JOURNAL ARTICLE

Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited

Abstract

Public-key encryption with keyword search (PEKS) does not provide trapdoor privacy, i.e., keyword information is leaked through trapdoors. To prevent this information leakage, public key authenticated encryption with keyword search (PAEKS) has been proposed, where a sender's secret key is required for encryption, and a trapdoor is associated with not only a keyword but also the sender. Liu et al. (ASIACCS 2022) proposed a generic construction of PAEKS based on word-independent smooth projective hash functions (SPHFs) and PEKS. In this paper, we propose a new generic construction of PAEKS. The basic construction methodology is the same as that of the Liu et al. construction, where each keyword is converted into an extended keyword using SPHFs, and PEKS is used for extended keywords. Nevertheless, our construction is more efficient than Liu et al.'s in the sense that we only use one SPHF, but Liu et al. used two SPHFs. In addition, for consistency we considered a security model that is stronger than Liu et al.'s. Briefly, Liu et al. considered only keywords even though a trapdoor is associated with not only a keyword but also a sender. Thus, a trapdoor associated with a sender should not work against ciphertexts generated by the secret key of another sender, even if the same keyword is associated. Our definition considers a multi-sender setting and captures this case. In addition, for indistinguishability against chosen keyword attack (IND-CKA) and indistinguishability against inside keyword guessing attack (IND-IKGA), we use a stronger security model defined by Qin et al. (ProvSec 2021), where an adversary is allowed to query challenge keywords to the encryption and trapdoor oracles. We also highlight several issues associated with the Liu et al. construction in terms of hash functions, e.g., their construction does not satisfy the consistency that they claimed to hold.

Keywords:
Communication source Computer science Keyword search Key (lock) Encryption Public-key cryptography Hash function Computer security Theoretical computer science Information retrieval Computer network

Metrics

20
Cited By
3.92
FWCI (Field Weighted Citation Impact)
24
Refs
0.91
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Cryptographic Implementations and Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition

Related Documents

JOURNAL ARTICLE

Generic Construction of Public-Key Authenticated Encryption with Keyword Search Revisited

Keita Emura

Journal:   IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences Year: 2023 Vol: E107.A (3)Pages: 260-274
JOURNAL ARTICLE

Public key authenticated encryption with keyword search: revisited

Mahnaz NorooziZiba Eslami

Journal:   IET Information Security Year: 2018 Vol: 13 (4)Pages: 336-342
JOURNAL ARTICLE

Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search

Keita Emura

Journal:   IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences Year: 2025 Vol: E108.A (9)Pages: 1152-1163
BOOK-CHAPTER

Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search

Keita Emura

Lecture notes in computer science Year: 2024 Pages: 237-256
JOURNAL ARTICLE

Generic Construction of Dual‐Server Public Key Authenticated Encryption With Keyword Search

Keita Emura

Journal:   IET Information Security Year: 2025 Vol: 2025 (1)
© 2026 ScienceGate Book Chapters — All rights reserved.