{"id":"https://openalex.org/W4413415132","doi":"https://doi.org/10.29007/126n","title":"Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester","display_name":"Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester","publication_year":2025,"publication_date":"2025-08-21","ids":{"openalex":"https://openalex.org/W4413415132","doi":"https://doi.org/10.29007/126n"},"language":"en","primary_location":{"id":"doi:10.29007/126n","is_oa":true,"landing_page_url":"https://doi.org/10.29007/126n","pdf_url":"https://easychair.org/publications/paper/KqwW/download","source":{"id":"https://openalex.org/S4220651395","display_name":"EPiC series in computing","issn_l":"2398-7340","issn":["2398-7340"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EPiC Series in Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://easychair.org/publications/paper/KqwW/download","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Mizuki Hayashi","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mizuki Hayashi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5038506185","display_name":"Keita Emura","orcid":"https://orcid.org/0000-0002-8969-3581"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Keita Emura","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.2283,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.90272351,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"106","issue":null,"first_page":"31","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.8546000123023987,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.8546000123023987,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.8438000082969666,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.7986999750137329,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6773825287818909},{"id":"https://openalex.org/keywords/index","display_name":"Index (typography)","score":0.6551918983459473},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6526771783828735},{"id":"https://openalex.org/keywords/inverted-index","display_name":"Inverted index","score":0.6519867181777954},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6121183633804321},{"id":"https://openalex.org/keywords/keyword-search","display_name":"Keyword search","score":0.5483735799789429},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5204468369483948},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4272986948490143},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3281819820404053},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.24156275391578674},{"id":"https://openalex.org/keywords/search-engine-indexing","display_name":"Search engine indexing","score":0.20319592952728271},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1859746277332306},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1220225989818573}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6773825287818909},{"id":"https://openalex.org/C2777382242","wikidata":"https://www.wikidata.org/wiki/Q6017816","display_name":"Index (typography)","level":2,"score":0.6551918983459473},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6526771783828735},{"id":"https://openalex.org/C130590232","wikidata":"https://www.wikidata.org/wiki/Q1671754","display_name":"Inverted index","level":3,"score":0.6519867181777954},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6121183633804321},{"id":"https://openalex.org/C2988412617","wikidata":"https://www.wikidata.org/wiki/Q7441656","display_name":"Keyword search","level":2,"score":0.5483735799789429},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5204468369483948},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4272986948490143},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3281819820404053},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.24156275391578674},{"id":"https://openalex.org/C75165309","wikidata":"https://www.wikidata.org/wiki/Q2258979","display_name":"Search engine indexing","level":2,"score":0.20319592952728271},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1859746277332306},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1220225989818573},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.29007/126n","is_oa":true,"landing_page_url":"https://doi.org/10.29007/126n","pdf_url":"https://easychair.org/publications/paper/KqwW/download","source":{"id":"https://openalex.org/S4220651395","display_name":"EPiC series in computing","issn_l":"2398-7340","issn":["2398-7340"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EPiC Series in Computing","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.29007/126n","is_oa":true,"landing_page_url":"https://doi.org/10.29007/126n","pdf_url":"https://easychair.org/publications/paper/KqwW/download","source":{"id":"https://openalex.org/S4220651395","display_name":"EPiC series in computing","issn_l":"2398-7340","issn":["2398-7340"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EPiC Series in Computing","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G304502384","display_name":"\u30c7\u30fc\u30bf\u306e\u5229\u6d3b\u7528\u3092\u4fc3\u9032\u3059\u308b\u30bb\u30ad\u30e5\u30a2\u30b7\u30b9\u30c6\u30e0\u306e\u8a3c\u660e\u53ef\u80fd\u5b89\u5168\u6027\u306b\u95a2\u3059\u308b\u7814\u7a76","funder_award_id":"21K11897","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G3242345856","display_name":null,"funder_award_id":"JP21K11897","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"}],"funders":[{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4413415132.pdf","grobid_xml":"https://content.openalex.org/works/W4413415132.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2126037447","https://openalex.org/W2888183313","https://openalex.org/W4243688874","https://openalex.org/W2084064431","https://openalex.org/W4252709806","https://openalex.org/W2081673223","https://openalex.org/W3191337274","https://openalex.org/W2154930424","https://openalex.org/W2124060239","https://openalex.org/W2808647302"],"abstract_inverted_index":{"Gao":[0,114],"et":[1,115],"al.":[2],"(IEEE":[3],"Internet":[4],"of":[5,20,59,91,120,180,189],"Things":[6],"Journal":[7],"2024)":[8],"proposed":[9],"public-key":[10],"inverted-index":[11],"keyword":[12,25,60,92,121],"search":[13,26,46],"with":[14,24],"designated":[15,51],"tester":[16,52],"as":[17,82],"an":[18,110,160],"extension":[19],"public":[21],"key":[22,38,42,136,170],"encryption":[23],"(PEKS).":[27],"In":[28,105],"their":[29,172,181],"scheme,":[30],"a":[31,36,75,83,125],"server":[32],"(a":[33],"tester)":[34],"has":[35],"secret":[37,135,169],"and":[39,148,175,192],"uses":[40],"the":[41,45,50,66,98,113,133,140,149,167,187,190],"for":[43],"running":[44],"algorithm":[47],"due":[48],"to":[49,139,165],"setting.":[53],"They":[54],"proved":[55],"that":[56,89,159,194],"no":[57],"information":[58,90,119],"is":[61,87,93,122,152,162,178,198],"revealed":[62,94,123],"from":[63,95,124],"trapdoors":[64,96],"under":[65],"decisional":[67],"Diffie-Hellman":[68],"(DDH)":[69],"assumption.":[70],"However,":[71],"they":[72],"also":[73],"employed":[74],"symmetric":[76],"pairing":[77,155],"which":[78],"can":[79],"be":[80],"seen":[81],"DDH-solver.":[84],"Thus,":[85,184],"it":[86],"expected":[88],"since":[97],"underlying":[99],"complexity":[100,151],"assumption":[101],"does":[102],"not":[103,163],"hold.":[104],"this":[106],"paper,":[107],"we":[108,185],"demonstrate":[109],"attack":[111,128,150,177,196],"against":[112],"al.'s":[116],"scheme":[117],"where":[118],"trapdoor.":[126],"Our":[127],"completes":[129],"by":[130],"using":[131],"only":[132],"server's":[134,168],"in":[137,171],"addition":[138],"challenge":[141],"trapdoor,":[142],"without":[143],"any":[144],"additional":[145],"encryption/trapdoor":[146],"queries,":[147],"just":[153],"two":[154],"computations.":[156],"We":[157],"remark":[158],"adversary":[161],"allowed":[164],"obtain":[166],"security":[173,182],"model,":[174],"our":[176,195],"outside":[179],"model.":[183],"discuss":[186],"roles":[188],"server,":[191],"stress":[193],"scenario":[197],"reasonable.":[199]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
