Public-key authenticated encryption with keyword search: Cryptanalysis, enhanced security, and quantum-resistant instantiation

ZY Liu, YF Tseng, R Tso, M Mambo… - … of the 2022 ACM on Asia …, 2022 - dl.acm.org
With the rapid development of cloud computing, an increasing number of companies are
adopting cloud storage technology to reduce overhead. However, to ensure the privacy of …

Lattice-based lightweight quantum resistant scheme in 5G-enabled vehicular networks

ZG Al-Mekhlafi, MA Al-Shareeda, S Manickam… - Mathematics, 2023 - mdpi.com
Both security and privacy are central issues and need to be properly handled because
communications are shared among vehicles in open channel environments of 5G-enabled …

Generic construction of public-key authenticated encryption with keyword search revisited: Stronger security and efficient construction

K Emura - Proceedings of the 9th ACM on ASIA Public-Key …, 2022 - dl.acm.org
Public-key encryption with keyword search (PEKS) does not provide trapdoor privacy, ie,
keyword information is leaked through trapdoors. To prevent this information leakage, public …

A more efficient public-key authenticated encryption scheme with keyword search

Q Huang, P Huang, H Li, J Huang, H Lin - Journal of Systems Architecture, 2023 - Elsevier
To realize ciphertext retrieval without decryption in the public key settings, Boneh et al. in
2004 proposed a cryptographic primitive named Public-key Encryption with Keyword Search …

Public key authenticated encryption with keyword search from LWE

L Cheng, F Meng - European Symposium on Research in Computer …, 2022 - Springer
Public key encryption with keyword search (PEKS) inherently suffers from the inside
keyword guessing attack. To resist against this attack, Huang et al. proposed the public key …

Forward secure public-key authenticated encryption with conjunctive keyword search

Z Jiang, K Zhang, L Wang, J Ning - The Computer Journal, 2023 - academic.oup.com
Public key encryption with keyword search is a promising primitive which enables search
over encrypted data in secure data outsourcing services. In traditional construction, the …

Identity-certifying authority-aided identity-based searchable encryption framework in cloud systems

ZY Liu, YF Tseng, R Tso, YC Chen… - IEEE Systems …, 2021 - ieeexplore.ieee.org
In the era of cloud computing, massive quantities of data are encrypted and uploaded to the
cloud to realize a variety of applications and services while protecting user confidentiality …

Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications

S Xu, Y Cao, X Chen, Y Zhao, SM Yiu - International Conference on …, 2023 - Springer
Public-key encryption with keyword search (PEKS) was first proposed by Boneh et
al.(EUROCRYPT 2004), achieving the ability to search for ciphertext files. Nevertheless, it is …

Abaeks: Attribute-based authenticated encryption with keyword search over outsourced encrypted data

F Luo, H Wang, C Lin, X Yan - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The widespread adoption of cloud computing and the exponential growth of data highlight
the need for secure data sharing and querying. Attribute-based keyword search (ABKS) has …

A Lightweight Authenticated Searchable Encryption without Bilinear Pairing for Cloud Computing

H Du, J Chen, M Chen, C Peng… - … and Mobile Computing, 2022 - Wiley Online Library
Outsourcing data to cloud services is a good solution for users with limited computing
resources. Privacy and confidentiality of data is jeopardized when data is transferred and …