{"id":"https://openalex.org/W4391508049","doi":"https://doi.org/10.1007/978-981-99-9785-5_24","title":"Efficient Wildcard Searchable Symmetric Encryption with\u00a0Forward and\u00a0Backward Security","display_name":"Efficient Wildcard Searchable Symmetric Encryption with\u00a0Forward and\u00a0Backward Security","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4391508049","doi":"https://doi.org/10.1007/978-981-99-9785-5_24"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-99-9785-5_24","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-99-9785-5_24","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101958550","display_name":"Xi Zhang","orcid":"https://orcid.org/0000-0001-7237-3656"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]},{"id":"https://openalex.org/I94611258","display_name":"Hebei Normal University","ror":"https://ror.org/004rbbw49","country_code":"CN","type":"education","lineage":["https://openalex.org/I94611258"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xi Zhang","raw_affiliation_strings":["College of Computer and Cyber Security, Hebei Normal University, Shijiazhuang, 050024, China","Hebei Provincial Key Laboratory of Network and Information Security, Hebei Normal University, Shijiazhuang, 050024, China","School of Mathematics, Shandong University, Jinan, 250100, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Hebei Normal University, Shijiazhuang, 050024, China","institution_ids":["https://openalex.org/I94611258"]},{"raw_affiliation_string":"Hebei Provincial Key Laboratory of Network and Information Security, Hebei Normal University, Shijiazhuang, 050024, China","institution_ids":["https://openalex.org/I94611258"]},{"raw_affiliation_string":"School of Mathematics, Shandong University, Jinan, 250100, China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027080903","display_name":"Ye Su","orcid":"https://orcid.org/0000-0002-4912-3197"},"institutions":[{"id":"https://openalex.org/I28006308","display_name":"Shandong Normal University","ror":"https://ror.org/01wy3h363","country_code":"CN","type":"education","lineage":["https://openalex.org/I28006308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ye Su","raw_affiliation_strings":["School of Information Science and Engineering, Shandong Normal University, Jinan, 250358, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Shandong Normal University, Jinan, 250358, China","institution_ids":["https://openalex.org/I28006308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069132939","display_name":"Zhongkai Wei","orcid":"https://orcid.org/0009-0001-1701-1043"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhongkai Wei","raw_affiliation_strings":["School of Mathematics, Shandong University, Jinan, 250100, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics, Shandong University, Jinan, 250100, China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001399678","display_name":"Wenting Shen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wenting Shen","raw_affiliation_strings":["College of Computer Science and Technology, Qingdao University, Qingdao, 266071, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Qingdao University, Qingdao, 266071, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091403237","display_name":"Jing Qin","orcid":"https://orcid.org/0000-0003-2380-0396"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Qin","raw_affiliation_strings":["School of Mathematics, Shandong University, Jinan, 250100, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics, Shandong University, Jinan, 250100, China","institution_ids":["https://openalex.org/I154099455"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101958550"],"corresponding_institution_ids":["https://openalex.org/I154099455","https://openalex.org/I94611258"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.604,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.80531962,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"342","last_page":"357"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.838616669178009},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6274323463439941},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.550525963306427},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4041195213794708},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3867957890033722},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2717127203941345}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.838616669178009},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6274323463439941},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.550525963306427},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4041195213794708},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3867957890033722},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2717127203941345}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-981-99-9785-5_24","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-99-9785-5_24","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W265050821","https://openalex.org/W1517223221","https://openalex.org/W1929869986","https://openalex.org/W2027423568","https://openalex.org/W2160331838","https://openalex.org/W2233400177","https://openalex.org/W2523263095","https://openalex.org/W2533357737","https://openalex.org/W2592956480","https://openalex.org/W2624841517","https://openalex.org/W2791990314","https://openalex.org/W2914247668","https://openalex.org/W3012007529","https://openalex.org/W3189377603","https://openalex.org/W3215772207","https://openalex.org/W4285049595","https://openalex.org/W4285154500","https://openalex.org/W4324007139","https://openalex.org/W4385080249"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2322947709","https://openalex.org/W4385192994","https://openalex.org/W4255237014","https://openalex.org/W4242847202","https://openalex.org/W2951531469","https://openalex.org/W2384237980","https://openalex.org/W3144186108","https://openalex.org/W2050654845"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
