Huan Li , Lunzhi Deng , Yating Gu , Na Wang , Yanli Chen , Siwei Li
{"title":"A secure data sharing scheme based on searchable public key encryption for authorized multi-receiver","authors":"Huan Li , Lunzhi Deng , Yating Gu , Na Wang , Yanli Chen , Siwei Li","doi":"10.1016/j.sysarc.2025.103489","DOIUrl":null,"url":null,"abstract":"<div><div>To ensure data confidentiality, data sharers usually choose to encrypt the data before uploading it to cloud storage. Data sharing is an important way to realize the value of data. Therefore, how to share encrypted data stored in the cloud among authorized users is a pressing issue that needs to be addressed. Public key encryption schemes with keyword search provide an effective solution to this problem. In this paper, we first analyze Yang et al.’ scheme Yang et al. (2023), and point out that the scheme does not realize the indistinguishability of ciphertext and trapdoor. Then, we propose a new data sharing scheme with searchable public key encryption for authorized multi-receiver (SDS-SPKE), which not only realizes the search function, but also realizes the key update, user revocation. Additionally, we provide the security proofs of the scheme, which reveals that our scheme realizes the indistinguishability of ciphertext and trapdoor, and solves the problem of single-key-exposure. Finally, we compare the performance of SDS-SPKE with five other searchable encryption schemes, and the experimental results show that our scheme offers superior efficiency.</div></div>","PeriodicalId":50027,"journal":{"name":"Journal of Systems Architecture","volume":"167 ","pages":"Article 103489"},"PeriodicalIF":3.7000,"publicationDate":"2025-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Systems Architecture","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1383762125001614","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
To ensure data confidentiality, data sharers usually choose to encrypt the data before uploading it to cloud storage. Data sharing is an important way to realize the value of data. Therefore, how to share encrypted data stored in the cloud among authorized users is a pressing issue that needs to be addressed. Public key encryption schemes with keyword search provide an effective solution to this problem. In this paper, we first analyze Yang et al.’ scheme Yang et al. (2023), and point out that the scheme does not realize the indistinguishability of ciphertext and trapdoor. Then, we propose a new data sharing scheme with searchable public key encryption for authorized multi-receiver (SDS-SPKE), which not only realizes the search function, but also realizes the key update, user revocation. Additionally, we provide the security proofs of the scheme, which reveals that our scheme realizes the indistinguishability of ciphertext and trapdoor, and solves the problem of single-key-exposure. Finally, we compare the performance of SDS-SPKE with five other searchable encryption schemes, and the experimental results show that our scheme offers superior efficiency.
为了保证数据的保密性,数据共享者通常会选择将数据加密后再上传到云存储。数据共享是实现数据价值的重要途径。因此,如何在授权用户之间共享存储在云中的加密数据是一个迫切需要解决的问题。基于关键字搜索的公钥加密方案有效地解决了这一问题。本文首先分析了Yang et al.(2023)的方案Yang et al.(2023),指出该方案没有实现密文和活板门的不可区分性。在此基础上,提出了一种基于可搜索公钥加密的授权多接收方数据共享方案(SDS-SPKE),该方案不仅实现了密钥搜索功能,还实现了密钥更新、用户撤销等功能。此外,我们还提供了方案的安全性证明,表明我们的方案实现了密文和活板门的不可区分性,解决了单密钥暴露问题。最后,我们将SDS-SPKE与其他五种可搜索加密方案的性能进行了比较,实验结果表明我们的方案具有更高的效率。
期刊介绍:
The Journal of Systems Architecture: Embedded Software Design (JSA) is a journal covering all design and architectural aspects related to embedded systems and software. It ranges from the microarchitecture level via the system software level up to the application-specific architecture level. Aspects such as real-time systems, operating systems, FPGA programming, programming languages, communications (limited to analysis and the software stack), mobile systems, parallel and distributed architectures as well as additional subjects in the computer and system architecture area will fall within the scope of this journal. Technology will not be a main focus, but its use and relevance to particular designs will be. Case studies are welcome but must contribute more than just a design for a particular piece of software.
Design automation of such systems including methodologies, techniques and tools for their design as well as novel designs of software components fall within the scope of this journal. Novel applications that use embedded systems are also central in this journal. While hardware is not a part of this journal hardware/software co-design methods that consider interplay between software and hardware components with and emphasis on software are also relevant here.