{"id":"https://openalex.org/W4321607989","doi":"https://doi.org/10.1109/tcc.2023.3248308","title":"An Efficient Identity-Based Encryption With Equality Test in Cloud Computing","display_name":"An Efficient Identity-Based Encryption With Equality Test in Cloud Computing","publication_year":2023,"publication_date":"2023-02-23","ids":{"openalex":"https://openalex.org/W4321607989","doi":"https://doi.org/10.1109/tcc.2023.3248308"},"language":"en","primary_location":{"id":"doi:10.1109/tcc.2023.3248308","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2023.3248308","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047431218","display_name":"Zhichao Yang","orcid":"https://orcid.org/0000-0002-0366-7201"},"institutions":[{"id":"https://openalex.org/I2800710378","display_name":"Naval University of Engineering","ror":"https://ror.org/056vyez31","country_code":"CN","type":"education","lineage":["https://openalex.org/I2800710378"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhichao Yang","raw_affiliation_strings":["Department of Information Security, Naval University of Engineering, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, Naval University of Engineering, Wuhan, China","institution_ids":["https://openalex.org/I2800710378"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]},{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["Shandong Provincial Key Laboratory of Computer Networks, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Shandong Provincial Key Laboratory of Computer Networks, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I4210142748","https://openalex.org/I152269853"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071414491","display_name":"Longjiang Qu","orcid":"https://orcid.org/0000-0003-3506-5501"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Longjiang Qu","raw_affiliation_strings":["College of Liberal Arts and Sciences, National University of Defence Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Liberal Arts and Sciences, National University of Defence Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100347583","display_name":"Qing Ye","orcid":"https://orcid.org/0009-0005-7100-5903"},"institutions":[{"id":"https://openalex.org/I2800710378","display_name":"Naval University of Engineering","ror":"https://ror.org/056vyez31","country_code":"CN","type":"education","lineage":["https://openalex.org/I2800710378"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qing Ye","raw_affiliation_strings":["Department of Information Security, Naval University of Engineering, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Department of Information Security, Naval University of Engineering, Wuhan, China","institution_ids":["https://openalex.org/I2800710378"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5047431218"],"corresponding_institution_ids":["https://openalex.org/I2800710378"],"apc_list":null,"apc_paid":null,"fwci":2.6651,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.91618512,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"11","issue":"3","first_page":"2983","last_page":"2992"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7430528998374939},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7394058704376221},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7191449999809265},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.607320249080658},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5994132161140442},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5394045114517212},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4751838743686676},{"id":"https://openalex.org/keywords/quantum-computer","display_name":"Quantum computer","score":0.47127363085746765},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.46927395462989807},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.43147939443588257},{"id":"https://openalex.org/keywords/learning-with-errors","display_name":"Learning with errors","score":0.4203091263771057},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.303397536277771},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2629939317703247},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.2260516881942749},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09444800019264221}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7430528998374939},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7394058704376221},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7191449999809265},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.607320249080658},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5994132161140442},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5394045114517212},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4751838743686676},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.47127363085746765},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.46927395462989807},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.43147939443588257},{"id":"https://openalex.org/C2779014939","wikidata":"https://www.wikidata.org/wiki/Q6510239","display_name":"Learning with errors","level":3,"score":0.4203091263771057},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.303397536277771},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2629939317703247},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.2260516881942749},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09444800019264221},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcc.2023.3248308","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2023.3248308","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4190834028","display_name":null,"funder_award_id":"62172307","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5377421199","display_name":null,"funder_award_id":"62276273","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6816960198","display_name":null,"funder_award_id":"62032009","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6998966417","display_name":null,"funder_award_id":"62202490","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7469201033","display_name":null,"funder_award_id":"2042022kf0045","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W130395163","https://openalex.org/W157865340","https://openalex.org/W1442181477","https://openalex.org/W1508077776","https://openalex.org/W1530039015","https://openalex.org/W1581001589","https://openalex.org/W1839785783","https://openalex.org/W2007466965","https://openalex.org/W2031533839","https://openalex.org/W2061949491","https://openalex.org/W2089477764","https://openalex.org/W2089607820","https://openalex.org/W2101444129","https://openalex.org/W2106970188","https://openalex.org/W2117376962","https://openalex.org/W2122973102","https://openalex.org/W2130410178","https://openalex.org/W2146813141","https://openalex.org/W2161214567","https://openalex.org/W2168676717","https://openalex.org/W2619866197","https://openalex.org/W2888533739","https://openalex.org/W2975247317","https://openalex.org/W2995061854","https://openalex.org/W3022821785","https://openalex.org/W3116453702","https://openalex.org/W3201550941","https://openalex.org/W4285167083","https://openalex.org/W6688218289"],"related_works":["https://openalex.org/W2997530193","https://openalex.org/W4310649982","https://openalex.org/W2942137924","https://openalex.org/W4236344152","https://openalex.org/W4395066784","https://openalex.org/W2011667854","https://openalex.org/W2802117553","https://openalex.org/W1589129854","https://openalex.org/W2939324531","https://openalex.org/W2153886246"],"abstract_inverted_index":{"Identity-based":[0],"encryption":[1,172],"with":[2,110,163],"equality":[3],"test":[4,188],"(IBEET)":[5],"provides":[6],"a":[7],"feasible":[8],"way":[9],"for":[10,202],"cloud":[11,54,206],"server":[12,25],"partitioning":[13],"or":[14,36],"searching":[15],"on":[16],"ciphertexts":[17,31],"in":[18,136,176,187,204],"the":[19,24,33,67,87,102,111,118,143,146,177,184,191,194],"cloud.":[20],"In":[21,38,72],"that":[22,155],"case,":[23],"can":[26,64],"judge":[27],"if":[28],"two":[29],"different":[30],"encrypt":[32],"same":[34],"plaintexts":[35],"not.":[37],"response":[39],"to":[40,52],"threats":[41],"posed":[42],"by":[43,85,153,181],"quantum":[44,137],"computers,":[45],"lattice-based":[46,165],"IBEET":[47,78,166,197],"schemes":[48,60],"have":[49],"been":[50],"proposed":[51,196],"make":[53],"service":[55],"post-quantum":[56,77,205],"secure.":[57],"However,":[58],"those":[59],"are":[61],"inefficient":[62],"and":[63,100,127,149,173],"hardly":[65],"meet":[66],"needs":[68],"of":[69,90,96,104,145,171],"resource-constrained":[70],"devices.":[71],"this":[73],"article,":[74],"an":[75],"efficient":[76],"scheme":[79,120,179],"is":[80,121,198],"introduced,":[81],"which":[82],"achieves":[83],"testability":[84],"embedding":[86],"hash":[88],"value":[89],"plaintext":[91],"into":[92],"testing":[93],"trapdoor":[94],"instead":[95],"encrypting":[97],"it":[98,156],"directly":[99],"doubling":[101],"size":[103],"ciphertext.":[105],"We":[106],"also":[107],"prove":[108],"that,":[109],"Learning":[112],"With":[113],"Errors":[114],"(LWE)":[115],"problem":[116],"assumption,":[117],"new":[119,147,178,195],"one-way":[122],"secure":[123,138],"against":[124],"selective":[125],"identity":[126],"chosen":[128],"ciphertext":[129],"attacks":[130],"(":[131],"<italic":[132],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[133],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">OW-sID-CCA</i>":[134],")":[135],"model.":[139],"Furthermore,":[140],"we":[141],"evaluate":[142],"performance":[144],"construction":[148],"demonstrate":[150],"its":[151],"efficiency":[152],"showing":[154],"only":[157],"costs":[158],"about":[159],"half":[160],"storage":[161],"comparing":[162],"other":[164],"schemes.":[167],"The":[168],"execution":[169],"time":[170],"decryption":[174],"phrases":[175],"reduce":[180],"50%,":[182],"while":[183],"computational":[185],"cost":[186],"algorithm":[189],"keeps":[190],"same.":[192],"Therefore,":[193],"much":[199],"more":[200],"practical":[201],"working":[203],"computing":[207],"scenarios.":[208]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":4}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
