{"id":"https://openalex.org/W2295829873","doi":"https://doi.org/10.5220/0005577104480453","title":"Practical and Secure Integrated PKE+PEKS with Keyword Privacy","display_name":"Practical and Secure Integrated PKE+PEKS with Keyword Privacy","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2295829873","doi":"https://doi.org/10.5220/0005577104480453","mag":"2295829873"},"language":"en","primary_location":{"id":"doi:10.5220/0005577104480453","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005577104480453","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0005577104480453","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011745542","display_name":"Francesco Buccafurri","orcid":"https://orcid.org/0000-0003-0448-8464"},"institutions":[{"id":"https://openalex.org/I59725666","display_name":"University of Reggio Calabria","ror":"https://ror.org/041sz8d87","country_code":"IT","type":"education","lineage":["https://openalex.org/I59725666"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Francesco Buccafurri","raw_affiliation_strings":["University of Reggio Calabria, Italy"],"affiliations":[{"raw_affiliation_string":"University of Reggio Calabria, Italy","institution_ids":["https://openalex.org/I59725666"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039882353","display_name":"Gianluca Lax","orcid":"https://orcid.org/0000-0002-5226-0870"},"institutions":[{"id":"https://openalex.org/I59725666","display_name":"University of Reggio Calabria","ror":"https://ror.org/041sz8d87","country_code":"IT","type":"education","lineage":["https://openalex.org/I59725666"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Gianluca Lax","raw_affiliation_strings":["University of Reggio Calabria, Italy"],"affiliations":[{"raw_affiliation_string":"University of Reggio Calabria, Italy","institution_ids":["https://openalex.org/I59725666"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059626792","display_name":"Rajeev Anand Sahu","orcid":"https://orcid.org/0000-0003-2220-9019"},"institutions":[{"id":"https://openalex.org/I4210109466","display_name":"CR Rao Advanced Institute of Mathematics, Statistics and Computer Science","ror":"https://ror.org/01sg0nk94","country_code":"IN","type":"facility","lineage":["https://openalex.org/I4210109466"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rajeev Anand Sahu","raw_affiliation_strings":["C.R.Rao Advanced Institute of Mathematics Statistics and Computer Science, India"],"affiliations":[{"raw_affiliation_string":"C.R.Rao Advanced Institute of Mathematics Statistics and Computer Science, India","institution_ids":["https://openalex.org/I4210109466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046198551","display_name":"Vishal Saraswat","orcid":"https://orcid.org/0000-0001-7082-9568"},"institutions":[{"id":"https://openalex.org/I4210109466","display_name":"CR Rao Advanced Institute of Mathematics, Statistics and Computer Science","ror":"https://ror.org/01sg0nk94","country_code":"IN","type":"facility","lineage":["https://openalex.org/I4210109466"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Vishal Saraswat","raw_affiliation_strings":["C.R.Rao Advanced Institute of Mathematics Statistics and Computer Science, India"],"affiliations":[{"raw_affiliation_string":"C.R.Rao Advanced Institute of Mathematics Statistics and Computer Science, India","institution_ids":["https://openalex.org/I4210109466"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5011745542"],"corresponding_institution_ids":["https://openalex.org/I59725666"],"apc_list":null,"apc_paid":null,"fwci":1.7258,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.89016153,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"448","last_page":"453"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9839000105857849,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7084237933158875},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5533942580223083},{"id":"https://openalex.org/keywords/keyword-search","display_name":"Keyword search","score":0.5395317673683167},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5228769779205322},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4216848611831665},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.16358616948127747}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7084237933158875},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5533942580223083},{"id":"https://openalex.org/C2988412617","wikidata":"https://www.wikidata.org/wiki/Q7441656","display_name":"Keyword search","level":2,"score":0.5395317673683167},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5228769779205322},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4216848611831665},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.16358616948127747}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0005577104480453","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005577104480453","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Security and Cryptography","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0005577104480453","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005577104480453","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.4699999988079071}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1493744513","https://openalex.org/W1587391206","https://openalex.org/W1597695477","https://openalex.org/W1605699871","https://openalex.org/W1847491301","https://openalex.org/W1868922675","https://openalex.org/W1931527931","https://openalex.org/W1999551046","https://openalex.org/W2120976781","https://openalex.org/W2122058555","https://openalex.org/W2151471396","https://openalex.org/W2152688060","https://openalex.org/W2161214158","https://openalex.org/W2161214567","https://openalex.org/W2165271954","https://openalex.org/W2914405671","https://openalex.org/W3124902154","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2584827882","https://openalex.org/W4239025223","https://openalex.org/W3195097297","https://openalex.org/W3038106605","https://openalex.org/W4225340788","https://openalex.org/W2513267613","https://openalex.org/W3049084372","https://openalex.org/W2528109871","https://openalex.org/W2905822832","https://openalex.org/W2940702331"],"abstract_inverted_index":{"Public-key":[0],"encryption":[1,49,53],"with":[2,54,145],"keyword":[3,55],"search":[4,56],"(PEKS)":[5,57],"schemes":[6,150],"are":[7],"useful":[8,136],"to":[9,16,63,126],"delegate":[10],"searching":[11,35],"capabilities":[12],"on":[13,95],"encrypted":[14],"data":[15,39],"a":[17,78,103,153],"third":[18],"party,":[19],"who":[20],"does":[21],"not":[22],"hold":[23],"the":[24,67,112,118,123],"entire":[25],"secret":[26],"key,":[27],"but":[28,37],"only":[29],"an":[30,43,132],"appropriate":[31],"token":[32],"which":[33,60,101,130],"allows":[34],"operations":[36],"preserves":[38],"privacy.":[40],"We":[41],"propose":[42],"efficient":[44],"and":[45,51,106,151],"practical":[46,138],"integrated":[47,148],"public-key":[48,52],"(PKE)":[50],"scheme":[58,93,144],"(PKE+PEKS)":[59],"we":[61,76,141],"prove":[62],"be":[64],"secure":[65],"in":[66,86,115],"strongest":[68],"security":[69,80,90],"notion":[70],"for":[71,137],"PKE+PEKS":[72,149],"schemes.":[73,120],"In":[74],"particular,":[75],"provide":[77,152],"unified":[79],"proof":[81],"of":[82,91,117,156],"its":[83,157],"joint":[84],"CCA-security":[85],"standard":[87,108],"model.":[88],"The":[89],"our":[92,143],"relies":[94],"Symmetric":[96],"eXternal":[97],"Diffie-Hellman":[98],"(SXDH)":[99],"assumption":[100,110],"is":[102,122],"much":[104],"simpler":[105],"more":[107],"hardness":[109],"than":[111],"ones":[113],"used":[114],"most":[116],"comparable":[119],"Ours":[121],"first":[124],"construction":[125],"use":[127],"asymmetric":[128],"pairings":[129],"enable":[131],"extremely":[133],"fast":[134],"implementation":[135],"applications.":[139],"Finally":[140],"compare":[142],"other":[146],"proposed":[147],"relative":[154],"analysis":[155],"efficiency.":[158]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
