{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:38:13Z","timestamp":1775817493177,"version":"3.50.1"},"reference-count":0,"publisher":"EasyChair","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"abstract":"<jats:p>Gao et al. (IEEE Internet of Things Journal 2024) proposed public-key inverted-index keyword search with designated tester as an extension of public key encryption with keyword search (PEKS). In their scheme, a server (a tester) has a secret key and uses the key for running the search algorithm due to the designated tester setting. They proved that no information of keyword is revealed from trapdoors under the decisional Diffie-Hellman (DDH) assumption. However, they also employed a symmetric pairing which can be seen as a DDH-solver. Thus, it is expected that information of keyword is revealed from trapdoors since the underlying complexity assumption does not hold. In this paper, we demonstrate an attack against the Gao et al.'s scheme where information of keyword is revealed from a trapdoor. Our attack completes by using only the server's secret key in addition to the challenge trapdoor, without any additional encryption\/trapdoor queries, and the attack complexity is just two pairing computations. We remark that an adversary is not allowed to obtain the server's secret key in their security model, and our attack is outside of their security model. Thus, we discuss the roles of the server, and stress that our attack scenario is reasonable.<\/jats:p>","DOI":"10.29007\/126n","type":"proceedings-article","created":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T22:10:10Z","timestamp":1755814210000},"page":"31-21","source":"Crossref","is-referenced-by-count":1,"title":["Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester"],"prefix":"10.29007","volume":"106","author":[{"given":"Mizuki","family":"Hayashi","sequence":"first","affiliation":[]},{"given":"Keita","family":"Emura","sequence":"additional","affiliation":[]}],"member":"11545","event":{"name":"Proceedings of the 20th Asia Joint Conference on Information Security"},"container-title":["EPiC Series in Computing"],"original-title":[],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T22:10:11Z","timestamp":1755814211000},"score":1,"resource":{"primary":{"URL":"https:\/\/easychair.org\/publications\/paper\/KqwW"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":0,"URL":"https:\/\/doi.org\/10.29007\/126n","relation":{},"ISSN":["2398-7340"],"issn-type":[{"value":"2398-7340","type":"print"}],"subject":[]}}