JOURNAL ARTICLE

Designated Server Certificateless Deniably Authenticated Encryption With Keyword Search

Yulei ZhangLong WenYongjie ZhangCaifen Wang

Year: 2019 Journal:   IEEE Access Vol: 7 Pages: 146542-146551   Publisher: Institute of Electrical and Electronics Engineers

Abstract

In email system, the cryptography technology has been used to defend email secrets, so it is important to search specific encrypted emails on cloud sever without local decryption. The Public key encryption with keyword search (PEKS) might is a suitable way to perform the email ciphertext search. However, most existing PEKS schemes cannot protect the identity privacy of data sender. Deniably authenticated encryption (DAE) technique allows the data sender to deny his/her involvement after the communication. Moreover, the receiver can verify the authenticity of ciphertext in DAE, which assures the identity privacy of data sender. In this paper, so as to solve the above shortages in existing PEKS schemes, we introduce an original scheme called designated server certificateless deniably authenticated encryption with keyword search (dCLDAEKS), where leverages the techniques of DAE and designated server. In dCLDAEKS, data sender authenticates the messages and simultaneously encrypt them. Meanwhile, only designated server has ability to execute search ciphertext operation for receivers. So there is no adversary including the server can launch inside or outside offline KGA. Therefore dCLDAEKS scheme can better protect the identity privacy of data sender. In addition, compared the related schemes in the literature, dCLDAEKS scheme perform less efficient in some procedure, but it can against inside KGA and better protect the sender's identity privacy.

Keywords:
Ciphertext Communication source Computer science Encryption Computer security Public-key cryptography Symmetric-key algorithm Scheme (mathematics) Cryptography Identity (music) Key (lock) Computer network Mathematics

Metrics

10
Cited By
0.77
FWCI (Field Weighted Citation Impact)
30
Refs
0.78
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Cryptographic Implementations and Security
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Designated tester certificateless encryption with keyword search

Nasrollah Pakniat

Journal:   Journal of Information Security and Applications Year: 2019 Vol: 49 Pages: 102394-102394
JOURNAL ARTICLE

Pairing-free certificateless authenticated encryption with keyword search

Danial ShiralyNasrollah PakniatMahnaz NorooziZiba Eslami

Journal:   Journal of Systems Architecture Year: 2022 Vol: 124 Pages: 102390-102390
JOURNAL ARTICLE

A lattice-based designated-server public-key authenticated encryption with keyword search

Yajun FanBaodong QinDong Zheng

Journal:   Journal of Systems Architecture Year: 2023 Vol: 145 Pages: 103031-103031
© 2026 ScienceGate Book Chapters — All rights reserved.