A Review of Functional Encryption in IoT Applications
A Review of Functional Encryption in IoT Applications
Review
A Review of Functional Encryption in IoT Applications
Khurram Shahzad 1, * , Tanveer Zia 1,2 and Emad-ul-Haq Qazi 2
1 School of Computing, Mathematics and Engineering, Charles Sturt University, Wagga Wagga 2650, Australia
2 Center of Excellence in Cybercrime and Digital Forensics, Naif Arab University for Security Sciences,
Riyadh 14812, Saudi Arabia
* Correspondence: [email protected]
Abstract: The Internet of Things (IoT) represents a growing aspect of how entities, including humans
and organizations, are likely to connect with others in their public and private interactions. The
exponential rise in the number of IoT devices, resulting from ever-growing IoT applications, also gives
rise to new opportunities for exploiting potential security vulnerabilities. In contrast to conventional
cryptosystems, frameworks that incorporate fine-grained access control offer better opportunities for
protecting valuable assets, especially when the connectivity level is dense. Functional encryption
is an exciting new paradigm of public-key encryption that supports fine-grained access control,
generalizing a range of existing fine-grained access control mechanisms. This survey reviews the
recent applications of functional encryption and the major cryptographic primitives that it covers,
identifying areas where the adoption of these primitives has had the greatest impact. We first provide
an overview of different application areas where these access control schemes have been applied.
Then, an in-depth survey of how the schemes are used in a multitude of applications related to IoT is
given, rendering a potential vision of security and integrity that this growing field promises. Towards
the end, we identify some research trends and state the open challenges that current developments
face for a secure IoT realization.
Keywords: IoT; functional encryption; security; privacy; fog and cloud computing; data sharing;
blockchain; e-Health
Citation: Shahzad, K.; Zia, T.; Qazi,
E.-u.H. A Review of Functional
Encryption in IoT Applications.
Sensors 2022, 22, 7567. https:// 1. Introduction
doi.org/10.3390/s22197567
1.1. Background
Academic Editor: Raffaele Bruno The last decade has seen an explosion in digital technologies, essentially transforming
Received: 26 July 2022
the way we produce, store and transmit information. Our lives are dependent on the use
Accepted: 26 September 2022
of services brought about through this change, whether it be as simple a task as opening
Published: 6 October 2022
the garage door or transferring highly personal information including medical records
and financial transactions. One of the drivers behind the recent data revolution is the
Publisher’s Note: MDPI stays neutral
Internet of Things (IoT) [1], which revolves around the idea of connecting a multitude
with regard to jurisdictional claims in
of devices. These devices, ranging from small sensors to advanced electronic gadgets,
published maps and institutional affil-
communicate and exchange information with either each other or central entities to form
iations.
a network. Through the use of smart terminals equipped with sensors and actuators,
and the integration of technologies and promising solutions, the IoT constitutes a network
of distributed intelligence, realizing the vision of a smart connected world. The variety
Copyright: © 2022 by the authors.
of applications wherein IoT has made a difference is vast, ranging from massive IoT
Licensee MDPI, Basel, Switzerland. applications to time- and information-critical IoT networks. The range of IoT applications
This article is an open access article is visually depicted in Figure 1. The positives of this modern digital transformation also
distributed under the terms and resulted in some negatives, among which the security and privacy of information appears
conditions of the Creative Commons to be of the highest concern. Apart from the standard security concerns involved in generic
Attribution (CC BY) license (https:// broadcast-natured wireless systems, IoT comes with its own additional challenges. These
creativecommons.org/licenses/by/ challenges stem from its unique characteristics including the range of communication,
4.0/). desired capabilities of self-organization and the availability of limited resources. The IoT
also often connects to the cloud for added storage and computation capabilities, which
brings upon additional challenges in maintaining desired security and privacy.
Researchers from the industry and academia alike are interested in analyzing and
developing ways to achieve the highest possible degree of information security, whether
it be identity protection, data integrity and security, or simply ensuring users that both
their day-to-day and sensitive information is in safe hands. Traditional approaches to data
integrity and security are highly dependent on public-key cryptography [2,3], which has
been driving the research efforts in the cryptographic community for a long time. In these
conventional cryptosystems, the decryption process eventually recovers the underlying
plaintext if the decryption process is successful, which means that all the information
contained in the plaintext is revealed. However, there are many applications where only
a partial exposure of the contained information is needed. For example, a financial orga-
nization may want to filter transactions above a certain amount in which case decrypting
the exact value of all transaction records is not needed. Rather, a simple decision on the
transaction amount determining whether it is above or below the desired threshold is
needed. Similarly, access rights in broadcast transmissions need to determine the level of
access that a user is granted instead of revealing the complete content of the transmission.
These rights can be determined based on, among other things, a user’s identity, affiliation,
attributes and organizational standing. This is specifically needed to hold under circum-
stances where the encryptor does not necessarily know the identity or attributes of the
decryptor, but rather all that is needed are the required attributes to determine the access
structure. Such a structure for data access drastically changes the way that information
access can be determined since it fundamentally alters the way in which data are distributed
among receivers and also affects the steps taken to ensure the security and integrity of these
data. This fine-grained access control provides a method of controlling certain forms of
data access, and compared to generalized data access control, it uses more distinctive and
variable methods for allowing access. Fine-gained access control provides the ability to
Sensors 2022, 22, 7567 3 of 50
centrally store data, maintain confidentiality and precision, improve security and improve
the information access for authorized users.
Functional encryption (FE) [4] is a public-key encryption scheme with different de-
cryption keys allowing a user to learn specific functions of the encrypted data. The control
that FE offers over which functions are allowed to be computed on the data and by which
user immensely benefits the data owner in multiple ways. For example, if suspicious
activity is observed within an organization, a scan of system logs might help understand
the origin of this activity. However, sharing the complete logs with an external security
expert may not be feasible as it gives them access to the entire network data. In such a
situation, a function can be generated for the expert to only look at the transmission-control
protocol (TCP) port, giving the external expert the corresponding key, and restricting their
access only to the desired information. Since its introduction, functional encryption has
attracted a lot of interest, and its known results are broadly categorized as either focusing on
feasibility results for general functionalities, or concrete, efficient realizations for restricted
functionalities of practical interest [5]. In this work, we review the recent applications of
functional encryption and the major cryptographic primitives that it covers. We identify
the areas in which the adoption of these primitives has had the greatest impact, especially
in the realm of IoT. Our work provides a review of these applications without strictly going
into the mathematical details associated with each area of application. This essentially
helps readers understand the domains and guides them towards further exploration in the
desired directions.
out of scope. The authors in [10] provided a review of IBC and a comparison with tra-
ditional public-key encryption. After reviewing some important IBE schemes based on
bilinear pairing, a computational primitive widely used to build various identity-based
cryptographic schemes, a number of real-world applications were identified. Li et al. [11]
surveyed identity-based signcryption (IBSC) schemes (Signcryption is the cryptographic
primitive that meets both requirements of authenticity and confidentiality of crowdsourced
data among users and is ideal for ensuring secure authentic data storage and transmission
in industrial crowdsourcing environments), providing a comparison on their security prop-
erties and efficiency. Several recommendations to improve the performance of IBSC were
made, including the construction of schemes in the standard model, the construction of
post-quantum signcryption schemes and efficiency improvements.
Wang et al. [12] provided a survey on the two main techniques of searchable encryption
(SE), namely symmetric SE (SSE) and public key encryption with keyword search (PEKS).
Different SE schemes are categorized and compared in terms of functionality, efficiency,
and security. The work of [13] describes the notion of SE in the context of healthcare appli-
cations and characterizes the SE use cases into different healthcare scenarios. The authors
provided a comprehensive overview of the four representative SE techniques: SSE, PEKS,
attribute-based encryption with keyword search (ABKS), and proxy re-encryption with
keyword search (PRES) according to different electronic health records (EHRs) retrieving
scenarios and requirements. Furthermore, the categorization and comparison of different
SE schemes in terms of their security, efficiency, and functionality is also provided. In a
more recent work, the authors in [14] presented a complete taxonomy/classification of
the searchable encryption schemes in terms of the type of search, type of index, results
retrieved, implementation type, multiplicity of users, and the techniques used. A more
recent study in [15] provided the reader with a wide view of the different FE schemes, fo-
cusing on their functionalities, limitations, security models, and the involved mathematical
assumptions. The authors also presented an overview of “non-standard” FE schemes that
go beyond the inner product encryption and schemes with enhanced properties.
did not address specific IoT applications were also excluded from further analysis. More
specifically, the articles considered for further analysis met the criteria as (i) they considered
fine-grained access control in one of the variations given above; and (ii) they presented ap-
plication of access control in an application area of IoT. Further screening was also applied
to those records that did not offer full-text availability and were deemed unsuitable for
inclusion in the review due to the fact they were not applicable in IoT areas. We summarize
the process of search, exclusion, and selection in Figure 2, where it can be seen that although
the initial search resulted in a total of 410 articles, the number was reduced to 155 articles
after the analysis, filtering, and classification. We also provided a distribution of the works
considered in this study according to the publication year in Figure 3.
Figure 2. PRISMA components of this review on applications of fine-grained access control in IoT.
1.3.2. Contribution
In this work, we surveyed the recent applications of FE along with the commonly
occurring cryptographic primitives that it generalizes. More specifically, we looked at the
prominent works presented in the literature in recent years covering the applications of
these cryptographic primitives to IoT-related domains. Our main contributions can be
summarized as follows:
• We present a comprehensive review of the use of FE and encompassed fine-grain
access control mechanisms in IoT applications.
• We provide a detailed overview of the different application areas where fine-grain
access schemes were applied.
• We provide an in-depth survey of how these schemes are used in a multitude of
applications related to IoT. The aim was to provide the reader with a potential vision
of fine-grained security and integrity in IoT.
• We identify some research trends and state some open challenges that current devel-
opments face for a secure IoT realization.
the applications of ABE; Section 5 describes the work utilizing IBE for the most common
application areas; Section 6 presents the works using SE; Section 7 describes the applications
of PE; and the applications wherein FE is utilized are given in Section 8. We provide some
open challenges and related research trends in Section 9, and finally, some conclusions are
drawn in Section 10. A graphical outline of this work is also shown in Figure 4. We also
note that there is a significant overlap in the application areas of all these cryptographic
techniques, whereas the underlying schemes and targeted benefit drawn upon differ greatly
depending on the utilization of these schemes.
Figure 3. The number of works considered in this work, shown according to the publication year. ‘X
represents year 2003 and earlier.
Sensors 2022, 22, 7567 7 of 50
• M = Decrypt( Par, ID, CP)—This outputs the message M taking as input the cipher-
text CP alongwith Par and ID. In the case of decryption failure, it outputs ⊥.
to obtain the plaintext. It is often necessary to only grant access to a function of the plaintext,
depending on the decryptor’s authorization. For example, law enforcement agencies may
ask the cloud to search for particular individual’s images, hence the cloud only needs
restricted access to decrypt images that only contain the target individual, and nothing
else from the images is revealed. Many applications such as spam filters, parental control,
or targeted advertising, only require a partial knowledge of the data. Functional encryption
adapts these useful applications for the desired data privacy and confidentiality, since only
the relevant, processed information is revealed.
As compared to public-key cryptography systems, which contain three algorithms
of Setup, Encryption and Decryption, FE systems also include a fourth algorithm called
KeyGen. The KeyGen algorithm takes as input the master key mk generated by Setup and
a description of some function f , and outputs a key sk [ f ] that is specific to the function f .
More precisely, if c is the result of encrypting x with public key pk, then the decryption
of c using sk [ f ] outputs f ( x ). It should be emphasized here that that sk( f ) does not fully
decrypt c, rather it provides only a function f of the full decryption. However, for full
decryption, users can use a secret key for some function, say g, where g( x ) = x for all x.
An FE system is secure if an attacker with a set of secret keys sk [ f 1 ], . . . , sk [ f t ] can learn
nothing about the decryption of some ciphertext c other than what is revealed by the keys
at the attacker’s disposal (we refer the interested reader to [4,15] for further mathematical
details including the security model analysis).
For further illustration, we consider the common example of spam filtering on en-
crypted mail, as described in [44] and depicted in Figure 5. Here, the email recipient, who
has a master secret key sk, gives a spam-filtering service a key sk [ f ] for the functionality
f ; this f satisfies f ( x ) = 1 whenever message x is marked as spam by a specific spam
predicate, otherwise f ( x ) = 0. A sender encrypts an email message x to the recipient,
but the spam filter blocks the message if it is spam. The spam filter does its job through the
key sk [ f ] but learns nothing else about the contents of the message.
Based on the seminal work of [17], the tutorial style article by Boneh et al. [44] explains
the basic ideas for FE, encompassing previous specializations of public-key encryptions
such as IBE and ABE as special cases of FE. Motivating the use of FE through practical
examples such as spam filtering on encrypted email, expressive access control and the
mining of large datasets, it discusses how FE supports the richest possible families of
functions and also provides an insight into the inherent limitations of FE systems. It is
notable that FE generalizes several existing cryptographic primitives including IBE and
ABE, among others. Under the FE terminology, IBE can be formulated as equality testing
functionality, where assuming pk and mk to be output of an FE setup, the encryptor uses
the encryption algorithm as E( pk, (id, m)) to obtain the ciphertext, while the data being
encrypted are the pair (id, m). A recipient with an identity of id∗ can use the secret key
sk [ f id∗ ], issued by the authority, where the function f id∗ outputs m if id = id∗ , otherwise
it produces a ⊥. Under this construction, users can only decrypt messages intended for
id∗ , otherwise they learn nothing about messages which are encrypted for other identities.
Similarly, in the case of a ciphertext-policy ABE system, the policy φ specifies the recipient
attributes that can decrypt the ciphertext and the encryption function takes into account
Sensors 2022, 22, 7567 11 of 50
the pair (φ, m) to generate the ciphertext. The message m is successfully decrypted if all
the specified attributes of the recipient match the ones specified in the policy else a ⊥ is
the output.
A brief summary of the advantages and disadvantages of the above discussed primi-
tives is given in Figure 6, providing the reader with an intuitive understanding of these
approaches. It should be noted that the details in Figure 6 are not application-specific,
and can be used as general guidelines when choosing between different approaches to
achieve fine-grained access control and security.
Figure 6. A brief summary of the advantages and disadvantages of cryptographic primitives consid-
ered in this work.
Sensors 2022, 22, 7567 12 of 50
3. Areas of Application
In the modern day and age, the range of applications where the security and integrity
of information plays a vital role is virtually unlimited. The amount of data exchanged in
these applications is vast, and data integrity is not only important to the users but also
to various service providers. The Internet of Things [1,45], enabling the realistic vision
of ‘everything smart’ is one of the most common and crucial areas where the security
and integrity of data are highly desirable. A variety of modern-day applications rely on
numerous IoT devices distributed across every possible surface, equipped with various
IoT-based sensors for data collection and further uploading these data to the relevant
authorities. Apart from analysis and response, these data also allow control authorities to
make intelligent decisions and develop algorithms for improved performance. Even though
this realization of IoT seems exciting and able to solve several problems, the characteristics
of these IoT sensor devices make the security and privacy of all the involved information
very critical.
In the following, we provide an overview of some of those application areas that
were considered in this survey, providing the reader with a glimpse of relevant security
concerns in these applications. The major application areas covered in this work are
shown in Figure 7, whereas Figure 8 details the application areas considered under each
cryptographic primitive.
Figure 7. Application areas for FE and encompassed primitives considered in this work.
Sensors 2022, 22, 7567 13 of 50
Fog and Cloud Computing—Cloud computing [46] enables the sharing of resources
as services for software, infrastructure and platforms for customers. Cloud customers,
in general, store their sensitive data in encrypted form. Fog computing [47], as shown
in Figure 9, extends cloud computing to the edge of the network, providing newer ser-
vices such as location awareness, low latency and quality-of-service (QoS) enhancement.
However, significant threats exist in cloud- and fog-based computing networks relating to
data alteration, unauthorized access and eavesdropping attacks. Furthermore, fog nodes
are considered to be more easily compromised and less trustworthy due to their closer
deployment to the network edge. These issues raise the most concerns among users who
look to utilize fog and cloud resources for data storage and sharing.
Figure 8. A list of applications covered in this work under considered cryptographic primitives.
Data Search and Sharing—With the recent increase in the amount of data exchanged [48],
their transmission and sharing across public networks should be treated carefully. This,
in part, can be attributed to the fact that in public networks, participating users are not
fully trusted and everyone, including the adversaries, can easily become part of the net-
work. On the other hand, searching is an increasingly important aspect for the retrieval
of desired information. Since data are generally stored in encrypted form with cloud
service providers, extracting desired information may require the decryption of all the data
which are computationally complex and infeasible. Furthermore, traditional public-key
encryption with keyword search (PEKS) schemes involve public-key infrastructure (PKI) to
authenticate users over the network which is considered a complex and costly task due to
the involvement of certificate revocation, storage, distribution and verification.
e-Health Applications—Smart health systems [49], as shown in Figure 10, enable the
exchange of sensitive and personal data between doctors and patients. If the doctors have
Sensors 2022, 22, 7567 14 of 50
timely access to a patient’s medical information, this can result in better advice and medical
services. The privacy of these data can be threatened if these sensitive data are exposed
to an open network. Furthermore, since most health sensors and mobile devices have
constrained resources, quickly producing and processing ciphertexts can be challenging.
Smart Homes and Cities—Smart homes and cities, as shown in Figure 11, are per-
ceived to facilitate the needs of modern citizens, improving the overall quality of their life.
Smart homes [50] are envisioned to connect all appliances and objects together, integrating
them in the Internet through smartphones and other mobile devices. However, all these
connected devices contain personal information flowing through them, causing concerns
among home owners about their privacy. On the other hand, smart cities [51] can address
the major problems in most urban areas including traffic congestion, energy and resource
management, education, sanitation and healthcare services. However, these technologies
heavily rely on some underlying infrastructure, e.g., IoT sensors to achieve the desired
purpose. Furthermore, the large amounts of data produced for the purposes of observation
and analysis are generally outsourced to a cloud storage service (CSS) for ease of access
and enhanced security. As soon as the data land on the cloud, the user’s control is lost and
they have to fully trust the CSS. To encounter these problems, it has been often proposed to
store encrypted data on the cloud while ensuring fine-grained access control.
designed privacy-preserving framework such that users can benefit from ML without
revealing their own models and training data. More recent approaches, including federated
learning [55], have every user train their model locally and then exchange only model
parameters with others, instead of the sensitive training data. Although this protects the
local exchanges among users, it requires sophisticated approaches to security and privacy.
Figure 10. e-Health applications offer quick and safe access for both doctors and patients, resulting
in better advice and services.
Figure 11. Smart cities are perceived to improve the overall quality of life for their citizens.
4. Attribute-Based Encryption
ABE is a public-key encryption scheme in which the user attributes determine their
secret key and the resulting ciphertext. Thus, the decryption of a ciphertext is only possible
if the set of attributes of the user key matches the attributes of the ciphertext. A review of
the significant literature on ABE in terms of applications for the last decade is provided
in Table 2. In the following, we review some works on the application of ABE in the
IoT domain.
Blockchain-Based IoT Ecosystem—The work in [64] used ABE to address the privacy
and confidentiality of the data shared in blockchain-based IoT ecosystems. It proposes
a restructuring of the blockchain protocol to absorb ABE and provide an end-to-end
privacy-preserving blockchain system. The use of blockchains in IoT offers major security
advantages including the mitigation of data manipulation attacks, avoiding data tampering
and trust building based on node reputation. The authors considered a decentralized ABE
thus more than one AA issues credentials for miners and users, avoiding any single point
of failure. Similarly to traditional blockchain applications, transactions are verified through
AAs using ABE and new blocks are added after mining in a periodic fashion. To guarantee
a stronger security, the blockchain protocol specifies the minimum number of miners for
transaction verification and AAs will be forced to wait until the number of miners for an
attribute surpasses the minimum requirement set by the protocol.
Secure MQTT for IoT—Protocols such as Message Queue Telemetry Transport
(MQTT) [140] are widely used in D2D communication in IoT for rapid developments,
but lack security features. The authors in [65] proposed secure versions of these protocols
where the existing security features are augmented with KP/CP-ABE, based on elliptic
curve cryptography (ECC) [141]. The authors studied the suitability of ABE schemes for
MQTT from an IoT perspective, and evaluate the performance of these secure protocols
in IoT. A new published service ‘Spublish’ is described where the messages are encrypted
using ABE, and suitability is provided based on lightweight ECC. The performance is
evaluated in terms of the time taken to perform encryption, decryption, key generation and
validation against a varying number of attributes with different key sizes. It is shown that a
Secure-MQTT-based KP-ABE scheme is suitable for scenarios where the access policies are
fixed and known a priori, and the requirement of an interactive public key generator (PKG)
is feasible. On the other hand, secure-MQTT based on CP-ABE is more suitable for those
deployments where devices can afford higher computing power and storage, and require
dynamic access policies.
Cooperative Signcryption for IoT Applications—The paper [66] presented a coop-
erative privacy preserving attribute-based signcryption scheme (C-ABSC) based on the
constant-size attribute-based signcryption technique [142]. The main idea presented by
the authors relies on the distribution of the signcrypting operation among different de-
vices, with respect to the selected subsets of a general access predicate. Thus, each device
signcrypts its input data and sends them to an untrusted aggregator (e.g., the edge node
in a cloud scenario) who is capable of decrypting the received data only if a sufficient
number of IoT devices cooperate. The proposed cooperative signcryption scheme does not
reveal more information other than the authenticity of the information. The analysis of the
proposed scheme further shows that the size of the signcrypted data does not depend on
the number of attributes in the access policy.
Attribute-Based Encryption and Routing in ICN—Due to data replication and dis-
semination, it is often difficult for the data owner to control data access in existing
information-centric networking (ICN) implementations. The work of [67] enhances ICN’s
ability to support data confidentiality by introducing ABE into ICN and making the ap-
proach specific to data attributes. The authors proposed an ABE and searchable data
encryption (SDE)-based encryption scheme for content-centric data privacy in ICN, which
offers fine-grained access control policies. The scheme facilitates large-scale applications by
decoupling publishers and subscribers without any need to share keys, as is customary in
symmetric encryption. Under the proposed approach, user privacy is preserved by encrypt-
ing subscription interests while routers can still forward encrypted data to subscribers.
ABE for Industrial IoT—The authors in [68] proposed an ABE scheme suitable for
industrial IoT applications, fABElous, aiming to minimize the encryption overhead in
communication. It should be noted that the computation power for the execution of ABE is
generally not a major concern, as it was shown to be suitable for IoT sensor devices [60],
however, the overhead generated by ABE can be heavy for the communication protocol
as it generates roughly 1 kB overhead per message. In the setting under consideration,
Sensors 2022, 22, 7567 20 of 50
a wireless sensor and actuator network (WSAN) is examined where sensors and actuators
exchange encrypted information. Under the given threat model, an eavesdropper is unable
to gain any information as they lack the symmetric key and the ABE decryption key. Simi-
larly, if compromised, the architecture proposes that the sensors periodically refresh their
symmetric keys, minimizing the information retrieved by an attacker. Although fABElous
has a huge overhead as compared to no security, it has less communication overhead when
compared to naive CP-ABE. Furthermore, as the number of data exchange executions
increases, the overhead becomes lower and lower, and in its best-case scenario, fABElous
has less than 50% of naive CP-ABE.
attribute bloom filter (ABF) is proposed which hides the entire attributes in the anonymous
access control structure. To generate the ciphertext more quickly, the use of online/offline
encryption is proposed where the majority of the work needed in the encryption phase is
completed before knowing the exact message. Furthermore, in the case of an increase in
system users’ attributes, the proposed system does not need to be reinitialized, resulting
in improved efficiency. Although hiding the values of attributes protects user privacy
to a certain extent, even the names of attributes can leak some sensitive information.
To cater for this, the authors propose to hide the attributes in an access control structure.
For successful attribute assignment and gaining the secret key, both data owners and
users should register and be authenticated with the attribute authority. Due to the use of
pre-encryption technology, ciphertext is generated more quickly, which is well-suited for
terminals with limited computing power.
User Study and Evaluation for ABE Adoption in Hospitals—To study the integra-
tion of ABE in e-Health environments, the work in [77] conducted a study to identify use
cases and requirements, and to learn the integration of ABE in IT processes. Based on the
identified requirements through a focus group, an adaptive prototype implemented and
evaluated through a cognitive walkthrough with usability experts. The target is to identify
application scenarios and best-suited strategies to embed the useful features of ABE into
the daily routine of a hospital. The authors proposed an architecture that is adaptive and
matches the requirements of healthcare domain. The requirements derived from the focus
group are taken into account for the development of a user management and container
management (UMCM) endpoint, which deals with the authentication and authorization of
users and also the validation of claimed email addresses that serve as part of user identity.
The end users maintain a contact list and tags corresponding to identities with attributes,
where the client application takes care of the policy authoring process.
5. Identity-Based Encryption
IBE is public-key encryption wherein a user generates a public key from a known
unique identifier such as age or an email address or known location, and a TTP server
calculates the corresponding private key from the public key. As a result, there is no need
to distribute public keys before the exchange of encrypted information. A review of the
significant literature on IBE in terms of applications for the last decade is provided in Table 3.
In the following, we review some works on the application of IBE in the IoT domain.
identity based on virtual IPv6 addresses and authenticates devices and gateways through
a hierarchical and distributed deployment. The key establishment method is based on
elliptic curve cryptography (ECC) [141], while the root controller public key is assumed to
be hardcoded in each thing when manufactured. The authors provided details of all the
phases involved in the process of authentication, including public key certification, thing
registration and the authentication phase. The evaluation of the proposed scheme shows
that it is safe against masquerade, man-in-the-middle and replay attacks.
IBE for Post-Quantum Secure IoT—The authors in [80] demonstrated that IBE has
become practical for a range of embedded devices for the Internet of Things. The authors
explored how different security levels and parameters for the underlying ring learning
with errors (RLWE) assumption [145] will affect the implementation of IBE encryption
and decryption in a range of typical IoT devices. Furthermore, the authors also proposed
parameters for a pair of security levels that render an efficient IBE implementation via the
number theoretic transform (NTT) [146] possible. In particular, the authors considered an
ARM Cortex-M0 and an ARM Cortex-M4 for low-cost microcontrollers and a Xilinx Spartan-
6 for FPGA implementation. The implementation results provided a detailed analysis
of the applied techniques and algorithms, comparing the cycle counts and read-only
memory (ROM) consumption, especially for the processes of encryption and decryption.
The results suggested that IBE is practical for IoT devices as the performance is only slightly
lower than the performance of RLWE Encrypt, with the added benefit of IBE’s simplified
key management.
IBE for Anonymous Communication in IoT—The article [81] proposed a scheme
to ensure the privacy and anonymity of a communication system based on anonymous
IBE, protecting the users’ metadata. In the proposed scheme, a user can send and receive
the ciphertext in the same round of communication, which apart from causing sufficient
confusion for the adversary, also results in improved efficiency. This work addresses the
security goal of anonymous communication in three aspects, consisting of the message
security, as well as the anonymity of both the sender and recipient. All the users follow a
slotted time format, where the operations of encryption, upload, download and decryption
are undertaken within pre-specified time slots. One downside of the proposed scheme
stems from the fact that every user is required to send at least one message in each round
of communication whether they want to have a communication or not.
Fuzzy IBE for Secure IoT—The work in article [82] presented a fuzzy IBE scheme that
is secure in the full model (i.e., the adversary can commit the target identity at any time)
without random oracles, and at the same time, has a tight security reduction and short
public parameters. Under the tight security reduction, the scheme does not need to enlarge
Sensors 2022, 22, 7567 24 of 50
the key and ciphertext size to obtain an increased security level. Due to these efficiencies of
the proposed scheme, the authors believe that the scheme is more suitable for secure IoT
communications. The authors also proved the semantic security of the proposed scheme
under the modified bilinear Diffie–Hellman exponent (2-MBDHE) assumption, which is
adapted from some of the previous [151] security constructions.
IoT Security Framework Based on IBE—The paper [83] proposes a lightweight se-
curity framework for IoTs using identity-based cryptography (IBC). The authors devel-
oped a hierarchical security architecture for IoTs, and provided protocols for secure IoT
communication such as for intra-domain and inter-domain communication, mutual au-
thentication and revocation. In contrast to prevalent mechanism, the authors envisioned
hierarchical topologies for IoT that can adapt to deployment at a massive scale. For the
intra-domain communication, the authors adapt the Sakai, Ohgishi and Kasahara (SOK)
scheme [152] for non-interactive key agreement. On the other hand, the mutual authenti-
cation scheme is a hybrid key management mechanism that uses IBE to set up pairwise
symmetric keys between s and gateway nodes, and operates in bootstrapping, operational
and post-operational phases. The scheme preserves data integrity by computing a message
authentication code (MAC) on the pairwise symmetric key to provide an increased level of
security, and it is shown that the scheme is scalable and incurs less overhead than traditional
public key-based cryptography.
Identity Signcryption for Industrial IoT—The authors in [84] presented an identity-
based signcryption (IBSC) scheme using bilinear pairing for IIoT deployment. After study-
ing two hard problems named modified bilinear Diffie–Hellman inversion (MBDHI) and
modified bilinear strong Diffie–Hellman (MBSDH) under polynomial time intractable
assumptions, the authors demonstrated through a rigorous security analysis that their
scheme is provably secure based on the intractability of decisional-MBDHI and MBSDH
assumptions. The scheme works on a multiplicative group elements, and proves its re-
sistance in the formal security structure. The performance of the proposed scheme is
illustrated considering the computational cost and the communication cost. Although the
scheme is efficient, the cost during signcrypted IIoT data generation and verification can be
reduced by eliminating the pairing overhead. Furthermore, the scheme does not support
any revocation facility.
security requires that the adversary cannot generate a valid, but different, signature σ0 on
the same message m). The proposed generic identity-based broadcast encryption (IBBE) has
a desirable property that its public parameter size and private key size are constant and that
its decryption cost is independent of the number of receivers. Furthermore, the ciphertext is
linear with the size of the receivers. Due to these characteristics, the proposed construction
is deemed to be appropriate for smart city information systems. The security model of the
proposed scheme builds on the IND-CCA (indistinguishability under chosen-ciphertext
attacks), ANO-CCA (anonymity under chosen-ciphertext attacks) and WROB-CCA (weakly
robust against chosen-ciphertext attacks) models. However, it should be noted that the
construction is proven in the random oracle model.
key issuing of IBE. The scheme implements mutual identity authentication between the
communicating parties through integrating blockchain in the key issuing process. Users are
treated as nodes of a blockchain, and are divided into the roles of supervision, production
and protection nodes. The authentication process consists of key issuing and identity
authentication to establish a secure communication channel. Furthermore, the role of the
nodes are changed from time to time to effectively reduce the attack probability, where
the change in roles is carried out through a consensus mechanism using the proof of vote
(PoV). To prevent any network attacks, the scheme employs timestamps, random numbers
and a hash algorithm in the process of identification. The analysis shows that the proposed
scheme can effectively resist network replay attacks and DoS attacks, guaranteeing integrity
and authenticity.
Data Privacy for Permissioned Blockchains—The authors in [91] presented a practi-
cal scheme by adding IBE to blockchain systems, effectively improving the data privacy
for non-transaction applications. The proposed approach has a high security level which
can prevent both disguised and passive attacks, offering functionality, effectiveness and
practicality in many applications for non-transactional scenarios. For many applications
related to the real-world economy, such as quality tracking, copyright and supply chain
finance, only data transfer is mainly needed which means that operations in consensus
are primarily the consolidation of data. The authors first constructed a simple ID-based
encryption privacy protection scheme that can be well applied to non-transaction scenarios
in permissioned blockchains. In the proposed scheme, a user’s public key is generated
through their identity, which simplifies the management and distribution of certificates
in traditional PKI systems. Any new user joining the permissioned blockchain can obtain
the encrypted key directly through their unique identity, which offers convenience in
comparison to PKI systems.
is analyzed under both the ROM and in standard model, and the efficiency is improved
using an online/offline encryption scheme.
6. Searchable Encryption
SE allows a user to encrypt and send a message to an information receiver who can
reassign it to a third party for searching the encrypted message for keywords without
compromising the security of the encrypted message contents. A review of the significant
literature on SE in terms of applications for the last decade is provided in Table 4. In the
following, we review some works on the application of SE in the IoT domain.
issue of resource-constrained IoT devices, the majority of the heavy computations of the
proposed scheme are transferred to the fog and cloud, whereas only a small part is reserved
for the users. The security analysis of the scheme demonstrates it to be secure under
IND-CK-CCA attacks and to satisfy the trapdoor indistinguishability.
Dynamic SE with Privacy Protection—The authors in [98] proposed a scheme to in-
crease efficiency where the cloud is used to generate and store IoT-aggregated files. Forward
privacy is achieved through a sublinear search efficiency by keeping an increasing counter
for each keyword at an IoT gateway. The proposed scheme achieves forward privacy
through the combination of locally stored state information and lightweight cryptography,
whereas the cloud server is unaware of whether a newly added file consists of certain
keywords except when the keyword is queried again. The proposed approach encrypts the
combined increasing counter and the keyword together, making the server unable to link
the keyword with the newly added file to any keywords in the cloud without knowing the
secret key. In addition, a secure pseudo-random function is used to hide the connections
with the generated tuples with the consecutive counter values.
Although the ciphertext of both the schemes is larger than most of the existing schemes,
it does not affect the user experience since the ciphertext uploaded to the cloud does not
require extra storage at IoT devices.
7. Predicate Encryption
PE is a novel cryptographic primitive that provides accurate fine-grained access to
encrypted data. In contrast to traditional public-key cryptographic systems, it has been
widely adopted in point-to-point communication systems. A cryptographic system such as
PE discerns the justification of information only being available to the users with access
rights, providing more fine-grained control over the ciphertext. A review of the significant
literature on PE in terms of applications over the last decade is provided in Table 5. In the
following, we review some works on the application of PE in the IoT domain.
8. Functional Encryption
FE is a public-key encryption scheme with different decryption keys allowing a user
to learn specific functions of the encrypted data. The control that FE offers over which
functions are allowed to be computed on the data by which user immensely benefits the
data owner in multiple cases. A review of the significant literature on FE in terms of
applications for the last decade is provided in Table 6. In the following, we review some
works on the application of FE in the IoT domain.
which allow the library user to choose the underlying primitives when instantiating an FE
scheme. Here, GoFE is implemented in GO, while CiFEr is implemented in C and aims at
a lower level, possibly IoT-related applications. The three prediction services which are
implemented using the developed libraries consist of an online privacy-friendly predictor
of cardiovascular diseases, anonymous traffic heatmap service and image classification on
encrypted data.
an untrusted third party such that the payment can be processed through a blockchain-
based cryptocurrency.
FE for UAV-Integrated Heterogeneous Networks—The work in [127] proposed the
use of FE in UAV-enabled HetNets to secure data against intrusion attacks. The process
of implementing FE is proposed in two phases: first between UE and macro base station
(MBS) and second between MBS and UE through UAVs. The work mainly focuses on the
activation of an intrusion monitoring process and attacker ejection. Furthermore, a Bayesian
game model was proposed to accurately detect the attacks with low overhead. Following
the standard construction of FE, the work mainly proposes to secure the communication
between the three parties, although no concrete construction is provided, and the security
validation is proposed to be conducted through the AVISPA tool [199].
been proven to be secure against CCA in the standard model. In the proposed scheme,
a user with secret keys associated with their DFA accepts the ciphertext-associated string
and can quite efficiently access the encrypted content with the help of the cloud service
provider. The authors leveraged the DFA-based FPRE scheme to realize fine-grained
access control over encrypted contents among a set of users, protecting the contents stored
in a semi-trusted cloud environment and allowing flexibility in specifying the access
rights of individual users. Through the use of computation outsourcing, the issue of high
computation at the user side is also addressed. The work follows the scheme of [202] which
allows the delegated key server to immediately revoke the attributes and malicious users.
Searchable Encryption using Multi-Input FE—The authors in [132] proposed a se-
cure and efficient searchable encryption scheme supporting multi-keyword search in a
single-owner multi-user settings. The scheme is mainly applicable in cases where the
number of keywords is limited but the number of files is large, such as sharing a compre-
hensive knowledge base in a certain field. In the proposed scheme, the cloud server is able
to complete search processes with search tokens consisting of only two items, resulting
in a significantly decreased communication and transportation overhead. The scheme
achieves an efficient multi-keyword search through the use of an inverted index structure
and super-incremental sequence. Furthermore, the scheme avoids per-query interaction
between the data owner and data user, hence the data owner does not need to stay online
for data users to search in their archives.
10. Conclusions
In this survey, we looked at a variety of application areas where FE and various
underlying cryptographic primitives have been used to enhance the security and integrity
of user data including their identity and access rights, among others. We first presented
a brief introduction to some of these primitives, including ABE, IBE, SE, PE and FE itself.
After the overview of some of these potential applications, particularly those based on IoT
sensors, we surveyed the recent literature utilizing these different cryptosystems in the
aforementioned application areas. Although a lot of these schemes have been developed
to address the broader areas of IoT and cloud computing, research in areas such as ML
and biometric identification using state-of-the-art sensors is also being looked into by
researchers. We aimed to provide the reader with a recent view of the developments
in this growing area of research from the point of view of applications, such that it can
inspire further interest. It should be noted that all the aforementioned primitives are
provably secure and provide unquestionable security, which generally causes an efficiency
barrier for various applications. For example, in a typical ABE implementation, the size
of ciphertext is proportional to the number of attributes associated with the access policy,
and the decryption time is proportional to the number of attributes used during decryption.
Similarly, most current ABKS schemes incur large computation costs in the encryption and
keyword search operations. In particular, when implementing an ABKS system inherited
from ABE technology, the size of the ciphertext is proportional (at least linearly) to the
number of attributes associated with the access policy. Future work should consider this
important aspect in terms of trade-off between the security and efficiency for different
cryptographic primitives, under various applications, and explore how the primitives
might need to be modified to suit the application.
Author Contributions: Conceptualization, K.S. and T.Z.; methodology, K.S.; investigation, K.S. and
E.-u.-H.Q.; resources, T.Z.; writing—original draft preparation, K.S.; writing—review and editing,
K.S., T.Z. and E.-u.-H.Q.; supervision, T.Z.; project administration, K.S.; funding acquisition, T.Z. and
E.-u.-H.Q. All authors have read and agreed to the published version of the manuscript.
Funding: This work was supported by Security Research Center at Naif Arab University for Security
Sciences (Project No. SRC-PR2-01).
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: Not applicable.
Acknowledgments: The authors would like to express their profound gratitude to the Vice Presidency
for Scientific Research at Naif Arab University for Security Sciences for their kind encouragement of
this work.
Conflicts of Interest: The authors declare no conflict of interest.
Abbreviations
List of abbreviations used in this work:
Acronym Description Acronym Description
AA Attribute Authority KGC Key Generation Center
AABE Attribute-Based Encryption KP-ABE Key-Policy ABE
Attribute-Based Encryption
ABKS LSTM Long Short-Term Memory
with Keyword Search
ABS Attribute-Based Signature MAC Message Authentication Code
AES Advanced Encryption Standard MAP Malware Analytic Provider
ASPE Asymmetric PE MANETs Mobile Ad Hoc Networks
CA Certificate Authority MBS Macro Base Station
CAA Central Attribute Authority CCA Chosen Ciphertext Attack
Sensors 2022, 22, 7567 41 of 50
References
1. Atzori, L.; Iera, A.; Morabito, G. The internet of things: A survey. Comput. Netw. 2010, 54, 2787–2805. [CrossRef]
2. Gaubatz, G.; Kaps, J.P.; Sunar, B. Public key cryptography in sensor networks—Revisited. In European Workshop on Security in
Ad-Hoc and Sensor Networks; Springer: Berlin/Heidelberg, Germany, 2004; pp. 2–18.
3. Galbraith, S.D. Mathematics of Public Key Cryptography; Cambridge University Press: Cambridge, UK, 2012.
4. Boneh, D.; Sahai, A.; Waters, B. Functional encryption: Definitions and challenges. In Theory of Cryptography, Proceedings of the 8th
Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, 28–30 March 2011; Springer: Berlin/Heidelberg, Germany, 2011;
pp. 253–273.
5. Abdalla, M.; Catalano, D.; Gay, R.; Ursu, B. Inner-product functional encryption with fine-grained access control. In Advances
in Cryptology—ASIACRYPT 2020, Proceedings of the 26th International Conference on the Theory and Application of Cryptology and
Information Security, Daejeon, Korea, 7–11 December 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 467–497.
6. Lee, C.C.; Chung, P.S.; Hwang, M.S. A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments.
IJ Netw. Secur. 2013, 15, 231–240.
7. Moffat, S.; Hammoudeh, M.; Hegarty, R. A survey on ciphertext-policy attribute-based encryption (CP-ABE) approaches to data
security on mobile devices and its application to IoT. In Proceedings of the International Conference on Future Networks and
Distributed Systems, Cambridge, UK, 19–20 July 2017.
Sensors 2022, 22, 7567 42 of 50
8. Balamurugan, B.; Krishna, P.V. Extensive survey on usage of attribute based encryption in cloud. J. Emerg. Technol. Web Intell.
2014, 6, 263–272.
9. Zhao, S.; Aggarwal, A.; Frost, R.; Bai, X. A survey of applications of identity-based cryptography in mobile ad hoc networks.
IEEE Commun. Surv. Tutor. 2011, 14, 380–400. [CrossRef]
10. Phaneendra, H. Identity-based cryptography and comparison with traditional public key encryption: A survey. Int. J. Comput.
Sci. Inf. Technol. 2014, 5, 5521–5525.
11. Li, F.; Khan, M.K. A survey of identity-based signcryption. IETE Tech. Rev. 2011, 28, 265–272. [CrossRef]
12. Wang, Y.; Wang, J.; Chen, X. Secure searchable encryption: A survey. J. Commun. Inf. Netw. 2016, 1, 52–65. [CrossRef]
13. Zhang, R.; Xue, R.; Liu, L. Searchable encryption for healthcare clouds: A survey. IEEE Trans. Serv. Comput. 2017, 11, 978–996.
[CrossRef]
14. Handa, R.; Krishna, C.R.; Aggarwal, N. Searchable encryption: A survey on privacy-preserving search schemes on encrypted
outsourced data. Concurr. Comput. Pract. Exp. 2019, 31, e5201. [CrossRef]
15. Mascia, C.; Sala, M.; Villa, I. A survey on Functional Encryption. arXiv 2021, arXiv:2106.06306.
16. Moher, D.; Liberati, A.; Tetzlaff, J.; Altman, D.G.; Group, P. Preferred reporting items for systematic reviews and meta-analyses:
the PRISMA statement. Ann. Intern. Med. 2009, 151, 264–269. [CrossRef] [PubMed]
17. Sahai, A.; Waters, B. Fuzzy identity-based encryption. In Proceedings of the Annual International Conference on the Theory and
Applications of Cryptographic Techniques, Aarhus, Denmark, 22–26 May 2005; Springer: Berlin/Heidelberg, Germany, 2005;
pp. 457–473.
18. Bethencourt, J.; Sahai, A.; Waters, B. Ciphertext-policy attribute-based encryption. In Proceedings of the 2007 IEEE Symposium
on Security and Privacy (SP’07), Oakland, CA, USA, 22–23 May 2007; IEEE: Piscataway, NJ, USA, 2007; pp. 321–334.
19. Cheung, L.; Newport, C. Provably secure ciphertext policy ABE. In Proceedings of the 14th ACM Conference on Computer and
Communications Security, Alexandria, VA, USA, 31 October–2 November 2007; pp. 456–465.
20. Goyal, V.; Jain, A.; Pandey, O.; Sahai, A. Bounded ciphertext policy attribute based encryption. In Proceedings of the International
Colloquium on Automata, Languages and Programming, Reykjyavik, Iceland, 7–11 July 2008; Springer: Berlin/Heidelberg,
Germany, 2008; pp. 579–591.
21. Liang, X.; Cao, Z.; Lin, H.; Xing, D. Provably secure and efficient bounded ciphertext policy attribute based encryption. In
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia,
10–12 March 2009; pp. 343–352.
22. Waters, B. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Proceedings
of the International Workshop on Public Key Cryptography; Springer: Berlin/Heidelberg, Germany, 2011; pp. 53–70.
23. Goyal, V.; Pandey, O.; Sahai, A.; Waters, B. Attribute-based encryption for fine-grained access control of encrypted data. In
Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 30 October–
3 November 2006; pp. 89–98.
24. Whitten, A.; Tygar, J.D. Why Johnny Ca not Encrypt: A Usability Evaluation of PGP 5.0. In Proceedings of the USENIX Security
Symposium, Washington, DC, USA, 23–26 August 1999; Volume 348, pp. 169–184.
25. Sheng, S.; Broderick, L.; Koranda, C.A.; Hyland, J.J. Why johnny still can’t encrypt: Evaluating the usability of email encryption
software. In Proceedings of the Symposium On Usable Privacy and Security, Pittsburgh, PA, USA, 12–14 July 2006, ACM: New
York, NY, USA, 2006; pp. 3–4.
26. Shamir, A. Identity-based cryptosystems and signature schemes. In Proceedings of the Workshop on the Theory and Application
of Cryptographic Techniques, Paris, France, 9–11 April 1984, Springer: Berlin/Heidelberg, Germany, 1984; pp. 47–53.
27. Boneh, D.; Franklin, M. Identity-based encryption from the Weil pairing. In Proceedings of the Annual International Cryptology
Conference, Santa Barbara, CA, USA, 19–23 August 2001; Springer: Berlin/Heidelberg, Germany, 2001; pp. 213–229.
28. Cocks, C. An identity based encryption scheme based on quadratic residues. In Proceedings of the IMA International Conference
on Cryptography and Coding, Cirencester, UK, 17–19 December 2001; Springer: Berlin/Heidelberg, Germany, 2001; pp. 360–363.
29. Park, J.H.; Lee, K.; Lee, D.H. Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups. IACR
Cryptol. ePrint Arch. 2016, 2016, 500.
30. Liu, J.; Ke, L. New efficient identity based encryption without pairings. J. Ambient Intell. Humaniz. Comput. 2019, 10, 1561–1570.
[CrossRef]
31. Yao, A.C. Protocols for secure computations. In Proceedings of the 23rd Annual Symposium on Foundations of Computer
Science (SFCS 1982) NW, Washington, DC, USA, 3–5 November 1982; IEEE: Piscataway, NJ, USA, 1982; pp. 160–164.
32. Gentry, C. Fully homomorphic encryption using ideal lattices. In Proceedings of the Forty-First Annual ACM Symposium on
Theory of Computing, Bethesda, MD, USA, 31 May–2 June 2009; pp. 169–178.
33. Song, D.X.; Wagner, D.; Perrig, A. Practical techniques for searches on encrypted data. In Proceedings of the 2000 IEEE
Symposium on Security and Privacy, S&P, Berkeley, CA, USA, 14–17 May 2000; IEEE: Piscataway, NJ, USA, 2000; pp. 44–55.
34. Curtmola, R.; Garay, J.; Kamara, S.; Ostrovsky, R. Searchable symmetric encryption: Improved definitions and efficient
constructions. J. Comput. Secur. 2011, 19, 895–934. [CrossRef]
35. Ibrahim, A.; Jin, H.; Yassin, A.A.; Zou, D. Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data. In
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, Guilin, China, 6–8 December 2012; IEEE: Piscataway,
NJ, USA, 2012; pp. 263–270.
Sensors 2022, 22, 7567 43 of 50
36. Chen, X.; Huang, X.; Li, J.; Ma, J.; Lou, W.; Wong, D.S. New algorithms for secure outsourcing of large-scale systems of linear
equations. IEEE Trans. Inf. Forensics Secur. 2014, 10, 69–78. [CrossRef]
37. Sun, W.; Wang, B.; Cao, N.; Li, M.; Lou, W.; Hou, Y.T.; Li, H. Privacy-preserving multi-keyword text search in the cloud supporting
similarity-based ranking. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications
Security, Hangzhou, China, 8–10 May 2013, pp. 71–82.
38. Katz, J.; Sahai, A.; Waters, B. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In
Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul,
Turkey, 13–17 April 2008; Springer: Berlin/Heidelberg, Germany, 2008; pp. 146–162.
39. Boneh, D.; Waters, B. Conjunctive, subset, and range queries on encrypted data. In Proceedings of the Theory of Cryptography
Conference, Amsterdam, The Netherlands, 21–24 February 2007; Springer: Berlin/Heidelberg, Germany, 2007; pp. 535–554.
40. Kawai, Y.; Takashima, K. Predicate-and attribute-hiding inner product encryption in a public key setting. In Proceedings of the
International Conference on Pairing-Based Cryptography, Beijing, China, 22–24 November 2013; Springer: Berlin/Heidelberg,
Germany, 2013; pp. 113–130.
41. Blundo, C.; Iovino, V.; Persiano, G. Private-key hidden vector encryption with key confidentiality. In Proceedings of the Interna-
tional Conference on Cryptology and Network Security, Kanazawa, Japan, 12–14 December 2009; Springer: Berlin/Heidelberg,
Germany, 2009; pp. 259–277.
42. Fan, C.I.; Huang, S.Y. Controllable privacy preserving search based on symmetric predicate encryption in cloud storage. Future
Gener. Comput. Syst. 2013, 29, 1716–1724. [CrossRef]
43. Gay, R.; Méaux, P.; Wee, H. Predicate encryption for multi-dimensional range queries from lattices. In Proceedings of
the IACR International Workshop on Public Key Cryptography, Gaithersburg, MD, USA, 30 March–1 April 2015; Springer:
Berlin/Heidelberg, Germany, 2015; pp. 752–776.
44. Boneh, D.; Sahai, A.; Waters, B. Functional encryption: A new vision for public-key cryptography. Commun. ACM 2012, 55, 56–64.
[CrossRef]
45. Whitmore, A.; Agarwal, A.; Da Xu, L. The Internet of Things—A survey of topics and trends. Inf. Syst. Front. 2015, 17, 261–274.
[CrossRef]
46. Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.D.; Katz, R.; Konwinski, A.; Lee, G.; Patterson, D.; Rabkin, A.; Stoica, I.; et al. A view
of cloud computing. Commun. ACM 2010, 53, 50–58. [CrossRef]
47. Bonomi, F.; Milito, R.; Zhu, J.; Addepalli, S. Fog computing and its role in the internet of things. In Proceedings of the First
Edition of the MCC Workshop on Mobile Cloud Computing, Helsinki, Finland, 17 August 2012; pp. 13–16.
48. Ali, M.; Dhamotharan, R.; Khan, E.; Khan, S.U.; Vasilakos, A.V.; Li, K.; Zomaya, A.Y. SeDaSC: Secure data sharing in clouds. IEEE
Syst. J. 2015, 11, 395–404. [CrossRef]
49. Özkar, M.; Sandıkkaya, M.T. A Survey on Security & Privacy Design in e-Health. In Proceedings of the 2020 5th International
Conference on Computer Science and Engineering (UBMK), Diyarbakır, Turkey, 9–11 September 2020; IEEE: Piscataway, NJ, USA,
2020; pp. 208–213.
50. Alam, M.R.; Reaz, M.B.I.; Ali, M.A.M. A review of smart homes—Past, present, and future. IEEE Trans. Syst. Man Cybern. Part C
2012, 42, 1190–1203. [CrossRef]
51. Albino, V.; Berardi, U.; Dangelico, R.M. Smart cities: Definitions, dimensions, performance, and initiatives. J. Urban Technol. 2015,
22, 3–21. [CrossRef]
52. Feng, Q.; He, D.; Zeadally, S.; Khan, M.K.; Kumar, N. A survey on privacy protection in blockchain system. J. Netw. Comput. Appl.
2019, 126, 45–58. [CrossRef]
53. Li, X.; Jiang, P.; Chen, T.; Luo, X.; Wen, Q. A survey on the security of blockchain systems. Future Gener. Comput. Syst. 2020,
107, 841–853. [CrossRef]
54. Jordan, M.I.; Mitchell, T.M. Machine learning: Trends, perspectives, and prospects. Science 2015, 349, 255–260. [CrossRef]
55. Yang, Q.; Liu, Y.; Chen, T.; Tong, Y. Federated machine learning: Concept and applications. ACM Trans. Intell. Syst. Technol. 2019,
10, 1–19. [CrossRef]
56. Unar, J.; Seng, W.C.; Abbasi, A. A review of biometric technology along with trends and prospects. Pattern Recognit. 2014,
47, 2673–2688. [CrossRef]
57. Liyanage, M.; Salo, J.; Braeken, A.; Kumar, T.; Seneviratne, S.; Ylianttila, M. 5G privacy: Scenarios and solutions. In Proceedings
of the 2018 IEEE 5G World Forum (5GWF), Santa Clara, CA, USA, 9–11 July 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 197–203.
58. Zheleva, E.; Getoor, L. Privacy in social networks: A survey. In Social Network Data Analytics; Springer: Berlin/Heidelberg,
Germany, 2011; pp. 277–306.
59. Ambrosin, M.; Anzanpour, A.; Conti, M.; Dargahi, T.; Moosavi, S.R.; Rahmani, A.M.; Liljeberg, P. On the feasibility of attribute-
based encryption on internet of things devices. IEEE Micro 2016, 36, 25–35. [CrossRef]
60. Girgenti, B.; Perazzo, P.; Vallati, C.; Righetti, F.; Dini, G.; Anastasi, G. On the feasibility of attribute-based encryption on constrained
IoT devices for smart systems. In Proceedings of the IEEE International Conference on Smart Computing (SMARTCOMP),
Washington, DC, USA, 12–15 June 2019; pp. 225–232.
61. Oualha, N.; Nguyen, K.T. Lightweight attribute-based encryption for the internet of things. In Proceedings of the IEEE
International Conference on Computer Communication and Networks (ICCCN), Waikoloa, HI, USA, 1–4 August 2016; pp. 1–6.
Sensors 2022, 22, 7567 44 of 50
62. Garg, H.; Dave, M. Securing User Access at IoT Middleware Using Attribute Based Access Control. In Proceedings of the
International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kanpur, India, 6–8 July 2019;
pp. 1–6.
63. Kurniawan, A.; Kyas, M. Securing Machine Learning Engines in IoT Applications with Attribute-Based Encryption. In
Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI), Shenzhen, China, 1–3 July 2019;
pp. 30–34.
64. Rahulamathavan, Y.; Phan, R.C.W.; Rajarajan, M.; Misra, S.; Kondoz, A. Privacy-preserving blockchain based IoT ecosystem
using attribute-based encryption. In Proceedings of the 2017 IEEE International Conference on Advanced Networks and
Telecommunications Systems (ANTS), Odisha, India, 17–20 December 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 1–6.
65. Singh, M.; Rajan, M.; Shivraj, V.; Balamuralidhar, P. Secure MQTT for Internet of Things (IoT). In Proceedings of the IEEE
International Conference on Communication Systems and Network Technologies, Gwalior, India, 4–6 April 2015; pp. 746–751.
66. Belguith, S.; Kaaniche, N.; Mohamed, M.; Russello, G. C-ABSC: Cooperative attribute based signcryption scheme for internet of
things applications. In Proceedings of the IEEE International Conference on Services Computing (SCC), San Francisco, CA, USA,
2–7 July 2018, pp. 245–248.
67. Ion, M.; Zhang, J.; Schooler, E.M. Toward content-centric privacy in ICN: Attribute-based encryption and routing. In Proceedings
of the ACM SIGCOMM Workshop on Information-Centric Networking, Hong Kong, China, 12 August 2013; pp. 39–40.
68. La Manna, M.; Perazzo, P.; Rasori, M.; Dini, G. fABElous: An attribute-based scheme for industrial internet of things. In
Proceedings of the IEEE International Conference on Smart Computing (SMARTCOMP), Washington, DC, USA, 12–15 June 2019;
pp. 33–38.
69. Alrawais, A.; Alhothaily, A.; Hu, C.; Xing, X.; Cheng, X. An attribute-based encryption scheme to secure fog communications.
IEEE Access 2017, 5, 9131–9138. [CrossRef]
70. Huang, Q.; Yang, Y.; Wang, L. Secure data access control with ciphertext update and computation outsourcing in fog computing
for Internet of Things. IEEE Access 2017, 5, 12941–12950. [CrossRef]
71. Li, J.; Zhang, Y.; Chen, X.; Xiang, Y. Secure attribute-based data sharing for resource-limited users in cloud computing. Elsevier
Comput. Secur. 2018, 72, 1–12. [CrossRef]
72. Meamari, E.; Guo, H.; Shen, C.C.; Zhang, R. Data User-Based Attribute Based Encryption. In Proceedings of the 54th IEEE
Annual Conference on Information Sciences and Systems (CISS), Princeton, NJ, USA, 18–20 March 2020; pp. 1–5.
73. Wang, H.; Dong, X.; Cao, Z.; Li, D. Secure and efficient attribute-based encryption with keyword search. Comput. J.-Br. Comput.
Soc. 2018, 61, 1133–1142. [CrossRef]
74. Zhang, Q.; Wang, G.; Liu, Q.; Peng, T. Attribute-based encryption with personalized search. In Proceedings of the IEEE
International Symposium on Parallel and Distributed Processing with Applications and IEEE International Conference on
Ubiquitous Computing and Communications (ISPA/IUCC), Guangzhou, China, 12–15 December 2017; pp. 1172–1178.
75. Luo, J.; Dong, Q.; Huang, D.; Kang, M. Attribute Based Encryption for Information Sharing on Tactical Mobile Networks.
In Proceedings of the MILCOM 2018—2018 IEEE Military Communications Conference (MILCOM), Los Angeles, CA, USA,
29–31 October 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–9.
76. Zheng, D.; Wu, A.; Zhang, Y.; Zhao, Q. Efficient and privacy-preserving medical data sharing in Internet of Things with limited
computing power. IEEE Access 2018, 6, 28019–28027. [CrossRef]
77. Thatmann, D.; Raschke, P.; Küpper, A. Please, No More GUIs!: A User Study, Prototype Development and Evaluation on the
Integration of Attribute-Based Encryption in a Hospital Environment. In Proceedings of the IEEE Annual Computer Software
and Applications Conference (COMPSAC), Atlanta, GA, USA, 10–14 June 2016; Volume 2, pp. 496–502.
78. Rasori, M.; Perazzo, P.; Dini, G. ABE-Cities: An attribute-based encryption system for smart cities. In Proceedings of the IEEE
International Conference on Smart Computing (SMARTCOMP), Taormina, Italy, 18–20 June 2018; pp. 65–72.
79. Salman, O.; Abdallah, S.; Elhajj, I.H.; Chehab, A.; Kayssi, A. Identity-based authentication scheme for the Internet of Things. In
Proceedings of the IEEE Symposium on Computers and Communication (ISCC), Messina, Italy, 27–30 June 2016; pp. 1109–1111.
80. Güneysu, T.; Oder, T. Towards lightweight identity-based encryption for the post-quantum-secure Internet of Things. In Proceed-
ings of the 2017 18th International Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA, 14–15 March 2017;
IEEE: Piscataway, NJ, USA, 2017; pp. 319–324.
81. Jiang, L.; Li, T.; Li, X.; Atiquzzaman, M.; Ahmad, H.; Wang, X. Anonymous communication via anonymous identity-based
encryption and its application in IoT. Wirel. Commun. Mob. Comput. 2018, 2018, 6809796. [CrossRef]
82. Mao, Y.; Li, J.; Chen, M.R.; Liu, J.; Xie, C.; Zhan, Y. Fully secure fuzzy identity-based encryption for secure IoT communications.
Comput. Stand. Interfaces 2016, 44, 117–121. [CrossRef]
83. Sankaran, S. Lightweight security framework for IoTs using identity based cryptography. In Proceedings of the 2016 International
Conference on Advances in Computing, Communications and Informatics (ICACCI), Jaipur, India, 21–24 September 2016; IEEE:
Piscataway, NJ, USA, 2016; pp. 880–886.
84. Karati, A.; Islam, S.H.; Biswas, G.; Bhuiyan, M.Z.A.; Vijayakumar, P.; Karuppiah, M. Provably secure identity-based signcryption
scheme for crowdsourced industrial Internet of Things environments. IEEE Internet Things J. 2017, 5, 2904–2914. [CrossRef]
85. Al Salami, S.; Baek, J.; Salah, K.; Damiani, E. Lightweight encryption for smart home. In Proceedings of the 11th International
Conference on Availability, Reliability and Security (ARES), Salzburg, Austria, 31 August–2 September 2016; pp. 382–388.
Sensors 2022, 22, 7567 45 of 50
86. He, K.; Weng, J.; Mao, Y.; Yuan, H. Anonymous identity-based broadcast encryption technology for smart city information system.
Pers. Ubiquitous Comput. 2017, 21, 841–853. [CrossRef]
87. Alornyo, S.; Asante, M.; Hu, X.; Mireku, K.K. Encrypted Traffic Analytic using Identity Based Encryption with Equality Test for
Cloud Computing. In Proceedings of the IEEE 7th International Conference on Adaptive Science & Technology (ICAST), Accra,
Ghana, 22–24 August 2018; pp. 1–4.
88. Sudarsono, A.; Yuliana, M.; Darwito, H.A. A secure data sharing using identity-based encryption scheme for e-healthcare
system. In Proceedings of the 3rd International Conference on Science in Information Technology (ICSITech), Bandung, Indonesia,
25–26 October 2017; pp. 429–434.
89. Huang, Q.; Yue, W.; He, Y.; Yang, Y. Secure identity-based data sharing and profile matching for mobile healthcare social networks
in cloud computing. IEEE Access 2018, 6, 36584–36594. [CrossRef]
90. Zhou, B.; Li, H.; Xu, L. An authentication scheme using identity-based encryption & blockchain. In Proceedings of the 2018
IEEE Symposium on Computers and Communications (ISCC), Natal, Brazil, 25–28 June 2018; IEEE: Piscataway, NJ, USA, 2018;
pp. 00556–00561.
91. Zhang, M.; Wang, S.; Zhang, P.; He, L.; Li, X.; Zhou, S. Protecting Data Privacy for Permissioned Blockchains using Identity-Based
Encryption. In Proceedings of the 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control
Conference (ITNEC), Chengdu, China, 15–17 March 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 602–605.
92. Liu, J.; Lai, J.; Huang, X. Dual trapdoor identity-based encryption with keyword search. Soft Comput. 2017, 21, 2599–2607.
[CrossRef]
93. Sarier, N.D. Multimodal biometric identity based encryption. Future Gener. Comput. Syst. 2018, 80, 112–125. [CrossRef]
94. Li, S.; Wang, F.; Shi, T.; Kuang, J. Probably secure multi-user multi-keyword searchable encryption scheme in cloud storage. In
Proceedings of the 3rd IEEE Information Technology, Networking, Electronic and Automation Control Conference (ITNEC),
Chengdu, China, 15–17 March 2019; pp. 1368–1372.
95. Liu, X.; Guan, Z.; Du, X.; Wu, L.; Abedin, Z.U.; Guizani, M. Achieving secure and efficient cloud search services: Cross-lingual
multi-keyword rank search over encrypted cloud data. In Proceedings of the IEEE International Conference on Communications
(ICC), Shanghai, China, 20–24 May 2019, pp. 1–6.
96. Eltayieb, N.; Elhabob, R.; Hassan, A.; Li, F. An efficient attribute-based online/offline searchable encryption and its application in
cloud-based reliable smart grid. J. Syst. Archit. 2019, 98, 165–172. [CrossRef]
97. Li, H.; Jing, T. A Lightweight fine-grained searchable encryption scheme in fog-based healthcare IoT networks. Wirel. Commun.
Mob. Comput. 2019, 2019, 1019767. [CrossRef]
98. Ocansey, S.K.; Ametepe, W.; Li, X.W.; Wang, C. Dynamic searchable encryption with privacy protection for cloud computing. Int.
J. Commun. Syst. 2018, 31, e3403. [CrossRef]
99. Liu, Z.; Li, T.; Li, P.; Jia, C.; Li, J. Verifiable searchable encryption with aggregate keys for data sharing system. Future Gener.
Comput. Syst. 2018, 78, 778–788. [CrossRef]
100. Michalas, A. The lord of the shares: Combining attribute-based encryption and searchable encryption for flexible data sharing. In
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, Limassol, Cyprus, 8–12 April 2019; pp. 146–155.
101. Ma, M.; He, D.; Kumar, N.; Choo, K.K.R.; Chen, J. Certificateless searchable public key encryption scheme for industrial internet
of things. IEEE Trans. Ind. Inform. 2017, 14, 759–767. [CrossRef]
102. Wu, L.; Chen, B.; Choo, K.K.R.; He, D. Efficient and secure searchable encryption protocol for cloud-based Internet of Things.
J. Parallel Distrib. Comput. 2018, 111, 152–161. [CrossRef]
103. Li, W.; Xiao, Y.; Tang, C.; Huang, X.; Xue, J. Multi-user searchable encryption voice in home IoT system. Internet Things 2020,
11, 100180. [CrossRef]
104. Zhang, K.; Long, J.; Wang, X.; Dai, H.N.; Liang, K.; Imran, M. Lightweight searchable encryption protocol for industrial internet
of things. IEEE Trans. Ind. Inform. 2020, 17, 4248–4259. [CrossRef]
105. Tahir, S.; Rajarajan, M. Privacy-preserving searchable encryption framework for permissioned blockchain networks. In
Proceedings of the IEEE International Conferences on Internet of Things, Green Computing and Communications, Cyber, Physical
and Social Computing, and Smart Data, Halifax, NS, Canada, 30 July–3 August 2018; pp. 1628–1633.
106. Chen, L.; Lee, W.K.; Chang, C.C.; Choo, K.K.R.; Zhang, N. Blockchain based searchable encryption for electronic health record
sharing. Future Gener. Comput. Syst. 2019, 95, 420–429. [CrossRef]
107. Chen, K.; Lin, Z.; Wan, J.; Xu, C. Interpretable Encrypted Searchable Neural Networks. In Proceedings of the International
Conference on Machine Learning for Cyber Security, Xi’an, China, 19–21 September 2019; Springer: Berlin/Heidelberg, Germany,
2019; pp. 279–289.
108. Farràs, O.; Ribes-González, J. Searchable encryption for geo-referenced data. In Proceedings of the 2016 Mediterranean Ad Hoc
Networking Workshop (Med-Hoc-Net), Vilanova i la Geltru, Spain, 20–22 June 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–8.
109. Sun, J.; Bao, Y.; Nie, X.; Xiong, H. Attribute-hiding predicate encryption with equality test in cloud computing. IEEE Access 2018,
6, 31621–31629. [CrossRef]
110. Wang, X.A.; Xhafa, F.; Cai, W.; Ma, J.; Wei, F. Efficient privacy preserving predicate encryption with fine-grained searchable
capability for Cloud storage. Comput. Electr. Eng. 2016, 56, 871–883. [CrossRef]
111. Huang, S.Y.; Fan, C.I.; Tseng, Y.F. Enabled/disabled predicate encryption in clouds. Future Gener. Comput. Syst. 2016, 62, 148–160.
[CrossRef]
Sensors 2022, 22, 7567 46 of 50
112. Xu, S.; Qian, Y.; Hu, R.Q. Privacy-preserving data preprocessing for fog computing in 5g network security. In Proceedings of the
2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018; IEEE:
Piscataway, NJ, USA, 2018; pp. 1–6.
113. Liu, W.; Liu, J.; Wu, Q.; Qin, B.; Liang, K. Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access
Control. In Proceedings of the European Symposium on Research in Computer Security, Heraklion, Greece, 26–30 September
2016; Springer: Berlin/Heidelberg, Germany, 2016; pp. 588–605.
114. Fan, C.I.; Tseng, Y.F.; Huang, J.J.; Chen, S.F.; Kikuchi, H. Multireceiver predicate encryption for online social networks. IEEE
Trans. Signal Inf. Process. Netw. 2017, 3, 388–403. [CrossRef]
115. Wei, R.; Ye, D. Delegate predicate encryption and its application to anonymous authentication. In Proceedings of the 4th
International Symposium on Information, Computer, and Communications Security, Sydney, Australia, 10–12 March 2009;
pp. 372–375.
116. Xu, S.; Ye, F. A predicate encryption based anomaly detection scheme for e-Health communications network. In Proceedings of
the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; IEEE: Piscataway, NJ,
USA, 2018; pp. 1–6.
117. Abdallai, H.; Hu, X.; Wahaballa, A.; Eltayieb, N.; Ramadan, M.; Zhiguang, Q. Efficient functional encryption and proxy re-
cryptography for secure public cloud data sharing. In Proceedings of the 2016 IEEE International Conference of Online Analysis
and Computing Science (ICOACS), Chongqing, China, 28–29 May 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 367–370.
118. Sharma, D.; Jinwala, D.C. Encrypted data ordering with functional encryption. In Proceedings of the 2018 4th International
Conference on Recent Advances in Information Technology (RAIT), Dhanbad, India, 15–17 March 2018; IEEE: Piscataway, NJ,
USA, 2018; pp. 1–8.
119. Ligier, D.; Carpov, S.; Fontaine, C.; Sirdey, R. Privacy Preserving Data Classification using Inner-product Functional Encryption.
In Proceedings of the ICISSP, Porto, Portugal, 19–21 February 2017; pp. 423–430.
120. Marc, T.; Stopar, M.; Hartman, J.; Bizjak, M.; Modic, J. Privacy-Enhanced Machine Learning with Functional Encryption. In
Proceedings of the European Symposium on Research in Computer Security, Luxembourg, 23–27 September 2019; Springer:
Berlin/Heidelberg, Germany, 2019; pp. 3–21.
121. Xu, R.; Baracaldo, N.; Zhou, Y.; Anwar, A.; Ludwig, H. Hybridalpha: An efficient approach for privacy-preserving federated
learning. In Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, London, UK, 15 November 2019;
pp. 13–23.
122. Xu, R.; Joshi, J.B.; Li, C. Cryptonn: Training neural networks over encrypted data. In Proceedings of the 2019 IEEE 39th
International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA, 7–10 July 2019; IEEE: Piscataway, NJ,
USA, 2019; pp. 1199–1209.
123. Stant, O.; Sirdey, R.; Gouy-Pailler, C.; Blanchart, P.; BenHamida, A.; Zayani, M.H. Privacy-Preserving Tax Calculations in
Smart Cities by Means of Inner-Product Functional Encryption. In Proceedings of the 2018 2nd Cyber Security in Networking
Conference (CSNet), Paris, France, 24–26 October 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–8.
124. Son, Y.B.; Im, J.H.; Kwon, H.Y.; Jeon, S.Y.; Lee, M.K. Privacy-Preserving Peer-to-Peer Energy Trading in Blockchain-Enabled Smart
Grids Using Functional Encryption. Energies 2020, 13, 1321. [CrossRef]
125. Im, J.H.; Kwon, H.Y.; Jeon, S.Y.; Lee, M.K. Privacy-Preserving Electricity Billing System Using Functional Encryption. Energies
2019, 12, 1237. [CrossRef]
126. Cui, H.; Wan, Z.; Wei, X.; Nepal, S.; Yi, X. Pay as you decrypt: Decryption outsourcing for functional encryption using blockchain.
IEEE Trans. Inf. Forensics Secur. 2020, 15, 3227–3238. [CrossRef]
127. Sharma, D.; Rashid, A.; Gupta, S.; Gupta, S.K. A functional encryption technique in uav integrated hetnet: A proposed model.
Int. J. Simul.-Sci. Technol. 2019, 20, 7.1–7.7. [CrossRef]
128. Liang, K.; Huang, X.; Guo, F.; Liu, J.K. Privacy-preserving and regular language search over encrypted cloud data. IEEE Trans.
Inf. Forensics Secur. 2016, 11, 2365–2376. [CrossRef]
129. Sharma, D.; Jinwala, D. Functional encryption in IoT e-health care system. In Proceedings of the International Conference on
Information Systems Security, Kolkata, India, 16–20 December 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 345–363.
130. Zhou, K.; Ren, J. PassBio: Privacy-preserving user-centric biometric authentication. IEEE Trans. Inf. Forensics Secur. 2018,
13, 3050–3063. [CrossRef]
131. Abdalla, H.; Hu, X.; Wahaballa, A.; Ali, A.A.; Ramadan, M.; Qin, Z. Integrating the Functional Encryption and Proxy Re-
cryptography to Secure DRM Scheme. IJ Netw. Secur. 2017, 19, 27–38.
132. Liang, Y.; Cao, Z.; Dong, X.; Shen, J. Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product
Functional Encryption. In Proceedings of the International Conference on Information and Communications Security, Lille,
France, 29–31 October 2018; Springer: Berlin/Heidelberg, Germany, 2018; pp. 377–392.
133. Yao, X.; Chen, Z.; Tian, Y. A lightweight attribute-based encryption scheme for the Internet of Things. Future Gener. Comput. Syst.
2015, 49, 104–112. [CrossRef]
134. Touati, L.; Challal, Y.; Bouabdallah, A. C-CP-ABE: Cooperative ciphertext policy attribute-based encryption for the internet of
things. In Proceedings of the IEEE International Conference on Advanced Networking Distributed Systems and Applications,
Bejaia, Algeria, 17–19 June 2014; pp. 64–69.
Sensors 2022, 22, 7567 47 of 50
135. Rasori, M.; La Manna, M.; Perazzo, P.; Dini, G. A Survey on Attribute-Based Encryption Schemes Suitable for the Internet of
Things. IEEE Internet Things J. 2022, 9, 8269–8290. [CrossRef]
136. Imam, R.; Kumar, K.; Raza, S.M.; Sadaf, R.; Anwer, F.; Fatima, N.; Nadeem, M.; Abbas, M.; Rahman, O. A systematic literature
review of attribute based encryption in health services. J. King Saud Univ.-Comput. Inf. Sci. 2022, in press.
137. Zhang, Y.; Nakanishi, R.; Sasabe, M.; Kasahara, S. Combining IOTA and Attribute-Based Encryption for Access Control in the
Internet of Things. Sensors 2021, 21, 5053. [CrossRef] [PubMed]
138. Tan, S.Y.; Yeow, K.W.; Hwang, S.O. Enhancement of a lightweight attribute-based encryption scheme for the Internet of Things.
IEEE Internet Things J. 2019, 6, 6384–6395. [CrossRef]
139. Kumar Premkamal, P.; Pja, A.; Kumar, P.S. Attribute based encryption in cloud computing: A survey, gap analysis, and future
directions. J. Netw. Comput. Appl. 2018, 108, 37–52.
140. Locke, D. MQ Telemetry Transport (MQTT) v3. 1 protocol specification. IBM Dev. Tech. Libr. 2010, 15.
141. Adiga, B.; Balamuralidhar, P.; Rajan, M.; Shastry, R.; Shivraj, V. An identity based encryption using elliptic curve cryptography
for secure m2m communication. In Proceedings of the First International Conference on Security of Internet of Things, Kollam,
India, 17–19 August 2012; pp. 68–74.
142. Belguith, S.; Kaaniche, N.; Laurent, M.; Jemai, A.; Attia, R. Constant-size threshold attribute based signcryption for cloud
applications. In Proceedings of the International Conference on Security and Cryptography (SECRYPT), Madrid, Spain,
24–26 July 2017, pp. 212–225.
143. Guo, F.; Mu, Y.; Chen, Z. Identity-based online/offline encryption. In Proceedings of the International Conference on Financial
Cryptography and Data Security, Cozumel, Mexico, 28–31 January 2008; Springer: Berlin/Heidelberg, Germany, 2008; pp. 247–261.
144. Kreutz, D.; Ramos, F.M.; Verissimo, P.E.; Rothenberg, C.E.; Azodolmolky, S.; Uhlig, S. Software-defined networking: A
comprehensive survey. Proc. IEEE 2014, 103, 14–76. [CrossRef]
145. Lyubashevsky, V.; Peikert, C.; Regev, O. On ideal lattices and learning with errors over rings. In Proceedings of the Annual
International Conference on the Theory and Applications of Cryptographic Techniques, Monaco and Nice, France, 30 May–3 June
2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 1–23.
146. Roy, S.S.; Vercauteren, F.; Mentens, N.; Chen, D.D.; Verbauwhede, I. Compact ring-LWE cryptoprocessor. In Proceedings of the
International Workshop on Cryptographic Hardware and Embedded Systems, Busan, Korea, 23–26 September 2014; Springer:
Berlin/Heidelberg, Germany, 2014; pp. 371–391.
147. Jia, X.; Hu, N.; Su, S.; Yin, S.; Zhao, Y.; Cheng, X.; Zhang, C. IRBA: An identity-based cross-domain authentication scheme for the
internet of things. Electronics 2020, 9, 634. [CrossRef]
148. Farjana, N.; Roy, S.; Mahi, M.; Nayeen, J.; Whaiduzzaman, M. An identity-based encryption scheme for data security in
fog computing. In Proceedings of the International Joint Conference on Computational Intelligence, Budapest, Hungary,
2–4 November 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 215–226.
149. Kim, J.Y.; Hu, W.; Sarkar, D.; Jha, S. ESIoT: Enabling secure management of the internet of things. In Proceedings of the 10th
ACM Conference on Security and Privacy in Wireless and Mobile Networks, Boston, MA, USA, 18–20 July 2017; pp. 219–229.
150. Li, F.; Xiong, P. Practical secure communication for integrating wireless sensor networks into the internet of things. IEEE Sens. J.
2013, 13, 3677–3684. [CrossRef]
151. Gentry, C. Practical identity-based encryption without random oracles. In Proceedings of the Annual International Confer-
ence on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, 28 May–1 June 2006; Springer:
Berlin/Heidelberg, Germany, 2006; pp. 445–464.
152. Sakai, R.; Kasahara, M. Cryptosystems based on pairings. In Proceedings of the Symposium on Cryptography and Information
Security-SCIS’00, Okinawa, Japan, 26–28 January 2000.
153. Phong, L.T.; Matsuoka, H.; Ogata, W. Stateful identity-based encryption scheme: Faster encryption and decryption. In
Proceedings of the ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, 18–20 March 2008;
pp. 381–388.
154. Ma, S. Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 2016, 328, 389–402. [CrossRef]
155. Boneh, D.; Lynn, B.; Shacham, H. Short signatures from the Weil pairing. J. Cryptol. 2004, 17, 297–319. [CrossRef]
156. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System; Technical Report; Manubot. 2009. Available online: https:
//bitcoin.org/bitcoin.pdf (accessed on 25 July 2022).
157. Waters, B. Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. In Proceedings of the Annual
International Cryptology Conference, Santa Barbara, CA, USA, 16–20 August 2009; Springer: Berlin/Heidelberg, Germany, 2009;
pp. 619–636.
158. Li, J.; Wang, Q.; Wang, C.; Cao, N.; Ren, K.; Lou, W. Fuzzy keyword search over encrypted data in cloud computing. In
Proceedings of the IEEE INFOCOM, San Diego, CA, USA, 14–19 March 2010; pp. 1–5.
159. Guo, F.; Susilo, W.; Mu, Y. Distance-based encryption: How to embed fuzziness in biometric-based encryption. IEEE Trans. Inf.
Forensics Secur. 2015, 11, 247–257. [CrossRef]
160. Wu, Q. Uni-Sender Multi-Receiver searchable encryption. In Proceedings of the 2nd IEEE International Conference on Computer
and Communications (ICCC), Chengdu, China, 14–17 October 2016; pp. 223–226.
161. Zhou, R.; Zhang, X.; Du, X.; Wang, X.; Yang, G.; Guizani, M. File-centric multi-key aggregate keyword searchable encryption for
industrial internet of things. IEEE Trans. Ind. Inform. 2018, 14, 3648–3658. [CrossRef]
Sensors 2022, 22, 7567 48 of 50
162. Bond, F.; Foster, R. Linking and extending an open multilingual wordnet. In Proceedings of the 51st Annual Meeting of the
Association for Computational Linguistics (Volume 1: Long Papers), Sofia, Bulgaria, 4–9 August 2013; pp. 1352–1362.
163. Hohenberger, S.; Waters, B. Online/offline attribute-based encryption. In Proceedings of the International Workshop on Public
Key Cryptography, Buenos Aires, Argentina, 26–28 March 2014; Springer: Berlin/Heidelberg, Germany, 2014; pp. 293–310.
164. Wang, C.; Li, W.; Li, Y.; Xu, X. A ciphertext-policy attribute-based encryption scheme supporting keyword search function.
In Proceedings of the International Symposium on Cyberspace Safety and Security, Zhangjiajle, China, 13–15 November 2013;
Springer: Berlin/Heidelberg, Germany, 2013; pp. 377–386.
165. Ning, J.; Xu, J.; Liang, K.; Zhang, F.; Chang, E.C. Passive attacks against searchable encryption. IEEE Trans. Inf. Forensics Secur.
2018, 14, 789–802. [CrossRef]
166. Poh, G.S.; Chin, J.J.; Yau, W.C.; Choo, K.K.R.; Mohamad, M.S. Searchable symmetric encryption: Designs and challenges. ACM
Comput. Surv. 2017, 50, 1–37. [CrossRef]
167. Bösch, C.; Hartel, P.; Jonker, W.; Peter, A. A survey of provably secure searchable encryption. ACM Comput. Surv. 2014, 47, 1–51.
[CrossRef]
168. Stefanov, E.; Papamanthou, C.; Shi, E. Practical dynamic searchable encryption with small leakage. Cryptol. ePrint Arch. 2013.
Available online: https://eprint.iacr.org/2013/832.pdf (accessed on 25 July 2012).
169. Kamara, S.; Papamanthou, C.; Roeder, T. Dynamic searchable symmetric encryption. In Proceedings of the 2012 ACM Conference
on Computer and Communications Security, Raleigh, NC, USA, 16–18 October 2012; pp. 965–976.
170. Green, M.; Hohenberger, S.; Waters, B. Outsourcing the decryption of abe ciphertexts. In Proceedings of the USENIX Security
Symposium, San Francisco, CA, USA, 8–12 August 2011; Volume 2011.
171. Yang, Y.; Liu, X.; Zheng, X.; Rong, C.; Guo, W. Efficient traceable authorization search system for secure cloud storage. IEEE
Trans. Cloud Comput. 2018, 8, 819–832. [CrossRef]
172. Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Enyeart, D.; Ferris, C.; Laventman, G.; Manevich,
Y.; et al. Hyperledger fabric: A distributed operating system for permissioned blockchains. In Proceedings of the 13th EuroSys
Conference, Porto, Portugal, 23–26 April 2018; pp. 1–15.
173. Tahir, S.; Ruj, S.; Rahulamathavan, Y.; Rajarajan, M.; Glackin, C. A new secure and lightweight searchable encryption scheme over
encrypted cloud data. IEEE Trans. Emerg. Top. Comput. 2017, 7, 530–544. [CrossRef]
174. Wood, G. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 2014, 151, 1–32.
175. Goodfellow, I.; Pouget-Abadie, J.; Mirza, M.; Xu, B.; Warde-Farley, D.; Ozair, S.; Courville, A.; Bengio, Y. Generative adversarial
nets. In Proceedings of the Advances in Neural Information Processing Systems, Montreal, QC, Canada, 8–13 December 2014;
pp. 2672–2680.
176. Hinton, G.; Osindero, S.; Welling, M.; Teh, Y.W. Unsupervised discovery of nonlinear structure using contrastive backpropagation.
Cogn. Sci. 2006, 30, 725–731. [CrossRef] [PubMed]
177. Park, J.; Kim, Y.; Eom, I.; Lee, K. Economic load dispatch for piecewise quadratic cost function using Hopfield neural network.
IEEE Trans. Power Syst. 1993, 8, 1030–1038. [CrossRef]
178. González, J.R. CLARUS: User-Centered Privacy and Security in the Cloud. In Proceedings of the 2nd URV Doctoral Workshop in
Computer Science and Mathematics, Tarragona, Spain, 13 November 2015; Publicacions Universitat Rovira i Virgili: Catalunya,
Spain, 2015; p. 29.
179. Cash, D.; Jarecki, S.; Jutla, C.; Krawczyk, H.; Roşu, M.C.; Steiner, M. Highly-scalable searchable symmetric encryption with
support for boolean queries. In Proceedings of the Annual Cryptology Conference, Santa Barbara, CA, USA, 18–22 August 2013;
Springer: Berlin/Heidelberg, Germany, 2013, pp. 353–373.
180. Wang, Q.; Peng, L.; Xiong, H.; Sun, J.; Qin, Z. Ciphertext-policy attribute-based encryption with delegated equality test in cloud
computing. IEEE Access 2017, 6, 760–771. [CrossRef]
181. Zhu, H.; Wang, L.; Ahmad, H.; Niu, X. Key-policy attribute-based encryption with equality test in cloud computing. IEEE Access
2017, 5, 20428–20439. [CrossRef]
182. Lewko, A.; Okamoto, T.; Sahai, A.; Takashima, K.; Waters, B. Fully secure functional encryption: Attribute-based encryption and
(hierarchical) inner product encryption. In Proceedings of the Annual International Conference on the Theory and Applications
of Cryptographic Techniques, Monaco and Nice, France, 30 May–3 June 2010; Springer: Berlin/Heidelberg, Germany, 2010;
pp. 62–91.
183. Park, J.H. Inner-product encryption under standard assumptions. Des. Codes Cryptogr. 2011, 58, 235–257. [CrossRef]
184. Tseng, Y.F.; Gao, S.J. Efficient Subset Predicate Encryption for Internet of Things. In Proceedings of the 2021 IEEE Conference on
Dependable and Secure Computing (DSC), Fukushima, Japan, 30 January–2 February 2021; IEEE: Piscataway, NJ, USA, 2021;
pp. 1–2.
185. Chen, X.; Zhang, F.; Kim, K. Chameleon hashing without key exposure. In Proceedings of the International Conference on
Information Security, Palo Alto, CA, USA, 27–29 September 2004; Springer: Berlin/Heidelberg, Germany, 2004; pp. 87–98.
186. Liang, K.; Au, M.H.; Liu, J.K.; Susilo, W.; Wong, D.S.; Yang, G.; Phuong, T.V.X.; Xie, Q. A DFA-based functional proxy re-encryption
scheme for secure public cloud data sharing. IEEE Trans. Inf. Forensics Secur. 2014, 9, 1667–1680. [CrossRef]
187. He, D.; Chen, J.; Zhang, R. An efficient identity-based blind signature scheme without bilinear pairings. Comput. Electr. Eng.
2011, 37, 444–450. [CrossRef]
Sensors 2022, 22, 7567 49 of 50
188. Agrawal, R.; Kiernan, J.; Srikant, R.; Xu, Y. Order preserving encryption for numeric data. In Proceedings of the 2004 ACM
SIGMOD International Conference on Management of Data, Paris, France, 13–18 June 2004; pp. 563–574.
189. Agrawal, S.; Libert, B.; Stehlé, D. Fully secure functional encryption for inner products, from standard assumptions. In Proceedings
of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 14–18 August 2016; Springer: Berlin/Heidelberg,
Germany, 2016; pp. 333–362.
190. Ananth, P.; Sahai, A. Functional encryption for turing machines. In Proceedings of the Theory of Cryptography Conference,
Beijing, China, 31 October–3 November 2016; Springer: Berlin/Heidelberg, Germany, 2016; pp. 125–153.
191. Wrona, K. Securing the Internet of Things a military perspective. In Proceedings of the 2015 IEEE 2nd World Forum on Internet
of Things (WF-IoT), Milan, Italy, 14–16 December 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 502–507.
192. Abdalla, M.; Catalano, D.; Fiore, D.; Gay, R.; Ursu, B. Multi-input functional encryption for inner products: Function-hiding
realizations and constructions without pairings. In Proceedings of the Annual International Cryptology Conference, Santa
Barbara, CA, USA, 19–23 August 2018; Springer: Berlin/Heidelberg, Germany, 2018; pp. 597–627.
193. Truex, S.; Baracaldo, N.; Anwar, A.; Steinke, T.; Ludwig, H.; Zhang, R.; Zhou, Y. A hybrid approach to privacy-preserving federated
learning. In Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, London, UK, 15 November 2019;
pp. 1–11.
194. LeCun, Y.; Cortes, C.; Burges, C. MNIST Handwritten Digit Database. 2010, Volume 7, p. 23. Available online: http:
//yann.Lecun.Com/exdb/mnist (accessed on 15 November 2021).
195. Kim, S.; Lewi, K.; Mandal, A.; Montgomery, H.; Roy, A.; Wu, D.J. Function-hiding inner product encryption is practical. In
Proceedings of the International Conference on Security and Cryptography for Networks, Amalfi, Italy, 5–7 September 2018;
Springer: Berlin/Heidelberg, Germany, 2018; pp. 544–562.
196. Bishop, A.; Jain, A.; Kowalczyk, L. Function-hiding inner product encryption. In Proceedings of the International Conference on
the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, 29 November–3 December 2015;
Springer: Berlin/Heidelberg, Germany, 2015; pp. 470–491.
197. Liu, J.; Li, W.; Karame, G.O.; Asokan, N. Toward fairness of cryptocurrency payments. IEEE Secur. Priv. 2018, 16, 81–89.
[CrossRef]
198. Zhang, Y.; Deng, R.H.; Liu, X.; Zheng, D. Blockchain based efficient and robust fair payment for outsourcing services in cloud
computing. Inf. Sci. 2018, 462, 262–277. [CrossRef]
199. Arm, o A.; Basin, D.; Boichut, Y.; Chevalier, Y.; Compagna, L.; Cuéllar, J.; Drielsma, P.H.; Heám, P.C.; Kouchnarenko, O.; Mantovani,
J.; et al. The AVISPA tool for the automated validation of internet security protocols and applications. In Proceedings of the
International Conference on Computer Aided Verification, San Francisco, CA, USA, 18–24 July 2005; Springer: Berlin/Heidelberg,
Germany, 2005; pp. 281–285.
200. Zheng, Q.; Xu, S.; Ateniese, G. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. In Proceedings
of the IEEE INFOCOM 2014—IEEE Conference on Computer Communications, Toronto, ON, Canada, 27 April–2 May, 2014;
IEEE: Piscataway, NJ, USA, 2014; pp. 522–530.
201. Wang, Q.; Hu, S.; Ren, K.; He, M.; Du, M.; Wang, Z. CloudBI: Practical privacy-preserving outsourcing of biometric identification in
the cloud. In Proceedings of the European Symposium on Research in Computer Security, Vienna, Austria, 21–25 September 2015;
Springer: Berlin/Heidelberg, Germany, 2015; pp. 186–205.
202. Huang, Q.; Ma, Z.; Yang, Y.; Niu, X.; Fu, J. Attribute based DRM scheme with dynamic usage control in cloud computing. China
Commun. 2014, 11, 50–63. [CrossRef]
203. Stankovic, J.A. Research directions for the internet of things. IEEE Internet Things J. 2014, 1, 3–9. [CrossRef]
204. Naru, E.R.; Saini, H.; Sharma, M. A recent review on lightweight cryptography in IoT. In Proceedings of the 2017 International
Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 10–11 February 2017; IEEE:
Piscataway, NJ, USA, 2017; pp. 887–890.
205. Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions.
Future Gener. Comput. Syst. 2013, 29, 1645–1660. [CrossRef]
206. Lee, I.; Lee, K. The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Bus. Horiz. 2015,
58, 431–440. [CrossRef]
207. Fagan, M.; Megas, K.; Scarfone, K.; Smith, M. Recommendations for IoT Device Manufacturers: Foundational Activities and Core Device
Cybersecurity Capability Baseline, 2nd ed.; Technical Report; National Institute of Standards and Technology: Gaithersburg, MD,
USA, 2020.
208. Kanuparthi, A.; Karri, R.; Addepalli, S. Hardware and embedded security in the context of internet of things. In Proceedings of
the 2013 ACM workshop on Security, Privacy & Dependability for Cyber Vehicles, Berlin, Germany, 4 November 2013; pp. 61–64.
209. Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of things: A survey on enabling technologies,
protocols, and applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [CrossRef]
210. Li, B.; Lin, J.; Li, F.; Wang, Q.; Li, Q.; Jing, J.; Wang, C. Certificate transparency in the wild: Exploring the reliability of
monitors. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK,
11–15 November 2019; pp. 2505–2520.
211. Xu, R.; Joshi, J. Trustworthy and transparent third-party authority. ACM Trans. Internet Technol. 2020, 20, 1–23. [CrossRef]
Sensors 2022, 22, 7567 50 of 50
212. Xu, R.; Li, C.; Joshi, J. Blockchain-based Transparency Framework for Privacy Preserving Third-party Services. IEEE Trans.
Dependable Secur. Comput. 2022. [CrossRef]
213. Rahman, M.S.; Hossam-E-Haider, M. Quantum IoT: A quantum approach in IoT security maintenance. In Proceedings of the 2019
International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), Dhaka, Bangladesh, 10–12 January
2019; IEEE: Piscataway, NJ, USA, 2019; pp. 269–272.
214. Schöffel, M.; Lauer, F.; Rheinländer, C.C.; Wehn, N. Secure IoT in the Era of Quantum Computers—Where Are the Bottlenecks?
Sensors 2022, 22, 2484. [CrossRef]