At SeCrypt 2015, Buccafurri et al. [BLSS15] presented an integrated public-key encryption (PKE) and public-key encryption with keyword search (PEKS) scheme (PKE+PEKS) whose security relies on the Symmetric eXternal Diffie-Hellman (SXDH) assumption but they did not provide a security proof. We present a construction of PKE+PEKS and prove its security in the standard model under the SXDH assumption. We prove that our scheme is both IND-PKE-CCA secure, that is, it provides message confidentiality against an adaptive chosen ciphertext adversary, and IND-PEKS-CCA secure, that is, it provides keyword privacy against an adaptive chosen ciphertext adversary. Ours is the first secure PKE+PEKS construction to use asymmetric pairings which enable an e...
We survey the notion of provably secure Searchable Encryption (SE) by giving a complete and comprehe...
Public-key Encryption with Keyword Search (PEKS), proposed by Boneh et al. in 2004, is a cryptograph...
encrypted data, but communication must rely on a secure channel. In PEKS, a sender would like to sha...
In this paper we investigate the topic of integrated public-key encryption (PKE) and public-key encr...
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key T_W to a se...
[[abstract]]Public Key Encryption with Keyword Search (PEKS) scheme enable one to search the encrypt...
1. Public Key Encryption with Keyword Search (PEKS) • The concept was introduced by Boneh et al. (2...
Public Key Encryption with Keyword Search (PEKS), introduced by Boneh et al. in Eurocrypt\u2704, all...
Public Key Encryption with Keyword Search (PEKS) enables users to search encrypted messages by a spe...
doi:10.4156/jdcta.vol4. issue9.17 A public key encryption with keyword search (PEKS) scheme does not...
Certificateless Public-key Authenticated Encryption with Keyword Search (CLPAEKS) is derived from th...
Abstract. In cryptography, forward secrecy is a well-known property of key agreement protocols. It e...
In cryptography, forward secrecy is a well-known property for key agreement protocols. It ensures th...
Searchable encryption is of increasing interest for protecting the data privacy in secure searchable...
[[abstract]]The idea of public key encryption with keyword search (PEKS), proposed by Boneh et al., ...
We survey the notion of provably secure Searchable Encryption (SE) by giving a complete and comprehe...
Public-key Encryption with Keyword Search (PEKS), proposed by Boneh et al. in 2004, is a cryptograph...
encrypted data, but communication must rely on a secure channel. In PEKS, a sender would like to sha...
In this paper we investigate the topic of integrated public-key encryption (PKE) and public-key encr...
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key T_W to a se...
[[abstract]]Public Key Encryption with Keyword Search (PEKS) scheme enable one to search the encrypt...
1. Public Key Encryption with Keyword Search (PEKS) • The concept was introduced by Boneh et al. (2...
Public Key Encryption with Keyword Search (PEKS), introduced by Boneh et al. in Eurocrypt\u2704, all...
Public Key Encryption with Keyword Search (PEKS) enables users to search encrypted messages by a spe...
doi:10.4156/jdcta.vol4. issue9.17 A public key encryption with keyword search (PEKS) scheme does not...
Certificateless Public-key Authenticated Encryption with Keyword Search (CLPAEKS) is derived from th...
Abstract. In cryptography, forward secrecy is a well-known property of key agreement protocols. It e...
In cryptography, forward secrecy is a well-known property for key agreement protocols. It ensures th...
Searchable encryption is of increasing interest for protecting the data privacy in secure searchable...
[[abstract]]The idea of public key encryption with keyword search (PEKS), proposed by Boneh et al., ...
We survey the notion of provably secure Searchable Encryption (SE) by giving a complete and comprehe...
Public-key Encryption with Keyword Search (PEKS), proposed by Boneh et al. in 2004, is a cryptograph...
encrypted data, but communication must rely on a secure channel. In PEKS, a sender would like to sha...