Journal of Applied Science and Engineering

Published by Tamkang University Press

1.30

Impact Factor

2.10

CiteScore

Zemin WangThis email address is being protected from spambots. You need JavaScript enabled to view it.

Zhengzhou Medical College, Zhengzhou 452385 China


 

Received: September 25, 2024
Accepted: March 9, 2025
Publication Date: April 23, 2025

 Copyright The Author(s). This is an open access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are cited.


Download Citation: ||https://doi.org/10.6180/jase.202512_28(12).0014  


The national judicial system has put forward higher requirements for the sharing of legal data, but existing legal data sharing schemes still have some problems, such as weak data security, unrestricted user access. They are difficult to meet the specific needs of shared data. In order to solve these problems, a blockchain searchable encryption scheme that can realize multi-party sharing of legal data is proposed. The combination of conditional broadcast agent re-encryption and public key searchable encryption protects the confidentiality of legal data and realizes the keyword trapdoor search. The proxy re-encryption is added to the broadcast mechanism to realize the multi-user sharing of encryption once, reduce the computing burden of the data owner, and achieve f ine-grained access control through conditional value setting. The multi-party search and sharing model of encrypted legal data is designed, and the keyword file number is stored and indexed by the blockchain, so as to ensure that the data cannot be tampered with and the search is reliable. The analysis results show that the scheme realizes the safe search and sharing of legal data, and the multi-user controllable sharing is suitable for the new judicial system with complex data exchange.


Keywords: Blockchain searchable encryption; Multi-party sharing; Legal data; Proxy re-encryption


  1. [1] O.Popoola, M. Rodrigues, J. Marchang, A. Shenfield, A. Ikpehai, and J. Popoola, (2024) “A critical literature review of security and privacy in smart home healthcare schemes adopting IoT & blockchain: problems, challenges and solutions" Blockchain: Research and Applica tions 5(2): 100178. DOI: 10.1016/j.bcra.2023.100178.
  2. [2] O.Kuznetsov, P. Sernani, L. Romeo, E. Frontoni, and A. Mancini, (2024) “On the integration of artificial in telligence and blockchain technology: a perspective about security" IEEE Access 12: 3881–3897. DOI: 10.1109/ACCESS.2023.3349019.
  3. [3] S. Yin, H. Li, A. A. Laghari, L. Teng, T. R. Gadekallu, and A. Almadhor, (2024) “FLSN-MVO: Edge Comput ing and Privacy Protection Based on Federated Learn ing Siamese Network With Multi-Verse Optimization Algorithm for Industry 5.0" IEEE Open Journal of the Communications Society: DOI: 10.1109/OJCOMS.2024.3520562.
  4. [4] V.Raja et al., (2024) “Exploring challenges and solutions in cloud computing: A review of data security and privacy concerns" Journal of Artificial Intelligence General science (JAIGS) ISSN: 3006-4023 4(1): 121–144. DOI: 10.60087/jaigs.v4i1.86.
  5. [5] O.D.Segun-Falade, O. S. Osundare, W. E. Kedi, P. A. Okeleke, T. I. Ijomah, and O. Y. Abdul-Azeez, (2024) “Assessing the transformative impact of cloud computing on software deployment and management" Computer Science & IT Research Journal 5(8): DOI: 10.51594/csitrj.v5i8.1492.
  6. [6] Y. Mou, L. Deng, and Y. Ruan, (2025) “A Revocable Certificateless Encryption Scheme for Multi-User" Con currency andComputation:Practice and Experience 37(1): e8321. DOI: 10.1002/cpe.8321.
  7. [7] S. Yin, H. Li, L. Teng, A. A. Laghari, and V. V. Estrela, (2024) “Attribute-based multiparty searchable encryption model for privacy protection of text data" Multimedia Tools and Applications 83(15): 45881–45902. DOI: 10.1007/s11042-023-16818-4.
  8. [8] A.Bisht, A.K.Das, and D.Giri,(2024)“Personalhealth record storage and sharing using searchable encryption and blockchain: A comprehensive survey" Security and Privacy 7(2): e351. DOI: 10.1002/spy2.351.
  9. [9] C. Jiang, C. Xu, and G. Yang. “Device-enhanced se cure cloud storage with keyword searchable encryption and deduplication”. In: European Symposium on Research in Computer Security. Springer. 2024, 396–413. DOI: 10.1007/978-3-031-70903-6_20.
  10. [10] M. Xie, X. Yang, H. Hong, G. Wei, and Z. Zhang, (2024) “A novel verifiable chinese multi-keyword fuzzy rank searchable encryption scheme in cloud environments" Future Generation Computer Systems 153: 287–300. DOI: 10.1016/j.future.2023.11.017.
  11. [11] F.Wang, H.Xiao, J.Wang, Y.Wang, and C.Cao,(2024) “Efficient secure channel free identity-based searchable encryption schemes with privacy preserving for cloud storage service" Journal of Systems Architecture 149: 103089. DOI: 10.1016/j.sysarc.2024.103089.
  12. [12] Z. Lin, H. Li, X. Chen, M. Xiao, and Q. Huang, (2024) “Identity-Based Encryption with Disjunctive, Conjunctive and Range Keyword Search from Lattices" IEEE Trans actions on Information Forensics and Security: DOI: 10.1109/TIFS.2024.3459646.
  13. [13] H. Liu, L. Deng, Y. Mou, B. Li, and J. Wen, (2024) “Identity-based authenticated multi-keyword searchable encryption scheme for cloud-assisted telemedicine information system" Computers and Electrical Engineering 120: 109816. DOI: 10.1016/j.compeleceng.2024.109816.
  14. [14] Q. Chai and G. Gong. “Verifiable symmetric search able encryption for semi-honest-but-curious cloud servers”. In: 2012 IEEE international conference on communications (ICC). IEEE. 2012, 917–922. DOI: 10.1109/ ICC.2012.6364125.
  15. [15] L. Chen, K. Huang, M. Manulis, and V. Sekar, (2021) “Password-authenticated searchable encryption" International Journal of Information Security 20(5): 675–693. DOI: 10.1007/s10207-020-00524-5.
  16. [16] C. V. Joe and J. S. Raj, (2021) “Deniable authentication encryption for privacy protection using blockchain" Journal of Artificial Intelligence and Capsule Networks 3(3): 259–271. DOI: 10.36548/jaicn.2021.3.008.
  17. [17] X. Yan, S. Feng, Y. Tang, P. Yin, and D. Deng, (2022) “Blockchain-based verifiable and dynamic multi-keyword ranked searchable encryption scheme in cloud computing" Journal of Information Security and Applications 71: 103353. DOI: 10.1016/j.jisa.2022.103353.
  18. [18] H. Li, Q. Huang, J. Huang, and W. Susilo, (2022) “Public-key authenticated encryption with keyword search supporting constant trapdoor generation and fast search" IEEE Transactions on Information Forensics and Security 18: 396–410. DOI: 10.1109/TIFS.2022.3224308.
  19. [19] X. Tang, C. Guo, K.-K. R. Choo, Y. Liu, and L. Li, (2021) “A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain" Computer Networks 200: 108540. DOI: 10.1016/j.comnet.2021.108540.
  20. [20] L. Yao, J. Weng, A. Yang, X. Liang, Z. Wu, Z. Jiang, and L. Hou, (2023) “Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing" Information Sciences 624: 777–795. DOI: 10.1016/j.ins.2022.12.035.
  21. [21] L. Teng and H. Li, (2018) “A High-efficiency Discrete Logarithm-based Multi-proxy Blind Signature Scheme via Elliptic Curve and Bilinear Mapping." Int. J. Netw. Se cur. 20(6): 1200–1205. DOI: 10.6633/IJNS.20181120(6).20.
  22. [22] Y.Sun, S. Yin, J. Liu, and L. Teng, (2019) “A Certificate less Group Authenticated Key Agreement Protocol Based on Dynamic Binary Tree." Int. J. Netw. Secur. 21(5): 843–849. DOI: 10.6633/IJNS.20190921(5).17.
  23. [23] B.B.Gupta,K.-C. Li, V. C. Leung, K. E. Psannis, S. Ya maguchi, et al., (2021) “Blockchain-assisted secure fine grained searchable encryption for a cloud-based healthcare cyber-physical system" IEEE/CAA Journal of Auto matica Sinica 8(12): 1877–1890. DOI: 10.1109/JAS.2021.1004003.
  24. [24] J. G. Chamani, Y. Wang, D. Papadopoulos, M. Zhang, and R. Jalili, (2021) “Multi-user dynamic searchable symmetric encryption with corrupted participants" IEEE Transactions on Dependable and Secure Computing 20(1): 114–130. DOI: 10.1109/TDSC.2021.3127546.
  25. [25] C. Jiang, C. Xu, Z. Zhang, and K. Chen, (2023) “SR PEKS: Subversion-resistant public key encryption with keyword search" IEEE Transactions on Cloud Computing 11(3): 3168–3183. DOI: 10.1109/TCC.2023.3266459.
  26. [26] F. Shen, L. Shi, J. Zhang, C. Xu, Y. Chen, and Y. He, (2024) “BMSE: Blockchain-based multi-keyword search able encryption for electronic medical records" Computer Standards & Interfaces 89: 103824. DOI: 10.1016/j.csi.2023.103824.
  27. [27] F. Zhou, Z. Jiao, Q. Wang, and J. Sun, (2024) “Bcvse: Verifiable searchable encryption scheme with blockchain supporting fuzzy query" Arabian Journal for Science and Engineering 49(3): 4401–4418. DOI: 10.1007/s13369-023-08482-5.
  28. [28] A. Arabnouri and A. Shafieinejad, (2024) “BACASE SH: Blockchain-based authenticated certificate-lessasym metric searchable encryption for smart healthcare" Peer to-Peer Networking and Applications 17(4): 2298–2314. DOI: 10.1007/s12083-024-01687-x.
  29. [29] H.Yu, S. Liu, L. Chen, and Y. Gao, (2024) “Blockchain enabled one-to-many searchable encryption supporting designated server and multi-keywords for Cloud-IoMT" Journal of Systems Architecture 149: 103103. DOI: 10.1016/j.sysarc.2024.103103.