Volume 71 | Issue 12 | Year 2025 | Article Id. IJMTT-V71I12P104 | DOI : https://doi.org/10.14445/22315373/IJMTT-V71I12P104
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 11 Oct 2025 | 21 Nov 2025 | 13 Dec 2025 | 27 Dec 2025 |
Mishal Ismaeel, Chungen Xu, Lin Mei, GangQiang Duan, "ECSE: An Expressive Collaborative Searchable Encryption Scheme for Secure Group Data Sharing in Cloud Computing," International Journal of Mathematics Trends and Technology (IJMTT), vol. 71, no. 12, pp. 19-39, 2025. Crossref, https://doi.org/10.14445/22315373/IJMTT-V71I12P104
[1] Biwen Chen et al., “Lightweight Searchable Public-key
Encryption with Forward Privacy Over IIoT Outsourced Data,” IEEE
Transactions on Emerging Topics in Computing, vol. 9, no. 4, pp. 1753–1764,
2019.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Lili Sun et al., “Efficient and Privacy-Preserving Weighted
Nearby-Fit Spatial Keyword Query in Cloud,” IEEE Internet of Things Journal,
vol. 12, no. 12, pp. 20498-20511, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[3] I. Secretary, “Information Technology–security
Techniques–biometric Information Protection,” International Organization for
Standardization, Standard ISO/IEC, 2011.
[Google Scholar]
[4] Hongjun Li et al., “Verifiable and Forward-Secure
Multi-Keyword Query in Internet of Medical Things,” IEEE Internet of Things
Journal, vol. 12, no. 13, pp. 23809-23822, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Axin Wu et al., “Efficient Verifiable Searchable Encryption
with Search and Access Pattern Privacy,” Security and Safety, vol. 4,
2025.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Yinbin Miao et al., “Time-controllable Keyword Search Scheme
with Efficient Revocation in Mobile E-health Cloud,” IEEE Transactions on
Mobile Computing, vol. 23, no. 5, pp. 3650–3665, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Chunhua Jin et al., “EBIAC: Efficient Biometric
Identity-based Access Control for Wireless Body Area Networks,” Journal of
Systems Architecture, vol. 121, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Liqing Chen et al., “Partially Hidden Policy Attribute-based
Multi-keyword Searchable Encryption with Verification and Revocation,” IEEE
Transactions on Mobile Computing, vol. 24, no. 9, pp. 9020-9035, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Dilxat Ghopur, “Attribute-based Searchable Encryption with
Forward Security for Cloud-assisted IoT,” IEEE Access, vol. 12, pp.
90840–90852, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Muqadar Ali, Chungen Xu, and Abid Hussain, “Authorized
Attribute-based Encryption Multi-keywords Search with Policy Updating,” Journal
of New Media, vol. 2, no. 1, pp. 31–43, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Jing Wang et al., “Blockchain-enabled Lightweight
Fine-grained Searchable Knowledge Sharing for Intelligent IoT,” IEEE
Internet of Things Journal, vol. 10, no. 24, pp. 21566–21579, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Bo Qin et al., “Provably Secure Threshold Public-key
Encryption with Adaptive Security and Short Ciphertexts,” Information
Sciences, vol. 210, pp. 67–80, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Stanislaw Jarecki, and Phillip Nazarian, “Adaptively Secure
Threshold Blind BLS Signatures and Threshold Oblivious PRF,” Advances in
Cryptology-ASIACRYPT, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Shiwei Zhang, Yi Mu, and Guomin Yang, “Threshold Broadcast
Encryption with Keyword Search,” Information Security and Cryptology,
pp. 322-337, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Peishun Wang, Huaxiong Wang, and Josef Pieprzyk, “Threshold
Privacy Preserving Keyword Searches,” SOFSEM 2008: Theory and Practice of
Computer Science, pp. 646–658, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Hang Cheng et al., “Person Re-identification over Encrypted
Outsourced Surveillance Videos,” IEEE Transactions on Dependable and Secure
Computing, vol. 18, no. 3, pp. 1456–1473, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Shan Jiang et al., “Privacy-preserving and Efficient
Multi-keyword Search Over Encrypted Data on Blockchain,” 2019 IEEE
International Conference on Blockchain (Blockchain), 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Yongliang Xu et al., “PCSE: Privacy-preserving Collaborative
Searchable Encryption for Group Data Sharing in Cloud Computing,” IEEE
Transactions on Mobile Computing, vol. 24, no. 5, pp. 4558-4572, 2025. [CrossRef] [Google Scholar] [Publisher Link]
[19] Axin Wu et al., “Efficient Public-key Searchable Encryption
Against Inside Keyword Guessing Attacks for Cloud Storage,” Journal of
Systems Architecture, vol. 149, p. 103104, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Rongmao Chen et al., “Server-aided Public Key Encryption
with Keyword Search,” IEEE Transactions on Information Forensics and
Security, vol. 11, no. 12, pp. 2833–2842, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Qiang Tang, and Liqun Chen, “Public-key Encryption with
Registered Keyword Search,” Public Key Infrastructure, Services and
Applications, pp. 163–178, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Yuan Zhang et al., “Blockchain-assisted Public-key
Encryption with Keyword Search Against Keyword Guessing Attacks for Cloud
Storage,” IEEE Transactions on Cloud Computing, vol. 9, no. 4, pp.
1335–1348, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Kai Zhang et al., “Subversion-resistant and Consistent
Attribute-based Keyword Search for Secure Cloud Storage,” IEEE Transactions
on Information Forensics and Security, vol. 17, pp. 1771–1784, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Pascal Bemmann, Rongmao Chen, and Tibor Jager,
“Subversion-resilient Public Key Encryption with Practical Watchdogs,” Public-Key
Cryptography-PKC, pp. 627–658, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Ilya Mironov, and Noah Stephens-Davidowitz, “Cryptographic
Reverse Firewalls,” Advances in Cryptology-EUROCRYPT, pp. 657–686, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Changsong Jiang et al., “Blockchain-based Immunization
Against Kleptographic Attacks,” Science China Information Sciences, vol.
67, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Yuyang Zhou, Zhebin Hu, and Fagen Li, “Searchable Public-key
Encryption with Cryptographic Reverse Firewalls for Cloud Storage,” IEEE
Transactions on Cloud Computing, vol. 11, no. 1, pp. 383–396, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Changsong Jiang et al., “SR-PEKS: Subversion-resistant
Public Key Encryption with Keyword Search,” IEEE Transactions on Cloud
Computing, vol. 11, no. 3, pp. 3168–3183, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[29]
Dawn Xiaoding Song, D. Wagner, and A. Perrig, “Practical
Techniques for Searches on Encrypted Data,” Proceeding 2000 IEEE Symposium
on Security and Privacy. S&P 2000, 2000.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Joonsang Baek, Reihaneh Safavi-Naini, and Willy Susilo,
“Public Key Encryption with Keyword Search Revisited,” Computational Science
and Its Applications-ICCSA, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Lijun Qi, and Jincheng Zhuang, “Efficient Public Key
Searchable Encryption Schemes from Standard Hard Lattice Problems for Cloud
Computing,” Cryptology ePrint Archive, 2022.
[Google Scholar] [Publisher Link]
[32] Liqing Chen et al., “Fair and Exculpable Attribute-Based
Searchable Encryption with Revocation and Verifiable Outsourced Decryption
Using Smart Contract,” IEEE Internet of Things Journal, vol. 12, no. 4,
pp. 4302-4317, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Axin Wu et al., “Enabling Traceable and Verifiable
Multi-user Forward Secure Searchable Encryption in Hybrid Cloud,” IEEE
Transactions on Cloud Computing, vol. 11, no. 2, pp. 1886–1898, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Maryam Zarezadeh, Hamid Mala, and Maede Ashouri-Talouki,
“Multi-keyword Ranked Searchable Encryption Scheme with Access Control for
Cloud Storage,” Peer-to-Peer Networking and Applications, vol. 13, pp.
207–218, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Leixiao Cheng et al., “Security-enhanced Public-key
Authenticated Searchable Encryption,” Information Sciences, vol. 647,
2023.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Panyu Wu et al., “MMKFB: Multi-client and Multi-keyword
Searchable Symmetric Encryption with Forward and Backward Privacy,” Frontiers
of Computer Science, vol. 19, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[37] Qiyang Song et al., “SAP-SSE: Protecting Search Patterns and
Access Patterns in Searchable Symmetric Encryption,” IEEE Transactions on
Information Forensics and Security, vol. 16, pp. 1795–1809, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[38] Dan Boneh et al., “Public Key Encryption with Keyword
Search,” Advances in Cryptology-EUROCRYPT, pp. 506-522, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[39] Yang Yang et al., “Dual Traceable Distributed
Attribute-based Searchable Encryption and Ownership Transfer,” IEEE
Transactions on Cloud Computing, vol. 11, no. 1, pp. 247–262, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[40] Puning Zhang et al., “Efficient and Privacy-preserving
Search Over Edge–cloud Collaborative Entity in IoT,” IEEE Internet of Things
Journal, vol. 10, no. 4, pp. 3192–3205, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[41] Chunpeng Ge et al., “Secure Keyword Search and Data Sharing
Mechanism for Cloud Computing,” IEEE Transactions on Dependable and Secure
Computing, vol. 18, no. 6, pp. 2787–2800, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[42] Garima Verma, and Soumen Kanrar, “Secure Keyword Search over
Encrypted Cloud Data Using Blockchain in Digital Document Sharing,” Wireless
Personal Communications, vol. 134, pp. 975–996, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[43] Jin Wook Byun et al., “Off-line Keyword Guessing Attacks on
Recent Keyword Search Schemes Over Encrypted Data,” Secure Data Management,
pp. 75-83, 2006.
[CrossRef] [Google Scholar] [Publisher Link]
[44] Run Xie et al., “Lattice-based Searchable Public-key
Encryption Scheme for Secure Cloud Storage,” International Journal of Web
and Grid Services, vol. 14, no. 1, pp. 3–20, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[45] Liming Fang et al., “Public Key Encryption with Keyword
Search Secure Against Keyword Guessing Attacks without Random Oracle,” Information
Sciences, vol. 238, pp. 221–241, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[46] Haoyu Zhang, Baodong Qin, and Dong Zheng, “Registered
Keyword Searchable Encryption Based on SM9,” Applied Sciences, vol. 13,
no. 5, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[47] Mohammad Raouf Senouci et al., “An Efficient and Secure
Certificateless Searchable Encryption Scheme Against Keyword Guessing Attacks,”
Journal of Systems Architecture, vol. 119, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[48] Qiong Huang, and Hongbo Li, “An Efficient Public-key
Searchable Encryption Scheme Secure Against Inside Keyword Guessing Attacks,” Information
Sciences, vol. 403-404, pp. 1–14, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[49] Xiangyu Pan, and Fagen Li, “Public-key Authenticated
Encryption with Keyword Search Achieving Both Multi-Ciphertext and
Multi-Trapdoor Indistinguishability,” Journal of Systems Architecture,
vol. 115, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[50] Yang Lu, and Jiguo Li, “Lightweight Public Key Authenticated
Encryption with Keyword Search Against Adaptively-Chosen-Targets Adversaries
for Mobile Devices,” IEEE Transactions on Mobile Computing, vol. 21, no.
12, pp. 4397–4409, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[51] Mihir Bellare, Kenneth G. Paterson, and Phillip Rogaway,
“Security of Symmetric Encryption Against Mass Surveillance,” Advances in
Cryptology-CRYPTO, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[52] Mihir Bellare, Joseph Jaeger, and Daniel Kane,
“Mass-surveillance without the State: Strongly Undetectable
Algorithm-substitution Attacks,” Proceedings of the 22nd ACM
SIGSAC Conference on Computer and Communications Security, pp. 1431–1440,
2015.
[CrossRef] [Google Scholar] [Publisher Link]
[53] Shanshan Li et al., “A Secure Two-factor Authentication
Scheme from Password-protected Hardware Tokens,” IEEE Transactions on
Information Forensics and Security, vol. 17, pp. 3525–3538, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[54] Emma Dauterman et al., “True2F: Backdoor-resistant
Authentication Tokens,” 2019 IEEE Symposium on Security and Privacy (SP),
2019.
[CrossRef] [Google Scholar] [Publisher Link]
[55] Suvradip Chakraborty, Stefan Dziembowski, and Jesper Buus
Nielsen, “Reverse Firewalls for Actively Secure MPCs,” Advances in
Cryptology-CRYPTO, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[56]
Yevgeniy Dodis, Ilya Mironov, and Noah Stephens-Davidowitz,
“Message Transmission with Reverse Firewalls—Secure Communication on Corrupted
Machines,” Advances in Cryptology-CRYPTO, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[57] A. Beimel, “Secure Schemes for Secret Sharing and Key
Distribution,” PhD Thesis, Israel Institute of Technology, Technion, 1996.
[Google Scholar] [Publisher Link]
[58] Yinbin Miao et al., “Threshold Multi-keyword Search for Cloud-based
Group Data Sharing,” IEEE Transactions on Cloud Computing, vol. 10, no.
3, pp. 2146–2162, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[59] Ruizhong Du, Caixia Ma, and Mingyue Li, “Privacy-preserving
Searchable Encryption Scheme Based on Public and Private Blockchains,” Tsinghua
Science and Technology, vol. 28, no. 1, pp. 13-26, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[60] Yun Wang, and Dimitrios Papadopoulos, “Multi-user
Collusion-resistant Searchable Encryption for Cloud Storage,” IEEE
Transactions on Cloud Computing, vol. 11, no. 3, pp. 2993-3008, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[61] Somchart Fugkeaw et al., “EVSEB: Efficient and Verifiable
Searchable Encryption with Boolean Search for Encrypted Cloud Logs,” IEEE
Access, vol. 13, pp. 101177-101195, 2025.
[CrossRef] [Google Scholar] [Publisher Link]