{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:25:56Z","timestamp":1755800756993,"version":"3.41.0"},"reference-count":35,"publisher":"Wiley","issue":"18","license":[{"start":{"date-parts":[[2016,11,16]],"date-time":"2016-11-16T00:00:00Z","timestamp":1479254400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61300181","61502044"],"award-info":[{"award-number":["61300181","61502044"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2016,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Centralized approaches are widely adopted to improve the qualities of outsourced services owing to its feature of efficient system management. Because the cloud is untrusted, data are usually encrypted before outsourcing. One of the interesting applications is searchable encrypted keywords, a well\u2010known cryptographic primitive that allows encryption while enabling search for keywords. However, achieving data retrieval without revealing privacy in a cloud\u2010based centralized system is still a challenging problem. In this paper, we introduce centralized approaches to searchable encryption and present a novel centralized system for retrieval services. In our system, the centralized manager can search and access all the encrypted data from authorized users, while each user can only search and access his or her own data. The system builds on a new cryptographic notion called<jats:italic>centralized keyword search on encrypted data<\/jats:italic>. We formalize its security model and propose a centralized keyword search on encrypted data construction that is featured by short ciphertext and search result verification. We further extend the construction for removing secure channel and enabling batch authentication on data legalities. The experiment demonstrates the performance of our proposals. Copyright \u00a9 2016 John Wiley &amp; Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.1679","type":"journal-article","created":{"date-parts":[[2016,11,17]],"date-time":"2016-11-17T04:13:40Z","timestamp":1479356020000},"page":"5064-5084","source":"Crossref","is-referenced-by-count":4,"title":["Centralized keyword search on encrypted data for cloud applications"],"prefix":"10.1002","volume":"9","author":[{"given":"Peng","family":"Jiang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China"}]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[{"name":"Centre for Computer and Information Security Research, School of Computing and Information Technology University of Wollongong Wollongong Australia"}]},{"given":"Fuchun","family":"Guo","sequence":"additional","affiliation":[{"name":"Centre for Computer and Information Security Research, School of Computing and Information Technology University of Wollongong Wollongong Australia"}]},{"given":"Xiaofen","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering and Big Data Research Center University of Electronic Science and Technology of China Chengdu Sichuan 611731 China"}]},{"given":"Jianchang","family":"Lai","sequence":"additional","affiliation":[{"name":"Centre for Computer and Information Security Research, School of Computing and Information Technology University of Wollongong Wollongong Australia"}]}],"member":"311","published-online":{"date-parts":[[2016,11,16]]},"reference":[{"key":"e_1_2_12_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7437025"},{"key":"e_1_2_12_3_1","doi-asserted-by":"crossref","unstructured":"StefanovicC CrnojevicVS VukobratovicD NiccolaiL ChitiF FantacciR.Contaminated areas monitoring via distributed rateless coding with constrained data gathering.Proceedings of the 6th International Wireless Communications and Mobile Computing Conference IWCMC 2010 Caen France 2010;671\u2013675.","DOI":"10.1145\/1815396.1815550"},{"key":"e_1_2_12_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110110"},{"key":"e_1_2_12_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3067"},{"key":"e_1_2_12_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.06.011"},{"key":"e_1_2_12_7_1","unstructured":"Enterprise resource planning.https:\/\/www.oracle.com\/cloud\/saas.html?sckw=srch:Software\\_as\\_a\\_Service&SC=srch:Software\\_as\\_a\\_Service\\&mkwid=sheWecJ4v|pcrid|50106807535|pkw|software\\_asaservice|pmt|e|pdv|c[Accessed on March 15 2016]."},{"key":"e_1_2_12_8_1","unstructured":"SongDX WagnerD PerrigA.Practical techniques for searches on encrypted data.2000 IEEE Symposium on Security and Privacy Berkeley California USA May 14\u201017 2000;44\u201355."},{"key":"e_1_2_12_9_1","doi-asserted-by":"crossref","unstructured":"CurtmolaR GarayJA KamaraS OstrovskyR.Searchable symmetric encryption: improved definitions and efficient constructions.Proceedings of the 13th ACM Conference on Computer and Communications Security CCS 2006 Alexandria VA USA Ioctober 30\u2013November 3 2006;79\u201388.","DOI":"10.1145\/1180405.1180417"},{"key":"e_1_2_12_10_1","doi-asserted-by":"crossref","unstructured":"CashD GrubbsP PerryJ RistenpartT.Leakage\u2010abuse attacks against searchable encryption.Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security Denver CO USA October 12\u20106 2015;668\u2013679.","DOI":"10.1145\/2810103.2813700"},{"key":"e_1_2_12_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.47"},{"key":"e_1_2_12_12_1","unstructured":"BonehD CrescenzoGD OstrovskyR PersianoG.Public key encryption with keyword search. InAdvances in Cryptology\u2014EUROCRYPT 2004 International Conference on the Theory and Applications of Cryptographic Techniques Proceedings:Interlaken Switzerland May \u20106 2004;506\u2013522."},{"key":"e_1_2_12_13_1","unstructured":"AbdallaM BellareM CatalanoD KiltzE KohnoT LangeT Malone\u2010LeeJ NevenG PaillierP ShiH.Searchable encryption revisited: consistency properties relation to anonymous IBE and extensions.Advances in Cryptology\u2014CRYPTO 2005: 25th Annual International Cryptology Conference Proceedings Santa Barbara California USA August 14\u201018 2005;205\u2013222."},{"key":"e_1_2_12_14_1","unstructured":"WatersBR BalfanzD DurfeeG SmettersDK.Building an encrypted and searchable audit log.Proceedings of the Network and Distributed System Security Symposium NDSS 2004 San Diego California USA 2004."},{"key":"e_1_2_12_15_1","unstructured":"BethencourtJ ChanTH PerrigA ShiE SongD.Anonymous multiattribute encryption with range query and conditional decryption. Technical Report.Technical Report. CMU\u2010CS\u201006\u2010135 Proceeding of 2006 IEEE Symposium on Security and Privacy Berkeley California USA 2006."},{"key":"e_1_2_12_16_1","doi-asserted-by":"crossref","unstructured":"BonehD WatersB.Conjunctive subset and range queries on encrypted data. InTheory of Cryptography 4th Theory of Cryptography Conference TCC 2007 Proceedings:Amsterdam The Netherlands February 21\u201024 2007;535\u2013554.","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"e_1_2_12_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3754"},{"key":"e_1_2_12_18_1","doi-asserted-by":"crossref","unstructured":"IbraimiL NikovaS HartelPH JonkerW.Public\u2010key encryption with delegated search.Applied Cryptography and Network Security\u20149th International Conference ACNS 2011 Proceedings Nerja Spain June 7\u201010 2011;532\u2013549.","DOI":"10.1007\/978-3-642-21554-4_31"},{"key":"e_1_2_12_19_1","first-page":"654","article-title":"Refine the concept of public key encryption with delegated search","volume":"2012","author":"Tang Q","year":"2012","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_2_12_20_1","doi-asserted-by":"crossref","unstructured":"LiM YuS CaoN LouW.Authorized private keyword search over encrypted data in cloud computing.2011 International Conference on Distributed Computing Systems ICDCS 2011 Minneapolis Minnesota USA June 20\u201324 2011;383\u2013392.","DOI":"10.1109\/ICDCS.2011.55"},{"key":"e_1_2_12_21_1","doi-asserted-by":"crossref","unstructured":"BaekJ Safavi\u2010NainiR SusiloW.Public key encryption with keyword search revisited.Computational Science and Its Applications\u2014ICCSA 2008 International Conference Proceedings Part I Perugia Italy June 30\u2013July 3 2008;1249\u20131259.","DOI":"10.1007\/978-3-540-69839-5_96"},{"key":"e_1_2_12_22_1","doi-asserted-by":"crossref","unstructured":"RheeHS ParkJH SusiloW LeeDH.Improved searchable public key encryption with designated tester.Proceedings of the 2009 ACM Symposium on Information Computer and Communications Security ASIACCS 2009 Sydney Australia March 10\u201312 2009;376\u2013379.","DOI":"10.1145\/1533057.1533108"},{"key":"e_1_2_12_23_1","doi-asserted-by":"publisher","DOI":"10.1587\/elex.6.237"},{"key":"e_1_2_12_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.03.008"},{"key":"e_1_2_12_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2401003"},{"key":"e_1_2_12_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.282"},{"key":"e_1_2_12_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2016.05.017"},{"key":"e_1_2_12_28_1","doi-asserted-by":"crossref","unstructured":"ShiJ LaiJ LiY DengRH WengJ.Authorized keyword search on encrypted data.Computer Security\u2014ESORICS 2014\u201419th European Symposium on Research in Computer Security Proceedings Part I Wroclaw Poland September 7\u201311 2014;419\u2013435.","DOI":"10.1007\/978-3-319-11203-9_24"},{"key":"e_1_2_12_29_1","doi-asserted-by":"crossref","unstructured":"ZhengQ XuS AtenieseG.VABKS: verifiable attribute\u2010based keyword search over outsourced encrypted data.2014 IEEE Conference on Computer Communications INFOCOM 2014 Toronto Canada April 27\u2013May 2 2014;522\u2013530.","DOI":"10.1109\/INFOCOM.2014.6847976"},{"key":"e_1_2_12_30_1","doi-asserted-by":"crossref","unstructured":"LvZ ZhangM FengD.Multi\u2010user searchable encryption with efficient access control for cloud storageUnknown Month December 15;366\u2013373.","DOI":"10.1109\/CloudCom.2014.45"},{"key":"e_1_2_12_31_1","doi-asserted-by":"crossref","unstructured":"LvZ HongC ZhangM FengD.Expressive and secure searchable encryption in the public key setting.Information Security\u201417th International Conference ISC 2014 Proceedings Hong Kong China October 12\u2013142014;364\u2013376.","DOI":"10.1007\/978-3-319-13257-0_21"},{"key":"e_1_2_12_32_1","doi-asserted-by":"crossref","unstructured":"ZhaoF NishideT SakuraiK.Multi\u2010user keyword search scheme for secure data sharing with fine\u2010grained access control.Information Security and Cryptology\u2014ICISC 2011\u201414th International Conference Revised Selected Papers Seoul Korea November 30\u2013 December 2 2011;406\u2013418.","DOI":"10.1007\/978-3-642-31912-9_27"},{"key":"e_1_2_12_33_1","doi-asserted-by":"crossref","unstructured":"BonehD FranklinMK.Identity\u2010based encryption from the weil pairing.Advances in Cryptology\u2014CRYPTO 2001 21st Annual International Cryptology Conference Proceedings Santa Barbara California USA August 19\u201323 2011;213\u2013229.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"e_1_2_12_34_1","doi-asserted-by":"crossref","unstructured":"BonehD BoyenX.Efficient selective\u2010ID secure identity\u2010based encryption without random oracles.Advances in Cryptology\u2014EUROCRYPT 2004 International Conference on the Theory and Applications of Cryptographic Techniques Proceedings Interlaken Switzerland May 2\u20136 2004;223\u2013238.","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"e_1_2_12_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-003-0052-4"},{"key":"e_1_2_12_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2012.08.017"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1679","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1679","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.1679","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T17:49:30Z","timestamp":1749750570000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.1679"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,16]]},"references-count":35,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["10.1002\/sec.1679"],"URL":"https:\/\/doi.org\/10.1002\/sec.1679","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2016,11,16]]}}}