{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T04:57:46Z","timestamp":1770353866183,"version":"3.49.0"},"reference-count":35,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T00:00:00Z","timestamp":1684108800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Minister of Science and Technology, Taiwan","award":["MOST 111-2221-E-002-134-MY3"],"award-info":[{"award-number":["MOST 111-2221-E-002-134-MY3"]}]},{"name":"Minister of Science and Technology, Taiwan","award":["TSMC: 112H1002-D"],"award-info":[{"award-number":["TSMC: 112H1002-D"]}]},{"name":"Taiwan Semiconductor Manufacturing Company","award":["MOST 111-2221-E-002-134-MY3"],"award-info":[{"award-number":["MOST 111-2221-E-002-134-MY3"]}]},{"name":"Taiwan Semiconductor Manufacturing Company","award":["TSMC: 112H1002-D"],"award-info":[{"award-number":["TSMC: 112H1002-D"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Currently, cloud computing has become increasingly popular and thus, many people and institutions choose to put their data into the cloud instead of local environments. Given the massive amount of data and the fidelity of cloud servers, adequate security protection and efficient retrieval mechanisms for stored data have become critical problems. Attribute-based encryption brings the ability of fine-grained access control and can achieve a direct encrypted data search while being combined with searchable encryption algorithms. However, most existing schemes only support single-keyword or provide no ranking searching results, which could be inflexible and inefficient in satisfying the real world\u2019s actual needs. We propose a flexible multi-keyword ranked searchable attribute-based scheme using search trees to overcome the above-mentioned problems, allowing users to combine their fuzzy searching keywords with AND\u2013OR logic gates. Moreover, our enhanced scheme not only improves its privacy protection but also goes a step further to apply a semantic search to boost the flexibility and the searching experience of users. With the proposed index-table method and the tree-based searching algorithm, we proved the efficiency and security of our schemes through a series of analyses and experiments.<\/jats:p>","DOI":"10.3390\/cryptography7020028","type":"journal-article","created":{"date-parts":[[2023,5,16]],"date-time":"2023-05-16T02:27:04Z","timestamp":1684204024000},"page":"28","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Flexible and Efficient Multi-Keyword Ranked Searchable Attribute-Based Encryption Schemes"],"prefix":"10.3390","volume":"7","author":[{"given":"Je-Kuan","family":"Lin","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Taiwan University, Taipei City 10617, Taiwan"}]},{"given":"Wun-Ting","family":"Lin","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Taiwan University, Taipei City 10617, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3631-1551","authenticated-orcid":false,"given":"Ja-Ling","family":"Wu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Taiwan University, Taipei City 10617, Taiwan"},{"name":"Graduate Institute of Networking and Multimedia, National Taiwan University, Taipei City 10617, Taiwan"}]}],"member":"1968","published-online":{"date-parts":[[2023,5,15]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Saxena, A., Shinghal, K., Misra, R., and Agarwal, A. (2019, January 18\u201319). Automated Enhanced Learning System using IoT. Proceedings of the 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), Ghaziabad, India.","DOI":"10.1109\/IoT-SIU.2019.8777711"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Korupolu, M., Jannabhatla, S., Kommineni, V.S., Kalyanam, H., and Vasantham, V. (2021, January 19\u201320). Video Streaming Platform Using Distributed Environment in Cloud Platform. Proceedings of the 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India.","DOI":"10.1109\/ICACCS51430.2021.9441742"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1109\/JIOT.2021.3109440","article-title":"A Survey of Public-Key Encryption with Search Functionality for Cloud-Assisted IoT","volume":"9","author":"Xiong","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., and Waters, B. (2007, January 20\u201323). Ciphertext-Policy Attribute-Based Encryption. Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP\u201907), Berkeley, CA, USA.","DOI":"10.1109\/SP.2007.11"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"89866","DOI":"10.1109\/ACCESS.2020.2993688","article-title":"How to Hide the Real Receiver Under the Cover Receiver: CP-ABE with Policy Deniability","volume":"8","author":"Chi","year":"2020","journal-title":"IEEE Access"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1109\/TIFS.2014.2382297","article-title":"Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption","volume":"10","author":"Han","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1767","DOI":"10.1109\/JSYST.2017.2667679","article-title":"User Collusion Avoidance CP-ABE with Efficient Attribute Revocation for Cloud Storage","volume":"12","author":"Li","year":"2017","journal-title":"IEEE Syst. J."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Moffat, S., Hammoudeh, M., and Hegarty, R. (2017, January 19\u201320). A Survey on Ciphertext-Policy Attribute-based Encryption (CP-ABE) Approaches to Data Security on Mobile Devices and its Application to IoT. Proceedings of the ICFNDS\u201917: Proceedings of the International Conference on Future Networks and Distributed Systems, Cambridge, UK.","DOI":"10.1145\/3102304.3102338"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Yahiatene, Y., Menacer, D.E., Riahla, M.A., Rachedi, A., and Tebibel, T.B. (2019, January 15\u201318). Towards a distributed ABE based approach to protect privacy on online social networks. Proceedings of the 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco.","DOI":"10.1109\/WCNC.2019.8886021"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Fu, Z., Shu, J., Sun, X., and Zhang, D. (2014, January 3). Semantic keyword search based on tree over encrypted cloud data. Proceedings of the SCC\u201914\u2014Proceedings of the 2nd International Workshop on Security in Cloud Computing, Kyoto, Japan.","DOI":"10.1145\/2600075.2600081"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"71893","DOI":"10.1109\/ACCESS.2020.2966367","article-title":"FSSE: An Effective Fuzzy Semantic Searchable Encryption Scheme over Encrypted Cloud Data","volume":"8","author":"Liu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Tzouramanis, T., and Manolopoulos, Y. (2018, January 18\u201320). Secure reverse k-nearest neighbors search over encrypted mult-dimensional databases. Proceedings of the IDEAS\u201918: Proceedings of the 22nd International Database Engineering & Applications Symposium, Calabria, Italy.","DOI":"10.1145\/3216122.3216170"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Wang, B., Hou, Y., Li, M., Wang, H., and Li, H. (2014, January 4\u20136). Maple: Scalable multi-dimensional range search over encrypted cloud data with tree-based index. Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, Kyoto, Japan.","DOI":"10.1145\/2590296.2590305"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Yoshino, M., Naganuma, K., Kunihiro, N., and Sato, H. (2020, January 20\u201321). Practical Query-based Order Revealing Encryption from Symmetric Searchable Encryption. Proceedings of the 2020 15th Asia Joint Conference on Information Security (AsiaJCIS), Taipei, Taiwan.","DOI":"10.1109\/AsiaJCIS50894.2020.00015"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Zhang, M., Wang, X.A., Yang, X., and Cai, W. (2013, January 9\u201311). Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption. Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi\u2019an, China.","DOI":"10.1109\/INCoS.2013.82"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"153","DOI":"10.23919\/JCC.2020.06.013","article-title":"Searchable encryption cloud storage with dynamic data update to support efficient policy hiding","volume":"17","author":"Cao","year":"2020","journal-title":"China Commun."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Chaudhari, P., and Das, M.L. (February, January 29). A2BSE: Anonymous attribute based searchable encryption. Proceedings of the 2017 ISEA Asia Security and Privacy (ISEASP), Surat, India.","DOI":"10.1109\/ISEASP.2017.7976986"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"46313","DOI":"10.1109\/ACCESS.2021.3068194","article-title":"ABKS-PBM: Attribute-Based Keyword Search with Partial Bilinear Map","volume":"9","author":"Khan","year":"2021","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Li, H., Liu, D., Jia, K., and Lin, X. (2015, January 8\u201312). Achieving authorized and ranked multi-keyword search over encrypted cloud data. Proceedings of the 2015 IEEE International Conference on Communications (ICC), London, UK.","DOI":"10.1109\/ICC.2015.7249517"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"109038","DOI":"10.1109\/ACCESS.2019.2928455","article-title":"A Keyword-Searchable ABE Scheme from Lattice in Cloud Storage Environment","volume":"7","author":"Liu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_21","first-page":"1667","article-title":"Multi-authority Attribute-Based Keyword Search over Encrypted Cloud Data","volume":"18","author":"Miao","year":"2019","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Sun, W., Yu, S., Lou, W., Hou, Y.T., and Li, H. (May, January 27). Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. Proceedings of the IEEE INFOCOM 2014\u2014IEEE Conference on Computer Communications, Toronto, ON, Canada.","DOI":"10.1109\/INFOCOM.2014.6847943"},{"key":"ref_23","first-page":"1307","article-title":"Secure Fine-grained Encrypted Keyword Search for e-Healthcare Cloud","volume":"18","author":"Wang","year":"2019","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"30444","DOI":"10.1109\/ACCESS.2018.2846037","article-title":"Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage","volume":"6","author":"Wang","year":"2018","journal-title":"IEEE Access"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"104344","DOI":"10.1109\/ACCESS.2020.3000049","article-title":"Outsourcing Attributed-Based Ranked Searchable Encryption with Revocation for Cloud Storage","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/219717.219748","article-title":"Wordnet: A lexical database for English. Communications","volume":"38","author":"Miller","year":"1995","journal-title":"ACM"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Wang, C.-J., and Luo, J.-F. (2012, January 17\u201318). A Key-policy Attribute-based Encryption Scheme with Constant Size Ciphertext. Proceedings of the 2012 Eighth International Conference on Computational Intelligence and Security, Guangzhou, China.","DOI":"10.1109\/CIS.2012.106"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TPDS.2013.45","article-title":"Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data","volume":"25","author":"Cao","year":"2013","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Aritomo, D., Watanabe, C., Matsubara, M., and Morishima, A. (2019). A Privacy-Preserving Similarity Search Scheme over Encrypted Word Embed-Dings, Association for Computing Machinery. iiWAS2019.","DOI":"10.1145\/3366030.3366081"},{"key":"ref_30","unstructured":"Fan, J., and Vercauteren, F. (2012). Somewhat practical fully homomorphic encryption. IACR Cryptol. ePrint Arch., 144."},{"key":"ref_31","unstructured":"Gentry, C. (2009). A Fully Homomorphic Encryption Scheme. [Ph.D. Thesis, Stanford University]. aAI3382729."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1109\/TDSC.2013.9","article-title":"Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data","volume":"10","author":"Yu","year":"2013","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"66655","DOI":"10.1109\/ACCESS.2019.2917772","article-title":"Multi-Keyword Searchable and Data Verifiable Attribute-Based Encryption Scheme for Cloud Storage","volume":"7","author":"Sun","year":"2019","journal-title":"IEEE Access"},{"key":"ref_34","unstructured":"Waters, B. (2011). International Workshop on Public Key Cryptography, Springer."},{"key":"ref_35","unstructured":"William, W., and Cohen, M.L.D.C. (2015). Enron Email Dataset. Tech. Rep., Available online: https:\/\/www.cs.cmu.edu\/enron\/."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/7\/2\/28\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:35:13Z","timestamp":1760124913000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/7\/2\/28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,15]]},"references-count":35,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2023,6]]}},"alternative-id":["cryptography7020028"],"URL":"https:\/\/doi.org\/10.3390\/cryptography7020028","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,15]]}}}