{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T10:05:55Z","timestamp":1771668355579,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,3,30]],"date-time":"2024-03-30T00:00:00Z","timestamp":1711756800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,30]],"date-time":"2024-03-30T00:00:00Z","timestamp":1711756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Sichuan Science and Technology Program","award":["grant no. 2023NSFSC0471"],"award-info":[{"award-number":["grant no. 2023NSFSC0471"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["grant no. 62272090"],"award-info":[{"award-number":["grant no. 62272090"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s11235-024-01131-8","type":"journal-article","created":{"date-parts":[[2024,3,30]],"date-time":"2024-03-30T15:02:27Z","timestamp":1711810947000},"page":"229-240","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A new construction of public key authenticated encryption with keyword search based on LWE"],"prefix":"10.1007","volume":"86","author":[{"given":"Ziqing","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaoguang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xinyan","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Fagen","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,30]]},"reference":[{"key":"1131_CR1","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1007\/978-3-642-13190-5_28","volume-title":"Advances in Cryptology - EUROCRYPT 2010","author":"S Agrawal","year":"2010","unstructured":"Agrawal, S., Boneh, D., & Boyen, X. (2010). Efficient lattice (h)ibe in the standard model. In H. Gilbert (Ed.), Advances in Cryptology - EUROCRYPT 2010 (pp. 553\u2013572). Springer."},{"key":"1131_CR2","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-642-14623-7_6","volume-title":"Advances in Cryptology - CRYPTO 2010","author":"S Agrawal","year":"2010","unstructured":"Agrawal, S., Boneh, D., & Boyen, X. (2010). Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical ibe. In T. Rabin (Ed.), Advances in Cryptology - CRYPTO 2010 (pp. 98\u2013115). Springer."},{"key":"1131_CR3","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/3-540-46035-7_6","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2002","author":"JH An","year":"2002","unstructured":"An, J. H., Dodis, Y., & Rabin, T. (2002). On the security of joint signature and encryption. In L. R. Knudsen (Ed.), Advances in Cryptology \u2013 EUROCRYPT 2002 (pp. 83\u2013107). Springer."},{"key":"1131_CR4","doi-asserted-by":"crossref","unstructured":"Applebaum, B., Cash, D., Peikert, C., et\u00a0al. (2009). Fast cryptographic primitives and circular-secure encryption based on hard learning problems. In S. Halevi (Ed.), Advances in Cryptology - CRYPTO 2009 (pp. 595\u2013618). Springer.","DOI":"10.1007\/978-3-642-03356-8_35"},{"key":"1131_CR5","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., et al. (2004). Public key encryption with keyword search. In C. Cachin & J. L. Camenisch (Eds.), Advances in Cryptology - EUROCRYPT 2004 (pp. 506\u2013522). Springer."},{"key":"1131_CR6","doi-asserted-by":"publisher","unstructured":"Bos, J., Costello, C., Ducas, L., et\u00a0al. (2016). Frodo: Take off the ring! practical, quantum-secure key exchange from lwe. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, New York, NY, USA, CCS \u201916 (pp. 1006\u20131018). https:\/\/doi.org\/10.1145\/2976749.2978425","DOI":"10.1145\/2976749.2978425"},{"key":"1131_CR7","doi-asserted-by":"crossref","unstructured":"Boyen, X. (2010). Lattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more. In Proceedings of Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26\u201328, 2010.","DOI":"10.1007\/978-3-642-13013-7_29"},{"key":"1131_CR8","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/11844662_6","volume-title":"Secure Data Management","author":"JW Byun","year":"2006","unstructured":"Byun, J. W., Rhee, H. S., Park, H. A., et al. (2006). Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In W. Jonker & M. Petkovi\u0107 (Eds.), Secure Data Management (pp. 75\u201383). Springer."},{"issue":"4","key":"1131_CR9","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1109\/TIFS.2015.2510822","volume":"11","author":"R Chen","year":"2016","unstructured":"Chen, R., Mu, Y., Yang, G., et al. (2016). Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Transactions on Information Forensics and Security, 11(4), 789\u2013798. https:\/\/doi.org\/10.1109\/TIFS.2015.2510822","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1131_CR10","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-031-17140-6_15","volume-title":"Computer Security - ESORICS 2022","author":"L Cheng","year":"2022","unstructured":"Cheng, L., & Meng, F., et al. (2022). Public key authenticated encryption with keyword search from lwe. In V. Atluri, R. Di Pietro, & C. D. Jensen (Eds.), Computer Security - ESORICS 2022 (pp. 303\u2013324). Springer International Publishing."},{"key":"1131_CR11","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1007\/11535218_26","volume-title":"Advances in Cryptology - CRYPTO 2005","author":"JS Coron","year":"2005","unstructured":"Coron, J. S., Dodis, Y., Malinaud, C., et al. (2005). Merkle-damg\u00e5rd revisited: How to construct a hash function. In V. Shoup (Ed.), Advances in Cryptology - CRYPTO 2005 (pp. 430\u2013448). Springer."},{"key":"1131_CR12","first-page":"688","volume":"2012","author":"J Ding","year":"2012","unstructured":"Ding, J., Xie, X., & Lin, X. (2012). A simple provably secure key exchange scheme based on the learning with errors problem. IACR Cryptol ePrint Arch, 2012, 688.","journal-title":"IACR Cryptol ePrint Arch"},{"key":"1131_CR13","doi-asserted-by":"publisher","unstructured":"Gentry, C., Peikert, C., & Vaikuntanathan, V. (2008). Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing. Association for Computing Machinery, New York, NY, USA, STOC \u201908 (pp. 197\u2013206). https:\/\/doi.org\/10.1145\/1374376.1374407","DOI":"10.1145\/1374376.1374407"},{"key":"1131_CR14","doi-asserted-by":"publisher","unstructured":"Huang, Q., & Li, H. (2017). An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Information Sciences, 403\u2013404, 1\u201314. https:\/\/doi.org\/10.1016\/j.ins.2017.03.038","DOI":"10.1016\/j.ins.2017.03.038"},{"key":"1131_CR15","unstructured":"Liu, Z. Y., Tseng, Y. F., & Tso, R. (2020). Cryptanalysis of \u201cfs-peks: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial internet of things\u201d. Cryptology ePrint Archive, Paper 2020\/651, https:\/\/eprint.iacr.org\/2020\/651."},{"key":"1131_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102709","volume":"58","author":"ZY Liu","year":"2021","unstructured":"Liu, Z. Y., Tseng, Y. F., Tso, R., et al. (2021). Designated-ciphertext searchable encryption. Journal of Information Security and Applications, 58, 102709. https:\/\/doi.org\/10.1016\/j.jisa.2020.102709","journal-title":"Journal of Information Security and Applications"},{"key":"1131_CR17","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-319-99807-7_7","volume-title":"Information Security Practice and Experience","author":"F Luo","year":"2018","unstructured":"Luo, F., Wang, K., & Lin, C. (2018). Leveled hierarchical identity-based fully homomorphic encryption from learning with rounding. In C. Su & H. Kikuchi (Eds.), Information Security Practice and Experience (pp. 101\u2013115). Springer International Publishing."},{"key":"1131_CR18","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1016\/j.ins.2019.12.063","volume":"516","author":"B Qin","year":"2020","unstructured":"Qin, B., Chen, Y., Huang, Q., et al. (2020). Public-key authenticated encryption with keyword search revisited: Security model and constructions. Information Sciences, 516, 515\u2013528. https:\/\/doi.org\/10.1016\/j.ins.2019.12.063","journal-title":"Information Sciences"},{"key":"1131_CR19","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-030-90402-9_2","volume-title":"Provable and Practical Security","author":"B Qin","year":"2021","unstructured":"Qin, B., Cui, H., Zheng, X., et al. (2021). Improved security model for public-key authenticated encryption with keyword search. In Q. Huang & Y. Yu (Eds.), Provable and Practical Security (pp. 19\u201338). Springer International Publishing."},{"key":"1131_CR20","doi-asserted-by":"publisher","unstructured":"Regev, O. (2005). On lattices, learning with errors, random linear codes, and cryptography. In Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing. Association for Computing Machinery, New York, NY, USA, STOC \u201905 (pp. 84\u201393). https:\/\/doi.org\/10.1145\/1060590.1060603","DOI":"10.1145\/1060590.1060603"},{"key":"1131_CR21","volume-title":"A computational introduction to number theory and algebra","author":"V Shoup","year":"2009","unstructured":"Shoup, V. (2009). A computational introduction to number theory and algebra. Cambridge University Press."},{"key":"1131_CR22","doi-asserted-by":"crossref","unstructured":"Tang, Q., & Chen, L. (2010). Public-key encryption with registered keyword search. In F. Martinelli & B. Preneel (Eds.), Public Key Infrastructures, Services and Applications (pp. 163\u2013178). Springer.","DOI":"10.1007\/978-3-642-16441-5_11"},{"key":"1131_CR23","doi-asserted-by":"crossref","unstructured":"Yau, W. C., Heng, S. H., & Goi, B. M., et al. (2008). Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In C. Rong, M. G. Jaatun, & F. E. Sandnes (Eds.), Autonomic and Trusted Computing (pp. 100\u2013105). Springer.","DOI":"10.1007\/978-3-540-69295-9_10"},{"key":"1131_CR24","doi-asserted-by":"crossref","unstructured":"Yu, X., Xu, C., & Dou, B. (2020). Conjunctive keywords searchable encryption scheme against inside keywords guessing attack from lattice. In X. Sun, J. Wang, & E. Bertino (Eds.), Artificial Intelligence and Security (pp. 107\u2013119). Springer International Publishing.","DOI":"10.1007\/978-3-030-57884-8_10"},{"key":"1131_CR25","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.ins.2019.04.051","volume":"494","author":"X Zhang","year":"2019","unstructured":"Zhang, X., Tang, Y., Wang, H., et al. (2019). Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage. Information Sciences, 494, 193\u2013207. https:\/\/doi.org\/10.1016\/j.ins.2019.04.051","journal-title":"Information Sciences"},{"issue":"3","key":"1131_CR26","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.1109\/TDSC.2019.2914117","volume":"18","author":"X Zhang","year":"2021","unstructured":"Zhang, X., Xu, C., Wang, H., et al. (2021). Fs-peks: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial internet of things. IEEE Transactions on Dependable and Secure Computing, 18(3), 1019\u20131032. https:\/\/doi.org\/10.1109\/TDSC.2019.2914117","journal-title":"IEEE Transactions on Dependable and Secure Computing"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-024-01131-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-024-01131-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-024-01131-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T10:08:30Z","timestamp":1720260510000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-024-01131-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,30]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["1131"],"URL":"https:\/\/doi.org\/10.1007\/s11235-024-01131-8","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,30]]},"assertion":[{"value":"4 March 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}]}}