Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/105388
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computing-
dc.creatorLu, J-
dc.creatorLi, H-
dc.creatorHuang, J-
dc.creatorMa, S-
dc.creatorAu, MHA-
dc.creatorHuang, Q-
dc.date.accessioned2024-04-12T06:52:10Z-
dc.date.available2024-04-12T06:52:10Z-
dc.identifier.urihttp://hdl.handle.net/10397/105388-
dc.language.isoenen_US
dc.publisherMDPI AGen_US
dc.rights© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).en_US
dc.rightsThe following publication Lu J, Li H, Huang J, Ma S, Au MHA, Huang Q. Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security. Information. 2023; 14(3):142. https://doi.org/10.3390/info14030142 is available at https://doi.org/10.3390/info14030142.en_US
dc.subjectCertificateless public key cryptographyen_US
dc.subjectEncryption with keyword searchen_US
dc.subjectKeyword guessing attacksen_US
dc.subjectProvable securityen_US
dc.subjectTrapdoor indistinguishabilityen_US
dc.titleCertificateless public key authenticated encryption with keyword search achieving stronger securityen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.volume14-
dc.identifier.issue3-
dc.identifier.doi10.3390/info14030142-
dcterms.abstractTransforming data into ciphertexts and storing them in the cloud database is a secure way to simplify data management. Public key encryption with keyword search (PEKS) is an important cryptographic primitive as it provides the ability to search for the desired files among ciphertexts. As a variant of PEKS, certificateless public key authenticated encryption with keyword search (CLPAEKS) not only simplifies certificate management but also could resist keyword guessing attacks (KGA). In this paper, we analyze the security models of two recent CLPAEKS schemes and find that they ignore the threat that, upon capturing two trapdoors, the adversary could directly compare them and distinguish whether they are generated using the same keyword. To cope with this threat, we propose an improved security model and define the notion of strong trapdoor indistinguishability. We then propose a new CLPAEKS scheme and prove it to be secure under the improved security model based on the intractability of the DBDH problem and the DDH problem in the targeted bilinear group.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationInformation (Switzerland), Mar. 2023, v. 14, no. 3, 142-
dcterms.isPartOfInformation (Switzerland)-
dcterms.issued2023-03-
dc.identifier.scopus2-s2.0-85151097048-
dc.identifier.eissn2078-2489-
dc.identifier.artn142-
dc.description.validate202403 bcvc-
dc.description.oaVersion of Recorden_US
dc.identifier.FolderNumberOA_Scopus/WOSen_US
dc.description.fundingSourceOthersen_US
dc.description.fundingTextNational Natural Science Foundation of China; Major Program of Guangdong Basic and Applied Research; Science and Technology Program of Guangzhouen_US
dc.description.pubStatusPublisheden_US
dc.description.oaCategoryCCen_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
information-14-00142-v2.pdf430.79 kBAdobe PDFView/Open
Open Access Information
Status open access
File Version Version of Record
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

16
Citations as of Jul 7, 2024

Downloads

4
Citations as of Jul 7, 2024

SCOPUSTM   
Citations

1
Citations as of Jul 4, 2024

WEB OF SCIENCETM
Citations

2
Citations as of Jul 4, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.