Article

Designs, Codes and Cryptography

pp 1-34

First online:

Generic constructions of integrated PKE and PEKS

  • Yu ChenAffiliated withState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences Email author 
  • , Jiang ZhangAffiliated withTrusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences
  • , Dongdai LinAffiliated withState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences
  • , Zhenfeng ZhangAffiliated withTrusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences

Rent the article at a discount

Rent now

* Final gross prices may vary according to local VAT.

Get Access

Abstract

In this paper we investigate the topic of integrated public-key encryption (PKE) and public-key encryption with keyword search (PEKS) schemes (PKE–PEKS as shorthand). We first formalize the strongest security notion to date for PKE–PEKS schemes, named joint CCA-security. We then propose two simple constructions of jointly CCA-secure PKE–PEKS schemes from anonymous (hierarchical) identity-based encryption schemes. Besides, we also define the notion of consistency for PKE–PEKS schemes, as well as revisit its related notions (including consistency of PEKS schemes, robustness and collision-freeness of IBE schemes), which may be of independent interest.

Keywords

PKE–PEKS Joint security Consistency Collision-freeness Robustness

Mathematics Subject Classification

94A60