{"id":"https://openalex.org/W2986080916","doi":"https://doi.org/10.1109/access.2019.2952163","title":"Lattice-Based Key-Aggregate (Searchable) Encryption in Cloud Storage","display_name":"Lattice-Based Key-Aggregate (Searchable) Encryption in Cloud Storage","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2986080916","doi":"https://doi.org/10.1109/access.2019.2952163","mag":"2986080916"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2952163","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2952163","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08894101.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08894101.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021447133","display_name":"Yanqing Yao","orcid":"https://orcid.org/0009-0002-6302-5574"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]},{"id":"https://openalex.org/I890469752","display_name":"Ministry of Industry and Information Technology","ror":"https://ror.org/0385nmy68","country_code":"CN","type":"government","lineage":["https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanqing Yao","raw_affiliation_strings":["Key Laboratory of Aerospace Network Security, Ministry of industry and information technology, School of Cyberspace Science and Technology, Beihang University, Beijing, China","State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Network Security, Ministry of industry and information technology, School of Cyberspace Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I890469752","https://openalex.org/I82880672"]},{"raw_affiliation_string":"State Key Laboratory of Software Development Environment, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008014876","display_name":"Zhengde Zhai","orcid":null},"institutions":[{"id":"https://openalex.org/I4210090985","display_name":"Zhejiang Financial College","ror":"https://ror.org/00deghz86","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210090985"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengde Zhai","raw_affiliation_strings":["Ant Financial Services Group, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Ant Financial Services Group, Beijing, China","institution_ids":["https://openalex.org/I4210090985"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100425107","display_name":"Jianwei Liu","orcid":"https://orcid.org/0000-0003-2965-3518"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]},{"id":"https://openalex.org/I890469752","display_name":"Ministry of Industry and Information Technology","ror":"https://ror.org/0385nmy68","country_code":"CN","type":"government","lineage":["https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianwei Liu","raw_affiliation_strings":["Key Laboratory of Aerospace Network Security, Ministry of industry and information technology, School of Cyberspace Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Network Security, Ministry of industry and information technology, School of Cyberspace Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I890469752","https://openalex.org/I82880672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036786337","display_name":"Zhoujun Li","orcid":"https://orcid.org/0000-0002-9603-9713"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]},{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhoujun Li","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]},{"raw_affiliation_string":"State Key Laboratory of Software Development Environment, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5021447133"],"corresponding_institution_ids":["https://openalex.org/I82880672","https://openalex.org/I890469752"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.3007,"has_fulltext":true,"cited_by_count":20,"citation_normalized_percentile":{"value":0.85993303,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"7","issue":null,"first_page":"164544","last_page":"164555"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9763000011444092,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7780288457870483},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7684548497200012},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.6532064080238342},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.6001519560813904},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.5916283130645752},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.5862085223197937},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.566405713558197},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5115583539009094},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.5006816387176514},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.44645583629608154},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.43597212433815},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.4131469130516052},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4053650498390198},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3343659043312073},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2395624816417694}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7780288457870483},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7684548497200012},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.6532064080238342},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.6001519560813904},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.5916283130645752},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.5862085223197937},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.566405713558197},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5115583539009094},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.5006816387176514},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.44645583629608154},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.43597212433815},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.4131469130516052},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4053650498390198},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3343659043312073},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2395624816417694}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2019.2952163","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2952163","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08894101.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:e7680b4cd03645d2b1914c2baf8e4286","is_oa":true,"landing_page_url":"https://doaj.org/article/e7680b4cd03645d2b1914c2baf8e4286","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 164544-164555 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2952163","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2952163","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08894101.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7300000190734863}],"awards":[{"id":"https://openalex.org/G1023919524","display_name":null,"funder_award_id":", Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1100817172","display_name":null,"funder_award_id":"619320","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1637248431","display_name":null,"funder_award_id":"61932014","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2219711069","display_name":null,"funder_award_id":"SKLSDE-2019ZX-17","funder_id":"https://openalex.org/F4320326978","funder_display_name":"State Key Laboratory of Software Development Environment"},{"id":"https://openalex.org/G2322052668","display_name":null,"funder_award_id":"61972018","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2323930268","display_name":null,"funder_award_id":"U1636211","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2676390433","display_name":null,"funder_award_id":"61602025","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3435950671","display_name":null,"funder_award_id":"and Gr","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G37568934","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4014870960","display_name":null,"funder_award_id":"4182033","funder_id":"https://openalex.org/F4320322919","funder_display_name":"Natural Science Foundation of Beijing Municipality"},{"id":"https://openalex.org/G466649759","display_name":null,"funder_award_id":"2017Y","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G4678737013","display_name":null,"funder_award_id":"2017YFB140","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5029846496","display_name":null,"funder_award_id":"U163621","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5071178787","display_name":null,"funder_award_id":"61170189","funder_id":"https://openalex.org/F4320326978","funder_display_name":"State Key Laboratory of Software Development Environment"},{"id":"https://openalex.org/G5864802539","display_name":null,"funder_award_id":"2016QY04W0802","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6144721335","display_name":null,"funder_award_id":"2017YFB1400702","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G6165937667","display_name":null,"funder_award_id":"SKLSDE-2016ZX-22","funder_id":"https://openalex.org/F4320326978","funder_display_name":"State Key Laboratory of Software Development Environment"},{"id":"https://openalex.org/G7429600474","display_name":null,"funder_award_id":"2017YFB1","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G7861180558","display_name":null,"funder_award_id":"2017YFB1400702","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7935533444","display_name":null,"funder_award_id":"201802","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8138572713","display_name":null,"funder_award_id":"61170189","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8241925995","display_name":null,"funder_award_id":"MMJJ20180215","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8334197915","display_name":null,"funder_award_id":"61972017","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8340078520","display_name":null,"funder_award_id":"2017YF","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8823009050","display_name":null,"funder_award_id":"2017YFB","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8863277810","display_name":null,"funder_award_id":"4182033","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322919","display_name":"Natural Science Foundation of Beijing Municipality","ror":null},{"id":"https://openalex.org/F4320326978","display_name":"State Key Laboratory of Software Development Environment","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2986080916.pdf","grobid_xml":"https://content.openalex.org/works/W2986080916.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W1502807523","https://openalex.org/W1537360597","https://openalex.org/W1905774212","https://openalex.org/W1927549517","https://openalex.org/W1960415006","https://openalex.org/W2007466965","https://openalex.org/W2038761522","https://openalex.org/W2092335398","https://openalex.org/W2104939601","https://openalex.org/W2121826550","https://openalex.org/W2129167380","https://openalex.org/W2130410178","https://openalex.org/W2146828512","https://openalex.org/W2158328724","https://openalex.org/W2162561603","https://openalex.org/W2320470009","https://openalex.org/W2408726748","https://openalex.org/W2550767048","https://openalex.org/W2793843657","https://openalex.org/W2807740615","https://openalex.org/W2890178353","https://openalex.org/W2922051607","https://openalex.org/W2928018723","https://openalex.org/W2941569673","https://openalex.org/W2943600914","https://openalex.org/W3023749109","https://openalex.org/W3111297213","https://openalex.org/W6630179032","https://openalex.org/W6631940837","https://openalex.org/W6640072080","https://openalex.org/W6640123764","https://openalex.org/W6680631407","https://openalex.org/W6714358020","https://openalex.org/W6749633596","https://openalex.org/W6760622984"],"related_works":["https://openalex.org/W2387840805","https://openalex.org/W4315815885","https://openalex.org/W2361619969","https://openalex.org/W2188413349","https://openalex.org/W4240313302","https://openalex.org/W4205100462","https://openalex.org/W4243621294","https://openalex.org/W2188276378","https://openalex.org/W3143289714","https://openalex.org/W2396533199"],"abstract_inverted_index":{"In":[0],"cloud":[1,49,282],"storage,":[2],"selectively":[3],"sharing":[4,288],"encrypted":[5,189,219],"data":[6,34,287],"is":[7,15,164,210,258,268],"becoming":[8],"increasingly":[9],"important.":[10],"One":[11],"key":[12,150,170],"design":[13],"challenge":[14],"the":[16,33,48,51,56,79,87,93,144,155,158,168,173,180,188,196,218,223,228,251,256,259,266,269,291],"management":[17],"of":[18,25,41,53,64,157,179,198,253],"encryption":[19,26,72,99,127,133,177,263,274],"keys.":[20],"Traditionally,":[21],"a":[22,125,130,140,207],"large":[23,39],"quantity":[24],"keys":[27],"have":[28,74,105],"to":[29,47,77,112,166,186,203,216,281],"be":[30,45],"managed":[31],"by":[32,212,289],"owner,":[35],"and":[36,67,119,129,222,247,265],"an":[37],"equally":[38],"number":[40],"keyword":[42],"trapdoors":[43],"must":[44],"sent":[46],"for":[50,284],"purpose":[52],"searching":[54],"over":[55],"shared":[57],"data,":[58],"which":[59,135,240],"are":[60,101,136,152,183,244],"cumbersome":[61],"in":[62,92],"terms":[63],"secure":[65,246],"communication":[66],"management.":[68],"Recently,":[69],"key-aggregate":[70,97,126,131,262,272],"(searchable)":[71,98],"schemes":[73,100,182],"been":[75],"introduced":[76],"alleviate":[78],"problem.":[80],"However,":[81],"they":[82,104,243],"were":[83],"only":[84],"designed":[85,165,211],"under":[86],"Bilinear":[88],"Diffie-Hellman":[89],"Exponent":[90],"assumption":[91],"prior":[94],"works.":[95],"Lattice-based":[96],"valuable,":[102],"because":[103],"security":[106,233],"against":[107],"quantum":[108],"computing":[109],"attacks,":[110],"average-case":[111],"worse-case":[113],"equivalence":[114],"as":[115,117,235,237],"well":[116,236],"simplicity":[118],"potential":[120],"efficiency.":[121],"Here":[122],"we":[123],"propose":[124],"scheme":[128,134,264],"searchable":[132,273,285],"both":[137],"based":[138],"on":[139],"lattice":[141,174],"problem":[142,197],"(i.e.,":[143],"Learning":[145],"with":[146],"Errors":[147],"problem).":[148],"Some":[149],"techniques":[151],"employed":[153],"during":[154],"construction":[156],"schemes.":[159,293],"A":[160],"basis":[161],"delegation":[162],"algorithm":[163],"generate":[167],"aggregate":[169],"without":[171],"increasing":[172],"dimension.":[175],"The":[176],"algorithms":[178],"two":[181,292],"trickily":[184],"devised":[185],"make":[187,217],"files":[190],"decryptable":[191,221],"or":[192],"searchable.":[193],"To":[194,250],"overcome":[195],"general":[199],"matrix":[200],"multiplication":[201],"failing":[202],"satisfy":[204],"commutative":[205],"law,":[206],"hash":[208],"function":[209],"using":[213],"diagonalizable":[214],"matrices":[215],"file":[220],"trapdoor":[224],"adjustable.":[225],"We":[226,276],"present":[227],"schemes\u2019":[229],"correctness":[230],"proof,":[231],"formal":[232],"analysis":[234],"performance":[238],"analysis,":[239],"confirm":[241],"that":[242],"provably":[245],"practically":[248],"efficient.":[249],"best":[252],"our":[254],"knowledge,":[255],"former":[257],"first":[260,270],"lattice-based":[261,271],"latter":[267],"scheme.":[275],"also":[277],"demonstrate":[278],"their":[279],"application":[280],"storage":[283],"group":[286],"combining":[290]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
