{"id":"https://openalex.org/W4361760124","doi":"https://doi.org/10.1109/jiot.2023.3262660","title":"User-Friendly Public-Key Authenticated Encryption With Keyword Search for Industrial Internet of Things","display_name":"User-Friendly Public-Key Authenticated Encryption With Keyword Search for Industrial Internet of Things","publication_year":2023,"publication_date":"2023-03-28","ids":{"openalex":"https://openalex.org/W4361760124","doi":"https://doi.org/10.1109/jiot.2023.3262660"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2023.3262660","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3262660","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013631396","display_name":"Lang Pu","orcid":"https://orcid.org/0000-0002-1157-5593"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lang Pu","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037642352","display_name":"Chao Lin","orcid":"https://orcid.org/0000-0002-0101-8531"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Lin","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023902836","display_name":"Biwen Chen","orcid":"https://orcid.org/0000-0002-7314-8271"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Biwen Chen","raw_affiliation_strings":["College of Computer Science, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5013631396"],"corresponding_institution_ids":["https://openalex.org/I111753288"],"apc_list":null,"apc_paid":null,"fwci":4.4162,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.95494338,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"10","issue":"15","first_page":"13544","last_page":"13555"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.803880512714386},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.6807546615600586},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6696618795394897},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5873942375183105},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.545630931854248},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5047963857650757},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49327725172042847},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.48920226097106934},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4826403260231018},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4694642126560211},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4598920941352844},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.45656025409698486},{"id":"https://openalex.org/keywords/keyword-search","display_name":"Keyword search","score":0.4426901340484619},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35380181670188904},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.24581483006477356},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.22710904479026794}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.803880512714386},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.6807546615600586},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6696618795394897},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5873942375183105},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.545630931854248},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5047963857650757},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49327725172042847},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.48920226097106934},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4826403260231018},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4694642126560211},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4598920941352844},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45656025409698486},{"id":"https://openalex.org/C2988412617","wikidata":"https://www.wikidata.org/wiki/Q7441656","display_name":"Keyword search","level":2,"score":0.4426901340484619},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35380181670188904},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.24581483006477356},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.22710904479026794},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2023.3262660","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3262660","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1974263772","display_name":null,"funder_award_id":"BX2021399","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G4117558629","display_name":null,"funder_award_id":"U21A20466","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G457323686","display_name":null,"funder_award_id":"62202226","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4641413523","display_name":null,"funder_award_id":"BK20220935","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"},{"id":"https://openalex.org/G5043465742","display_name":null,"funder_award_id":"61972094","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5310342163","display_name":null,"funder_award_id":"62272103","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5669255772","display_name":null,"funder_award_id":"62032005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6179630980","display_name":null,"funder_award_id":"30922010917","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G7249388177","display_name":null,"funder_award_id":"62102050","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7406850032","display_name":null,"funder_award_id":"62102089","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8361662618","display_name":null,"funder_award_id":"62272104","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320322769","display_name":"Natural Science Foundation of Jiangsu Province","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W1493744513","https://openalex.org/W1546774120","https://openalex.org/W1580750219","https://openalex.org/W1589843374","https://openalex.org/W1591524234","https://openalex.org/W1610688607","https://openalex.org/W1988374166","https://openalex.org/W2028161339","https://openalex.org/W2065955975","https://openalex.org/W2076147741","https://openalex.org/W2089607820","https://openalex.org/W2120976781","https://openalex.org/W2146828512","https://openalex.org/W2147929033","https://openalex.org/W2152516507","https://openalex.org/W2152924492","https://openalex.org/W2161214567","https://openalex.org/W2466516794","https://openalex.org/W2527543526","https://openalex.org/W2597901792","https://openalex.org/W2606779297","https://openalex.org/W2613814461","https://openalex.org/W2767329275","https://openalex.org/W2975754231","https://openalex.org/W2980098516","https://openalex.org/W2997187331","https://openalex.org/W2997594590","https://openalex.org/W3022257163","https://openalex.org/W3109465342","https://openalex.org/W3110715679","https://openalex.org/W3120179717","https://openalex.org/W3132951757","https://openalex.org/W3134558659","https://openalex.org/W3138234917","https://openalex.org/W3140267140","https://openalex.org/W3141266239","https://openalex.org/W3186852206","https://openalex.org/W3211012931","https://openalex.org/W4205320985","https://openalex.org/W4206177554","https://openalex.org/W4207008124","https://openalex.org/W4226286700","https://openalex.org/W4234486938","https://openalex.org/W4281382238","https://openalex.org/W4281399814","https://openalex.org/W4283769976","https://openalex.org/W6634626079","https://openalex.org/W6682311248","https://openalex.org/W6719607236","https://openalex.org/W6803830388"],"related_works":["https://openalex.org/W2383065991","https://openalex.org/W1519370602","https://openalex.org/W1569215146","https://openalex.org/W4313172668","https://openalex.org/W1554299772","https://openalex.org/W2024757849","https://openalex.org/W2165448723","https://openalex.org/W2154733135","https://openalex.org/W2063764735","https://openalex.org/W2369329904"],"abstract_inverted_index":{"The":[0,42,186],"Industrial":[1],"Internet":[2],"of":[3,19,24,88,99,111,193],"Things":[4],"(IIoT)":[5],"incorporates":[6],"massive":[7],"physical":[8],"devices":[9,228],"to":[10,15,28,51,77,119,215],"collect":[11],"ambient":[12],"data.":[13],"Due":[14,214],"the":[16,25,85,96,112,174,181,190,230],"limited":[17,86],"types":[18],"equipment":[20],"in":[21,53,173,229],"IIoT,":[22],"most":[23,110,201],"data":[26,64],"has":[27],"be":[29,38],"saved":[30],"on":[31,160],"a":[32,133],"cloud":[33],"server":[34],"before":[35],"it":[36],"can":[37,62],"processed":[39],"and":[40,147,156,169,183,219],"analyzed.":[41],"ciphertext":[43,146],"generated":[44],"by":[45,84],"traditional":[46,72],"encryption":[47,57,65,102],"techniques":[48],"is":[49,196,223],"difficult":[50],"search":[52,60,105],"subsequent":[54],"use.":[55],"Public-key":[56],"with":[58,103,179,200],"keyword":[59,79,104,145],"(PEKS)":[61],"provide":[63],"as":[66,68],"well":[67],"confidential":[69],"searching,":[70],"but":[71],"PEKS":[73],"schemes":[74,114,205],"are":[75,115],"susceptible":[76],"internal":[78],"guessing":[80],"attacks":[81],"(IKGAs)":[82],"caused":[83],"space":[87],"commonly":[89],"used":[90],"keywords.":[91],"To":[92],"address":[93],"this":[94,128],"issue,":[95],"cryptographic":[97],"primitive":[98],"public-key":[100],"authenticated":[101],"(PAEKS)":[106],"was":[107],"proposed,":[108],"while":[109],"existing":[113,202],"not":[116],"appropriately":[117],"applied":[118],"IIoT":[120],"for":[121,226],"involving":[122],"time-consuming":[123],"bilinear":[124,140],"pairing":[125,141],"operations.":[126],"In":[127],"article,":[129],"we":[130,150],"first":[131],"propose":[132],"user-friendly":[134],"PAEKS":[135,204],"scheme":[136,222],"that":[137,189],"totally":[138],"circumvents":[139],"operations":[142],"during":[143],"generating":[144],"trapdoor.":[148],"Then,":[149],"prove":[151],"its":[152,216],"multiciphertext":[153],"indistinguishability":[154],"(MCI)":[155],"trapdoor":[157],"privacy":[158],"based":[159],"decisional":[161],"<inline-formula":[162],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[163],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[164],"<tex-math":[165],"notation=\"LaTeX\">$q$":[166],"</tex-math></inline-formula>":[167],"-ABDHE":[168],"computational":[170,191],"Diffie\u2013Hellman":[171],"assumptions":[172],"random":[175],"oracle":[176],"model":[177],"together":[178],"conducting":[180],"theoretical":[182],"experimental":[184],"comparisons.":[185],"results":[187],"show":[188],"overhead":[192],"our":[194,221],"proposal":[195],"significantly":[197],"reduced":[198],"comparing":[199],"classical":[203],"without":[206],"causing":[207],"other":[208],"communication":[209],"costs":[210],"or":[211],"security":[212],"loss.":[213],"better":[217,224],"performance":[218],"security,":[220],"suited":[225],"lightweight":[227],"IIoT.":[231]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":6}],"updated_date":"2026-03-14T08:43:22.919905","created_date":"2025-10-10T00:00:00"}
