Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation.
Zi-Yuan LiuYi-Fan TsengRaylin TsoMasahiro MamboYu-Chi ChenPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- keyword search
- public key
- secret key
- session key
- authentication scheme
- key exchange
- private key
- key distribution
- proxy re encryption
- encryption scheme
- security analysis
- elliptic curve cryptography
- diffie hellman
- public key cryptography
- signature scheme
- security model
- key management
- security level
- secure communication
- public key cryptosystem
- digital signature
- ciphertext
- keywords
- relational databases
- search engine
- structured data
- image encryption
- authentication protocol
- image authentication
- standard model
- public key encryption
- xml data
- identity based encryption
- smart card
- high security
- xml documents
- search queries
- query language
- public key infrastructure
- web search engines
- blind signature
- provably secure
- hash functions
- elliptic curve
- blind signature scheme
- rfid tags
- cca secure
- group communication
- secret sharing scheme