I. Background
Wireless sensor networks (WSNs) is widely used in building e-healthcare, traffic management, social network, smart grid and various interconnected systems. Such interconnected systems store a large number of sensitive data. Due to the limitation of computation and storage capacity, sensor nodes usually upload these sensitive data to the base station or cloud server. However, the privacy of data needs to be considered, since these sensitive data are out of local management which makes it very convenient for any probabilistic polynomial-time (PPT) adversary to exploit the weakness and launch attacks on WSNs systems [3], [7], [9]. To prevent the cloud server from obtaining private information, these sensitive data collected by the sensor nodes are usually encrypted before uploading to the cloud server.