{"id":"https://openalex.org/W2980098516","doi":"https://doi.org/10.1109/tcc.2019.2945714","title":"Dual-Server Public-Key Authenticated Encryption with Keyword Search","display_name":"Dual-Server Public-Key Authenticated Encryption with Keyword Search","publication_year":2019,"publication_date":"2019-10-07","ids":{"openalex":"https://openalex.org/W2980098516","doi":"https://doi.org/10.1109/tcc.2019.2945714","mag":"2980098516"},"language":"en","primary_location":{"id":"doi:10.1109/tcc.2019.2945714","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2019.2945714","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023902836","display_name":"Biwen Chen","orcid":"https://orcid.org/0000-0002-7314-8271"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Biwen Chen","raw_affiliation_strings":["Computer School, Wuhan University, Wuhan, Hubei, China","Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Computer School, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102735309","display_name":"Libing Wu","orcid":"https://orcid.org/0000-0002-6863-3280"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Libing Wu","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002810652","display_name":"Sherali Zeadally","orcid":"https://orcid.org/0000-0002-5982-8190"},"institutions":[{"id":"https://openalex.org/I143302722","display_name":"University of Kentucky","ror":"https://ror.org/02k3smh20","country_code":"US","type":"education","lineage":["https://openalex.org/I143302722"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sherali Zeadally","raw_affiliation_strings":["College of Communication and Information, University of Kentucky, Lexington, KY, USA"],"affiliations":[{"raw_affiliation_string":"College of Communication and Information, University of Kentucky, Lexington, KY, USA","institution_ids":["https://openalex.org/I143302722"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China","Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, Guangzhou, China","institution_ids":["https://openalex.org/I4210126530"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5023902836"],"corresponding_institution_ids":["https://openalex.org/I37461747","https://openalex.org/I4210136793"],"apc_list":null,"apc_paid":null,"fwci":2.1657,"has_fulltext":false,"cited_by_count":40,"citation_normalized_percentile":{"value":0.90788211,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"10","issue":"1","first_page":"322","last_page":"333"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7775132656097412},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6525415778160095},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5756900310516357},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5526911020278931},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5487861633300781},{"id":"https://openalex.org/keywords/keyword-search","display_name":"Keyword search","score":0.5170838832855225},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.45575302839279175},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4435950219631195},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3562473952770233},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.16874012351036072},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07648926973342896}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7775132656097412},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6525415778160095},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5756900310516357},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5526911020278931},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5487861633300781},{"id":"https://openalex.org/C2988412617","wikidata":"https://www.wikidata.org/wiki/Q7441656","display_name":"Keyword search","level":2,"score":0.5170838832855225},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.45575302839279175},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4435950219631195},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3562473952770233},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.16874012351036072},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07648926973342896}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcc.2019.2945714","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2019.2945714","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G3371617097","display_name":null,"funder_award_id":"2017CFA007","funder_id":"https://openalex.org/F4320322186","funder_display_name":"Natural Science Foundation of Hubei Province"},{"id":"https://openalex.org/G3423709866","display_name":null,"funder_award_id":"61932016","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4201753823","display_name":null,"funder_award_id":"61772377","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4399944000","display_name":null,"funder_award_id":"JCYJ20170818112550194","funder_id":"https://openalex.org/F4320335966","funder_display_name":"Science and Technology Planning Project of Shenzhen Municipality"},{"id":"https://openalex.org/G6286192115","display_name":null,"funder_award_id":"61972294","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7599279027","display_name":null,"funder_award_id":"2018YFC1315404","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322186","display_name":"Natural Science Foundation of Hubei Province","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335966","display_name":"Science and Technology Planning Project of Shenzhen Municipality","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W198181672","https://openalex.org/W1493744513","https://openalex.org/W1573743738","https://openalex.org/W1591213347","https://openalex.org/W1656279256","https://openalex.org/W1847491301","https://openalex.org/W1851414966","https://openalex.org/W1984213107","https://openalex.org/W2014022156","https://openalex.org/W2048334094","https://openalex.org/W2056949817","https://openalex.org/W2080574324","https://openalex.org/W2087223825","https://openalex.org/W2092258731","https://openalex.org/W2126564982","https://openalex.org/W2144342348","https://openalex.org/W2147929033","https://openalex.org/W2161214567","https://openalex.org/W2268989031","https://openalex.org/W2280409606","https://openalex.org/W2321165057","https://openalex.org/W2511212777","https://openalex.org/W2514873781","https://openalex.org/W2514981978","https://openalex.org/W2524195644","https://openalex.org/W2561614683","https://openalex.org/W2597901792","https://openalex.org/W2613814461","https://openalex.org/W2734150319","https://openalex.org/W2748510848","https://openalex.org/W2767329275","https://openalex.org/W2779765840","https://openalex.org/W2884658035","https://openalex.org/W2905175110","https://openalex.org/W2963504955"],"related_works":["https://openalex.org/W4244478748","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W1997222214","https://openalex.org/W2560439919","https://openalex.org/W4389340727","https://openalex.org/W3150465815","https://openalex.org/W2802581102","https://openalex.org/W1503401473"],"abstract_inverted_index":{"In":[0],"cloud":[1],"storage,":[2],"how":[3],"to":[4,58,73],"search":[5,42],"sensitive":[6],"data":[7,27],"efficiently":[8],"and":[9,29,92,94,135,164],"securely":[10],"is":[11,44,71,161],"a":[12,20,84,143,154],"challenging":[13],"problem.":[14],"The":[15],"searchable":[16,36],"encryption":[17,39],"technique":[18],"provides":[19,165],"secure":[21],"storage":[22],"method":[23],"without":[24,147],"loss":[25],"of":[26,35,51,78,114,145],"confidentiality":[28],"usability.":[30],"As":[31],"an":[32,75],"important":[33],"branch":[34],"encryption,":[37],"public-key":[38],"with":[40,119],"keyword":[41,61,68],"(PEKS)":[43],"widely":[45],"studied":[46],"by":[47,127],"scholars.":[48],"However,":[49],"most":[50,95],"the":[52,59,66,107,112,137],"traditional":[53],"PEKS":[54,81,97],"schemes":[55,98],"are":[56],"vulnerable":[57],"inside":[60,67],"guessing":[62,69],"attack":[63,70],"(IKGA).":[64],"Resisting":[65],"likely":[72],"become":[74],"essential":[76],"property":[77],"all":[79],"new":[80],"schemes.":[82],"For":[83],"long":[85],"time,":[86],"mitigating":[87],"IKGA":[88,126],"has":[89],"been":[90],"inefficient":[91],"difficult,":[93],"existing":[96],"fail":[99],"in":[100,173],"achieving":[101],"their":[102],"security":[103],"goals.":[104],"To":[105],"address":[106],"above":[108],"problems,":[109],"we":[110,141],"define":[111],"notion":[113],"<b>D</b>ual-server":[115],"<b>P</b>ublic-key":[116],"<b>A</b>uthenticated":[117],"<b>E</b>ncryption":[118],"<b>K</b>eyword":[120],"<b>S</b>earch":[121],"(DPAEKS),":[122],"which":[123],"protects":[124],"against":[125],"leveraging":[128],"two":[129],"servers":[130],"that":[131,158],"do":[132],"not":[133],"cooperate,":[134],"supports":[136],"authentication":[138],"property.":[139],"Then,":[140],"provide":[142],"construction":[144],"DPAEKS":[146],"bilinear":[148],"pairings.":[149],"Experimental":[150],"results":[151],"obtained":[152],"using":[153],"real-world":[155],"dataset":[156],"show":[157],"our":[159],"scheme":[160],"highly":[162],"efficient":[163],"strong":[166],"security,":[167],"making":[168],"it":[169],"suitable":[170],"for":[171],"deployment":[172],"practical":[174],"applications.":[175]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":8}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
