An improved secure designated server certificateless authenticated searchable encryption scheme for IIoT

Le Zhang , Feng Zhou , Qijia Zhang , Wei Xiong , Youliang Tian

High-Confidence Computing ›› 2025, Vol. 5 ›› Issue (3) : 100301

PDF (1140KB)
High-Confidence Computing ›› 2025, Vol. 5 ›› Issue (3) : 100301 DOI: 10.1016/j.hcc.2025.100301
Research Articles
research-article

An improved secure designated server certificateless authenticated searchable encryption scheme for IIoT

Author information +
History +
PDF (1140KB)

Abstract

The Industrial Internet of Things (IIoT) achieves the automation, monitoring, and optimization of industrial processes by interconnecting various sensors, smart devices, and the Internet, which dramatically increases productivity and product quality. Nevertheless, the IIoT comprises a substantial amount of sensitive data, which requires encryption to ensure data privacy and security. Recently, Sun et al. proposed a certificateless searchable encryption scheme for IIoT to enable the retrieval of ciphertext data while protecting data privacy. However, we found that their scheme not only fails to satisfy trapdoor indistinguishability but also lacks defense against keyword guessing attacks. In addition, some schemes use deterministic algorithms in the encryption process, resulting in the same ciphertexts after encryption for the same keyword, thereby leaking the potential frequency distribution of the keyword in the ciphertext space, thereby leaking the potential frequency distribution of the keyword in the ciphertext space, allowing attackers to infer the plaintext information corresponding to the ciphertext through statistical analysis. To better protect data privacy, we propose an improved certificateless searchable encryption scheme with a designated server. With security analysis, we prove that our scheme provides multi-ciphertext indistinguishability and multi-trapdoor indistinguishability security under the random oracle. Experimental results show that the proposed scheme has good overall performance in terms of computational overhead, communication overhead, and security features.

Keywords

Industrial Internet of Things / Searchable encryption / Indistinguishability / guessing attacks / Random oracle

Cite this article

Download citation ▾
Le Zhang, Feng Zhou, Qijia Zhang, Wei Xiong, Youliang Tian. An improved secure designated server certificateless authenticated searchable encryption scheme for IIoT. High-Confidence Computing, 2025, 5(3): 100301 DOI:10.1016/j.hcc.2025.100301

登录浏览全文

4963

注册一个新账户 忘记密码

CRediT authorship contribution statement

Le Zhang: Writing - original draft, Conceptualization. Feng Zhou: Supervision. Qijia Zhang: Supervision. Wei Xiong: Supervision. Youliang Tian: Supervision.

Declaration of competing interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Acknowledgments

This work was supported by National Key Research and Development Program of China (2021YFB3101100), National Natural Science Foundation of China (62272123), Project of High-level Innovative Talents of Guizhou Province, China ([2020]6008), Science and Technology Program of Guiyang, China ([2022]2-4) and Science and Technology Program of Guizhou Province, China ([2022]065 and [2022]ZD001).

References

[1]

K. Ashton, et al., That ‘internet of things’ thing, RFID J. 22 (7) (2009) 97-114.

[2]

E. Sisinni, A. Saifullah, S. Han, U. Jennehag, M. Gidlund, Industrial internet of things: Challenges, opportunities, and directions, IEEE Trans. Ind. Inform. 14 (11) (2018) 4724-4734.

[3]

I.A.T. Hashem, I. Yaqoob, N.B. Anuar, S. Mokhtar, A. Gani, S.U. Khan, The rise of "big data" on cloud computing: Review and open research issues, Inf. Syst. 47 (2015) 98-115.

[4]

K.-K.R. Choo, Cloud computing: Challenges and future directions, Trends Issues Crime Crim. Justice (400) (2010) 1-6.

[5]

A. Shahidinejad, F. Farahbakhsh, M. Ghobaei-Arani, M.H. Malik, T. Anwar, Context-aware multi-user offloading in mobile edge computing: a federated learning-based approach, J. Grid Comput. 19 (2) (2021) 18.

[6]

R. Aghazadeh, A. Shahidinejad, M. Ghobaei-Arani, Proactive content caching in edge computing environment: A review, Softw. Pr. Exp. 53 (3) (2023) 811-855.

[7]

A.-R. Sadeghi, C. Wachsmann, M. Waidner, Security and privacy challenges in industrial internet of things, in:Proceedings of the 52nd Annual Design Automation Conference, 2015, pp. 1-6.

[8]

K.-K.R. Choo, Cloud computing: Challenges and future directions, Trends Issues Crime Crim. Justice (400) (2010) 1-6.

[9]

K.-K.R. Choo, S. Gritzalis, J.H. Park, Cryptographic solutions for industrial Internet-of-Things: Research challenges and opportunities, IEEE Trans. Ind. Inform. 14 (8) (2018) 3567-3569.

[10]

D.X. Song, D. Wagner, A. Perrig, Practical techniques for searches on encrypted data, in: Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, IEEE, 2000, pp. 44-55.

[11]

D. Boneh, G. Di Crescenzo, R. Ostrovsky, G. Persiano, Public key encryption with keyword search, in:Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2- 6, 2004. Proceedings 23, Springer, 2004, pp. 506-522.

[12]

J. Tian, Y. Lu, J. Li, Lightweight searchable and equality-testable certificateless authenticated encryption for encrypted cloud data, IEEE Trans. Mob. Comput. (2024).

[13]

W. Long, J. Zeng, Y. Wu, Y. Gao, H. Zhang, A certificateless verifiable bilinear pair-free conjunctive keyword search encryption scheme for IoMT, Electronics 13 (8) (2024) 1449.

[14]

S. Ghosh, S.H. Islam, A.V. Vasilakos, Private blockchain-assisted certificate-less public key encryption with multi-keyword search for fog-based IIoT environments, IEEE Internet Things J. (2024).

[15]

D. He, M. Ma, S. Zeadally, N. Kumar, K. Liang, Certificateless public key authenticated encryption with keyword search for industrial internet of things, IEEE Trans. Ind. Informatics 14 (8) (2017) 3618-3627.

[16]

Y. Lu, J. Li, Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems, Clust. Comput. 22 (2019) 285-299.

[17]

L. Sun, C. Xu, X. Zhang, F. Zeng, Certificateless searchable encryption with trapdoor unlinkability for industrial internet of things, IEEE Syst. J. (2023).

[18]

L. Cheng, F. Meng, Certificateless public key authenticated searchable encryption with enhanced security model in IIoT applications, IEEE Internet Things J. 10 (2) (2022) 1391-1400.

[19]

J. Baek, R. Safavi-Naini, W. Susilo, Public key encryption with keyword search revisited, in:Computational Science and Its Applications-ICCSA 2008: International Conference, Perugia, Italy, June 30-July 3, 2008, Proceedings, Part I 8, Springer, 2008, pp. 1249-1259.

[20]

L. Fang, W. Susilo, C. Ge, J. Wang, Public key encryption with keyword search secure against keyword guessing attacks without random oracle, Inform. Sci. 238 (2013) 221-241.

[21]

R. Chen, Y. Mu, G. Yang, F. Guo, X. Huang, X. Wang, Y. Wang, Serveraided public key encryption with keyword search, IEEE Trans. Inf. Forensics Secur. 11 (12) (2016) 2833-2842.

[22]

H. Cui, Z. Wan, R.H. Deng, G. Wang, Y. Li, Efficient and expressive keyword search over encrypted data in cloud, IEEE Trans. Dependable Secur. Comput. 15 (3) (2016) 409-422.

[23]

B. Zhang, F. Zhang, An efficient public key encryption with conjunctive-subset keywords search, J. Netw. Comput. Appl. 34 (1) (2011) 262-267.

[24]

M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, H. Shi, Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions, in: Advances in Cryptology-CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings 25, Springer, 2005, pp. 205-222.

[25]

P. Yanguo, C. Jiangtao, P. Changgen, Y. Zuobin, Certificateless public key encryption with keyword search, China Commun. 11 (11) (2014) 100-113.

[26]

J.W. Byun, H.S. Rhee, H.-A. Park, D.H. Lee, Off-line keyword guessing attacks on recent keyword search schemes over encrypted data, in: Workshop on Secure Data Management, Springer, 2006, pp. 75-83.

[27]

H.S. Rhee, J.H. Park, W. Susilo, D.H. Lee, Trapdoor security in a searchable public-key encryption scheme with a designated tester, J. Syst. Softw. 83 (5) (2010) 763-771.

[28]

R. Chen, Y. Mu, G. Yang, F. Guo, X. Wang, Dual-server public-key encryption with keyword search for secure cloud storage, IEEE Trans. Inf. Forensics Secur. 11 (4) (2015) 789-798.

[29]

Q. Huang, H. Li, An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks, Inform. Sci. 403 (2017) 1-14.

[30]

H. Li, Q. Huang, J. Shen, G. Yang, W. Susilo, Designated-server identity-based authenticated encryption with keyword search for encrypted emails, Inform. Sci. 481 (2019) 330-343.

[31]

B. Chen, L. Wu, S. Zeadally, D. He, Dual-server public-key authenticated encryption with keyword search, IEEE Trans. Cloud Comput. 10 (1) (2019) 322-333.

[32]

M. Noroozi, Z. Eslami, Public key authenticated encryption with keyword search: revisited, IET Inf. Secur. 13 (4) (2019) 336-342.

[33]

B. Qin, Y. Chen, Q. Huang, X. Liu, D. Zheng, Public-key authenticated encryption with keyword search revisited: Security model and constructions, Inform. Sci. 516 (2020) 515-528.

[34]

J. Guo, L. Han, G. Yang, X. Liu, C. Tian, An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability, J. Cloud Comput. 11 (1) (2022) 1-12.

[35]

G. Yang, J. Guo, L. Han, X. Liu, C. Tian, An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy, in: Peer-to-Peer Networking and Applications, Springer, 2022, pp. 1-13.

[36]

L. Cheng, J. Qin, F. Meng, Privacy leakage of certificateless public key authenticated searchable encryption via frequency analysis: Attacks and revises, Comput. Stand. Interfaces 87 (2024) 103762.

[37]

Z. Cao, F. Zhang, Pairing-based Cryptography-pairing 2013, Springer, 2014.

AI Summary AI Mindmap
PDF (1140KB)

317

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/