{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T19:36:42Z","timestamp":1764963402213,"version":"3.46.0"},"reference-count":55,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T00:00:00Z","timestamp":1764288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Searchable Encryption (SE) schemes enable data users to securely search over outsourced encrypted data stored in the cloud. To support fine-grained access control, Attribute-Based Encryption with Keyword Search (ABKS) extends SE by associating access policies with user attributes. However, existing ABKS schemes often suffer from limited security and functionality, such as lack of verifiability, vulnerability to collusion, and insider keyword-guessing attacks (IKGA), or inefficiency in multi-authority and post-quantum settings, restricting their practical deployment in real-world distributed systems. In this paper, we propose a verifiable ciphertext-policy multi-authority ABKS (MA-CP-ABKS) scheme based on the Module Learning with Errors (MLWE) problem, which provides post-quantum security, verifiability, and resistance to both collusion and IKGA. Moreover, the proposed scheme supports multi-keyword searchability and forward security, enabling secure and efficient keyword search in dynamic environments. We formally prove the correctness, verifiability, completeness, and security of the scheme under the MLWE assumption against selective chosen-keyword attacks (SCKA) in the standard model and IKGA in the random oracle model. The scheme also maintains efficient computation and manageable communication overhead. Implementation results confirm its practical performance, demonstrating that the proposed MA-CP-ABKS scheme offers a secure, verifiable, and efficient solution for multi-organizational cloud environments.<\/jats:p>","DOI":"10.3390\/cryptography9040076","type":"journal-article","created":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T18:42:02Z","timestamp":1764960122000},"page":"76","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Verifiable Multi-Authority Attribute-Based Encryption with Keyword Search Based on MLWE"],"prefix":"10.3390","volume":"9","author":[{"given":"Saba","family":"Karimani","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Sharif University of Technology, Tehran 14588-89694, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3182-0277","authenticated-orcid":false,"given":"Taraneh","family":"Eghlidos","sequence":"additional","affiliation":[{"name":"Electronics Research Institute, Sharif University of Technology, Tehran 14588-89694, Iran"}]}],"member":"1968","published-online":{"date-parts":[[2025,11,28]]},"reference":[{"key":"ref_1","unstructured":"Song, D.X., Wagner, D., and Perrig, A. (2000, January 14\u201317). Practical techniques for searches on encrypted data. Proceedings of the 2000 IEEE Symposium on Security and Privacy, S&P 2000, Berkley, CA, USA."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Boneh, D., Crescenzo, G.D., Ostrovsky, R., and Persiano, G. (2004). Public key encryption with keyword search. Advances in Cryptology\u2014EUROCRYPT 2004, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2\u20136 May 2004, Springer.","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Wang, C., Li, W., Li, Y., and Xu, X. (2013). A ciphertext-policy attribute-based encryption scheme supporting keyword search function. Proceedings of the Cyberspace Safety and Security, 5th International Symposium, CSS 2013, Zhangjiajie, China, 13\u201315 November 2013, Springer.","DOI":"10.1007\/978-3-319-03584-0_28"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2754","DOI":"10.1109\/JIOT.2022.3213829","article-title":"An efficient revocable and searchable MA-ABE scheme with blockchain assistance for C-IoT","volume":"10","author":"Yu","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_5","first-page":"1667","article-title":"Multi-authority attribute-based keyword search over encrypted cloud data","volume":"18","author":"Miao","year":"2019","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"90840","DOI":"10.1109\/ACCESS.2024.3418886","article-title":"Attribute-based searchable encryption with forward security for cloud-assisted IoT","volume":"12","author":"Ghopur","year":"2024","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"957","DOI":"10.1109\/TSC.2022.3149761","article-title":"Attribute-based expressive and ranked keyword search over encrypted documents in cloud computing","volume":"16","author":"Huang","year":"2022","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_8","unstructured":"Shor, P.W. (1994, January 20\u201322). Algorithms for quantum computation: Discrete logarithms and factoring. Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA."},{"key":"ref_9","unstructured":"Kuchta, V., and Markowitch, O. (2017). Multi-authority distributed attribute-based encryption with application to searchable encryption on lattices. Paradigms in Cryptology\u2013Mycrypt 2016, Proceedings of the Malicious and Exploratory Cryptology: Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, 1\u20132 December 2016, Springer International Publishing. Revised Selected Papers 2."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"110559","DOI":"10.1016\/j.comnet.2024.110559","article-title":"Lattice-based multi-authority ciphertext-policy attribute-based searchable encryption with attribute revocation for cloud storage","volume":"250","author":"Shen","year":"2024","journal-title":"Comput. Netw."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Cao, Y., Xu, S., Xu, G., Chen, X.B., Chen, Y., and Yiu, S.M. Privacy-Preserving in Cloud Networks: An Efficient, Revocable and Authenticated Encrypted Search Scheme. Comput. Netw., 2025. in press.","DOI":"10.1016\/j.comnet.2025.111771"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Zhuang, E.S., and Fan, C.I. (2023). Multi-keyword searchable identity-based proxy re-encryption from lattices. Mathematics, 11.","DOI":"10.3390\/math11183830"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"139715","DOI":"10.1109\/ACCESS.2023.3334733","article-title":"Multi-keywords searchable attribute-based encryption with verification and attribute revocation over cloud data","volume":"11","author":"Shen","year":"2023","journal-title":"IEEE Access"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1007\/s42979-024-02646-2","article-title":"Searchable Attribute-Based Proxy Re-encryption: Keyword Privacy, Verifiable Expressive Search, and Outsourced Decryption","volume":"5","author":"Bera","year":"2024","journal-title":"SN Comput. Sci."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1016\/j.ins.2017.09.029","article-title":"AKSER: Attribute-based keyword search with efficient revocation in cloud computing","volume":"423","author":"Cui","year":"2018","journal-title":"Inf. Sci."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1007\/s10586-025-05407-9","article-title":"A novel search approach for secure and flexible sharing of hierarchical EHR based on blockchain","volume":"28","author":"Jiang","year":"2025","journal-title":"Clust. Comput."},{"key":"ref_17","first-page":"3325","article-title":"Efficient Multi-Authority Attribute-Based Searchable Encryption Scheme with Blockchain Assistance for Cloud-Edge Coordination","volume":"76","author":"Liu","year":"2023","journal-title":"Comput. Mater. Contin."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"724","DOI":"10.1109\/TSC.2019.2959306","article-title":"Practical attribute-based multi-keyword ranked search scheme in cloud computing","volume":"15","author":"Chen","year":"2019","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Wan, Q., Liu, M., Wang, L., Wang, F., and Zhang, M. (2025). Dual-Policy Attribute-Based Searchable Encryption with Secure Keyword Update for Vehicular Social Networks. Electronics, 14.","DOI":"10.3390\/electronics14020266"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1299","DOI":"10.1109\/TDSC.2024.3432769","article-title":"Efficient Attribute-Based Searchable Encryption with Policy Hiding over Personal Health Records","volume":"22","author":"Zhang","year":"2024","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1007\/s42979-024-03206-4","article-title":"Anonymous Attribute-Based Searchable Encryption for Smart Health System","volume":"5","author":"Mehla","year":"2024","journal-title":"SN Comput. Sci."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"103081","DOI":"10.1016\/j.sysarc.2024.103081","article-title":"Attribute-based searchable encryption with decentralized key management for healthcare data sharing","volume":"148","author":"Yin","year":"2024","journal-title":"J. Syst. Archit."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Zheng, Q., Xu, S., and Ateniese, G. (May, January 27). VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. Proceedings of the IEEE INFOCOM 2014-IEEE Conference on Computer Communications, Toronto, ON, Canada.","DOI":"10.1109\/INFOCOM.2014.6847976"},{"key":"ref_24","first-page":"2299","article-title":"Verifiable Identity-Based Encryption with Keyword Search for IoT from Lattice","volume":"68","author":"Mei","year":"2021","journal-title":"CMC-Comput. Mater. Contin."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1663","DOI":"10.1109\/TC.2025.3540649","article-title":"Lattice-based Forward Secure Multi-user Authenticated Searchable Encryption for Cloud Storage Systems","volume":"74","author":"Xu","year":"2025","journal-title":"IEEE Trans. Comput."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"108523","DOI":"10.1016\/j.compeleceng.2022.108523","article-title":"An efficient, secure and verifiable conjunctive keyword search scheme based on rank metric codes over encrypted outsourced cloud data","volume":"105","author":"Yousefipoor","year":"2023","journal-title":"Comput. Electr. Eng."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Byun, J.W., Rhee, H.S., Park, H.A., and Lee, D.H. (2006). Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. Workshop on Secure Data Management, Springer.","DOI":"10.1007\/11844662_6"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Tang, Q., and Chen, L. (2009). Public-key encryption with registered keyword search. European Public Key Infrastructure Workshop, Springer.","DOI":"10.1007\/978-3-642-16441-5_11"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2017.03.038","article-title":"An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks","volume":"403","author":"Huang","year":"2017","journal-title":"Inf. Sci."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/s11235-024-01131-8","article-title":"A new construction of public key authenticated encryption with keyword search based on LWE","volume":"86","author":"Wang","year":"2024","journal-title":"Telecommun. Syst."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Cheng, L., and Meng, F. (2022). Public key authenticated encryption with keyword search from LWE. European Symposium on Research in Computer Security, Springer International Publishing.","DOI":"10.1007\/978-3-031-17140-6_15"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"109038","DOI":"10.1109\/ACCESS.2019.2928455","article-title":"A keyword-searchable ABE scheme from lattice in cloud storage environment","volume":"7","author":"Liu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_33","unstructured":"Li, J., Ma, M., Zhang, J., Fan, S., and Li, S. (2019). Attribute-based keyword search from lattices. Infomration Security and Cryptology, Proceedings of the 5th International Conference, Inscrypt 2019, Nanjing, China, 6\u20138 December 2019, Springer International Publishing."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1290","DOI":"10.1007\/s12083-020-01057-3","article-title":"CP-ABSEL: Ciphertext-policy attribute-based searchable encryption from lattice in cloud storage","volume":"14","author":"Varri","year":"2021","journal-title":"Peer\u2014Peer Netw. Appl."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"4970","DOI":"10.1109\/TIFS.2023.3301740","article-title":"ABAEKS: Attribute-Based Authenticated Encryption with Keyword Search Over Outsourced Encrypted Data","volume":"18","author":"Luo","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Lyubashevsky, V., Peikert, C., and Regev, O. (2010). On ideal lattices and learning with errors over rings. Advances in Cryptology\u2014EUROCRYPT 2010, Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, France, 30 May\u20133 June 2010, Springer.","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Ro\u015fca, M., Sakzad, A., Stehl\u00e9, D., and Steinfeld, R. (2017). Middle-product learning with errors. Advances in Cryptology\u2014EUROCRYPT 2017, Proceedings of the 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, 20\u201324 August 2017, Springer International Publishing.","DOI":"10.1007\/978-3-319-63697-9_10"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1007\/s10623-014-9938-4","article-title":"Worst-case to average-case reductions for module lattices","volume":"75","author":"Langlois","year":"2015","journal-title":"Des. Codes Cryptogr."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J.M., Schwabe, P., Seiler, G., and Stehl\u00e9, D. (2018, January 24\u201326). CRYSTALS-Kyber: A CCA-secure module-lattice-based KEM. Proceedings of the 2018 IEEE European Symposium on Security and Privacy (EuroS&P), London, UK.","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Alagic, G., Dang, Q., Moody, D., Robinson, A., Silberg, H., and Smith-Tone, D. (2024). Module-Lattice-Based Key-Encapsulation Mechanism Standard, NIST.","DOI":"10.6028\/NIST.SP.800-227"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Lewko, A., and Waters, B. (2011). Decentralizing attribute-based encryption. Advances in Cryptology\u2014EUROCRYPT 2011, Proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, 15\u201319 May 2011, Springer.","DOI":"10.1007\/978-3-642-20465-4_31"},{"key":"ref_42","unstructured":"Micciancio, D., and Goldwasser, S. (2012). Complexity of Lattice Problems: A Cryptographic Perspective, Springer Science & Business Media."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J. (2009). Introduction to post-quantum cryptography. Post-Quantum Cryptography, Springer.","DOI":"10.1007\/978-3-540-88702-7"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1137\/S0097539705447360","article-title":"Worst-case to average-case reductions based on Gaussian measures","volume":"37","author":"Micciancio","year":"2007","journal-title":"SIAM J. Comput."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1568318.1568324","article-title":"On lattices, learning with errors, random linear codes, and cryptography","volume":"56","author":"Regev","year":"2009","journal-title":"J. ACM"},{"key":"ref_46","unstructured":"Bert, P., Eberhart, G., Prabel, L., Roux-Langlois, A., and Sabt, M. (2021). Implementation of lattice trapdoors on modules and applications. Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021, Daejeon, Republic of Korea, 20\u201322 July 2021, Springer International Publishing. Proceedings 12."},{"key":"ref_47","first-page":"700","article-title":"Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller","volume":"7237","author":"Micciancio","year":"2012","journal-title":"Eurocrypt"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Gentry, C., Peikert, C., and Vaikuntanathan, V. (2008, January 17\u201320). Trapdoors for hard lattices and new cryptographic constructions. Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, Victoria, BC, Canada.","DOI":"10.1145\/1374376.1374407"},{"key":"ref_49","unstructured":"Beimel, A. (1996). Secret sharing and non-Shannon information inequalities. [Ph.D. Thesis, Israel Institute of Technology, Technion]."},{"key":"ref_50","first-page":"553","article-title":"Efficient lattice (h) ibe in the standard model","volume":"6110","author":"Agrawal","year":"2010","journal-title":"Eurocrypt"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Cash, D., Hofheinz, D., and Kiltz, E. How to Delegate a Lattice Basis, Report 2009\/351;Cryptology ePrint Archive: 2009.","DOI":"10.1007\/978-3-642-13190-5_27"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Bert, P., Fouque, P.A., Roux-Langlois, A., and Sabt, M. (2018). Practical implementation of ring-SIS\/LWE based signature and IBE. Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, 9\u201311 April 2018, Springer International Publishing. Proceedings 9.","DOI":"10.1007\/978-3-319-79063-3_13"},{"key":"ref_53","unstructured":"Gajland, P., de Kock, B., Quaresma, M., Malavolta, G., and Schwabe, P. (2024, January 14\u201316). SWOOSH: Efficient Lattice-Based Non-Interactive Key Exchange. Proceedings of the 33rd USENIX Security Symposium (USENIX Security 24), Philadelphia, PA, USA."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00145-022-09441-3","article-title":"On the hardness of module learning with errors with short distributions","volume":"36","author":"Boudgoust","year":"2023","journal-title":"J. Cryptol."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"3503","DOI":"10.1109\/JSYST.2023.3283389","article-title":"Attribute-based searchable encryption in edge computing for lightweight devices","volume":"17","author":"Niu","year":"2023","journal-title":"IEEE Syst. J."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/4\/76\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T19:13:10Z","timestamp":1764961990000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/4\/76"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,28]]},"references-count":55,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["cryptography9040076"],"URL":"https:\/\/doi.org\/10.3390\/cryptography9040076","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,28]]}}}