{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T19:43:57Z","timestamp":1750448637625,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Bangladesh University of Engineering and Technology (BUET)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3508398.3511518","type":"proceedings-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:13:31Z","timestamp":1650082411000},"page":"324-335","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["RS-PKE"],"prefix":"10.1145","author":[{"given":"Israt Jahan","family":"Mouri","sequence":"first","affiliation":[{"name":"Bangladesh University of Engineering and Technology (BUET), Dhaka, Bangladesh"}]},{"given":"Muhammad","family":"Ridowan","sequence":"additional","affiliation":[{"name":"Bangladesh University of Engineering and Technology (BUET), Dhaka, Bangladesh"}]},{"given":"Muhammad Abdullah","family":"Adnan","sequence":"additional","affiliation":[{"name":"Bangladesh University of Engineering and Technology (BUET), Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"e_1_3_2_2_2_1","volume-title":"Group homomorphic encryption: characterizations, impossibility results, and applications. Designs, codes and cryptography","author":"Armknecht Frederik","year":"2013","unstructured":"Frederik Armknecht , Stefan Katzenbeisser , and Andreas Peter . 2013. Group homomorphic encryption: characterizations, impossibility results, and applications. Designs, codes and cryptography , Vol. 67 , 2 ( 2013 ), 209--232. Frederik Armknecht, Stefan Katzenbeisser, and Andreas Peter. 2013. Group homomorphic encryption: characterizations, impossibility results, and applications. Designs, codes and cryptography , Vol. 67, 2 (2013), 209--232."},{"key":"e_1_3_2_2_3_1","volume-title":"Revisiting Leakage Abuse Attacks. In 27th Annual Network and Distributed System Security Symposium, NDSS. The Internet Society","author":"Blackstone Laura","year":"2020","unstructured":"Laura Blackstone , Seny Kamara , and Tarik Moataz . 2020 . Revisiting Leakage Abuse Attacks. In 27th Annual Network and Distributed System Security Symposium, NDSS. The Internet Society , San Diego, California, USA. https:\/\/www.ndss-symposium.org\/ndss-paper\/revisiting-leakage-abuse-attacks\/ Laura Blackstone, Seny Kamara, and Tarik Moataz. 2020. Revisiting Leakage Abuse Attacks. In 27th Annual Network and Distributed System Security Symposium, NDSS. The Internet Society, San Diego, California, USA. https:\/\/www.ndss-symposium.org\/ndss-paper\/revisiting-leakage-abuse-attacks\/"},{"key":"e_1_3_2_2_4_1","volume-title":"Rafail Ostrovsky, and Giuseppe Persiano.","author":"Boneh Dan","year":"2004","unstructured":"Dan Boneh , Giovanni Di Crescenzo , Rafail Ostrovsky, and Giuseppe Persiano. 2004 . Public Key Encryption with Keyword Search. In Advances in Cryptology - EUROCRYPT 2004 , , Christian Cachin and Jan L. Camenisch (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 506--522. Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. 2004. Public Key Encryption with Keyword Search. In Advances in Cryptology - EUROCRYPT 2004 , , Christian Cachin and Jan L. Camenisch (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 506--522."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978303"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133980"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.45"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2019.2921113"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2959383"},{"key":"e_1_3_2_2_11_1","volume-title":"ACISP (Lecture Notes in Computer Science","volume":"76","author":"Chen Rongmao","year":"2015","unstructured":"Rongmao Chen , Yi Mu , Guomin Yang , Fuchun Guo , and Xiaofen Wang . 2015 . A New General Framework for Secure Public Key Encryption with Keyword Search. In Information Security and Privacy - 20th Australasian Conference , ACISP (Lecture Notes in Computer Science , Vol. 9144), Ernest Foo and Douglas Stebila (Eds.). Springer, Brisbane, QLD, Australia, 59-- 76 . https:\/\/doi.org\/10.1007\/978--3--319--19962--7_4 10.1007\/978--3--319--19962--7_4 Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, and Xiaofen Wang. 2015. A New General Framework for Secure Public Key Encryption with Keyword Search. In Information Security and Privacy - 20th Australasian Conference, ACISP (Lecture Notes in Computer Science, Vol. 9144), Ernest Foo and Douglas Stebila (Eds.). Springer, Brisbane, QLD, Australia, 59--76. https:\/\/doi.org\/10.1007\/978--3--319--19962--7_4"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0002"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243833"},{"key":"e_1_3_2_2_15_1","volume-title":"Request for Comments (RFC) . https:\/\/www.rfc-editor","author":"I.E.T.F.","year":"2020","unstructured":", I.E.T.F. 2020. Request for Comments (RFC) . https:\/\/www.rfc-editor .org\/retrieve\/bulk\/. [Online; accessed 02- February - 2020 ]. , I.E.T.F. 2020. Request for Comments (RFC) . https:\/\/www.rfc-editor.org\/retrieve\/bulk\/. [Online; accessed 02-February-2020]."},{"key":"e_1_3_2_2_16_1","volume-title":"Attack and Mitigation. In NDSS","volume":"20","author":"Islam Mohammad Saiful","year":"2012","unstructured":"Mohammad Saiful Islam , Mehmet Kuzu , and Murat Kantarcioglu . 2012 . Access Pattern disclosure on Searchable Encryption: Ramification , Attack and Mitigation. In NDSS , Vol. 20 . Citeseer, The Internet Society, Virginia, United States, 12. Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation. In NDSS , Vol. 20. Citeseer, The Internet Society, Virginia, United States, 12."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/NSYSS2.2017.8267793"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0026"},{"key":"e_1_3_2_2_19_1","volume-title":"Inscrypt 2010 (Lecture Notes in Computer Science","volume":"35","author":"Lipmaa Helger","year":"2010","unstructured":"Helger Lipmaa . 2010 . On the CCA1-Security of Elgamal and Damg\u00e5rd's Elgamal. In Information Security and Cryptology - 6th International Conference , Inscrypt 2010 (Lecture Notes in Computer Science , Vol. 6584), , Xuejia Lai, Moti Yung, and Dongdai Lin (Eds.). Springer, Shanghai, China, 18-- 35 . https:\/\/doi.org\/10.1007\/978--3--642--21518--6_2 10.1007\/978--3--642--21518--6_2 Helger Lipmaa. 2010. On the CCA1-Security of Elgamal and Damg\u00e5rd's Elgamal. In Information Security and Cryptology - 6th International Conference, Inscrypt 2010 (Lecture Notes in Computer Science, Vol. 6584), , Xuejia Lai, Moti Yung, and Dongdai Lin (Eds.). Springer, Shanghai, China, 18--35. https:\/\/doi.org\/10.1007\/978--3--642--21518--6_2"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2823309"},{"key":"e_1_3_2_2_21_1","volume-title":"secure-pkse. https:\/\/github.com\/pkse-searcher\/secure-pkse Retrieved","author":"Mouri Israt Jahan","year":"2022","unstructured":"Israt Jahan Mouri and Muhammad Ridowan . 2020. secure-pkse. https:\/\/github.com\/pkse-searcher\/secure-pkse Retrieved February 14, 2022 from Israt Jahan Mouri and Muhammad Ridowan. 2020. secure-pkse. https:\/\/github.com\/pkse-searcher\/secure-pkse Retrieved February 14, 2022 from"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2828404"},{"key":"e_1_3_2_2_24_1","volume-title":"et almbox","author":"Rivest Ronald L","year":"1978","unstructured":"Ronald L Rivest , Len Adleman , Michael L Dertouzos , et almbox . 1978 . On data banks and privacy homomorphisms. Foundations of secure computation , Vol. 4 , 11 (1978), 169--180. Ronald L Rivest, Len Adleman, Michael L Dertouzos, et almbox. 1978. On data banks and privacy homomorphisms. Foundations of secure computation , Vol. 4, 11 (1978), 169--180."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.05.008"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/882494.884426"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23298"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243782"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.282"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.34"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.282"},{"key":"e_1_3_2_2_32_1","volume-title":"A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data","author":"Xia Zhihua","year":"2015","unstructured":"Zhihua Xia , Xinhui Wang , Xingming Sun , and Qian Wang . 2015. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data . IEEE transactions on parallel and distributed systems , Vol. 27 , 2 ( 2015 ), 340--352. Zhihua Xia, Xinhui Wang, Xingming Sun, and Qian Wang. 2015. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE transactions on parallel and distributed systems , Vol. 27, 2 (2015), 340--352."},{"key":"e_1_3_2_2_33_1","first-page":"3","article-title":"b. FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things","volume":"18","author":"Zhang Xiaojun","year":"2021","unstructured":"Xiaojun Zhang , Chunxiang Xu , Huaxiong Wang , Yuan Zhang , and Shixiong Wang . 2021 b. FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things . IEEE Transactions on Dependable and Secure Computing , Vol. 18 , 3 (May 2021), 1019--1032. https:\/\/doi.org\/10.1109\/TDSC.2019.2914117 10.1109\/TDSC.2019.2914117 Xiaojun Zhang, Chunxiang Xu, Huaxiong Wang, Yuan Zhang, and Shixiong Wang. 2021 b. FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things. IEEE Transactions on Dependable and Secure Computing , Vol. 18, 3 (May 2021), 1019--1032. https:\/\/doi.org\/10.1109\/TDSC.2019.2914117","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_2_34_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Zhang Yupeng","year":"2016","unstructured":"Yupeng Zhang , Jonathan Katz , and Charalampos Papamanthou . 2016 . All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption . In 25th USENIX Security Symposium (USENIX Security 16) . USENIX Association, Austin, TX, 707--720. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/zhang Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou. 2016. All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 707--720. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/zhang"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2923222"}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Baltimore MD USA","acronym":"CODASPY '22"},"container-title":["Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511518","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3511518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:39Z","timestamp":1750188639000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511518"}},"subtitle":["Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms"],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":35,"alternative-id":["10.1145\/3508398.3511518","10.1145\/3508398"],"URL":"https:\/\/doi.org\/10.1145\/3508398.3511518","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]},"assertion":[{"value":"2022-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}