Table 1: Efficiency Comparison.
Operation Scheme P E(Z
q
) I(Z
q
) E(G
1
) M(G
1
) E(G
2
) M(G
2
) E(G
T
) M(G
T
)
Encryption
(Baek et al., 2006) 1 0 0 2 0 - - 1 0
(Zhang and Imai, 2007) 2 0 0 2 1 - - 6 1
(Chen et al., 2014) 5 0 1 7 2 - - 5 2
Our scheme 0 0 0 2 0 1 0 1 2
Decryption
(Baek et al., 2006) 0 0 0 1 0 - - 0 0
(Zhang and Imai, 2007) 0 0 0 0 0 - - 2 1
(Chen et al., 2014) 3 0 1 3 2 - - 0 1
Our scheme 2 0 0 1 0 0 0 0 1
TokenGen
(Baek et al., 2006) 0 0 0 1 0 - - 0 0
(Zhang and Imai, 2007) 0 0 0 1 1 - - 0 0
(Chen et al., 2014) 0 0 1 1 1 - - 0 0
Our scheme 0 0 0 0 0 0 0 0 0
Test
(Baek et al., 2006) 1 0 0 0 0 - - 0 0
(Zhang and Imai, 2007) 1 0 0 0 0 - - 1 1
(Chen et al., 2014) 4 1 0 2 2 0 0 2 3
Our scheme 2 0 0 1 0 0 0 1 0
Overall
comparison
(Baek et al., 2006) 2 0 0 4 1 - - 1 0
(Zhang and Imai, 2007) 3 0 0 3 2 - - 9 3
(Chen et al., 2014) 12 1 3 13 7 - - 7 6
Our scheme 4 0 0 4 0 1 0 2 3
Nazionale Ricerca e Competitivit`a” 2007-2013, Dis-
tretto Tecnologico CyberSecurity funded by the Ital-
ian Ministry of Education, University and Research.
REFERENCES
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T.,
Lange, T., Malone-Lee, J., Neven, G., Paillier, P., and
Shi, H. (2005). Searchable encryption revisited: Con-
sistency properties, relation to anonymous ibe, and ex-
tensions. In CRYPTO, volume 3621 of LNCS, pages
205–222.
Abdalla, M., Bellare, M., and Neven, G. (2010). Robust en-
cryption. In TCC, volume 5978 of LNCS, pages 480–
497.
Baek, J., Safavi-Naini, R., and Susilo, W. (2006). On the
integration of public key data encryption and public
key encryption with keyword search. In ISC, volume
4176 of LNCS, pages 217–232.
Baek, J., Safavi-Naini, R., and Susilo, W. (2008). Public key
encryption with keyword search revisited. In ICCSA,
volume 5072 of LNCS, pages 1249–1259.
Boneh, D., Di Crescenzo, G., Ostrovsky, R., and Per-
siano, G. (2004). Public key encryption with keyword
search. In EuroCrypt, volume 3027 of LNCS, pages
506–522.
Boyen, X. and Waters, B. (2006). Anonymous hierarchical
identity-based encryption (without random oracles).
In CRYPTO, volume 4117 of LNCS, pages 290–307.
Canetti, R., Goldreich, O., and Halevi, S. (2004). The ran-
dom oracle methodology, revisited. Journal of the
ACM (JACM), 51(4):557–594.
Chen, J., Lim, H., Ling, S., Wang, H., and Wee, H. (2012).
Shorter ibe and signatures via asymmetric pairings. In
Pairing, volume 7708 of LNCS, pages 122–140.
Chen, Y., Zhang, J., Lin, D., and Zhang, Z. (2014). Generic
constructions of integrated pke and peks. Designs,
Codes and Cryptography, pages 1–34.
Crescenzo, G. D. and Saraswat, V. (2007). Public key en-
cryption with searchable keywords based on jacobi
symbols. In IndoCrypt, volume 4859 of LNCS, pages
282–296.
Dodis, Y. and Katz, J. (2005). Chosen-ciphertext security of
multiple encryption. In TCC, volume 3378 of LNCS,
pages 188–209.
Fuhr, T. and Paillier, P. (2007). Decryptable searchable en-
cryption. In ProvSec, pages 228–236.
Ibraimi, L., Nikova, S., Hartel, P., and Jonker, W. (2011).
Public-key encryption with delegated search. In
ACNS, pages 532–549.
Kurosawa, K. (2002). Multi-recipient public-key encryp-
tion with shortened ciphertext. In PKC, pages 48–63.
Lu, W., Swaminathan, A., Varna, A. L., and Wu, M.
(2009). Enabling search over encrypted multimedia
databases. In IS&T/SPIE Electronic Imaging, pages
725418–725418. International Society for Optics and
Photonics.
Okamoto, T. and Takashima, K. (2010). Fully secure func-
tional encryption with general relations from the deci-
sional linear assumption. In CRYPTO, volume 6223
of LNCS, pages 191–208.
Shmueli, E., Vaisenberg, R., Elovici, Y., and Glezer, C.
(2010). Database encryption: an overview of con-
temporary challenges and design considerations. ACM
SIGMOD Record, 38(3):29–34.
Zhang, R. and Imai, H. (2007). Generic combination of
public key encryption with keyword search and pub-
lic key encryption. In CANS, volume 4856 of LNCS,
pages 159–174.
PracticalandSecureIntegratedPKE+PEKSwithKeywordPrivacy
453