%PDF-1.5
%
1 0 obj
<< /S /GoTo /D (section.1) >>
endobj
4 0 obj
(Introduction and Motivation)
endobj
5 0 obj
<< /S /GoTo /D (subsection.1.1) >>
endobj
8 0 obj
(Basic Technical Settings)
endobj
9 0 obj
<< /S /GoTo /D (subsection.1.2) >>
endobj
12 0 obj
(Comparisons with Existing Cryptographic Primitives)
endobj
13 0 obj
<< /S /GoTo /D (subsection.1.3) >>
endobj
16 0 obj
(Our Work)
endobj
17 0 obj
<< /S /GoTo /D (subsection.1.4) >>
endobj
20 0 obj
(Related Work)
endobj
21 0 obj
<< /S /GoTo /D (section.2) >>
endobj
24 0 obj
(Protocol Definition)
endobj
25 0 obj
<< /S /GoTo /D (section.3) >>
endobj
28 0 obj
(Security Models)
endobj
29 0 obj
<< /S /GoTo /D (subsection.3.1) >>
endobj
32 0 obj
(Consistency)
endobj
33 0 obj
<< /S /GoTo /D (subsection.3.2) >>
endobj
36 0 obj
(Indistinguishability of CBEKS against Chosen Keyword and Ciphertext attacks \(IND-CKCA\))
endobj
37 0 obj
<< /S /GoTo /D (subsubsection.3.2.1) >>
endobj
40 0 obj
(Game played by the Server: GameS.)
endobj
41 0 obj
<< /S /GoTo /D (subsubsection.3.2.2) >>
endobj
44 0 obj
(Game played by the Certifier: GameC.)
endobj
45 0 obj
<< /S /GoTo /D (subsubsection.3.2.3) >>
endobj
48 0 obj
(Game played by the Receiver: GameR.)
endobj
49 0 obj
<< /S /GoTo /D (subsection.3.3) >>
endobj
52 0 obj
(Indistinguishability of CBEKS against Keyword-Guessing attack \(IND-KGA\))
endobj
53 0 obj
<< /S /GoTo /D (subsection.3.4) >>
endobj
56 0 obj
(Collusion Resistance \(CR\))
endobj
57 0 obj
<< /S /GoTo /D (section.4) >>
endobj
60 0 obj
(Preliminaries)
endobj
61 0 obj
<< /S /GoTo /D (subsection.4.1) >>
endobj
64 0 obj
(Bilinear Maps)
endobj
65 0 obj
<< /S /GoTo /D (subsection.4.2) >>
endobj
68 0 obj
(Discrete Logarithm Assumption)
endobj
69 0 obj
<< /S /GoTo /D (subsection.4.3) >>
endobj
72 0 obj
(Symmetric External Diffie-Hellman Assumption)
endobj
73 0 obj
<< /S /GoTo /D (subsection.4.4) >>
endobj
76 0 obj
(Decisional Bilinear Diffie-Hellman Assumption)
endobj
77 0 obj
<< /S /GoTo /D (subsection.4.5) >>
endobj
80 0 obj
(Decisional Bilinear Diffie-Hellman Exponent Assumption)
endobj
81 0 obj
<< /S /GoTo /D (subsection.4.6) >>
endobj
84 0 obj
(Waters Hash Function)
endobj
85 0 obj
<< /S /GoTo /D (section.5) >>
endobj
88 0 obj
(CBEKS Construction)
endobj
89 0 obj
<< /S /GoTo /D (section.6) >>
endobj
92 0 obj
(Security Proofs)
endobj
93 0 obj
<< /S /GoTo /D (subsection.6.1) >>
endobj
96 0 obj
(Consistency)
endobj
97 0 obj
<< /S /GoTo /D (subsection.6.2) >>
endobj
100 0 obj
(Indistinguishability of CBEKS against Chosen Keyword and Ciphertext attacks \(IND-CKCA\))
endobj
101 0 obj
<< /S /GoTo /D (subsection.6.3) >>
endobj
104 0 obj
(Indistinguishability of CBEKS against Keyword-Guessing attack \(IND-KGA\))
endobj
105 0 obj
<< /S /GoTo /D (subsection.6.4) >>
endobj
108 0 obj
(Collusion Resistance \(CR\))
endobj
109 0 obj
<< /S /GoTo /D (section.7) >>
endobj
112 0 obj
(Performance and Observations)
endobj
113 0 obj
<< /S /GoTo /D (section.8) >>
endobj
116 0 obj
(Conclusion)
endobj
117 0 obj
<< /S /GoTo /D [118 0 R /Fit] >>
endobj
123 0 obj <<
/Length 3078
/Filter /FlateDecode
>>
stream
xڍ˒۸>_R
o2vڛ8IDa$Iaerȷ_(
*Gwj_O7|=1KWA VO@*Uq{o.`7Low덎w_s;MS9ZǞ]|Zk:Y`MW<~$Թ':Aq([mtAʈkzcg}7+mKW.lMH(?Wy7
6agi(h #`UbZCY?u0̪z}Y5LLR?OUBH|f\0*.T@RpZxhXm(8~9`? qITώ$k8fTPPbijשlq?0%jwDquj=nrCg0վ?}t4eVhАtW?-2#@zR!h innG:=!po~<7yp!|4uEF+\&Ȁ"4 >8 _5^_t%!Me~wqp*QY@悠9#|p:Ղ~m/: L!PpU`@Ta{C;]YwM1gyh˚6֠3]ez":0⼥0bxײ(=rՆ.a-L2t pH2-n_T
>POwM/i8$w1;&v`2ŷ8zun_)-'mEq_[qoQG8+-5E BC>f);zvܭڢ|}sC QQ(+Pꢊ80!GHq #U%He`ZyL|Gу]b$XC4E/fm6y[:߾{q1U~2!F=Z(& [V
I{|ꚣۧuDauDn&F Tg蛱+Hm`(SF i+SX.1!zce0[/[C#C(S;&ZvÃ@J}gZТE)uo])"E5yދ}{Έn!NBk+tc9,j&WrtT}#@iZOAmSXpwlvBԫVn%o$5S-F_ Bgr v%ٱf[Vp35'4 u9nK~8{lA`_א#%ȣ%ܛ== !xE02