CINXE.COM
Public-Key Authenticated Encryption with Keyword Search Made Easy
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <link href="/css/bootstrap/css/bootstrap.min.css" rel="stylesheet"> <script src="/css/bootstrap/js/bootstrap.bundle.min.js"></script> <title>Public-Key Authenticated Encryption with Keyword Search Made Easy</title> <link rel="stylesheet" href="/css/iacrcc.css"> <link rel="icon" type="image/png" href="/favicon.ico"> <style> div.authorname { font-weight: 500; margin-bottom: .3rem; } div.author { margin-bottom: 1rem; } span.keyword { font-weight: 500; } span.keyword a { color: black; } div.reference { margin-bottom: .5rem; } ol.bib li:before { margin-left: -1.5rem; content: "[" counter(bcounter) "] "; margin-right: .5rem; } ol.bib { list-style: none; counter-reset: bcounter; } ol.bib li { counter-increment: bcounter; margin-bottom: .5rem; } .card-header { background-color: #d1e7dd !important; } .authorlist { /* border: 1px solid #aaa; padding: 1rem; margin-bottom: 1rem; background-color: white;*/ } </style> <script> MathJax = { tex: { inlineMath: [['$', '$'], ['\\(', '\\)']], displayMath: [ ['$$','$$'], ["\\[","\\]"] ], processEnvironments: false, processEscapes: true }, "HTML-CSS": { linebreaks: { automatic: true } } }; </script> <script id="MathJax-script" async src="/js/mathjax/tex-chtml.js"></script> <link rel="schema.DC" href="http://purl.org/dc/elements/1.1/"> <meta name="DC.Creator.PersonalName" content="Qinyi Li"> <meta name="DC.Creator.PersonalName" content="Xavier Boyen"> <meta name="DC.Date.created" content="2024-07-08 15:12:34"> <meta name="DC.Date.dateSubmitted" content="2024-04-08"> <meta name="DC.Date.dateAccepted" content="2024-06-03"> <meta name="DC.Description" xml:lang="en" lang="en" content="<p> Public-key searchable encryption allows keyword-associated tokens to be used to test if a ciphertext contains specific keywords. Due to the low entropies of keywords, the token holder can create ciphertexts from candidate keywords and test them using the token in hand to recover the keywords, known as inside keyword guessing attacks (IKGA). Public-key authenticated encryption with keyword search is a searchable encryption proposed to defend against such attacks. It ensures the sender's private key protects the ciphertexts from the IKGA. PAEKS schemes with reasonable security and practical efficiency remain elusive despite many proposals. This work provides a simple generic PAEKS scheme from non-interactive key exchange (NIKE) and symmetric-key equality-predicate encryption with three new constructions for the latter, respectively from pseudorandom functions (PRFs), the decision bilinear Diffie-Hellman assumption, and the learning-with-errors assumption. Instantiating our generic scheme, we derive several PAEKS schemes from the most well-known assumptions, with some of them achieving full cipher-keyword indistinguishability and full token indistinguishability in the standard model, for the first time. Our instantiated schemes allow practical implementations and outperform the existing PAEKS schemes under the same assumptions. </p>"> <meta name="DC.Format" content="application/pdf"> <meta name="DC.Identifier.DOI" content="10.62056/a63z11zn4"> <meta name="DC.Identifier.URI" content="https://cic.iacr.org/p/1/2/16"> <meta name="DC.Language" content="en"> <meta name="DC.Rights" content="Copyright (c) 2023 held by author(s)"> <meta name="DC.Rights" content="https://creativecommons.org/licenses/by/4.0/"> <meta name="DC.Source" content="IACR Communications in Cryptology"> <meta name="DC.Source.ISSN" content="3006-5496"> <meta name="DC.Source.Issue" content="2"> <meta name="DC.Source.Volume" content="1"> <meta name="DC.Subject" xml:lang="en" lang="en" content="Public-Key Authenticated Encryption"> <meta name="DC.Subject" xml:lang="en" lang="en" content="Keywords Search"> <meta name="DC.Subject" xml:lang="en" lang="en" content="Post-quantum"> <meta name="DC.Subject" xml:lang="en" lang="en" content="Token Privacy"> <meta name="DC.Subject" xml:lang="en" lang="en" content="Generic Constructions"> <meta name="DC.Title" content="Public-Key Authenticated Encryption with Keyword Search Made Easy"> <meta name="DC.Type" content="Text.Serial.Journal"> <meta name="DC.Type.articleType" content="Articles"> <meta name="citation_journal_title" content="IACR Communications in Cryptology"> <meta name="citation_journal_abbrev" content="CiC"> <meta name="citation_issn" content="3006-5496"><meta name="citation_author" content="Qinyi Li"> <meta name="citation_author_institution" content="Griffith University"> <meta name="citation_author" content="Xavier Boyen"> <meta name="citation_author_institution" content="QUT"> <meta name="citation_title" content="Public-Key Authenticated Encryption with Keyword Search Made Easy"> <meta name="citation_language" content="en"> <meta name="citation_date" content="2024-07-08"> <meta name="citation_volume" content="1"> <meta name="citation_issue" content="2"> <meta name="citation_doi" content="10.62056/a63z11zn4"> <meta name="citation_abstract_html_url" content="https://cic.iacr.org/p/1/2/16"> <meta name="citation_keywords" xml:lang="en" lang="en" content="Public-Key Authenticated Encryption"><meta name="citation_keywords" xml:lang="en" lang="en" content="Keywords Search"><meta name="citation_keywords" xml:lang="en" lang="en" content="Post-quantum"><meta name="citation_keywords" xml:lang="en" lang="en" content="Token Privacy"><meta name="citation_keywords" xml:lang="en" lang="en" content="Generic Constructions"> <meta name="citation_pdf_url" content="https://cic.iacr.org/p/1/2/16/pdf"> </head> <body> <noscript> <h1 class="text-center">What a lovely hat</h1> <h4 class="text-center">Is it made out of <a href="https://iacr.org/tinfoil.html">tin foil</a>?</h4> </noscript> <div class="pageTop d-flex justify-content-md-around justify-content-between align-items-center"> <a href="https://iacr.org"><img id="logo" class="d-none d-lg-block ms-5" src="/images/iacrlogo_small.png" title="International Association for Cryptologic Research" alt="IACR logo"></a> <span class="headerTitle d-none d-md-block">Communications in Cryptology</span> <span class="headerTitle d-md-none">IACR CiC</span> <div class="dropdown ps-lg-2 me-5"> <button class="btn border-0" type="button" id="dropdownMenuButton1" data-bs-toggle="dropdown" aria-expanded="true"> <img src="/images/search.svg" class="searchIcon" alt="Search Button" style="width:33px;"> </button> <div id="searchDd" class="dropdown-menu dropdown-menu-end bg-transparent border-0" aria-labelledby="dropdownMenuButton1" data-bs-popper="none"> <form action="/search" method="GET" class="me-3"> <div class="input-group"> <input id="searchbox" name="q" type="search" class="form-control shadow-none" autocomplete="off" > <input type="hidden" name="d" value="/var/www/wsgi/cicjournal/webapp/search_index/xapian.db"> <button class="btn btn-outline-dark border border-dark input-group-append"> Search </button> </div> </form> <div id="results" class="bg-light"></div> </div> </div> </div> <nav id="sitenav" class="navbar navbar-expand-md"> <div class="container"> <button class="navbar-toggler" type="button" data-bs-toggle="collapse" data-bs-target="#collapseContent" aria-controls="collapseContent" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="collapse navbar-collapse" id="collapseContent"> <ul class="navbar-nav nav-fill w-100 justify-content-between"> <li class="nav-item"> <a class="nav-link active" aria-current="page" href="/">Home</a> </li> <li class="nav-item"> <a class="nav-link" href="/contents">Papers</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" role="button" data-bs-toggle="dropdown" aria-expanded="false"> Submissions </a> <ul class="dropdown-menu ms-3 ms-lg-5"> <li><a class="dropdown-item" href="/callforpapers">Call for papers</a></li> <li><a class="dropdown-item" href="/ethics">Publication ethics</a></li> <li><a class="dropdown-item" href="/irregular">Irregular submissions</a></li> <li><a class="dropdown-item" href="/conflicts">Conflict of interest</a></li> <li><a class="dropdown-item" href="/retraction">Retraction policy</a></li> </ul> </li> <li class="nav-item"> <a class="nav-link" href="/faq">FAQ</a> </li> <li class="nav-item"> <a class="nav-link" href="/contact">Contact</a> </li> <li class="nav-item"> <a class="nav-link" href="/board">Editorial board</a> </li> <li class="nav-item dropdown"> <a href="#" class="ms-md-5 nav-link dropdown-toggle" data-bs-toggle="dropdown"><img alt="Login" src="/images/user.svg"></a> <ul class="dropdown-menu"> <li><a href="/login" class="dropdown-item">Admin login</a></li> </ul> </li> </ul> </div> </div> </nav> <main id="mainContent" class="container"> <nav aria-label="breadcrumb" class="mt-3"> <ol class="breadcrumb"> <li class="breadcrumb-item"><a href="/">Home</a></li> <li class="breadcrumb-item"><a href="/v/1">Volume 1</a></li> <li class="breadcrumb-item"><a href="/i/1/2">Issue 2</a></li> <li class="breadcrumb-item active" aria-current="page">16</li> </ol> </nav> <h2>Public-Key Authenticated Encryption with Keyword Search Made Easy</h2> <div class="row mt-3"> <div class="col-12 col-md-8"> <h3 class="mt-2">Authors</h3> <div class="fs-4 mb-4 mt-2 d-flex justify-content-between flex-column flex-lg-row"> <div>Qinyi Li, Xavier Boyen</div> <button role="button" aria-expanded="false" aria-controls="authorlist" class="ms-4 btn me-3 dropdown-toggle" data-bs-toggle="collapse" data-bs-target="#authorlist">Author Info</button> </div> <div id="authorlist" class="authorlist collapse"> <div class="author"> <div class="authorname">Qinyi Li <a target="_blank" href="https://orcid.org/0000-0002-1064-2600"><img alt="ORCID" class="align-baseline orcidIcon" src="/images/orcid.svg"></a> </div> <div class="ms-4 mb-2"> Griffith University, Brisbane, Australia<br> <span class="font-monospace">qinyi dot li at griffith dot edu dot au</span> </div> </div> <div class="author"> <div class="authorname">Xavier Boyen </div> <div class="ms-4 mb-2"> QUT, Brisbane, Australia<br> <span class="font-monospace">xavier dot boyen at qut dot edu dot au</span> </div> </div> </div> <div class="mb-3"> <strong class="fs-4">Keywords: </strong> <span class="badge p-2 text-bg-light keyword ms-2 my-1" alt="Public-Key Authenticated Encryption" title="Public-Key Authenticated Encryption"><a href="/search?q=Public-Key%20Authenticated%20Encryption">Public-Key Authenticated Encryption</a></span> <span class="badge p-2 text-bg-light keyword ms-2 my-1" alt="Keywords Search" title="Keywords Search"><a href="/search?q=Keywords%20Search">Keywords Search</a></span> <span class="badge p-2 text-bg-light keyword ms-2 my-1" alt="Post-quantum" title="Post-quantum"><a href="/search?q=Post-quantum">Post-quantum</a></span> <span class="badge p-2 text-bg-light keyword ms-2 my-1" alt="Token Privacy" title="Token Privacy"><a href="/search?q=Token%20Privacy">Token Privacy</a></span> <span class="badge p-2 text-bg-light keyword ms-2 my-1" alt="Generic Constructions" title="Generic Constructions"><a href="/search?q=Generic%20Constructions">Generic Constructions</a></span> </div> <h3 class="mt-4">Abstract</h3> <p><p> Public-key searchable encryption allows keyword-associated tokens to be used to test if a ciphertext contains specific keywords. Due to the low entropies of keywords, the token holder can create ciphertexts from candidate keywords and test them using the token in hand to recover the keywords, known as inside keyword guessing attacks (IKGA). Public-key authenticated encryption with keyword search is a searchable encryption proposed to defend against such attacks. It ensures the sender's private key protects the ciphertexts from the IKGA. PAEKS schemes with reasonable security and practical efficiency remain elusive despite many proposals. This work provides a simple generic PAEKS scheme from non-interactive key exchange (NIKE) and symmetric-key equality-predicate encryption with three new constructions for the latter, respectively from pseudorandom functions (PRFs), the decision bilinear Diffie-Hellman assumption, and the learning-with-errors assumption. Instantiating our generic scheme, we derive several PAEKS schemes from the most well-known assumptions, with some of them achieving full cipher-keyword indistinguishability and full token indistinguishability in the standard model, for the first time. Our instantiated schemes allow practical implementations and outperform the existing PAEKS schemes under the same assumptions. </p></p> <h3 class="mb-3">References</h3> <div class="d-flex"> <div style="min-width:9rem;">[AAB<sup>+</sup>13]</div> <div><div id="ref-AABKPS13" class="bibitem">Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran, and Amit Sahai. <a href="https://eprint.iacr.org/2013/744">Functional Encryption and Property Preserving Encryption: New Definitions and Positive Results</a>. Cryptology ePrint Archive, Paper 2013/744. 2013.</div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Shashank+Agrawal+Shweta+Agrawal+Saikrishna+Badrinarayanan+Abishek+Kumarasubramanian+Manoj+Prabhakaran+Amit+Sahai+Functional+Encryption+and+Property+Preserving+Encryption%3A+New+Definitions+and+Positive+Results+2013" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Shashank+Agrawal+Shweta+Agrawal+Saikrishna+Badrinarayanan+Abishek+Kumarasubramanian+Manoj+Prabhakaran+Amit+Sahai&title=Functional+Encryption+and+Property+Preserving+Encryption%3A+New+Definitions+and+Positive+Results&submittedafter=2012&submittedbefore=2014" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[ABB10]</div> <div><div id="ref-ABB10a" class="bibitem">Shweta Agrawal, Dan Boneh, and Xavier Boyen. Efficient Lattice (H)IBE in the Standard Model. In Henri Gilbert, editor, <em>Advances in Cryptology - EUROCRYPT 2010</em>, volume 6110 of <em>Lecture Notes in Computer Science</em>, pages 553-572. Springer Berlin Heidelberg 2010. DOI: <a href="https://doi.org/10.1007/978-3-642-13190-5_28">10.1007/978-3-642-13190-5_28</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Shweta+Agrawal+Dan+Boneh+Xavier+Boyen+Efficient+Lattice+%28H%29IBE+in+the+Standard+Model+2010" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Shweta+Agrawal+Dan+Boneh+Xavier+Boyen&title=Efficient+Lattice+%28H%29IBE+in+the+Standard+Model&submittedafter=2009&submittedbefore=2011" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[BBDQ18]</div> <div><div id="ref-BBDQ18" class="bibitem">Fabrice Benhamouda, Olivier Blazy, Léo Ducas, and Willy Quach. Hash Proof Systems over Lattices Revisited. In Michel Abdalla and Ricardo Dahab, editors, <em>Public-Key Cryptography – PKC 2018</em>, pages 644–674, Cham. 2018. Springer International Publishing. DOI: <a href="https://doi.org/10.1007/978-3-319-76581-5_22">10.1007/978-3-319-76581-5_22</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Fabrice+Benhamouda+Olivier+Blazy+L%C3%A9o+Ducas+Willy+Quach+Hash+Proof+Systems+over+Lattices+Revisited+2018" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Fabrice+Benhamouda+Olivier+Blazy+L%C3%A9o+Ducas+Willy+Quach&title=Hash+Proof+Systems+over+Lattices+Revisited&submittedafter=2017&submittedbefore=2019" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[BCOP04]</div> <div><div id="ref-BCOP04" class="bibitem">Dan Boneh, Giovanni Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. Public Key Encryption with Keyword Search. In <em>Advances in Cryptology - EUROCRYPT 2004</em>, volume 3027 of <em>Lecture Notes in Computer Science</em>, pages 506-522. Springer Berlin Heidelberg 2004. DOI: <a href="https://doi.org/10.1007/978-3-540-24676-3_30">10.1007/978-3-540-24676-3_30</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Dan+Boneh+Giovanni+Crescenzo+Rafail+Ostrovsky+Giuseppe+Persiano+Public+Key+Encryption+with+Keyword+Search+2004" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Dan+Boneh+Giovanni+Crescenzo+Rafail+Ostrovsky+Giuseppe+Persiano&title=Public+Key+Encryption+with+Keyword+Search&submittedafter=2003&submittedbefore=2005" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[BEP<sup>+</sup>21]</div> <div><div id="ref-BEPRS21" class="bibitem">Pauline Bert, Gautier Eberhart, Lucas Prabel, Adeline Roux-Langlois, and Mohamed Sabt. Implementation of lattice trapdoors on modules and applications. In <em>Post-Quantum Cryptography – PQCrypto 2021</em>, pages 195–214. 2021. Springer. DOI: <a href="https://doi.org/10.1007/978-3-030-81293-5_11">10.1007/978-3-030-81293-5_11</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Pauline+Bert+Gautier+Eberhart+Lucas+Prabel+Adeline+Roux-Langlois+Mohamed+Sabt+Implementation+of+lattice+trapdoors+on+modules+and+applications+2021" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Pauline+Bert+Gautier+Eberhart+Lucas+Prabel+Adeline+Roux-Langlois+Mohamed+Sabt&title=Implementation+of+lattice+trapdoors+on+modules+and+applications&submittedafter=2020&submittedbefore=2022" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[BF01]</div> <div><div id="ref-BF01" class="bibitem">Dan Boneh and Matt Franklin. Identity-Based Encryption from the Weil Pairing. In Joe Kilian, editor, <em>Advances in Cryptology–CRYPTO 2001</em>, volume 2139 of <em>Lecture Notes in Computer Science</em>, pages 213-229. Springer Berlin Heidelberg 2001. DOI: <a href="https://doi.org/10.1007/3-540-44647-8_13">10.1007/3-540-44647-8_13</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Dan+Boneh+Matt+Franklin+Identity-Based+Encryption+from+the+Weil+Pairing+2001" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Dan+Boneh+Matt+Franklin&title=Identity-Based+Encryption+from+the+Weil+Pairing&submittedafter=2000&submittedbefore=2002" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[BS18]</div> <div><div id="ref-BS18" class="bibitem">Zvika Brakerski and Gil Segev. Function-private functional encryption in the private-key setting. <em>Journal of Cryptology</em>, 31:202–225, 2018. DOI: <a href="https://doi.org/10.1007/s00145-017-9261-0">10.1007/s00145-017-9261-0</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Zvika+Brakerski+Gil+Segev+Function-private+functional+encryption+in+the+private-key+setting+2018" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Zvika+Brakerski+Gil+Segev&title=Function-private+functional+encryption+in+the+private-key+setting&submittedafter=2017&submittedbefore=2019" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[BW06]</div> <div><div id="ref-BW06" class="bibitem">Xavier Boyen and Brent Waters. Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). In Cynthia Dwork, editor, <em>Advances in Cryptology - CRYPTO 2006</em>, volume 4117 of <em>Lecture Notes in Computer Science</em>, pages 290-307. Springer Berlin Heidelberg 2006. DOI: <a href="https://doi.org/10.1007/11818175_17">10.1007/11818175_17</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Xavier+Boyen+Brent+Waters+Anonymous+Hierarchical+Identity-Based+Encryption+%28Without+Random+Oracles%29+2006" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Xavier+Boyen+Brent+Waters&title=Anonymous+Hierarchical+Identity-Based+Encryption+%28Without+Random+Oracles%29&submittedafter=2005&submittedbefore=2007" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[CKS09]</div> <div><div id="ref-CKS09" class="bibitem">David Cash, Eike Kiltz, and Victor Shoup. The twin Diffie–Hellman problem and applications. <em>Journal of Cryptology</em>, 22:470–504, 2009. DOI: <a href="https://doi.org/10.1007/s00145-009-9041-6">10.1007/s00145-009-9041-6</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=David+Cash+Eike+Kiltz+Victor+Shoup+The+twin+Diffie%E2%80%93Hellman+problem+and+applications+2009" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=David+Cash+Eike+Kiltz+Victor+Shoup&title=The+twin+Diffie%E2%80%93Hellman+problem+and+applications&submittedafter=2008&submittedbefore=2010" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[CLM<sup>+</sup>18]</div> <div><div id="ref-CLMPR18" class="bibitem">Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, and Joost Renes. CSIDH: an efficient post-quantum commutative group action. In <em>Advances in Cryptology–ASIACRYPT 2018</em>, pages 395–427. 2018. Springer. DOI: <a href="https://doi.org/10.1007/978-3-030-03332-3_15">10.1007/978-3-030-03332-3_15</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Wouter+Castryck+Tanja+Lange+Chloe+Martindale+Lorenz+Panny+Joost+Renes+CSIDH%3A+an+efficient+post-quantum+commutative+group+action+2018" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Wouter+Castryck+Tanja+Lange+Chloe+Martindale+Lorenz+Panny+Joost+Renes&title=CSIDH%3A+an+efficient+post-quantum+commutative+group+action&submittedafter=2017&submittedbefore=2019" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[CM22]</div> <div><div id="ref-CM22" class="bibitem">Leixiao Cheng and Fei Meng. Public key authenticated encryption with keyword search from LWE. In <em>European Symposium on Research in Computer Security</em>, pages 303–324. 2022. Springer. DOI: <a href="https://doi.org/10.1007/978-3-031-17140-6_15">10.1007/978-3-031-17140-6_15</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Leixiao+Cheng+Fei+Meng+Public+key+authenticated+encryption+with+keyword+search+from+LWE+2022" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Leixiao+Cheng+Fei+Meng&title=Public+key+authenticated+encryption+with+keyword+search+from+LWE&submittedafter=2021&submittedbefore=2023" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[CQFM23]</div> <div><div id="ref-CQFM23" class="bibitem">Leixiao Cheng, Jing Qin, Feng Feng, and Fei Meng. Security-enhanced public-key authenticated searchable encryption. <em>Information Sciences</em>, 647:119454, 2023. DOI: <a href="https://doi.org/10.1016/j.ins.2023.119454">10.1016/j.ins.2023.119454</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Leixiao+Cheng+Jing+Qin+Feng+Feng+Fei+Meng+Security-enhanced+public-key+authenticated+searchable+encryption+2023" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Leixiao+Cheng+Jing+Qin+Feng+Feng+Fei+Meng&title=Security-enhanced+public-key+authenticated+searchable+encryption&submittedafter=2022&submittedbefore=2024" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[DH76]</div> <div><div id="ref-DH76" class="bibitem">Whitfield Diffie and Martin Hellman. New directions in cryptography. <em>IEEE transactions on Information Theory</em>, 22(6):644–654, 1976. DOI: <a href="https://doi.org/10.1109/TIT.1976.1055638">10.1109/TIT.1976.1055638</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Whitfield+Diffie+Martin+Hellman+New+directions+in+cryptography+1976" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Whitfield+Diffie+Martin+Hellman&title=New+directions+in+cryptography&submittedafter=1975&submittedbefore=1977" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[dK18]</div> <div><div id="ref-dKoc18" class="bibitem">Bor de Kock. <em>A non-interactive key exchange based on ring-learning with errors</em>. PhD thesis, Master’s thesis. Master’s thesis, Eindhoven University of Technology, 2018.</div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Bor+de+Kock+A+non-interactive+key+exchange+based+on+ring-learning+with+errors+2018" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Bor+de+Kock&title=A+non-interactive+key+exchange+based+on+ring-learning+with+errors&submittedafter=2017&submittedbefore=2019" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[DLP14]</div> <div><div id="ref-DLP14" class="bibitem">Léo Ducas, Vadim Lyubashevsky, and Thomas Prest. Efficient identity-based encryption over NTRU lattices. In <em>International Conference on the Theory and Application of Cryptology and Information Security</em>, pages 22–41. 2014. Springer. DOI: <a href="https://doi.org/10.1007/978-3-662-45608-8_2">10.1007/978-3-662-45608-8_2</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=L%C3%A9o+Ducas+Vadim+Lyubashevsky+Thomas+Prest+Efficient+identity-based+encryption+over+NTRU+lattices+2014" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=L%C3%A9o+Ducas+Vadim+Lyubashevsky+Thomas+Prest&title=Efficient+identity-based+encryption+over+NTRU+lattices&submittedafter=2013&submittedbefore=2015" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[DM14]</div> <div><div id="ref-DM14" class="bibitem">Léo Ducas and Daniele Micciancio. Improved Short Lattice Signatures in the Standard Model. In Juan A. Garay and Rosario Gennaro, editors, <em>Advances in Cryptology – CRYPTO 2014</em>, pages 335–352, Berlin, Heidelberg. 2014. Springer Berlin Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-662-44371-2_19">10.1007/978-3-662-44371-2_19</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=L%C3%A9o+Ducas+Daniele+Micciancio+Improved+Short+Lattice+Signatures+in+the+Standard+Model+2014" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=L%C3%A9o+Ducas+Daniele+Micciancio&title=Improved+Short+Lattice+Signatures+in+the+Standard+Model&submittedafter=2013&submittedbefore=2015" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[Emu22]</div> <div><div id="ref-Emu22" class="bibitem">Keita Emura. Generic construction of public-key authenticated encryption with keyword search revisited: stronger security and efficient construction. In <em>Proceedings of the 9th ACM on ASIA Public-Key Cryptography Workshop</em>, pages 39–49. 2022. DOI: <a href="https://doi.org/10.1145/3494105.352623">10.1145/3494105.352623</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Keita+Emura+Generic+construction+of+public-key+authenticated+encryption+with+keyword+search+revisited%3A+stronger+security+and+efficient+construction+2022" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Keita+Emura&title=Generic+construction+of+public-key+authenticated+encryption+with+keyword+search+revisited%3A+stronger+security+and+efficient+construction&submittedafter=2021&submittedbefore=2023" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[FHKP13]</div> <div><div id="ref-FHKP13" class="bibitem">Eduarda SV Freire, Dennis Hofheinz, Eike Kiltz, and Kenneth G Paterson. Non-interactive key exchange. In <em>Public-Key Cryptography–PKC 2013</em>, pages 254–271. 2013. Springer. DOI: <a href="https://doi.org/10.1007/978-3-642-36362-7_17">10.1007/978-3-642-36362-7_17</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Eduarda+SV+Freire+Dennis+Hofheinz+Eike+Kiltz+Kenneth+G+Paterson+Non-interactive+key+exchange+2013" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Eduarda+SV+Freire+Dennis+Hofheinz+Eike+Kiltz+Kenneth+G+Paterson&title=Non-interactive+key+exchange&submittedafter=2012&submittedbefore=2014" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[GdKQ<sup>+</sup>24]</div> <div><div id="ref-GKQMS24" class="bibitem">Phillip Gajland, Bor de Kock, Miguel Quaresma, Giulio Malavolta, and Peter Schwabe. <a href="https://www.usenix.org/system/files/sec24summer-prepub-883-gajland.pdf">Swoosh: Efficient Lattice-Based Non-Interactive Key Exchange</a>. In <em>USENIX Security Symposium – USENIX Security 2024</em>. 2024. USENIX Association. </div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Phillip+Gajland+Bor+de+Kock+Miguel+Quaresma+Giulio+Malavolta+Peter+Schwabe+Swoosh%3A+Efficient+Lattice-Based+Non-Interactive+Key+Exchange+2024" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Phillip+Gajland+Bor+de+Kock+Miguel+Quaresma+Giulio+Malavolta+Peter+Schwabe&title=Swoosh%3A+Efficient+Lattice-Based+Non-Interactive+Key+Exchange&submittedafter=2023&submittedbefore=2025" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[GPV08]</div> <div><div id="ref-GPV08" class="bibitem">Craig Gentry, Chris Peikert, and Vinod Vaikuntanathan. Trapdoors for hard lattices and new cryptographic constructions. In <em>Proceedings of the 40th annual ACM symposium on Theory of computing</em>, pages 197–206, New York, NY, USA. 2008. ACM. DOI: <a href="https://doi.org/10.1145/1374376.1374407">10.1145/1374376.1374407</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Craig+Gentry+Chris+Peikert+Vinod+Vaikuntanathan+Trapdoors+for+hard+lattices+and+new+cryptographic+constructions+2008" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Craig+Gentry+Chris+Peikert+Vinod+Vaikuntanathan&title=Trapdoors+for+hard+lattices+and+new+cryptographic+constructions&submittedafter=2007&submittedbefore=2009" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[HHK18]</div> <div><div id="ref-HHK18" class="bibitem">Julia Hesse, Dennis Hofheinz, and Lisa Kohl. On tightly secure non-interactive key exchange. In <em>Annual International Cryptology Conference – CRYPTO 2018</em>, pages 65–94. 2018. Springer. DOI: <a href="https://doi.org/10.1007/978-3-319-96881-0_3">10.1007/978-3-319-96881-0_3</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Julia+Hesse+Dennis+Hofheinz+Lisa+Kohl+On+tightly+secure+non-interactive+key+exchange+2018" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Julia+Hesse+Dennis+Hofheinz+Lisa+Kohl&title=On+tightly+secure+non-interactive+key+exchange&submittedafter=2017&submittedbefore=2019" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[KY16]</div> <div><div id="ref-KY16" class="bibitem">Shuichi Katsumata and Shota Yamada. Partitioning via non-linear polynomial functions: More compact ibes from ideal lattices and bilinear maps. In <em>Advances in Cryptology–ASIACRYPT 2016</em>, pages 682–712. 2016. Springer. DOI: <a href="https://doi.org/10.1007/978-3-662-53890-6_23">10.1007/978-3-662-53890-6_23</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Shuichi+Katsumata+Shota+Yamada+Partitioning+via+non-linear+polynomial+functions%3A+More+compact+ibes+from+ideal+lattices+and+bilinear+maps+2016" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Shuichi+Katsumata+Shota+Yamada&title=Partitioning+via+non-linear+polynomial+functions%3A+More+compact+ibes+from+ideal+lattices+and+bilinear+maps&submittedafter=2015&submittedbefore=2017" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[LHHS22]</div> <div><div id="ref-LHHS22" class="bibitem">Hongbo Li, Qiong Huang, Jianye Huang, and Willy Susilo. Public-key authenticated encryption with keyword search supporting constant trapdoor generation and fast search. <em>IEEE Transactions on Information Forensics and Security</em>, 18:396–410, 2022. DOI: <a href="https://doi.org/10.1109/TIFS.2022.3224308">10.1109/TIFS.2022.3224308</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Hongbo+Li+Qiong+Huang+Jianye+Huang+Willy+Susilo+Public-key+authenticated+encryption+with+keyword+search+supporting+constant+trapdoor+generation+and+fast+search+2022" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Hongbo+Li+Qiong+Huang+Jianye+Huang+Willy+Susilo&title=Public-key+authenticated+encryption+with+keyword+search+supporting+constant+trapdoor+generation+and+fast+search&submittedafter=2021&submittedbefore=2023" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[LTT<sup>+</sup>22]</div> <div><div id="ref-LTTMC22" class="bibitem">Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, and Yu-Chi Chen. Public-key authenticated encryption with keyword search: Cryptanalysis, enhanced security, and quantum-resistant instantiation. In <em>Proceedings of the 2022 ACM on Asia conference on computer and communications security</em>, pages 423–436. 2022. DOI: <a href="https://doi.org/10.1145/3488932.3497760">10.1145/3488932.3497760</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Zi-Yuan+Liu+Yi-Fan+Tseng+Raylin+Tso+Masahiro+Mambo+Yu-Chi+Chen+Public-key+authenticated+encryption+with+keyword+search%3A+Cryptanalysis%2C+enhanced+security%2C+and+quantum-resistant+instantiation+2022" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Zi-Yuan+Liu+Yi-Fan+Tseng+Raylin+Tso+Masahiro+Mambo+Yu-Chi+Chen&title=Public-key+authenticated+encryption+with+keyword+search%3A+Cryptanalysis%2C+enhanced+security%2C+and+quantum-resistant+instantiation&submittedafter=2021&submittedbefore=2023" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[LW19]</div> <div><div id="ref-LW19" class="bibitem">Zengpeng Li and Ding Wang. Achieving one-round password-based authenticated key exchange over lattices. <em>IEEE transactions on services computing</em>, 15(1):308–321, 2019. DOI: <a href="https://doi.org/10.1109/TSC.2019.2939836">10.1109/TSC.2019.2939836</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Zengpeng+Li+Ding+Wang+Achieving+one-round+password-based+authenticated+key+exchange+over+lattices+2019" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Zengpeng+Li+Ding+Wang&title=Achieving+one-round+password-based+authenticated+key+exchange+over+lattices&submittedafter=2018&submittedbefore=2020" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[MP12]</div> <div><div id="ref-MP12" class="bibitem">Daniele Micciancio and Chris Peikert. Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller. In David Pointcheval and Thomas Johansson, editors, <em>Advances in Cryptology – EUROCRYPT 2012</em>, volume 7237 of <em>Lecture Notes in Computer Science</em>, pages 700-718. Springer Berlin Heidelberg 2012. DOI: <a href="https://doi.org/10.1007/978-3-642-29011-4_41">10.1007/978-3-642-29011-4_41</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Daniele+Micciancio+Chris+Peikert+Trapdoors+for+Lattices%3A+Simpler%2C+Tighter%2C+Faster%2C+Smaller+2012" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Daniele+Micciancio+Chris+Peikert&title=Trapdoors+for+Lattices%3A+Simpler%2C+Tighter%2C+Faster%2C+Smaller&submittedafter=2011&submittedbefore=2013" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[NE19]</div> <div><div id="ref-NE19" class="bibitem">Mahnaz Noroozi and Ziba Eslami. Public key authenticated encryption with keyword search: revisited. <em>IET Information Security</em>, 13(4):336–342, 2019. DOI: <a href="https://doi.org/10.1049/iet-ifs.2018.5315">10.1049/iet-ifs.2018.5315</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Mahnaz+Noroozi+Ziba+Eslami+Public+key+authenticated+encryption+with+keyword+search%3A+revisited+2019" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Mahnaz+Noroozi+Ziba+Eslami&title=Public+key+authenticated+encryption+with+keyword+search%3A+revisited&submittedafter=2018&submittedbefore=2020" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[QCH<sup>+</sup>20]</div> <div><div id="ref-QCHLZ20" class="bibitem">Baodong Qin, Yu Chen, Qiong Huang, Ximeng Liu, and Dong Zheng. Public-key authenticated encryption with keyword search revisited: Security model and constructions. <em>Information Sciences</em>, 516:515–528, 2020. DOI: <a href="https://doi.org/10.1016/j.ins.2019.12.063">10.1016/j.ins.2019.12.063</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Baodong+Qin+Yu+Chen+Qiong+Huang+Ximeng+Liu+Dong+Zheng+Public-key+authenticated+encryption+with+keyword+search+revisited%3A+Security+model+and+constructions+2020" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Baodong+Qin+Yu+Chen+Qiong+Huang+Ximeng+Liu+Dong+Zheng&title=Public-key+authenticated+encryption+with+keyword+search+revisited%3A+Security+model+and+constructions&submittedafter=2019&submittedbefore=2021" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[QCZZ21]</div> <div><div id="ref-QCZZ21" class="bibitem">Baodong Qin, Hui Cui, Xiaokun Zheng, and Dong Zheng. Improved security model for public-key authenticated encryption with keyword search. In <em>Provable and Practical Security – ProvSec 2021</em>, pages 19–38. 2021. Springer. DOI: <a href="https://doi.org/10.1007/978-3-030-90402-9_2">10.1007/978-3-030-90402-9_2</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Baodong+Qin+Hui+Cui+Xiaokun+Zheng+Dong+Zheng+Improved+security+model+for+public-key+authenticated+encryption+with+keyword+search+2021" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Baodong+Qin+Hui+Cui+Xiaokun+Zheng+Dong+Zheng&title=Improved+security+model+for+public-key+authenticated+encryption+with+keyword+search&submittedafter=2020&submittedbefore=2022" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[Sha85]</div> <div><div id="ref-Shamir84" class="bibitem">Adi Shamir. Identity-Based Cryptosystems and Signature Schemes. In GeorgeRobert Blakley and David Chaum, editors, <em>Advances in Cryptology</em>, volume 196 of <em>Lecture Notes in Computer Science</em>, pages 47-53. Springer Berlin Heidelberg 1985. DOI: <a href="https://doi.org/10.1007/3-540-39568-7_5">10.1007/3-540-39568-7_5</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Adi+Shamir+Identity-Based+Cryptosystems+and+Signature+Schemes+1985" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Adi+Shamir&title=Identity-Based+Cryptosystems+and+Signature+Schemes&submittedafter=1984&submittedbefore=1986" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[SOK00]</div> <div><div id="ref-SOK00" class="bibitem">Ryuichi Sakai, Kiyoshi Ohgishi, and Masao Kasahara. Cryptosystems based on pairing. In <em>Symposium on Cryptography and Information Security</em>. 2000. Springer. </div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Ryuichi+Sakai+Kiyoshi+Ohgishi+Masao+Kasahara+Cryptosystems+based+on+pairing+2000" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Ryuichi+Sakai+Kiyoshi+Ohgishi+Masao+Kasahara&title=Cryptosystems+based+on+pairing&submittedafter=1999&submittedbefore=2001" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[SSW09]</div> <div><div id="ref-SSW09" class="bibitem">Emily Shen, Elaine Shi, and Brent Waters. Predicate Privacy in Encryption Systems. In Omer Reingold, editor, <em>Theory of Cryptography</em>, pages 457–473, Berlin, Heidelberg. 2009. Springer Berlin Heidelberg. DOI: <a href="https://doi.org/10.1007/978-3-642-00457-5_27">10.1007/978-3-642-00457-5_27</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Emily+Shen+Elaine+Shi+Brent+Waters+Predicate+Privacy+in+Encryption+Systems+2009" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Emily+Shen+Elaine+Shi+Brent+Waters&title=Predicate+Privacy+in+Encryption+Systems&submittedafter=2008&submittedbefore=2010" target="_blank" class="ms-3">ePrint</a> </div> <div class="d-flex"> <div style="min-width:9rem;">[XWC<sup>+</sup>24]</div> <div><div id="ref-XWCLWC24" class="bibitem">Tao Xiang, Zhongming Wang, Biwen Chen, Xiaoguo Li, Peng Wang, and Fei Chen. StopGuess: A framework for public-key authenticated encryption with keyword search. <em>Computer Standards & Interfaces</em>, 88:103805, 2024. DOI: <a href="https://doi.org/10.1016/j.csi.2023.103805">10.1016/j.csi.2023.103805</a></div></div> </div> <div class="text-end mb-4"> <a href="https://scholar.google.com/scholar?hl=en&q=Tao+Xiang+Zhongming+Wang+Biwen+Chen+Xiaoguo+Li+Peng+Wang+Fei+Chen+StopGuess%3A+A+framework+for+public-key+authenticated+encryption+with+keyword+search+2024" target="_blank" class="ms-3">Google Scholar</a> <a href="https://eprint.iacr.org/search?relevance=on&authors=Tao+Xiang+Zhongming+Wang+Biwen+Chen+Xiaoguo+Li+Peng+Wang+Fei+Chen&title=StopGuess%3A+A+framework+for+public-key+authenticated+encryption+with+keyword+search&submittedafter=2023&submittedbefore=2025" target="_blank" class="ms-3">ePrint</a> </div> </div> <div class="col-12 col-md-4"> <p class="mt-4"> <a class="btn btn-outline-dark" href="/p/1/2/16/pdf"><img alt="PDF" class="icon" src="/images/file-pdf.svg">PDF</a> <img style="margin-left: 1rem;max-width: 1.2rem;" src="/images/open_access.svg" title="Open access" alt="Open access"> </p> <div class="my-4"> <span class="fw-bold me-2">DOI:</span> <a href="https://doi.org/10.62056/a63z11zn4">https://doi.org/10.62056/a63z11zn4</a> </div> <div class="card mb-4"> <h5 class="card-header">History</h5> <div class="card-body"> <strong>Submitted</strong>: 2024-04-08<br> <strong>Accepted</strong>: 2024-06-03<br> <strong>Published</strong>: 2024-07-08<br> <!-- begin crossmark --> <script src="https://crossmark-cdn.crossref.org/widget/v2.0/widget.js"></script> <a data-target="crossmark"><img style="margin-top:4px;" src="https://crossmark-cdn.crossref.org/widget/v2.0/logos/CROSSMARK_Color_horizontal.svg" width="150" /></a> <!-- end crossmark --> </div> </div> <div class="card mb-4"> <h5 class="card-header">How to cite</h5> <div class="card-body"> <p>Qinyi Li and Xavier Boyen, Public-Key Authenticated Encryption with Keyword Search Made Easy. <span class="fst-italic">IACR Communications in Cryptology</span>, vol. 1, no. 2, Jul 08, 2024, doi: 10.62056/a63z11zn4. </p> <button type="button" id="citationModalLabel" class="float-end btn btn-outline-dark" data-bs-toggle="modal" data-bs-target="#citationModal"> BibTeX, etc </button> </div> </div> <div class="card mb-4"> <h5 class="card-header">Citations</h5> <div class="card-body"> <p>There is at least one citation.</p> <button type="button" id="citationsModalLabel" class="float-end btn btn-outline-dark" data-bs-toggle="modal" data-bs-target="#citationsModal">Show citations</button> </div> </div> <div class="card mb-4"> <h5 class="card-header">License</h5> <div class="card-body"> <p>Copyright is held by the author(s)</p> <p> This work is licensed under a <a target="_blank" href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution (CC BY)</a> license. </p> </div> </div> </div> </div> <div class="modal fade" id="citationModal" tabindex="-1" aria-labelledby="citationModalLabel" aria-hidden="true"> <div class="modal-dialog modal-xl"> <div class="modal-content"> <div class="modal-header"> <h1 class="modal-title fs-3">How to cite this</h1> <button type="button" class="btn-close" data-bs-dismiss="modal" aria-label="Close"></button> </div> <div class="modal-body p-4"> <ul class="nav nav-tabs" id="myTab" role="tablist"> <li class="nav-item" role="presentation"> <button class="nav-link active" id="bibtex-tab" data-bs-toggle="tab" data-bs-target="#bibtex-pane" type="button" role="tab" aria-controls="bibtex-pane" aria-selected="true">BibTeX</button> </li> <li class="nav-item" role="presentation"> <button class="nav-link" id="ris-tab" data-bs-toggle="tab" data-bs-target="#ris-pane" type="button" role="tab" aria-controls="ris-pane" aria-selected="false">RIS/Endnote/Zotero/Mendeley</button> </li> <li class="nav-item" role="presentation"> <button class="nav-link" id="text-tab" data-bs-toggle="tab" data-bs-target="#text-pane" type="button" role="tab" aria-controls="text-pane" aria-selected="false">Text</button> </li> </ul> <div class="tab-content p-4"> <div class="tab-pane active" id="bibtex-pane" role="tabpanel" aria-labelledby="bibtex-tab" tabindex="0"> <pre id="bib">@article{CiC-1-2-16, author = "Li, Qinyi and Boyen, Xavier", journal = "{IACR} {C}ommunications in {C}ryptology", publisher = "{I}nternational {A}ssociation for {C}ryptologic {R}esearch", title = "Public-Key Authenticated Encryption with Keyword Search Made Easy", volume = "1", number = "2", date = "2024-07-08", year = "2024", issn = "3006-5496", doi = "10.62056/a63z11zn4" } </pre> <button id="bibtexcopy" class="btn btn-sm btn-primary" aria-label="Copy to clipboard" onclick="copyMetadata('bibtexcopy', 'bib')">Copy to clipboard</button> <button id="bibtexdownload" class="ms-3 btn btn-sm btn-primary" aria-label="Download BibTeX .bib file" onclick="sendCitation('bib')">Download .bib file</button> </div> <div class="tab-pane" id="ris-pane" role="tabpanel" aria-labelledby="ris-tab" tabindex="0"> <pre id="ris">TY - JOUR AU - Li, Qinyi AU - Boyen, Xavier PY - 2024 TI - Public-Key Authenticated Encryption with Keyword Search Made Easy JF - IACR Communications in Cryptology JA - CIC VL - 1 IS - 2 DO - 10.62056/a63z11zn4 UR - https://doi.org/10.62056/a63z11zn4 AB - <p> Public-key searchable encryption allows keyword-associated tokens to be used to test if a ciphertext contains specific keywords. Due to the low entropies of keywords, the token holder can create ciphertexts from candidate keywords and test them using the token in hand to recover the keywords, known as inside keyword guessing attacks (IKGA). Public-key authenticated encryption with keyword search is a searchable encryption proposed to defend against such attacks. It ensures the sender's private key protects the ciphertexts from the IKGA. PAEKS schemes with reasonable security and practical efficiency remain elusive despite many proposals. This work provides a simple generic PAEKS scheme from non-interactive key exchange (NIKE) and symmetric-key equality-predicate encryption with three new constructions for the latter, respectively from pseudorandom functions (PRFs), the decision bilinear Diffie-Hellman assumption, and the learning-with-errors assumption. Instantiating our generic scheme, we derive several PAEKS schemes from the most well-known assumptions, with some of them achieving full cipher-keyword indistinguishability and full token indistinguishability in the standard model, for the first time. Our instantiated schemes allow practical implementations and outperform the existing PAEKS schemes under the same assumptions. </p> ER -</pre> <button id="riscopy" class="btn btn-sm btn-primary" aria-label="Copy to clipboard" onclick="copyMetadata('riscopy', 'ris')">Copy to clipboard</button> <button id="risdownload" class="ms-3 btn btn-sm btn-primary" aria-label="Download RIS file" onclick="sendCitation('ris')">Download .ris file</button> </div> <div class="tab-pane" id="text-pane" role="tabpanel" aria-labelledby="text-tab" tabindex="0"> <div class="w-75" id="textcitation">Qinyi Li and Xavier Boyen, Public-Key Authenticated Encryption with Keyword Search Made Easy. <span class="fst-italic">IACR Communications in Cryptology</span>, vol. 1, no. 2, Jul 08, 2024, doi: 10.62056/a63z11zn4.</div> <button id="textcopy" class="btn btn-sm btn-primary mt-3" aria-label="Copy to clipboard" onclick="copyMetadata('textcopy', 'textcitation')">Copy to clipboard</button> </div> </div> </div> <div class="modal-footer"> <button type="button" class="btn btn-secondary" data-bs-dismiss="modal">Close</button> </div> </div> </div> </div> <div class="modal fade" id="citationsModal" tabindex="-1" aria-labelledby="citationsModalLabel" aria-hidden="true"> <div class="modal-dialog modal-dialog-scrollable modal-lg"> <div class="modal-content"> <div class="modal-header"> <h1 class="modal-title fs-3">Known citations</h1> <button type="button" class="btn-close" data-bs-dismiss="modal" aria-label="Close"></button> </div> <div class="modal-body p-4"> <p> We do not crawl the web, so we are only able to identify citations from papers that are registered with a DOI in crossref.org and the publisher reports their citations to crossref, and crossref can identify a DOI from the reference. That includes (most) articles from Springer and many from ACM, but it excludes citations from USENIX because they don't issue DOIs. It also excludes citations from arxiv and eprint. You may find more citations in <a href="https://scholar.google.com/scholar?hl=en&q=Public-Key+Authenticated+Encryption+with+Keyword+Search+Made+Easy">Google Scholar</a>. </p> <ol> <li>Nan Zhang, Baodong Qin, Dong Zheng and Xueqin Liang. Cryptanalysis of Keyword Confidentiality in a Searchable Public‐Key Encryption Scheme Against Malicious Server. <em>IET Information Security</em> (2025) Vol 2025, Issue 1 DOI: <a href="https://doi.org/10.1049/ise2/2464518" target="_blank">10.1049/ise2/2464518</a></li> </ol> </div> <div class="modal-footer"> <button type="button" class="btn btn-secondary" data-bs-dismiss="modal">Close</button> </div> </div> </div> </div> <script> function copyMetadata(buttid, id) { let range = document.createRange(); range.selectNode(document.getElementById(id)); window.getSelection().removeAllRanges(); window.getSelection().addRange(range); document.execCommand('copy'); window.getSelection().removeAllRanges(); const copyTooltip = new bootstrap.Tooltip('#' + buttid, {trigger: 'manual', title: 'Copied!'}); copyTooltip.show(); setTimeout(function() { copyTooltip.dispose(); }, 2000); } function sendCitation(typ) { // typ is 'bib' or 'ris' let data = document.getElementById(typ).innerHTML; atag = document.createElement('a'); atag.setAttribute('href', 'data:text/plain;charset=utf-8,' + encodeURIComponent(data)); atag.setAttribute('download', '1-2-16.' + typ); if (document.createEvent) { let event = document.createEvent('MouseEvents'); event.initEvent('click', true, true); atag.dispatchEvent(event); } else { atag.click(); } } </script> </main> <div class="container-fluid mt-auto" id="pageFooter"> </div> <footer class="text-center footer py-3"> <small> <a href="https://iacr.org/copyright.html">Copyright © 2025</a> <span class="d-none d-md-inline">by the </span><span class="d-md-none">IACR</span> <span class="d-none d-md-inline">International Association for Cryptologic Research</span> <span class="d-none d-md-inline">• </span><br class="d-md-none"> <a href="https://iacr.org/privacy.html">Privacy Policy</a> </small> </footer> <script id="results-template" type="text/x-handlebars-template"> <div class="p-3 shadow" style="margin-bottom:1rem;max-height:70vh;overflow-y:scroll"> <p>{{estimated_results}} results (if more than 100, then refine your query)</p> <ol> {{#each results}} <li role="presentation"><a href="{{url}}">{{title}}</a><br> {{#each authors }}{{this}}{{#unless @last}}, {{/unless}}{{/each}}</li> {{/each}} </ol> </div> </script> <script src="/static/js/handlebars-v4.7.7.js"></script> <script> var theTemplateScript = document.getElementById('results-template').innerHTML; var resultsTemplate = Handlebars.compile(theTemplateScript); var textinput = document.getElementById('searchbox'); // Returns a function, that, as long as it continues to be invoked, will not // be triggered. The function will be called after it stops being called for // N milliseconds. If `immediate` is passed, trigger the function on the // leading edge, instead of the trailing. function debounce(func, wait, immediate) { var timeout; return function() { var context = this, args = arguments; var later = function() { timeout = null; if (!immediate) func.apply(context, args); }; var callNow = immediate && !timeout; clearTimeout(timeout); timeout = setTimeout(later, wait); if (callNow) func.apply(context, args); }; }; let controller; let signal; var doSearch = debounce(function() { args = {'d': '/var/www/wsgi/cicjournal/webapp/search_index/xapian.db'} if (textinput.value) { args['q'] = textinput.value; if (controller !== undefined) { console.log('killing'); controller.abort(); } controller = new AbortController(); signal = controller.signal; let search_url = "https://cic.iacr.org/api/search" + "?" + new URLSearchParams(args); console.log(search_url); fetch(search_url, {signal}) .then((response) => response.json()) .then((data) => { console.log(data); let elem = document.getElementById('view'); if (elem) {elem.innerHTML = '';} if (data.results.length > 0) { document.getElementById('results').innerHTML = resultsTemplate(data); } else { document.getElementById('results').innerHTML = '<div class="p-3 shadow">no results</div>'; } controller = undefined; }).catch((error) => { console.log('error in fetch'); console.log(error); }); } else { console.log('no query'); } }, 500); // only after 250 ms. document.querySelectorAll('input').forEach((elem) => { elem.addEventListener('input', doSearch); }); </script> </body> </html>