{"id":"https://openalex.org/W4402673992","doi":"https://doi.org/10.1109/e-science62913.2024.10678696","title":"On the Design of a Searchable Encryption Protocol for Keyword Search using Proactive Secret Sharing","display_name":"On the Design of a Searchable Encryption Protocol for Keyword Search using Proactive Secret Sharing","publication_year":2024,"publication_date":"2024-09-16","ids":{"openalex":"https://openalex.org/W4402673992","doi":"https://doi.org/10.1109/e-science62913.2024.10678696"},"language":"en","primary_location":{"id":"doi:10.1109/e-science62913.2024.10678696","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/e-science62913.2024.10678696","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 20th International Conference on e-Science (e-Science)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pure.qub.ac.uk/en/publications/872c59b5-21a2-44ec-b9dd-93d9a6526789","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038419463","display_name":"K. Praveen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210154636","display_name":"Technology Information, Forecasting and Assessment Council","ror":"https://ror.org/04d81ed36","country_code":"IN","type":"government","lineage":["https://openalex.org/I2799351866","https://openalex.org/I4210098748","https://openalex.org/I4210134808","https://openalex.org/I4210154636"]},{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Praveen K","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,TIFAC CORE in Cyber Security, Amrita School of Engineering,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,TIFAC CORE in Cyber Security, Amrita School of Engineering,India","institution_ids":["https://openalex.org/I81556334","https://openalex.org/I4210154636"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114230369","display_name":"G. S.","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]},{"id":"https://openalex.org/I4210154636","display_name":"Technology Information, Forecasting and Assessment Council","ror":"https://ror.org/04d81ed36","country_code":"IN","type":"government","lineage":["https://openalex.org/I2799351866","https://openalex.org/I4210098748","https://openalex.org/I4210134808","https://openalex.org/I4210154636"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Gabriel Anand K S","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,TIFAC CORE in Cyber Security, Amrita School of Engineering,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,TIFAC CORE in Cyber Security, Amrita School of Engineering,India","institution_ids":["https://openalex.org/I81556334","https://openalex.org/I4210154636"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036058781","display_name":"Indranil Ghosh Ray","orcid":"https://orcid.org/0000-0002-4156-8247"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Indranil Ghosh Ray","raw_affiliation_strings":["Queen&#x2019;s University,Belfast,UK"],"affiliations":[{"raw_affiliation_string":"Queen&#x2019;s University,Belfast,UK","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049764999","display_name":"Avishek Adhikari","orcid":"https://orcid.org/0000-0002-7768-4629"},"institutions":[{"id":"https://openalex.org/I157674215","display_name":"Presidency University","ror":"https://ror.org/04xgbph11","country_code":"IN","type":"education","lineage":["https://openalex.org/I157674215"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Avishek Adhikari","raw_affiliation_strings":["Presidency University,Department of Mathematics,India"],"affiliations":[{"raw_affiliation_string":"Presidency University,Department of Mathematics,India","institution_ids":["https://openalex.org/I157674215"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113392448","display_name":"Sabyasachi Datta","orcid":null},"institutions":[{"id":"https://openalex.org/I4210131147","display_name":"SRM University","ror":"https://ror.org/037skf023","country_code":"IN","type":"education","lineage":["https://openalex.org/I145286018","https://openalex.org/I4210131147"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sabyasachi Datta","raw_affiliation_strings":["SRM University,Department of Computer Science and Engineering,India"],"affiliations":[{"raw_affiliation_string":"SRM University,Department of Computer Science and Engineering,India","institution_ids":["https://openalex.org/I4210131147"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006115873","display_name":"Arnab Kumar Biswas","orcid":"https://orcid.org/0000-0002-3057-2478"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Arnab Kumar Biswas","raw_affiliation_strings":["Queen&#x2019;s University,Belfast,UK"],"affiliations":[{"raw_affiliation_string":"Queen&#x2019;s University,Belfast,UK","institution_ids":["https://openalex.org/I126231945"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5038419463"],"corresponding_institution_ids":["https://openalex.org/I4210154636","https://openalex.org/I81556334"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17563111,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9319000244140625,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9319000244140625,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8392472267150879},{"id":"https://openalex.org/keywords/keyword-search","display_name":"Keyword search","score":0.8156266212463379},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.663580596446991},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6302005052566528},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.47445473074913025},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43987447023391724},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4254254996776581},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3865854740142822},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.36970722675323486},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3289175033569336}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8392472267150879},{"id":"https://openalex.org/C2988412617","wikidata":"https://www.wikidata.org/wiki/Q7441656","display_name":"Keyword search","level":2,"score":0.8156266212463379},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.663580596446991},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6302005052566528},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.47445473074913025},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43987447023391724},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4254254996776581},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3865854740142822},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.36970722675323486},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3289175033569336},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/e-science62913.2024.10678696","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/e-science62913.2024.10678696","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 20th International Conference on e-Science (e-Science)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/872c59b5-21a2-44ec-b9dd-93d9a6526789","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/872c59b5-21a2-44ec-b9dd-93d9a6526789","pdf_url":null,"source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"K, P, K S, G A, Ghosh Ray, I, Adhikari, A, Datta, S & Biswas, A K 2024, On the design of a searchable encryption protocol for keyword search using proactive secret sharing. in 2024 IEEE 20th International Conference on e-Science (e-Science): Proceedings. IEEE International Conference on e-Science (e-Science): Proceedings, IEEE Xplore, 2024 IEEE 20th International Conference on e-Science (e-Science), Osaka, Japan, 16/09/2024. https://doi.org/10.1109/e-Science62913.2024.10678696","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"pmh:oai:pure.qub.ac.uk/portal:openaire/872c59b5-21a2-44ec-b9dd-93d9a6526789","is_oa":true,"landing_page_url":"https://pure.qub.ac.uk/en/publications/872c59b5-21a2-44ec-b9dd-93d9a6526789","pdf_url":null,"source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"K, P, K S, G A, Ghosh Ray, I, Adhikari, A, Datta, S & Biswas, A K 2024, On the design of a searchable encryption protocol for keyword search using proactive secret sharing. in 2024 IEEE 20th International Conference on e-Science (e-Science): Proceedings. IEEE International Conference on e-Science (e-Science): Proceedings, IEEE Xplore, 2024 IEEE 20th International Conference on e-Science (e-Science), Osaka, Japan, 16/09/2024. https://doi.org/10.1109/e-Science62913.2024.10678696","raw_type":"info:eu-repo/semantics/conferenceObject"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5445011987","display_name":null,"funder_award_id":"EP/K004379/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G7824805094","display_name":null,"funder_award_id":"EP/X022323/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W37553981","https://openalex.org/W2017126829","https://openalex.org/W2080574324","https://openalex.org/W2096024255","https://openalex.org/W2120976781","https://openalex.org/W2122590785","https://openalex.org/W2141420453","https://openalex.org/W2146828512","https://openalex.org/W2147929033","https://openalex.org/W2152516507","https://openalex.org/W2161214567","https://openalex.org/W2625831329","https://openalex.org/W2744604893","https://openalex.org/W2754919491","https://openalex.org/W2785422613","https://openalex.org/W2794522616","https://openalex.org/W2805625402","https://openalex.org/W2809016954","https://openalex.org/W2886830524","https://openalex.org/W3159239494","https://openalex.org/W3162521781","https://openalex.org/W4220751475","https://openalex.org/W4323241179","https://openalex.org/W4362554965","https://openalex.org/W4377287527","https://openalex.org/W4382983058","https://openalex.org/W6720239471"],"related_works":["https://openalex.org/W1503401473","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W2093529019","https://openalex.org/W87530933","https://openalex.org/W2282990539","https://openalex.org/W4240432851","https://openalex.org/W154233216","https://openalex.org/W2626486901","https://openalex.org/W2026856585"],"abstract_inverted_index":{"Searchable":[0],"encryption":[1],"allows":[2,68],"users":[3],"to":[4,26,39,47,75],"perform":[5],"search":[6,141,149],"operations":[7],"on":[8],"encrypted":[9],"data":[10,58],"before":[11],"decrypting":[12],"it":[13],"first.":[14],"Secret":[15],"sharing":[16,67,118],"is":[17,60,98,157],"one":[18],"of":[19,57,71,83,91,96,137,142,154],"the":[20,41,69,72,89,101,107,121,147,152,160],"most":[21],"important":[22],"cryptographic":[23],"primitives":[24],"used":[25,61],"design":[27],"an":[28],"information":[29],"theoretic":[30],"scheme.":[31],"Nowadays":[32],"cryptosys-tem":[33],"designers":[34],"are":[35,126],"providing":[36],"a":[37,80,114],"facility":[38],"adjust":[40],"security":[42,51,56],"parameters":[43],"in":[44],"real":[45],"time":[46,97],"circumvent":[48],"AI-enabled":[49],"cyber":[50],"threats.":[52],"For":[53],"long":[54],"term":[55],"which":[59],"by":[62,100,106],"various":[63],"applications,":[64],"proactive":[65,86,116],"secret":[66,74,87,117],"shares":[70,92,122],"original":[73],"be":[76],"dynamically":[77],"adjusted":[78],"during":[79],"specific":[81],"interval":[82],"time.":[84,138],"In":[85,109],"sharing,":[88],"updation":[90],"at":[93,124,134],"regular":[94,135],"intervals":[95,136],"done":[99],"servers":[102,125,133],"(participants)":[103],"and":[104],"not":[105],"dealer.":[108],"this":[110],"paper,":[111],"we":[112],"propose":[113],"novel":[115],"scheme":[119],"where":[120],"stored":[123],"updated":[127],"using":[128,146,159],"preshared":[129],"pairwise":[130],"keys":[131],"between":[132],"The":[139],"direct":[140],"words":[143],"over":[144],"sentences":[145],"conjunctive":[148],"function":[150],"without":[151],"generation":[153],"any":[155],"index":[156],"possible":[158],"underlying":[161],"querying":[162],"method.":[163]},"counts_by_year":[],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
