...

  • Home
  • Articles
    • Current Issue
    • Archives
  • Authors
    • Author Guidelines
    • Policies
    • Downloads
  • Editors
  • Reviewers
...

International Journal of Mathematics Trends and Technology

Research Article | Open Access | Download PDF

Volume 71 | Issue 12 | Year 2025 | Article Id. IJMTT-V71I12P104 | DOI : https://doi.org/10.14445/22315373/IJMTT-V71I12P104

ECSE: An Expressive Collaborative Searchable Encryption Scheme for Secure Group Data Sharing in Cloud Computing


Mishal Ismaeel, Chungen Xu, Lin Mei, GangQiang Duan
Received Revised Accepted Published
11 Oct 2025 21 Nov 2025 13 Dec 2025 27 Dec 2025
Citation :

Mishal Ismaeel, Chungen Xu, Lin Mei, GangQiang Duan, "ECSE: An Expressive Collaborative Searchable Encryption Scheme for Secure Group Data Sharing in Cloud Computing," International Journal of Mathematics Trends and Technology (IJMTT), vol. 71, no. 12, pp. 19-39, 2025. Crossref, https://doi.org/10.14445/22315373/IJMTT-V71I12P104

Abstract
With the growing usage of cloud services and multi-user collaboration, secure, privacy-preserving keyword searches are no longer optional. Conventional PEKS frameworks are susceptible to keyword-guessing attacks (KGA) and subversion attacks (SA), which become more likely when either the randomness-generating mechanism or key management fails. To address both of these risks, this work presents an Expressive Collaborative Searchable Encryption Scheme for Secure Group Data Sharing in Cloud Computing Environments (ECSE). The ECSE combines cryptographic reverse firewalls with threshold secret-sharing techniques and a collaborative approach to generating randomness, creating a robust, verified search framework. The ECSE can prevent SA attacks by employing trusted Cryptographic Randomness Generation, while it can fight KGAs by using a hybrid online/offline rate-limiting procedure with several key servers to create a ciphertext. The ECSE additionally supports Boolean search predicates, Linear Secret Sharing Schemes, and public access verification functionality to ensure that search results are reliable. Using a formal security analysis, this proposed scheme shows that the ECSE is semantically secure and resilient to semi-trusted cloud servers, key server compromise, and SA attacks. Finally, this work gives theoretical and experimental evaluations to support the conclusion that the ECSE improves security and adds functionality while maintaining acceptable efficiency. Experimental evaluation of a 2000-document dataset showed that the scheme can generate trapdoors for 15-keyword Boolean queries in less than 0.07 seconds and scales efficiently compared to TPPKS, PCSE, and TMS. Due to its Boolean expressiveness and resistance to subversion, ECSE enhances security with a slight performance overhead.
Keywords
Boolean Keyword Search, Cryptographic Reverse Firewall, Linear Secret Sharing, Subversion-resistant, Threshold Secret Sharing.
References

[1] Biwen Chen et al., “Lightweight Searchable Public-key Encryption with Forward Privacy Over IIoT Outsourced Data,” IEEE Transactions on Emerging Topics in Computing, vol. 9, no. 4, pp. 1753–1764, 2019.
[
CrossRef] [Google Scholar] [Publisher Link]

[2] Lili Sun et al., “Efficient and Privacy-Preserving Weighted Nearby-Fit Spatial Keyword Query in Cloud,” IEEE Internet of Things Journal, vol. 12, no. 12, pp. 20498-20511, 2025.
[
CrossRef] [Google Scholar] [Publisher Link]

[3] I. Secretary, “Information Technology–security Techniques–biometric Information Protection,” International Organization for Standardization, Standard ISO/IEC, 2011.
[
Google Scholar]

[4] Hongjun Li et al., “Verifiable and Forward-Secure Multi-Keyword Query in Internet of Medical Things,” IEEE Internet of Things Journal, vol. 12, no. 13, pp. 23809-23822, 2025.
[
CrossRef] [Google Scholar] [Publisher Link]

[5] Axin Wu et al., “Efficient Verifiable Searchable Encryption with Search and Access Pattern Privacy,” Security and Safety, vol. 4, 2025.
[
CrossRef] [Google Scholar] [Publisher Link]

[6] Yinbin Miao et al., “Time-controllable Keyword Search Scheme with Efficient Revocation in Mobile E-health Cloud,” IEEE Transactions on Mobile Computing, vol. 23, no. 5, pp. 3650–3665, 2024.
[
CrossRef] [Google Scholar] [Publisher Link]

[7] Chunhua Jin et al., “EBIAC: Efficient Biometric Identity-based Access Control for Wireless Body Area Networks,” Journal of Systems Architecture, vol. 121, 2021.
[
CrossRef] [Google Scholar] [Publisher Link]

[8] Liqing Chen et al., “Partially Hidden Policy Attribute-based Multi-keyword Searchable Encryption with Verification and Revocation,” IEEE Transactions on Mobile Computing, vol. 24, no. 9, pp. 9020-9035, 2025.
[
CrossRef] [Google Scholar] [Publisher Link]

[9] Dilxat Ghopur, “Attribute-based Searchable Encryption with Forward Security for Cloud-assisted IoT,” IEEE Access, vol. 12, pp. 90840–90852, 2024.
[
CrossRef] [Google Scholar] [Publisher Link]

[10] Muqadar Ali, Chungen Xu, and Abid Hussain, “Authorized Attribute-based Encryption Multi-keywords Search with Policy Updating,” Journal of New Media, vol. 2, no. 1, pp. 31–43, 2020.
[
CrossRef] [Google Scholar] [Publisher Link]

[11] Jing Wang et al., “Blockchain-enabled Lightweight Fine-grained Searchable Knowledge Sharing for Intelligent IoT,” IEEE Internet of Things Journal, vol. 10, no. 24, pp. 21566–21579, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[12] Bo Qin et al., “Provably Secure Threshold Public-key Encryption with Adaptive Security and Short Ciphertexts,” Information Sciences, vol. 210, pp. 67–80, 2012.
[
CrossRef] [Google Scholar] [Publisher Link]

[13] Stanislaw Jarecki, and Phillip Nazarian, “Adaptively Secure Threshold Blind BLS Signatures and Threshold Oblivious PRF,” Advances in Cryptology-ASIACRYPT, 2025.
[
CrossRef] [Google Scholar] [Publisher Link]

[14] Shiwei Zhang, Yi Mu, and Guomin Yang, “Threshold Broadcast Encryption with Keyword Search,” Information Security and Cryptology, pp. 322-337, 2016.
[
CrossRef] [Google Scholar] [Publisher Link]

[15] Peishun Wang, Huaxiong Wang, and Josef Pieprzyk, “Threshold Privacy Preserving Keyword Searches,” SOFSEM 2008: Theory and Practice of Computer Science, pp. 646–658, 2008.
[
CrossRef] [Google Scholar] [Publisher Link]

[16] Hang Cheng et al., “Person Re-identification over Encrypted Outsourced Surveillance Videos,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 3, pp. 1456–1473, 2019.
[
CrossRef] [Google Scholar] [Publisher Link]

[17] Shan Jiang et al., “Privacy-preserving and Efficient Multi-keyword Search Over Encrypted Data on Blockchain,” 2019 IEEE International Conference on Blockchain (Blockchain), 2019.
 [
CrossRef] [Google Scholar] [Publisher Link]

[18] Yongliang Xu et al., “PCSE: Privacy-preserving Collaborative Searchable Encryption for Group Data Sharing in Cloud Computing,” IEEE Transactions on Mobile Computing, vol. 24, no. 5, pp. 4558-4572, 2025. [CrossRef] [Google Scholar] [Publisher Link]

[19] Axin Wu et al., “Efficient Public-key Searchable Encryption Against Inside Keyword Guessing Attacks for Cloud Storage,” Journal of Systems Architecture, vol. 149, p. 103104, 2024.
[
CrossRef] [Google Scholar] [Publisher Link]

[20] Rongmao Chen et al., “Server-aided Public Key Encryption with Keyword Search,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 12, pp. 2833–2842, 2016.
[
CrossRef] [Google Scholar] [Publisher Link]

[21] Qiang Tang, and Liqun Chen, “Public-key Encryption with Registered Keyword Search,” Public Key Infrastructure, Services and Applications, pp. 163–178, 2010.
[
CrossRef] [Google Scholar] [Publisher Link]

[22] Yuan Zhang et al., “Blockchain-assisted Public-key Encryption with Keyword Search Against Keyword Guessing Attacks for Cloud Storage,” IEEE Transactions on Cloud Computing, vol. 9, no. 4, pp. 1335–1348, 2019.
[
CrossRef] [Google Scholar] [Publisher Link]

[23] Kai Zhang et al., “Subversion-resistant and Consistent Attribute-based Keyword Search for Secure Cloud Storage,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 1771–1784, 2022.
[
CrossRef] [Google Scholar] [Publisher Link]

[24] Pascal Bemmann, Rongmao Chen, and Tibor Jager, “Subversion-resilient Public Key Encryption with Practical Watchdogs,” Public-Key Cryptography-PKC, pp. 627–658, 2021.
[
CrossRef] [Google Scholar] [Publisher Link]

[25] Ilya Mironov, and Noah Stephens-Davidowitz, “Cryptographic Reverse Firewalls,” Advances in Cryptology-EUROCRYPT, pp. 657–686, 2015.
[
CrossRef] [Google Scholar] [Publisher Link]

[26] Changsong Jiang et al., “Blockchain-based Immunization Against Kleptographic Attacks,” Science China Information Sciences, vol. 67, 2024.
[
CrossRef] [Google Scholar] [Publisher Link]

[27] Yuyang Zhou, Zhebin Hu, and Fagen Li, “Searchable Public-key Encryption with Cryptographic Reverse Firewalls for Cloud Storage,” IEEE Transactions on Cloud Computing, vol. 11, no. 1, pp. 383–396, 2021.
[
CrossRef] [Google Scholar] [Publisher Link]

[28] Changsong Jiang et al., “SR-PEKS: Subversion-resistant Public Key Encryption with Keyword Search,” IEEE Transactions on Cloud Computing, vol. 11, no. 3, pp. 3168–3183, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[29]  Dawn Xiaoding Song, D. Wagner, and A. Perrig, “Practical Techniques for Searches on Encrypted Data,” Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 2000.
[
CrossRef] [Google Scholar] [Publisher Link]

[30] Joonsang Baek, Reihaneh Safavi-Naini, and Willy Susilo, “Public Key Encryption with Keyword Search Revisited,” Computational Science and Its Applications-ICCSA, 2008.
[
CrossRef] [Google Scholar] [Publisher Link]

[31] Lijun Qi, and Jincheng Zhuang, “Efficient Public Key Searchable Encryption Schemes from Standard Hard Lattice Problems for Cloud Computing,” Cryptology ePrint Archive, 2022.
[
Google Scholar] [Publisher Link]

[32] Liqing Chen et al., “Fair and Exculpable Attribute-Based Searchable Encryption with Revocation and Verifiable Outsourced Decryption Using Smart Contract,” IEEE Internet of Things Journal, vol. 12, no. 4, pp. 4302-4317, 2024.
[
CrossRef] [Google Scholar] [Publisher Link]

[33] Axin Wu et al., “Enabling Traceable and Verifiable Multi-user Forward Secure Searchable Encryption in Hybrid Cloud,” IEEE Transactions on Cloud Computing, vol. 11, no. 2, pp. 1886–1898, 2022.
[
CrossRef] [Google Scholar] [Publisher Link]

[34] Maryam Zarezadeh, Hamid Mala, and Maede Ashouri-Talouki, “Multi-keyword Ranked Searchable Encryption Scheme with Access Control for Cloud Storage,” Peer-to-Peer Networking and Applications, vol. 13, pp. 207–218, 2020.
[
CrossRef] [Google Scholar] [Publisher Link]

[35] Leixiao Cheng et al., “Security-enhanced Public-key Authenticated Searchable Encryption,” Information Sciences, vol. 647, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[36] Panyu Wu et al., “MMKFB: Multi-client and Multi-keyword Searchable Symmetric Encryption with Forward and Backward Privacy,” Frontiers of Computer Science, vol. 19, 2025.
[
CrossRef] [Google Scholar] [Publisher Link]

[37] Qiyang Song et al., “SAP-SSE: Protecting Search Patterns and Access Patterns in Searchable Symmetric Encryption,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1795–1809, 2020.
[
CrossRef] [Google Scholar] [Publisher Link]

[38] Dan Boneh et al., “Public Key Encryption with Keyword Search,” Advances in Cryptology-EUROCRYPT, pp. 506-522, 2004.
[
CrossRef] [Google Scholar] [Publisher Link]

[39] Yang Yang et al., “Dual Traceable Distributed Attribute-based Searchable Encryption and Ownership Transfer,” IEEE Transactions on Cloud Computing, vol. 11, no. 1, pp. 247–262, 2021.
[
CrossRef] [Google Scholar] [Publisher Link]

[40] Puning Zhang et al., “Efficient and Privacy-preserving Search Over Edge–cloud Collaborative Entity in IoT,” IEEE Internet of Things Journal, vol. 10, no. 4, pp. 3192–3205, 2021.
[
CrossRef] [Google Scholar] [Publisher Link]

[41] Chunpeng Ge et al., “Secure Keyword Search and Data Sharing Mechanism for Cloud Computing,” IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 6, pp. 2787–2800, 2020.
[
CrossRef] [Google Scholar] [Publisher Link]

[42] Garima Verma, and Soumen Kanrar, “Secure Keyword Search over Encrypted Cloud Data Using Blockchain in Digital Document Sharing,” Wireless Personal Communications, vol. 134, pp. 975–996, 2024.
[
CrossRef] [Google Scholar] [Publisher Link]

[43] Jin Wook Byun et al., “Off-line Keyword Guessing Attacks on Recent Keyword Search Schemes Over Encrypted Data,” Secure Data Management, pp. 75-83, 2006.
[
CrossRef] [Google Scholar] [Publisher Link]

[44] Run Xie et al., “Lattice-based Searchable Public-key Encryption Scheme for Secure Cloud Storage,” International Journal of Web and Grid Services, vol. 14, no. 1, pp. 3–20, 2018.
[
CrossRef] [Google Scholar] [Publisher Link]

[45] Liming Fang et al., “Public Key Encryption with Keyword Search Secure Against Keyword Guessing Attacks without Random Oracle,” Information Sciences, vol. 238, pp. 221–241, 2013.
[
CrossRef] [Google Scholar] [Publisher Link]

[46] Haoyu Zhang, Baodong Qin, and Dong Zheng, “Registered Keyword Searchable Encryption Based on SM9,” Applied Sciences, vol. 13, no. 5, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[47] Mohammad Raouf Senouci et al., “An Efficient and Secure Certificateless Searchable Encryption Scheme Against Keyword Guessing Attacks,” Journal of Systems Architecture, vol. 119, 2021.
[
CrossRef] [Google Scholar] [Publisher Link]

[48] Qiong Huang, and Hongbo Li, “An Efficient Public-key Searchable Encryption Scheme Secure Against Inside Keyword Guessing Attacks,” Information Sciences, vol. 403-404, pp. 1–14, 2017.
[
CrossRef] [Google Scholar] [Publisher Link]

[49] Xiangyu Pan, and Fagen Li, “Public-key Authenticated Encryption with Keyword Search Achieving Both Multi-Ciphertext and Multi-Trapdoor Indistinguishability,” Journal of Systems Architecture, vol. 115, 2021.
[
CrossRef] [Google Scholar] [Publisher Link]

[50] Yang Lu, and Jiguo Li, “Lightweight Public Key Authenticated Encryption with Keyword Search Against Adaptively-Chosen-Targets Adversaries for Mobile Devices,” IEEE Transactions on Mobile Computing, vol. 21, no. 12, pp. 4397–4409, 2021.
[
CrossRef] [Google Scholar] [Publisher Link]

[51] Mihir Bellare, Kenneth G. Paterson, and Phillip Rogaway, “Security of Symmetric Encryption Against Mass Surveillance,” Advances in Cryptology-CRYPTO, 2014.
[
CrossRef] [Google Scholar] [Publisher Link]

[52] Mihir Bellare, Joseph Jaeger, and Daniel Kane, “Mass-surveillance without the State: Strongly Undetectable Algorithm-substitution Attacks,” Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1431–1440, 2015.
[
CrossRef] [Google Scholar] [Publisher Link]

[53] Shanshan Li et al., “A Secure Two-factor Authentication Scheme from Password-protected Hardware Tokens,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 3525–3538, 2022.
[
CrossRef] [Google Scholar] [Publisher Link]

[54] Emma Dauterman et al., “True2F: Backdoor-resistant Authentication Tokens,” 2019 IEEE Symposium on Security and Privacy (SP), 2019.
[
CrossRef] [Google Scholar] [Publisher Link]

[55] Suvradip Chakraborty, Stefan Dziembowski, and Jesper Buus Nielsen, “Reverse Firewalls for Actively Secure MPCs,” Advances in Cryptology-CRYPTO, 2020.
[
CrossRef] [Google Scholar] [Publisher Link]

[56]  Yevgeniy Dodis, Ilya Mironov, and Noah Stephens-Davidowitz, “Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines,” Advances in Cryptology-CRYPTO, 2016.
[
CrossRef] [Google Scholar] [Publisher Link]

[57] A. Beimel, “Secure Schemes for Secret Sharing and Key Distribution,” PhD Thesis, Israel Institute of Technology, Technion, 1996.
[
Google Scholar] [Publisher Link]

[58] Yinbin Miao et al., “Threshold Multi-keyword Search for Cloud-based Group Data Sharing,” IEEE Transactions on Cloud Computing, vol. 10, no. 3, pp. 2146–2162, 2020.
[
CrossRef] [Google Scholar] [Publisher Link]

[59] Ruizhong Du, Caixia Ma, and Mingyue Li, “Privacy-preserving Searchable Encryption Scheme Based on Public and Private Blockchains,” Tsinghua Science and Technology, vol. 28, no. 1, pp. 13-26, 2022.
[
CrossRef] [Google Scholar] [Publisher Link]

[60] Yun Wang, and Dimitrios Papadopoulos, “Multi-user Collusion-resistant Searchable Encryption for Cloud Storage,” IEEE Transactions on Cloud Computing, vol. 11, no. 3, pp. 2993-3008, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[61] Somchart Fugkeaw et al., “EVSEB: Efficient and Verifiable Searchable Encryption with Boolean Search for Encrypted Cloud Logs,” IEEE Access, vol. 13, pp. 101177-101195, 2025.
[
CrossRef] [Google Scholar] [Publisher Link]

  • PDF
  • Citation
  • Abstract
  • Keywords
  • References
Citation Abstract Keywords References
  • Home
  • Authors Guidelines
  • Paper Submission
  • APC
  • Archives
  • Downloads
  • Open Access
  • Publication Ethics
  • Copyrights Infringement
  • Journals
  • FAQ
  • Contact Us

Follow Us

Copyright © 2025 Seventh Sense Research Group® . All Rights Reserved