{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T06:31:20Z","timestamp":1759991480248,"version":"3.37.3"},"reference-count":24,"publisher":"World Scientific Pub Co Pte Ltd","issue":"02","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Found. Comput. Sci."],"published-print":{"date-parts":[[2019,2]]},"abstract":"<jats:p> The idea of public key encryption with keyword search (PEKS), proposed by Boneh et\u00a0al., enables one to send a trapdoor containing a encrypted keyword to query data without revealing the keyword. In Boneh et\u00a0al.\u2019s design, the trapdoor has to be transferred through a secure channel, which is both costly and inefficient. Baek et\u00a0al. then proposed an efficient secure channel free public key encryption scheme with keyword search (SCF-PEKS). After that, vast amounts of research have focused on the protection against the off-line keyword guessing attack (OKGA) by enhancing the model. However, most of the PEKS\/SCF-PEKS schemes developed so far are constructed by applying bilinear pairing and are susceptible to off-line keyword guessing attacks. In this paper, we propose a new SCF-PEKS scheme based on the ElGamal cryptosystem. The proposed scheme is not only secure against off-line keyword guessing attacks but also improves the efficiency. <\/jats:p>","DOI":"10.1142\/s0129054119500047","type":"journal-article","created":{"date-parts":[[2019,3,12]],"date-time":"2019-03-12T23:51:51Z","timestamp":1552434711000},"page":"255-273","source":"Crossref","is-referenced-by-count":9,"title":["An ElGamal-like Secure Channel Free Public Key Encryption with Keyword Search Scheme"],"prefix":"10.1142","volume":"30","author":[{"given":"Min-Shiang","family":"Hwang","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information Engineering, Asia University, 500 Liufeng Road, Wufeng, Taichung, Taiwan 402, R.O.C."},{"name":"Department of Medical Research, China Medical University Hospital, China Medical University, No. 91, Hsueh-Shih Road, Taichung 40402, Taiwan, R.O.C."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8918-1703","authenticated-orcid":false,"given":"Cheng-Chi","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Library and Information Science, Fu Jen Catholic University, No. 510, Zhongzheng Rd., Xinzhuang Dist., New Taipei City 24205, Taiwan, R.O.C."}]},{"given":"Shih-Ting","family":"Hsu","sequence":"additional","affiliation":[{"name":"Department of Management Information Systems, National Chung Hsing University, 250 Kuo Kuang Road, Taichung, Taiwan 402, R.O.C."}]}],"member":"219","published-online":{"date-parts":[[2019,3,12]]},"reference":[{"key":"S0129054119500047BIB001","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9006-6"},{"key":"S0129054119500047BIB004","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"S0129054119500047BIB005","doi-asserted-by":"publisher","DOI":"10.1007\/11844662_6"},{"key":"S0129054119500047BIB006","doi-asserted-by":"publisher","DOI":"10.1145\/1008731.1008734"},{"key":"S0129054119500047BIB007","doi-asserted-by":"publisher","DOI":"10.1049\/el:19960886"},{"key":"S0129054119500047BIB009","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"S0129054119500047BIB010","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10433-6_16"},{"key":"S0129054119500047BIB011","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E98.B.190"},{"key":"S0129054119500047BIB012","first-page":"71","volume":"15","author":"Hsu S. T.","year":"2013","journal-title":"International Journal of Network Security"},{"key":"S0129054119500047BIB013","doi-asserted-by":"publisher","DOI":"10.1109\/69.991728"},{"issue":"1","key":"S0129054119500047BIB014","first-page":"1","volume":"1","author":"Hwang M. S.","year":"2005","journal-title":"International Journal of Network Security"},{"key":"S0129054119500047BIB015","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1245292"},{"key":"S0129054119500047BIB016","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23324-1_23"},{"issue":"5","key":"S0129054119500047BIB017","first-page":"298","volume":"8","author":"Lee C. C.","year":"2010","journal-title":"Journal of Digital Information Management"},{"key":"S0129054119500047BIB018","first-page":"231","volume":"15","author":"Lee C. C.","year":"2013","journal-title":"International Journal of Network Security"},{"key":"S0129054119500047BIB019","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2004.06.034"},{"key":"S0129054119500047BIB020","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2371239"},{"journal-title":"IEEE Transactions on Dependable and Secure Computing","year":"2015","author":"Li H.","key":"S0129054119500047BIB021"},{"key":"S0129054119500047BIB022","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxp060"},{"key":"S0129054119500047BIB023","first-page":"58","volume":"12","author":"Liu C. Y.","year":"2010","journal-title":"International Journal of Network Security"},{"key":"S0129054119500047BIB025","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.11.726"},{"journal-title":"IEEE Transactions on Parallel and Distributed Systems","year":"2015","author":"Xia Z.","key":"S0129054119500047BIB027"},{"key":"S0129054119500047BIB028","first-page":"317","volume":"15","author":"Xiong H.","year":"2013","journal-title":"International Journal of Network Security"},{"issue":"1","key":"S0129054119500047BIB030","first-page":"72","volume":"3","author":"Zhao Y.","year":"2012","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"}],"container-title":["International Journal of Foundations of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0129054119500047","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T15:40:42Z","timestamp":1565106042000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0129054119500047"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":24,"journal-issue":{"issue":"02","published-online":{"date-parts":[[2019,3,12]]},"published-print":{"date-parts":[[2019,2]]}},"alternative-id":["10.1142\/S0129054119500047"],"URL":"https:\/\/doi.org\/10.1142\/s0129054119500047","relation":{},"ISSN":["0129-0541","1793-6373"],"issn-type":[{"type":"print","value":"0129-0541"},{"type":"electronic","value":"1793-6373"}],"subject":[],"published":{"date-parts":[[2019,2]]}}}