scheme is provably secure in the random oracle model
whereas our proposed scheme is provably secure in
the standard model. Note that, we can further reduce
the computation cost of our scheme by applying the
multiple exponentiation algorithm (Menezes et al.,
1996) for the Encryption algorithm and Trapdoor al-
gorithm which can be reduced to 1.5((k + 1)M) +
1.5(k+1)exp +m +inv for both Encryption algorithm
and Trapdoor algorithm.
ACKNOWLEDGEMENT
This work was supported by the Telekom Malaysia
Research & Development Grant (RDTC/221045).
REFERENCES
Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno,
T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P.,
and Shi, H. (2005). Searchable encryption revisited:
Consistency properties, relation to anonymous ibe,
and extensions. In Advances in Cryptology–CRYPTO
2005: 25th Annual International Cryptology Confer-
ence, Santa Barbara, California, USA, August 14-18,
2005. Proceedings 25, pages 205–222. Springer.
Bai, L., Yong, L., Chen, Z., and Shao, J. (2024). Pairing-
free public-key authenticated encryption with key-
word search. Computer Standards & Interfaces,
88:103793.
Boneh, D., Di Crescenzo, G., Ostrovsky, R., and Per-
siano, G. (2004). Public key encryption with keyword
search. In Advances in Cryptology-EUROCRYPT
2004: International Conference on the Theory and
Applications of Cryptographic Techniques, Inter-
laken, Switzerland, May 2-6, 2004. Proceedings 23,
pages 506–522. Springer.
Byun, J. W., Rhee, H. S., Park, H.-A., and Lee, D. H.
(2006). Off-line keyword guessing attacks on re-
cent keyword search schemes over encrypted data. In
Workshop on secure data management, pages 75–83.
Springer.
Heng, S.-H. and Kurosawa, K. (2004). k-resilient identity-
based encryption in the standard model. In Topics
in Cryptology–CT-RSA 2004: The Cryptographers’
Track at the RSA Conference 2004, San Francisco,
CA, USA, February 23-27, 2004, Proceedings, pages
67–80. Springer.
Huang, Q., Huang, P., Li, H., Huang, J., and Lin, H. (2023).
A more efficient public-key authenticated encryption
scheme with keyword search. Journal of Systems Ar-
chitecture, 137:102839.
Huang, Q. and Li, H. (2017). An efficient public-key
searchable encryption scheme secure against inside
keyword guessing attacks. Information Sciences,
403:1–14.
Khader, D. (2006). Public key encryption with keyword
search based on k-resilient ibe. In International Con-
ference on Computational Science and Its Applica-
tions, pages 298–308. Springer.
Li, H., Huang, Q., Shen, J., Yang, G., and Susilo, W.
(2019). Designated-server identity-based authenti-
cated encryption with keyword search for encrypted
emails. Information Sciences, 481:330–343.
Lu, Y. and Li, J. (2022). Lightweight public key au-
thenticated encryption with keyword search against
adaptively-chosen-targets adversaries for mobile de-
vices. IEEE Transactions on Mobile Computing,
21(12):4397–4409.
Lu, Y., Wang, G., and Li, J. (2019). Keyword guessing at-
tacks on a public key encryption with keyword search
scheme without random oracle and its improvement.
Information Sciences, 479:270–276.
Ma, Y. and Kazemian, H. (2021). Public key authenticated
encryption with multiple keywords search using mam-
dani system. Evolving Systems, 12(3):687–699.
Menezes, A. J., Van Oorschot, P. C., and Vanstone, S. A.
(1996). Handbook of applied cryptography. CRC,
Boca Raton, 17.
Noroozi, M. and Eslami, Z. (2019). Public key authenti-
cated encryption with keyword search: revisited. IET
Information Security, 13(4):336–342.
Pu, L., Lin, C., Chen, B., and He, D. (2023). User-friendly
public-key authenticated encryption with keyword
search for industrial internet of things. IEEE Internet
of Things Journal.
Qin, B., Chen, Y., Huang, Q., Liu, X., and Zheng, D.
(2020). Public-key authenticated encryption with key-
word search revisited: Security model and construc-
tions. Information Sciences, 516:515–528.
Tan, S.-Y. and Groß, T. (2020). Monipoly—an expressive q-
sdh-based anonymous attribute-based credential sys-
tem. In International Conference on the Theory and
Application of Cryptology and Information Security,
pages 498–526. Springer.
Yau, W.-C., Heng, S.-H., and Goi, B.-M. (2008). Off-line
keyword guessing attacks on recent public key en-
cryption with keyword search schemes. In Autonomic
and Trusted Computing: 5th International Confer-
ence, ATC 2008, Oslo, Norway, June 23-25, 2008 Pro-
ceedings 5, pages 100–105. Springer.
Yau, W.-C., Heng, S.-H., Tan, S.-Y., Goi, B.-M., and Phan,
R. C.-W. (2012). Efficient encryption with keyword
search in mobile networks. Security and Communica-
tion Networks, 5(12):1412–1422.
Yau, W.-C., Phan, R. C.-W., Heng, S.-H., and Goi, B.-M.
(2013). Keyword guessing attacks on secure search-
able public key encryption schemes with a designated
tester. International Journal of Computer Mathemat-
ics, 90(12):2581–2587.
SECRYPT 2024 - 21st International Conference on Security and Cryptography
388