{"id":"https://openalex.org/W4382118802","doi":"https://doi.org/10.1109/jiot.2023.3288131","title":"Ciphertext Retrieval With Identity Bidirectional Authentication and Matrix Index in IoT","display_name":"Ciphertext Retrieval With Identity Bidirectional Authentication and Matrix Index in IoT","publication_year":2023,"publication_date":"2023-06-26","ids":{"openalex":"https://openalex.org/W4382118802","doi":"https://doi.org/10.1109/jiot.2023.3288131"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2023.3288131","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3288131","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100599856","display_name":"Nan Gao","orcid":"https://orcid.org/0000-0001-5129-5118"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Nan Gao","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","Henan Key Laboratory of Network Cryptography Technology, Zheng Zhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology, Zheng Zhou, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062686570","display_name":"Kai Fan","orcid":"https://orcid.org/0000-0001-6870-6657"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Fan","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","Henan Key Laboratory of Network Cryptography Technology, Zheng Zhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology, Zheng Zhou, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100741702","display_name":"Haoyang Wang","orcid":"https://orcid.org/0000-0002-6663-0692"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoyang Wang","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","Henan Key Laboratory of Network Cryptography Technology, Zheng Zhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology, Zheng Zhou, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100376683","display_name":"Hongyan Chen","orcid":"https://orcid.org/0000-0003-4454-3130"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongyan Chen","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","Henan Key Laboratory of Network Cryptography Technology, Zheng Zhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology, Zheng Zhou, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100736887","display_name":"Kuan Zhang","orcid":"https://orcid.org/0000-0002-4262-153X"},"institutions":[{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kuan Zhang","raw_affiliation_strings":["department of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE, USA"],"affiliations":[{"raw_affiliation_string":"department of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE, USA","institution_ids":["https://openalex.org/I114395901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024453724","display_name":"Hui Li","orcid":"https://orcid.org/0000-0001-8310-7169"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Li","raw_affiliation_strings":["State Key Laboratory of Integrated Service Networks, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100402361","display_name":"Yintang Yang","orcid":"https://orcid.org/0000-0001-9745-5404"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yintang Yang","raw_affiliation_strings":["Key Laboratory of the Ministry of Education for Wide Band-Gap Semiconductor Materials and Devices, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of the Ministry of Education for Wide Band-Gap Semiconductor Materials and Devices, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100599856"],"corresponding_institution_ids":["https://openalex.org/I149594827","https://openalex.org/I4210132990"],"apc_list":null,"apc_paid":null,"fwci":0.5219,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.7073206,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"11","issue":"1","first_page":"889","last_page":"903"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9879999756813049,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8688020706176758},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.8046956658363342},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6715673208236694},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.5334302186965942},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5217010378837585},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.477897047996521},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.44652652740478516},{"id":"https://openalex.org/keywords/relevance","display_name":"Relevance (law)","score":0.42969298362731934},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.42583560943603516},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3904361128807068},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.2389979362487793},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2119816541671753}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8688020706176758},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.8046956658363342},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6715673208236694},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.5334302186965942},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5217010378837585},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.477897047996521},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.44652652740478516},{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.42969298362731934},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.42583560943603516},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3904361128807068},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.2389979362487793},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2119816541671753},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2023.3288131","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3288131","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5}],"awards":[{"id":"https://openalex.org/G3086519815","display_name":null,"funder_award_id":"2021ZDLGY06-02","funder_id":"https://openalex.org/F4320336350","funder_display_name":"Key Research and Development Projects of Shaanxi Province"},{"id":"https://openalex.org/G3416543350","display_name":null,"funder_award_id":"92067103","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4427240869","display_name":null,"funder_award_id":"2019ZDLGY1202","funder_id":"https://openalex.org/F4320324173","funder_display_name":"Natural Science Foundation of Shaanxi Province"},{"id":"https://openalex.org/G5329705925","display_name":null,"funder_award_id":"62002276","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6746605564","display_name":null,"funder_award_id":"YJS2212","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324173","display_name":"Natural Science Foundation of Shaanxi Province","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null},{"id":"https://openalex.org/F4320336350","display_name":"Key Research and Development Projects of Shaanxi Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":56,"referenced_works":["https://openalex.org/W1984213107","https://openalex.org/W2087696423","https://openalex.org/W2112006025","https://openalex.org/W2126564982","https://openalex.org/W2147929033","https://openalex.org/W2152924492","https://openalex.org/W2161214567","https://openalex.org/W2487238101","https://openalex.org/W2559094099","https://openalex.org/W2597372044","https://openalex.org/W2597901792","https://openalex.org/W2740838595","https://openalex.org/W2767329275","https://openalex.org/W2774471028","https://openalex.org/W2805625402","https://openalex.org/W2898321742","https://openalex.org/W2898810860","https://openalex.org/W2899090608","https://openalex.org/W2904905394","https://openalex.org/W2908345802","https://openalex.org/W2910369831","https://openalex.org/W2947318417","https://openalex.org/W2957369234","https://openalex.org/W2963504955","https://openalex.org/W2964424756","https://openalex.org/W2995799768","https://openalex.org/W2997854921","https://openalex.org/W2999783367","https://openalex.org/W3035569271","https://openalex.org/W3044462010","https://openalex.org/W3088675074","https://openalex.org/W3094198982","https://openalex.org/W3094474718","https://openalex.org/W3109465342","https://openalex.org/W3117606830","https://openalex.org/W3120713318","https://openalex.org/W3135972262","https://openalex.org/W3136291199","https://openalex.org/W3153508529","https://openalex.org/W3174410876","https://openalex.org/W3181325133","https://openalex.org/W3198962021","https://openalex.org/W3204053154","https://openalex.org/W3208596899","https://openalex.org/W4205188036","https://openalex.org/W4205558896","https://openalex.org/W4226020289","https://openalex.org/W4226300264","https://openalex.org/W4285254507","https://openalex.org/W4285815110","https://openalex.org/W4286432784","https://openalex.org/W4295935086","https://openalex.org/W4310479282","https://openalex.org/W4319320050","https://openalex.org/W4360766377","https://openalex.org/W4367310663"],"related_works":["https://openalex.org/W3029058925","https://openalex.org/W2096211577","https://openalex.org/W2015940479","https://openalex.org/W2518737721","https://openalex.org/W2363701519","https://openalex.org/W2991416436","https://openalex.org/W1589129854","https://openalex.org/W1939781145","https://openalex.org/W2383331906","https://openalex.org/W2355126378"],"abstract_inverted_index":{"Ciphertext":[0],"retrieval":[1,29,131],"for":[2],"cloud-based":[3],"Internet":[4],"of":[5,15,27,67,77,112,137],"Things":[6],"has":[7],"been":[8],"widely":[9],"explored":[10],"with":[11,114],"the":[12,23,28,65,68,71,75,78,109,119,135,138,149],"increasing":[13],"popularity":[14],"cloud":[16],"computing.":[17],"However,":[18],"in":[19],"most":[20],"existing":[21],"solutions,":[22],"security":[24,66,145],"and":[25,46,54,70,142,151,158],"efficiency":[26,76],"process":[30],"are":[31,121],"difficult":[32],"to":[33,51,57,91,107,124,133],"achieve":[34],"simultaneously.":[35],"To":[36],"this":[37],"end,":[38],"we":[39,47,84,102,127],"develop":[40,85],"a":[41,129],"novel":[42],"secure":[43],"matrix":[44,59],"index,":[45],"utilize":[48],"identity-based":[49,87],"encryption":[50,56],"encrypt":[52,58],"keywords":[53,141],"homomorphic":[55],"values.":[60],"The":[61,144,162],"former":[62],"can":[63,73,97,153],"guarantee":[64],"keyword,":[69],"latter":[72],"realize":[74],"operation":[79],"while":[80],"ensuring":[81,117],"safety.":[82],"Then,":[83],"an":[86],"bidirectional":[88],"authentication":[89],"algorithm":[90],"ensure":[92],"that":[93,118,148,166],"only":[94],"authenticated":[95],"users":[96],"retrieve":[98],"ciphertext.":[99],"In":[100],"addition,":[101],"use":[103],"different":[104,115],"scoring":[105],"formulas":[106],"calculate":[108],"relevance":[110],"scores":[111],"documents":[113,120],"lengths,":[116],"appropriately":[122],"returned":[123],"users.":[125],"Finally,":[126],"design":[128],"new":[130],"structure":[132],"protect":[134],"privacy":[136],"correspondence":[139],"between":[140],"ciphertexts.":[143],"proof":[146],"shows":[147,165],"index":[150],"trapdoor":[152],"resist":[154],"chosen":[155],"keyword":[156,159],"attack":[157],"Guessing":[160],"attack.":[161],"extensive":[163],"simulation":[164],"our":[167],"scheme":[168],"is":[169],"efficient.":[170]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
