An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage

Libing Wu, Biwen Chen, Sherali Zeadally, Debiao He

Research output: Contribution to journalArticlepeer-review

31 Scopus citations


In the area of searchable encryption, the searchable public key encryption (SPE) is an attractive technique in secure cloud storage. SPE assures the data confidentiality without affecting the usage of the data stored in the cloud. Furthermore, compared with the symmetric searchable encryption, SPE does not require key distribution and management. We investigate the security of the searchable public key encryption based on the traditional Boneh’s framework. Although existing SPE schemes can enable users to search over encrypted data, most of these schemes are vulnerable to the file-injection attack and the insider keyword guessing attack. To mitigate these attacks, we propose an efficient and secure searchable public key encryption with privacy protection (SPE-PP). We then provide a concrete construction of SPE-PP that uses the Diffie–Hellman shared secret key, and we prove it can resist these attacks. Both the theoretical analysis and the experimental results show that our scheme achieves strong security along with high efficiency.

Original languageEnglish
Pages (from-to)7685-7696
Number of pages12
JournalSoft Computing
Issue number23
StatePublished - Dec 1 2018

Bibliographical note

Funding Information:
Acknowledgements We thank the anonymous reviewers for their valuable comments which helped us to improve the content and presentation of this paper. The work was supported in part by the National Natural Science Foundation of China under Grants 61472287, 61772377, 61501333 and 61572379, in part by the National Key Research and Development Program of China under Grant 2017YFB0802504 and in part by the Natural Science Foundation of Hubei Province of China under Grants 2015CFA068 and 2017CFA007.

Publisher Copyright:
© 2018, Springer-Verlag GmbH Germany, part of Springer Nature.


  • File-injection attack
  • Insider keyword guessing attack
  • Privacy
  • Searchable public key encryption
  • Secure cloud storage

ASJC Scopus subject areas

  • Software
  • Theoretical Computer Science
  • Geometry and Topology


Dive into the research topics of 'An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage'. Together they form a unique fingerprint.

Cite this