{"id":"https://openalex.org/W1493744513","doi":"https://doi.org/10.1007/978-3-540-69839-5_96","title":"Public Key Encryption with Keyword Search Revisited","display_name":"Public Key Encryption with Keyword Search Revisited","publication_year":2008,"publication_date":"2008-08-12","ids":{"openalex":"https://openalex.org/W1493744513","doi":"https://doi.org/10.1007/978-3-540-69839-5_96","mag":"1493744513"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-69839-5_96","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-69839-5_96","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088366326","display_name":"Joonsang Baek","orcid":"https://orcid.org/0000-0003-2613-2127"},"institutions":[{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Joonsang Baek","raw_affiliation_strings":["Cryptography and Security Department, Institute for Infocomm Research (I2R), Singapore","Cryptography and Security Department, Institute for Infocomm Research (I2R), Singapore#TAB#"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Cryptography and Security Department, Institute for Infocomm Research (I2R), Singapore","institution_ids":["https://openalex.org/I3005327000"]},{"raw_affiliation_string":"Cryptography and Security Department, Institute for Infocomm Research (I2R), Singapore#TAB#","institution_ids":["https://openalex.org/I3005327000"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010447902","display_name":"Reihaneh Safavi\u2013Naini","orcid":"https://orcid.org/0000-0002-1697-3590"},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Reihaneh Safavi-Naini","raw_affiliation_strings":["Centre for Information Security and Cryptography, University of Calgary, Canada"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Centre for Information Security and Cryptography, University of Calgary, Canada","institution_ids":["https://openalex.org/I168635309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["Centre for Computer and Information Security Research (CCISR) School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia","Centre for Computer and Information Security Research (CCISR) School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia NSW 2522#TAB#"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research (CCISR) School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer and Information Security Research (CCISR) School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia NSW 2522#TAB#","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088366326"],"corresponding_institution_ids":["https://openalex.org/I3005327000"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":8.9053,"has_fulltext":false,"cited_by_count":500,"citation_normalized_percentile":{"value":0.98496549,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1249","last_page":"1259"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8667135238647461},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6925605535507202},{"id":"https://openalex.org/keywords/keyword-search","display_name":"Keyword search","score":0.6246538162231445},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6182682514190674},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5637640357017517},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.436281681060791},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4211500287055969},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3849051594734192},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3343610167503357}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8667135238647461},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6925605535507202},{"id":"https://openalex.org/C2988412617","wikidata":"https://www.wikidata.org/wiki/Q7441656","display_name":"Keyword search","level":2,"score":0.6246538162231445},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6182682514190674},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5637640357017517},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.436281681060791},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4211500287055969},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3849051594734192},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3343610167503357}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-540-69839-5_96","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-69839-5_96","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W8287904","https://openalex.org/W1512194687","https://openalex.org/W1788452017","https://openalex.org/W1797206029","https://openalex.org/W1901278359","https://openalex.org/W2052267638","https://openalex.org/W2110740499","https://openalex.org/W2117685508","https://openalex.org/W2120976781","https://openalex.org/W2152924492","https://openalex.org/W2161214567"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W4289281780","https://openalex.org/W2013342653","https://openalex.org/W1503401473","https://openalex.org/W767161385","https://openalex.org/W4307248189","https://openalex.org/W3093954335","https://openalex.org/W4205482204"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":22},{"year":2024,"cited_by_count":30},{"year":2023,"cited_by_count":21},{"year":2022,"cited_by_count":47},{"year":2021,"cited_by_count":34},{"year":2020,"cited_by_count":42},{"year":2019,"cited_by_count":43},{"year":2018,"cited_by_count":30},{"year":2017,"cited_by_count":46},{"year":2016,"cited_by_count":41},{"year":2015,"cited_by_count":33},{"year":2014,"cited_by_count":21},{"year":2013,"cited_by_count":33},{"year":2012,"cited_by_count":21}],"updated_date":"2026-05-15T08:27:34.491423","created_date":"2025-10-10T00:00:00"}
