Research Article Multiuser Searchable Encryption with Token Freshness Verification Dhruti Sharma 1 and Devesh C. Jinwala 2 1 Sarvajanik College of Engineering and Technology, Surat, Gujarat, India 2 Sardar Vallabhbhai National Institute of Technology, Surat, Gujarat, India Correspondence should be addressed to Dhruti Sharma; sharmadhruti77@gmail.com Received 2 May 2017; Revised 25 September 2017; Accepted 25 October 2017; Published 26 November 2017 Academic Editor: Sherali Zeadally Copyright © 2017 Dhruti Sharma and Devesh C. Jinwala. Tis is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. A Multiuser Searchable Encryption (MUSE) can be defned with the notion of Functional Encryption (FE) where a user constructs a search token from a search key issued by an Enterprise Trusted Authority (ETA). In such scheme, a user possessing search key constructs search token at any time and consequently requests the server to search over encrypted data. Tus, an FE based MUSE scheme is not suitable for the applications where a log of search activities is maintained at the enterprise site to identify dishonest search query from any user. In addition, none of the existing searchable schemes provides security against token replay attack to avoid reuse of the same token. In this paper, therefore we propose an FE based scheme, Multiuser Searchable Encryption with Token Freshness Verifcation (MUSE-TFV). In MUSE-TFV, a user prepares one-time usable search token in cooperation with ETA and thus every search activity is logged at the enterprise site. Additionally, by verifying the freshness of a token, the server prevents reuse of the token. With formal security analysis, we prove the security of MUSE-TFV against chosen keyword attack and token replay attack. With theoretical and empirical analysis, we justify the efectiveness of MUSE-TFV in practical applications. 1. Introduction With the cloud storage infrastructure, one can easily share data with multiple users at a low cost. However, maintaining security and privacy of such data located on the untrusted remote server is nontrivial [1–3]. Terefore, a common trend is to upload the encrypted data onto a third-party cloud server. However, extraction of partial information from the stored encrypted data is indeed difcult. Te notion of Searchable Encryption (SE) is used to resolve the issue. In SE, a Data Owner prepares a ciphertext by associating a list of encrypted keywords (to be searched) with an encrypted payload message and uploads it onto the Storage Server. Subsequently, a Data User asks the server to search over encrypted data by issuing a search token (of keyword(s)). Te server applies a token over available ciphertexts and extracts the data containing that keyword(s) (Figure 1). However, the server learns nothing else about the data while searching. Here, a payload message is encrypted using any standard encryption algorithm, whereas keywords are encrypted with the defned Searchable Encryption algorithm. Tere exist numerous Searchable Encryption schemes for a single user [4–8] as well as for multiple users [9–13]. Practically, any single-user Searchable Encryption scheme can be adapted to defne a multiuser Searchable Encryption scheme at the cost of a ciphertext size linear to the number of users in the system. Formally, when a single-user searchable scheme is extended to support multiple users, its ciphertext size becomes () for users that subsequently raises to (||⋅) for ={1,2,...,} data items in the system. Tis ultimately outputs an impractical system with (||⋅) computational overhead at the Data Owner site and (||⋅ ) storage overhead at the server site. As solution, several Searchable Encryption schemes in [9, 10, 14–20] with a built- in support of multiple users are devised in recent years. Amongst them, the scheme proposed by Hwang and Lee [9] is a simple extension of a single-user Searchable Encryption with the ciphertext size (||+||⋅), where || is the number of keywords to be searched. However, this scheme works for the prefxed set of users. In contrast, the schemes in [10, 14–16] support the dynamic groups of users where joining/leaving a group by a member is entirely controlled Hindawi Security and Communication Networks Volume 2017, Article ID 6435138, 16 pages https://doi.org/10.1155/2017/6435138