{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T18:09:57Z","timestamp":1775326197965,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,5,26]],"date-time":"2024-05-26T00:00:00Z","timestamp":1716681600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,5,26]],"date-time":"2024-05-26T00:00:00Z","timestamp":1716681600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>With the rapid development of cloud computing technology, cloud storage services are becoming more and more mature. However, the storage of sensitive data on remote servers poses privacy risks and is presently a source of concern. Searchable Encryption (SE) is an effective method for protecting sensitive data while preserving server-side searchability. Hierarchical Public key Encryption with Keyword Search (HPEKS), a new variant of SE, allows users with higher access permission to search over encrypted data sent to lower-level users. To the best of our knowledge, there exist only four HPEKS schemes in the literature. Two of them are in traditional public-key setting, and the remaining ones are identity-based public key cryptosystems. Unfortunately, all of the four existing HPEKS schemes are vulnerable against inside Keyword Guessing Attacks (KGAs). Moreover, all of the existing HPEKS schemes are based on the computationally expensive bilinear pairing operation which dramatically increases the computational costs. To overcome these issues, in this paper, we introduce the notion of Hierarchical Identity-Based Authenticated Encryption with Keyword Search (HIBAEKS). We formulate a security model for HIBAEKS and propose an efficient pairing-free HIBAEKS scheme. We then prove that the proposed HIBAEKS scheme is secure under the defined security model and is resistant against KGAs. Finally, we compare our proposed scheme with related constructions regarding security requirements, computational and communication costs to indicate the overall superiority of our proposed scheme.<\/jats:p>","DOI":"10.1186\/s13677-024-00633-9","type":"journal-article","created":{"date-parts":[[2024,5,26]],"date-time":"2024-05-26T22:02:48Z","timestamp":1716760968000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data"],"prefix":"10.1186","volume":"13","author":[{"given":"Danial","family":"Shiraly","sequence":"first","affiliation":[]},{"given":"Ziba","family":"Eslami","sequence":"additional","affiliation":[]},{"given":"Nasrollah","family":"Pakniat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,26]]},"reference":[{"key":"633_CR1","doi-asserted-by":"crossref","unstructured":"Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy. S &P 2000. IEEE, Berkeley, CA, USA, pp 44\u201355","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"633_CR2","doi-asserted-by":"crossref","unstructured":"Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, Interlaken, Switzerland, pp 506\u2013522","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"633_CR3","doi-asserted-by":"crossref","unstructured":"Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In: International conference on Computational Science and Its Applications. Springer, Perugia, Italy, pp 1249\u20131259","DOI":"10.1007\/978-3-540-69839-5_96"},{"key":"633_CR4","doi-asserted-by":"crossref","unstructured":"Byun JW, Rhee HS, Park HA, Lee DH (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Workshop on Secure Data Management. Springer,  Seoul, Korea, pp 75\u201383","DOI":"10.1007\/11844662_6"},{"issue":"5","key":"633_CR5","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1016\/j.jss.2009.11.726","volume":"83","author":"HS Rhee","year":"2010","unstructured":"Rhee HS, Park JH, Susilo W, Lee DH (2010) Trapdoor security in a searchable public-key encryption scheme with a designated tester. J Syst Softw 83(5):763\u2013771","journal-title":"J Syst Softw"},{"issue":"3","key":"633_CR6","doi-asserted-by":"publisher","first-page":"716","DOI":"10.4304\/jcp.7.3.716-723","volume":"7","author":"C Hu","year":"2012","unstructured":"Hu C, Liu P (2012) An Enhanced Searchable Public Key Encryption Scheme with a Designated Tester and Its Extensions. J Comput 7(3):716\u2013723","journal-title":"J Comput"},{"issue":"9","key":"633_CR7","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/s12243-017-0571-x","volume":"72","author":"Z Li","year":"2017","unstructured":"Li Z, Zhao M, Jiang H, Xu Q (2017) Multi-user searchable encryption with a designated server. Ann Telecommun 72(9):617\u2013629","journal-title":"Ann Telecommun"},{"issue":"3","key":"633_CR8","doi-asserted-by":"publisher","first-page":"1601","DOI":"10.1007\/s11071-015-1965-9","volume":"80","author":"CT Li","year":"2015","unstructured":"Li CT, Lee CW, Shen JJ (2015) An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services. Nonlinear Dyn 80(3):1601\u20131611","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"633_CR9","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.1007\/s11071-018-4413-9","volume":"94","author":"M Noroozi","year":"2018","unstructured":"Noroozi M, Eslami Z, Pakniat N (2018) Comments on a chaos-based public key encryption with keyword search scheme. Nonlinear Dyn 94(2):1127\u20131132","journal-title":"Nonlinear Dyn"},{"key":"633_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2017.03.038","volume":"403","author":"Q Huang","year":"2017","unstructured":"Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci 403:1\u201314","journal-title":"Inf Sci"},{"issue":"4","key":"633_CR11","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1049\/iet-ifs.2018.5315","volume":"13","author":"M Noroozi","year":"2018","unstructured":"Noroozi M, Eslami Z (2018) Public key authenticated encryption with keyword search: revisited. IET Inf Secur 13(4):336\u2013342","journal-title":"IET Inf Secur"},{"key":"633_CR12","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1016\/j.ins.2019.12.063","volume":"516","author":"B Qin","year":"2020","unstructured":"Qin B, Chen Y, Huang Q, Liu X, Zheng D (2020) Public-key authenticated encryption with keyword search revisited: security model and constructions. Inf Sci 516:515\u2013528","journal-title":"Inf Sci"},{"key":"633_CR13","doi-asserted-by":"crossref","unstructured":"Liu X, He K, Yang G, Susilo W, Tonien J, Huang Q (2021) Broadcast Authenticated Encryption with Keyword Search. In: Australasian Conference on Information Security and Privacy. Springer, Virtual Event, pp 193\u2013213","DOI":"10.1007\/978-3-030-90567-5_10"},{"key":"633_CR14","doi-asserted-by":"publisher","first-page":"151245","DOI":"10.1109\/ACCESS.2021.3126867","volume":"9","author":"L Han","year":"2021","unstructured":"Han L, Guo J, Yang G, Xie Q, Tian C (2021) An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time. IEEE Access 9:151245\u2013151253","journal-title":"IEEE Access"},{"key":"633_CR15","doi-asserted-by":"publisher","first-page":"102075","DOI":"10.1016\/j.sysarc.2021.102075","volume":"115","author":"X Pan","year":"2021","unstructured":"Pan X, Li F (2021) Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability. J Syst Archit 115:102075","journal-title":"J Syst Archit"},{"key":"633_CR16","doi-asserted-by":"crossref","unstructured":"Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H (2005) Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. In: Annual international cryptology conference. Springer, Santa Barbara, California, USA,  pp 205\u2013222","DOI":"10.1007\/11535218_13"},{"key":"633_CR17","doi-asserted-by":"crossref","unstructured":"Tomida K, Mohri M, Shiraishi Y (2014) Keyword searchable encryption with access control from a certain identity-based encryption. In: Future Information Technology. Springer  Berlin, Heidelberg, pp 113\u2013118","DOI":"10.1007\/978-3-642-40861-8_17"},{"issue":"10","key":"633_CR18","doi-asserted-by":"publisher","first-page":"2599","DOI":"10.1007\/s00500-015-1960-6","volume":"21","author":"J Liu","year":"2017","unstructured":"Liu J, Lai J, Huang X (2017) Dual trapdoor identity-based encryption with keyword search. Soft Comput 21(10):2599\u20132607","journal-title":"Soft Comput"},{"issue":"7","key":"633_CR19","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s12243-013-0398-z","volume":"69","author":"TY Wu","year":"2014","unstructured":"Wu TY, Tsai TT, Tseng YM (2014) Efficient searchable ID-based encryption with a designated server. Ann Telecommun - Ann T\u00e9l\u00e9commun 69(7):391\u2013402","journal-title":"Ann Telecommun - Ann T\u00e9l\u00e9commun"},{"issue":"5","key":"633_CR20","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s12243-017-0574-7","volume":"72","author":"Y Lu","year":"2017","unstructured":"Lu Y, Wang G, Li J, Shen J (2017) Efficient designated server identity-based encryption with conjunctive keyword search. Ann Telecommun 72(5):359\u2013370","journal-title":"Ann Telecommun"},{"issue":"5","key":"633_CR21","doi-asserted-by":"publisher","first-page":"1012","DOI":"10.1007\/s11390-016-1676-9","volume":"31","author":"XF Wang","year":"2016","unstructured":"Wang XF, Mu Y, Chen R, Zhang XS (2016) Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group. J Comput Sci Technol 31(5):1012\u20131027","journal-title":"J Comput Sci Technol"},{"issue":"11","key":"633_CR22","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1007\/s12243-018-0653-4","volume":"73","author":"M Noroozi","year":"2018","unstructured":"Noroozi M, Karoubi I, Eslami Z (2018) Designing a secure designated server identity-based encryption with keyword search scheme: still unsolved. Ann Telecommun 73(11):769\u2013776","journal-title":"Ann Telecommun"},{"key":"633_CR23","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1016\/j.ins.2019.01.004","volume":"481","author":"H Li","year":"2019","unstructured":"Li H, Huang Q, Shen J, Yang G, Susilo W (2019) Designated-server identity-based authenticated encryption with keyword search for encrypted emails. Inf Sci 481:330\u2013343","journal-title":"Inf Sci"},{"key":"633_CR24","first-page":"102652","volume":"55","author":"M Ma","year":"2020","unstructured":"Ma M, Fan S, Feng D (2020) Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine. J Inf Secur Appl 55:102652","journal-title":"J Inf Secur Appl"},{"issue":"1","key":"633_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-022-00283-9","volume":"11","author":"N Yang","year":"2022","unstructured":"Yang N, Zhou Q, Huang Q, Tang C (2022) Multi-recipient encryption with keyword search without pairing for cloud storage. J Cloud Comput 11(1):1\u201312","journal-title":"J Cloud Comput"},{"key":"633_CR26","first-page":"102394","volume":"49","author":"N Pakniat","year":"2019","unstructured":"Pakniat N (2019) Designated tester certificateless encryption with keyword search. J Inf Secur Appl 49:102394","journal-title":"J Inf Secur Appl"},{"issue":"1","key":"633_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-022-00287-5","volume":"11","author":"J Guo","year":"2022","unstructured":"Guo J, Han L, Yang G, Liu X, Tian C (2022) An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability. J Cloud Comput 11(1):1\u201312","journal-title":"J Cloud Comput"},{"issue":"1","key":"633_CR28","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s10586-018-2855-y","volume":"22","author":"Y Lu","year":"2019","unstructured":"Lu Y, Li J (2019) Efficient searchable public key encryption against keyword guessing attacks for cloud-based EMR systems. Clust Comput 22(1):285\u2013299","journal-title":"Clust Comput"},{"issue":"1","key":"633_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-023-00451-5","volume":"12","author":"Y Sun","year":"2023","unstructured":"Sun Y, Han L, Bi J, Tan X, Xie Q (2023) Verifiable attribute-based keyword search scheme over encrypted data for personal health records in cloud. J Cloud Comput 12(1):1\u201313","journal-title":"J Cloud Comput"},{"key":"633_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-014-0008-2","volume":"3","author":"Z Xia","year":"2014","unstructured":"Xia Z, Zhu Y, Sun X, Chen L (2014) Secure semantic expansion based search over encrypted cloud data supporting similarity ranking. J Cloud Comput 3:1\u201311","journal-title":"J Cloud Comput"},{"key":"633_CR31","first-page":"102525","volume":"53","author":"N Pakniat","year":"2020","unstructured":"Pakniat N, Shiraly D, Eslami Z (2020) Certificateless authenticated encryption with keyword search: Enhanced security model and a concrete construction for industrial IoT. J Inf Secur Appl 53:102525","journal-title":"J Inf Secur Appl"},{"issue":"9","key":"633_CR32","doi-asserted-by":"publisher","first-page":"8663","DOI":"10.1007\/s12652-020-02621-8","volume":"12","author":"T Shahien","year":"2021","unstructured":"Shahien T, Sarhan AM, Alshewimy MA (2021) Multi-server searchable data crypt: searchable data encryption scheme for secure distributed cloud storage. J Ambient Intell Humanized Comput 12(9):8663\u20138681","journal-title":"J Ambient Intell Humanized Comput"},{"key":"633_CR33","doi-asserted-by":"crossref","unstructured":"Wang X, Zhang X, Mu Y (2015) Hierarchical ID-based searchable encryption with constant size ciphertext in cloud. In: 2015 IEEE International Conference on Smart City\/SocialCom\/SustainCom (SmartCity). IEEE, Chengdu, China, pp 1024\u20131031","DOI":"10.1109\/SmartCity.2015.204"},{"issue":"3","key":"633_CR34","doi-asserted-by":"publisher","first-page":"1532","DOI":"10.1109\/TDSC.2020.3027611","volume":"19","author":"H Li","year":"2020","unstructured":"Li H, Huang Q (2020) Susilo W (2020) A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search. IEEE Trans Dependable Secure Comput 19(3):1532\u20131543","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"13","key":"633_CR35","doi-asserted-by":"publisher","first-page":"11017","DOI":"10.1109\/JIOT.2021.3126468","volume":"9","author":"T Liu","year":"2021","unstructured":"Liu T, Miao Y, Choo KKR, Li H, Liu X, Meng X (2021) Deng RH (2021) Time-Controlled Hierarchical Multi-keyword Search over Encrypted Data in Cloud-Assisted IoT. IEEE Internet Things J 9(13):11017\u201311029","journal-title":"IEEE Internet Things J"},{"issue":"11","key":"633_CR36","doi-asserted-by":"publisher","first-page":"2401","DOI":"10.1109\/TIFS.2016.2573770","volume":"11","author":"X Liu","year":"2016","unstructured":"Liu X, Deng RH, Choo KKR, Weng J (2016) An efficient privacy-preserving outsourced calculation toolkit with multiple keys. IEEE Trans Inf Forensic Secur 11(11):2401\u20132414","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"3","key":"633_CR37","first-page":"1","volume":"15","author":"D Shiraly","year":"2023","unstructured":"Shiraly D, Pakniat N, Eslami Z (2023) Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting. ISeCure 15(3):1\u201316","journal-title":"ISeCure"},{"key":"633_CR38","doi-asserted-by":"crossref","unstructured":"Fuhr T, Paillier P (2007) Decryptable searchable encryption. In: International Conference on Provable Security. Springer, Wollongong, Australia,  pp 228\u2013236","DOI":"10.1007\/978-3-540-75670-5_17"},{"issue":"4","key":"633_CR39","doi-asserted-by":"publisher","first-page":"2696","DOI":"10.1109\/TII.2020.3006474","volume":"17","author":"Y Lu","year":"2020","unstructured":"Lu Y, Li J, Wang F (2020) Pairing-free certificate-based searchable encryption supporting privacy-preserving keyword search function for IIoTs. IEEE Trans Ind Inform 17(4):2696\u20132706","journal-title":"IEEE Trans Ind Inform"},{"key":"633_CR40","unstructured":"MIRACL Ltd (2012) MIRACL cryptographic SDK: Multiprecision integer and rational arithmetic cryptographic library, version 7.0.0. https:\/\/github.com\/miracl\/MIRACL. Accessed Jun 2012"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00633-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-024-00633-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00633-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,26]],"date-time":"2024-05-26T22:03:16Z","timestamp":1716760996000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-024-00633-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,26]]},"references-count":40,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["633"],"URL":"https:\/\/doi.org\/10.1186\/s13677-024-00633-9","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,26]]},"assertion":[{"value":"18 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 May 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"112"}}