) (2023) 2334-2344.

[15]

X. Zhou, M. Luo, P. Vijayakumar, C. Peng, D. He, Efficient certificateless conditional privacy-preserving authentication for VANETs, IEEE Trans. Veh. Technol. 71 (7) (2022) 7863-7875.

[16]

D. Song, D. Wagner, A. Perrig,Practical techniques for searches on encrypted data, in: Proceeding 2000 IEEE Symposium on Security and Privacy, S&P 2000, IEEE, 2000, pp. 44-55.

[17]

Y. Miao, X. Liu, K.K.R. Choo, R.H. Deng, J. Li, H. Li, J. Ma, Privacy-preserving attribute-based keyword search in shared multi-owner setting, IEEE Trans. Depend-able Secure Comput. 18 (3) (2019) 1080-1094.

[18]

X. Zhang, C. Xu, H. Wang, Y. Zhang, S. Wang, Fs-peks: lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial Internet of things, IEEE Trans. Dependable Secure Comput. 18 (3) (2019) 1019-1032.

[19]

J. Wang, S.S. Chow, Omnes pro uno: practical multi-writer encrypted database,in:31st USENIX Security Symposium (USENIX Security 22), USENIX Association, 2022, pp. 2371-2388.

[20]

Z. Chen, J. Nie, Z. Li, W. Susilo, C. Ge, Geometric searchable encryption for privacy-preserving location-based services, IEEE Trans. Serv. Comput. 16 (4) (2023) 2672-2684.

[21]

Y. Miao, F. Li, X. Li, Z. Liu, J. Ning, H. Li, K.R.R. Choo, R.H. Deng, Time-controllable keyword search scheme with efficient revocation in mobile e-health cloud, IEEE Trans. Mob. Comput. 23 (5) (2024) 3650-3665.

[22]

D. He, M. Ma, S. Zeadally, N. Kumar, K. Liang, Certificateless public key authenti-cated encryption with keyword search for industrial Internet of things, IEEE Trans. Ind. Inform. 14 (8) (2018) 3618-3627.

[23]

M. Ma, D. He, N. Kumar, K.-K.R. Choo, J. Chen, Certificateless searchable public key encryption scheme for industrial Internet of things, IEEE Trans. Ind. Inform. 14 (2) (2017) 759-767.

[24]

L. Cheng, F. Meng, Certificateless public key authenticated searchable encryption with enhanced security model in IIoT applications, IEEE Int. Things J. 10 (2) (2022) 1391-1400.

[25]

D. Shiraly, N. Pakniat, M. Noroozi, Z. Eslami, Pairing-free certificateless authenti-cated encryption with keyword search, J. Syst. Archit. 124 (2022) 102390.

[26]

R. Chen, Y. Mu, G. Yang, F. Guo, X. Huang, X. Wang, Y. Wang, Server-aided public key encryption with keyword search, IEEE Trans. Inf. Forensics Secur. 11 (12) (2016) 2833-2842.

[27]

J. Wang, R. Zhang, J. Li, Y. Xiao, Owner-enabled secure authorized keyword search over encrypted data with flexible metadata, IEEE Trans. Inf. Forensics Secur. 17 (2022) 2746-2760.

[28]

Y. Zheng, P. Xu, W. Wang, T. Chen, W. Susilo, K. Liang, H. Jin, Deks: a secure cloud-based searchable service can make attackers pay,in: European Symposium on Research in Computer Security, 2022, pp. 86-104.

[29]

H. Li, Q. Huang, J. Huang, W. Susilo, Public-key authenticated encryption with key-word search supporting constant trapdoor generation and fast search, IEEE Trans. Inf. Forensics Secur. 18 (2023) 396-410.

[30]

N. Pakniat, D. Shiraly, Z. Eslami, Certificateless authenticated encryption with key-word search: enhanced security model and a concrete construction for industrial IoT, J. Inf. Secur. Appl. 53 (5) (2020) 102525.

[31]

M. Ma, D. He, M.K. Khan, J. Chen, Certificateless searchable public key encryption scheme for mobile healthcare system, Comput. Electr. Eng. 65 (2018) 413-424.

[32]

S.S. Al-Riyami, K.G. Paterson, Certificateless public key cryptography, in: Advances in Cryptology-ASIACRYPT 2003, Springer Berlin Heidelberg, 2003, pp. 452-473.

[33]

G. Mwitende, Y. Ye, I. Ali, F. Li, Certificateless authenticated key agreement for blockchain-based WBANs, J. Syst. Archit. 110 (2020) 101777.

[34]

M. Green, G. Ateniese,Identity-based proxy re-encryption, in:Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings 5, Springer, 2007, pp. 288-306.

[35]

J. Zhang, S. Su, H. Zhong, J. Cui, D. He, Identity-based broadcast proxy re-encryption for flexible data sharing in VANETs, IEEE Trans. Inf. Forensics Secur. 18 (2023) 4830-4842.

[36]

Z. Xu, M. Luo, P. Vijayakumar, C. Peng, L. Wang, Efficient certificateless designated verifier proxy signature scheme using UAV network for sustainable smart city, Sus-tain. Cities Soc. 80 (2022) 103771.

PDF

10

Accesses

0

Citation

Detail

Sections
Recommended

/