Nov. 10, 2023, 1:42 a.m. |

IACR News www.iacr.org

ePrint Report: Lattice-based Public Key Encryption with Authorized Keyword Search: Construction, Implementation, and Applications

Shiyuan Xu, Yibo Cao, Xue Chen, Yuer Yang, Siu-Ming Yiu


Public key encryption with keyword search (PEKS), formalized by Boneh et al. [EUROCRYPT' 04], enables secure searching for specific keywords in the ciphertext. Nevertheless, in certain scenarios, varying user tiers are granted disparate data searching privileges, and administrators need to restrict the searchability of ciphertexts to select users exclusively. To address this concern, Jiang et al. …

applications chen ciphertext construction encryption eprint report eurocrypt implementation key public public key report search

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Offensive Security Engineer

@ Ivanti | United States, Remote

Senior Security Engineer I

@ Samsara | Remote - US

Senior Principal Information System Security Engineer

@ Chameleon Consulting Group | Herndon, VA

Junior Detections Engineer

@ Kandji | San Francisco

Data Security Engineer/ Architect - Remote United States

@ Stanley Black & Decker | Towson MD USA - 701 E Joppa Rd Bg 700