{"id":"https://openalex.org/W3206968728","doi":"https://doi.org/10.1109/tcc.2021.3120110","title":"Searchable Encryption With Autonomous Path Delegation Function and Its Application in Healthcare Cloud","display_name":"Searchable Encryption With Autonomous Path Delegation Function and Its Application in Healthcare Cloud","publication_year":2021,"publication_date":"2021-10-15","ids":{"openalex":"https://openalex.org/W3206968728","doi":"https://doi.org/10.1109/tcc.2021.3120110","mag":"3206968728"},"language":"en","primary_location":{"id":"doi:10.1109/tcc.2021.3120110","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2021.3120110","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100391159","display_name":"Qian Wang","orcid":"https://orcid.org/0000-0003-3071-2335"},"institutions":[{"id":"https://openalex.org/I20616075","display_name":"Qinghai Normal University","ror":"https://ror.org/03az1t892","country_code":"CN","type":"education","lineage":["https://openalex.org/I20616075"]},{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qian Wang","raw_affiliation_strings":["College of Computer, Qinghai Normal University, Xining, China","School of Computer Science and Technology and Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing, Xi'an University of Posts and Telecommunications, Xi'an, China"],"raw_orcid":"https://orcid.org/0000-0003-3071-2335","affiliations":[{"raw_affiliation_string":"College of Computer, Qinghai Normal University, Xining, China","institution_ids":["https://openalex.org/I20616075"]},{"raw_affiliation_string":"School of Computer Science and Technology and Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing, Xi'an University of Posts and Telecommunications, Xi'an, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085049261","display_name":"Chengzhe Lai","orcid":"https://orcid.org/0000-0002-4603-3380"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengzhe Lai","raw_affiliation_strings":["School of Cyberspace Security, Xi&#x0027;an University of Posts and Telecommunications, Xi&#x0027;an, China"],"raw_orcid":"https://orcid.org/0000-0002-4603-3380","affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Xi&#x0027;an University of Posts and Telecommunications, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070447777","display_name":"Rongxing Lu","orcid":"https://orcid.org/0000-0001-5720-0941"},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Rongxing Lu","raw_affiliation_strings":["Faculty of Computer Science, University of New Brunswick, Fredericton, Canada"],"raw_orcid":"https://orcid.org/0000-0001-5720-0941","affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, University of New Brunswick, Fredericton, Canada","institution_ids":["https://openalex.org/I106938459"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081385202","display_name":"Dong Zheng","orcid":"https://orcid.org/0000-0002-8343-3914"},"institutions":[{"id":"https://openalex.org/I20616075","display_name":"Qinghai Normal University","ror":"https://ror.org/03az1t892","country_code":"CN","type":"education","lineage":["https://openalex.org/I20616075"]},{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dong Zheng","raw_affiliation_strings":["College of Computer, Qinghai Normal University, Xining, China","School of Cyberspace Security, Xi'an University of Posts and Telecommunications, Xi'an, China"],"raw_orcid":"https://orcid.org/0000-0002-8343-3914","affiliations":[{"raw_affiliation_string":"College of Computer, Qinghai Normal University, Xining, China","institution_ids":["https://openalex.org/I20616075"]},{"raw_affiliation_string":"School of Cyberspace Security, Xi'an University of Posts and Telecommunications, Xi'an, China","institution_ids":["https://openalex.org/I4210136859"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100391159"],"corresponding_institution_ids":["https://openalex.org/I20616075","https://openalex.org/I4210136859"],"apc_list":null,"apc_paid":null,"fwci":1.6797,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.87180043,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"11","issue":"1","first_page":"879","last_page":"896"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9843999743461609,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9642999768257141,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7031517028808594},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6642510890960693},{"id":"https://openalex.org/keywords/delegate","display_name":"Delegate","score":0.6403831243515015},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6085568070411682},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5868010520935059},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5834279656410217},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.5302813649177551},{"id":"https://openalex.org/keywords/delegation","display_name":"Delegation","score":0.5041190385818481},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.47746920585632324},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.4611978232860565},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.43991369009017944},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4243614375591278},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.41425031423568726},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.40979480743408203},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3288309872150421},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.15322941541671753},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.12458661198616028}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7031517028808594},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6642510890960693},{"id":"https://openalex.org/C143273055","wikidata":"https://www.wikidata.org/wiki/Q2382794","display_name":"Delegate","level":2,"score":0.6403831243515015},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6085568070411682},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5868010520935059},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5834279656410217},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.5302813649177551},{"id":"https://openalex.org/C86532276","wikidata":"https://www.wikidata.org/wiki/Q1184065","display_name":"Delegation","level":2,"score":0.5041190385818481},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.47746920585632324},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.4611978232860565},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.43991369009017944},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4243614375591278},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.41425031423568726},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.40979480743408203},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3288309872150421},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.15322941541671753},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.12458661198616028},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcc.2021.3120110","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2021.3120110","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.4300000071525574,"display_name":"Partnerships for the goals"}],"awards":[{"id":"https://openalex.org/G4731325319","display_name":null,"funder_award_id":"62072371","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1493744513","https://openalex.org/W1512194687","https://openalex.org/W1580750219","https://openalex.org/W1590823599","https://openalex.org/W1622109882","https://openalex.org/W1656279256","https://openalex.org/W1851414966","https://openalex.org/W1992259749","https://openalex.org/W2014022156","https://openalex.org/W2028161339","https://openalex.org/W2043533815","https://openalex.org/W2161214567","https://openalex.org/W2280409606","https://openalex.org/W2406619327","https://openalex.org/W2508855287","https://openalex.org/W2531479711","https://openalex.org/W2540145162","https://openalex.org/W2623041174","https://openalex.org/W2779765840","https://openalex.org/W2796172907","https://openalex.org/W2802490441","https://openalex.org/W2907870311","https://openalex.org/W2931481992","https://openalex.org/W2965759621","https://openalex.org/W2991120477","https://openalex.org/W3008439638","https://openalex.org/W3084879446","https://openalex.org/W3140526655"],"related_works":["https://openalex.org/W2997530193","https://openalex.org/W4310649982","https://openalex.org/W2942137924","https://openalex.org/W4236344152","https://openalex.org/W4395066784","https://openalex.org/W2011667854","https://openalex.org/W2802117553","https://openalex.org/W1589129854","https://openalex.org/W2939324531","https://openalex.org/W4294104609"],"abstract_inverted_index":{"Outsourcing":[0],"medical":[1,12,80,117,141],"data":[2,13],"to":[3,37,72,93,123],"healthcare":[4,197],"cloud":[5,198],"has":[6,175],"become":[7],"a":[8,45],"popular":[9],"trend.":[10],"Since":[11],"of":[14,143,172,191],"patients":[15,70,92],"contain":[16],"sensitive":[17],"personal":[18],"information,":[19],"they":[20],"should":[21],"be":[22,34,65],"encrypted":[23,38],"before":[24],"outsourcing.":[25],"However,":[26],"information":[27,81,118,142],"retrieval":[28],"methods":[29],"based":[30],"on":[31],"plaintext":[32],"cannot":[33,137],"directly":[35],"applied":[36,66],"data.":[39],"In":[40],"this":[41],"article,":[42],"we":[43],"present":[44],"new":[46],"cryptographic":[47],"primitive":[48],"named":[49],"conjunctive":[50,150],"keyword":[51,151,161,167],"search":[52,73,110],"with":[53,99,119],"secure":[54,153,158],"channel":[55,154],"free":[56],"and":[57,75,102,112,134,156,166],"autonomous":[58,76],"path":[59,98,108],"delegation":[60,97],"function":[61],"(AP-SCF-PECKS),":[62],"which":[63],"can":[64,109,126],"in":[67,106,179],"scenarios":[68],"where":[69],"want":[71],"for":[74,111,196],"delegate":[77],"their":[78,84,100],"private":[79,85,116,140],"without":[82],"revealing":[83],"key.":[86],"Particularly,":[87],"the":[88,103,107,114,139,146,149,180,184,189],"proposed":[89,173,192],"solution":[90],"allows":[91],"set":[94],"up":[95],"multi-hop":[96],"preferences,":[101],"delegated":[104],"doctors":[105,130],"access":[113],"patient\u2019s":[115],"priority":[120],"from":[121],"high":[122],"low.":[124],"Patients":[125],"ensure":[127],"that":[128,188],"authorized":[129],"are":[131,194],"always":[132],"trustworthy,":[133],"unauthorized":[135],"users":[136],"obtain":[138],"patients.":[144],"Moreover,":[145],"scheme":[147,174,193],"supports":[148],"search,":[152],"free,":[155],"is":[157],"against":[159],"chosen":[160,163],"attack,":[162,165],"ciphertext":[164],"guessing":[168],"attack.":[169],"The":[170],"security":[171],"been":[176],"formally":[177],"proved":[178],"standard":[181],"model.":[182],"Finally,":[183],"performance":[185],"evaluations":[186],"demonstrate":[187],"overhead":[190],"modest":[195],"scenarios.":[199]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":4}],"updated_date":"2026-04-28T14:05:53.105641","created_date":"2025-10-10T00:00:00"}
