{"id":"https://openalex.org/W4399039620","doi":"https://doi.org/10.1109/tce.2024.3405496","title":"Equality Test Public Key Encryption With Cryptographic Reverse Firewalls for Cloud-Based E-Commerce","display_name":"Equality Test Public Key Encryption With Cryptographic Reverse Firewalls for Cloud-Based E-Commerce","publication_year":2024,"publication_date":"2024-05-27","ids":{"openalex":"https://openalex.org/W4399039620","doi":"https://doi.org/10.1109/tce.2024.3405496"},"language":"en","primary_location":{"id":"doi:10.1109/tce.2024.3405496","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2024.3405496","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://e-space.mmu.ac.uk/635862/1/Equality_Test_Public_Key_Encryption_With_Cryptographic_Reverse_Firewalls_for_Cloud-Based_E-Commerce.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087449505","display_name":"Rashad Elhabob","orcid":"https://orcid.org/0000-0002-1185-3194"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I64838667","display_name":"Karary University","ror":"https://ror.org/03ws81249","country_code":"SD","type":"education","lineage":["https://openalex.org/I64838667"]}],"countries":["CN","SD"],"is_corresponding":true,"raw_author_name":"Rashad Elhabob","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","Faculty of Computer Science and Information Technology, Karary University, Khartoum, Sudan","School of Information and Software Engineering, Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Faculty of Computer Science and Information Technology, Karary University, Khartoum, Sudan","institution_ids":["https://openalex.org/I64838667"]},{"raw_affiliation_string":"School of Information and Software Engineering, Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066470568","display_name":"Nabeil Eltayieb","orcid":"https://orcid.org/0000-0003-0189-4352"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I64838667","display_name":"Karary University","ror":"https://ror.org/03ws81249","country_code":"SD","type":"education","lineage":["https://openalex.org/I64838667"]}],"countries":["CN","SD"],"is_corresponding":false,"raw_author_name":"Nabeil Eltayieb","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","Faculty of Computer Science and Information Technology, Karary University, Khartoum, Sudan","School of Information and Software Engineering, Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Faculty of Computer Science and Information Technology, Karary University, Khartoum, Sudan","institution_ids":["https://openalex.org/I64838667"]},{"raw_affiliation_string":"School of Information and Software Engineering, Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100643589","display_name":"Hu Xiong","orcid":"https://orcid.org/0000-0001-6137-6667"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hu Xiong","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","School of Information and Software Engineering, Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Information and Software Engineering, Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078275221","display_name":"Fazlullah Khan","orcid":"https://orcid.org/0000-0003-4227-6067"},"institutions":[{"id":"https://openalex.org/I13591777","display_name":"University of Nottingham Ningbo China","ror":"https://ror.org/03y4dt428","country_code":"CN","type":"education","lineage":["https://openalex.org/I13591777","https://openalex.org/I142263535"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fazlullah Khan","raw_affiliation_strings":["School of Computer Science, Faculty of Science and Engineering, University of Nottingham Ningbo China, Ningbo, China","Faculty of Science and Engineering, School of Computer Science, University of Nottingham Ningbo China, Ningbo, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Faculty of Science and Engineering, University of Nottingham Ningbo China, Ningbo, China","institution_ids":["https://openalex.org/I13591777"]},{"raw_affiliation_string":"Faculty of Science and Engineering, School of Computer Science, University of Nottingham Ningbo China, Ningbo, Zhejiang, China","institution_ids":["https://openalex.org/I13591777"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088617561","display_name":"Ali Kashif Bashir","orcid":"https://orcid.org/0000-0003-2601-9327"},"institutions":[{"id":"https://openalex.org/I11983389","display_name":"Manchester Metropolitan University","ror":"https://ror.org/02hstj355","country_code":"GB","type":"education","lineage":["https://openalex.org/I11983389"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ali Kashif Bashir","raw_affiliation_strings":["Department of Computing and Mathematics, Manchester Metropolitan University, Manchester, U.K","Department of Computing and Mathematics, Manchester Metropolitan University, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computing and Mathematics, Manchester Metropolitan University, Manchester, U.K","institution_ids":["https://openalex.org/I11983389"]},{"raw_affiliation_string":"Department of Computing and Mathematics, Manchester Metropolitan University, United Kingdom","institution_ids":["https://openalex.org/I11983389"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056889098","display_name":"Saru Kumari","orcid":"https://orcid.org/0000-0003-4929-5383"},"institutions":[{"id":"https://openalex.org/I303593345","display_name":"Chaudhary Charan Singh University","ror":"https://ror.org/01hzdv945","country_code":"IN","type":"education","lineage":["https://openalex.org/I303593345"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Saru Kumari","raw_affiliation_strings":["Department of Mathematics, Chaudhary Charan, Singh University, Meerut, India"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Chaudhary Charan, Singh University, Meerut, India","institution_ids":["https://openalex.org/I303593345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044841063","display_name":"Ryan Alturki","orcid":"https://orcid.org/0000-0002-0967-1885"},"institutions":[{"id":"https://openalex.org/I199693650","display_name":"Umm al-Qura University","ror":"https://ror.org/01xjqrm90","country_code":"SA","type":"education","lineage":["https://openalex.org/I199693650"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ryan Alturki","raw_affiliation_strings":["Department of Software Engineering, College of Computing, Umm Al-Qura University, Makkah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, College of Computing, Umm Al-Qura University, Makkah, Saudi Arabia","institution_ids":["https://openalex.org/I199693650"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090500943","display_name":"Sachin Kumar","orcid":"https://orcid.org/0000-0002-5324-2156"},"institutions":[{"id":"https://openalex.org/I155125381","display_name":"Galgotias University","ror":"https://ror.org/02w8ba206","country_code":"IN","type":"education","lineage":["https://openalex.org/I155125381"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sachin Kumar","raw_affiliation_strings":["Department of Computer Science and Engineering, Galgotias College of Engineering and Technology, Greater Noida, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Galgotias College of Engineering and Technology, Greater Noida, India","institution_ids":["https://openalex.org/I155125381"]}]}],"institutions":[],"countries_distinct_count":5,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5087449505"],"corresponding_institution_ids":["https://openalex.org/I150229711","https://openalex.org/I64838667"],"apc_list":null,"apc_paid":null,"fwci":4.1302,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.94529262,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"70","issue":"4","first_page":"6763","last_page":"6775"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9682999849319458,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9682999849319458,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6464512348175049},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6455051898956299},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6072385907173157},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5829460024833679},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.571112871170044},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.558181643486023},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4722924828529358},{"id":"https://openalex.org/keywords/reverse-engineering","display_name":"Reverse engineering","score":0.44948112964630127},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.40544137358665466},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.27472686767578125}],"concepts":[{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6464512348175049},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6455051898956299},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6072385907173157},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5829460024833679},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.571112871170044},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.558181643486023},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4722924828529358},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.44948112964630127},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40544137358665466},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.27472686767578125}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tce.2024.3405496","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2024.3405496","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},{"id":"pmh:oai:e-space.mmu.ac.uk:635862","is_oa":true,"landing_page_url":"https://e-space.mmu.ac.uk/view/authors/aa810054662093994e6fff167e9d7a16.html>","pdf_url":"https://e-space.mmu.ac.uk/635862/1/Equality_Test_Public_Key_Encryption_With_Cryptographic_Reverse_Firewalls_for_Cloud-Based_E-Commerce.pdf","source":{"id":"https://openalex.org/S4306401617","display_name":"e-space (Manchester Metropolitan University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I11983389","host_organization_name":"Manchester Metropolitan University","host_organization_lineage":["https://openalex.org/I11983389"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":{"id":"pmh:oai:e-space.mmu.ac.uk:635862","is_oa":true,"landing_page_url":"https://e-space.mmu.ac.uk/view/authors/aa810054662093994e6fff167e9d7a16.html>","pdf_url":"https://e-space.mmu.ac.uk/635862/1/Equality_Test_Public_Key_Encryption_With_Cryptographic_Reverse_Firewalls_for_Cloud-Based_E-Commerce.pdf","source":{"id":"https://openalex.org/S4306401617","display_name":"e-space (Manchester Metropolitan University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I11983389","host_organization_name":"Manchester Metropolitan University","host_organization_lineage":["https://openalex.org/I11983389"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/5","score":0.5199999809265137,"display_name":"Gender equality"}],"awards":[{"id":"https://openalex.org/G5141996592","display_name":null,"funder_award_id":"2022YFB2701400","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4399039620.pdf"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W180983570","https://openalex.org/W1499713421","https://openalex.org/W1561443225","https://openalex.org/W1581001589","https://openalex.org/W2060233069","https://openalex.org/W2089607820","https://openalex.org/W2147929033","https://openalex.org/W2219924285","https://openalex.org/W2401376465","https://openalex.org/W2550436106","https://openalex.org/W2745605851","https://openalex.org/W2766233162","https://openalex.org/W3003253555","https://openalex.org/W3004140573","https://openalex.org/W3042636178","https://openalex.org/W3110732537","https://openalex.org/W3126795758","https://openalex.org/W3179332376","https://openalex.org/W4200566240","https://openalex.org/W4280636063","https://openalex.org/W4320717211","https://openalex.org/W4367016584","https://openalex.org/W4367146487","https://openalex.org/W4368232698","https://openalex.org/W4368374190","https://openalex.org/W4381713937","https://openalex.org/W4383890559","https://openalex.org/W4386275828","https://openalex.org/W4386737323","https://openalex.org/W4390481444","https://openalex.org/W4391854850","https://openalex.org/W4392551035"],"related_works":["https://openalex.org/W2363831530","https://openalex.org/W2363845219","https://openalex.org/W4244478748","https://openalex.org/W2381057835","https://openalex.org/W1789649838","https://openalex.org/W1780668307","https://openalex.org/W1984362519","https://openalex.org/W4223488648","https://openalex.org/W2051831113","https://openalex.org/W767161385"],"abstract_inverted_index":{"The":[0,149],"rise":[1],"of":[2,7,91,162],"e-commerce":[3,126],"and":[4,17,34,79,97,123,164],"the":[5,24,40,56,64,76,89,154],"adoption":[6],"cloud":[8,57,65],"servers":[9],"have":[10],"revolutionized":[11],"retail":[12],"by":[13],"providing":[14],"greater":[15],"convenience":[16],"selection":[18],"to":[19,55,69,118,129],"online":[20],"shoppers.":[21],"However,":[22,114],"personalizing":[23],"customer":[25],"experience":[26],"also":[27],"poses":[28],"important":[29],"challenges":[30],"regarding":[31],"privacy,":[32],"security,":[33],"trust.":[35],"To":[36,105],"tackle":[37,106],"this":[38,133],"issue,":[39],"public":[41,140],"key":[42,141],"encryption":[43,142],"with":[44,143],"equality":[45,73,138],"test":[46,74,139],"(PKEET)":[47],"is":[48,67],"employed.":[49],"Customer":[50],"experiences":[51],"are":[52],"securely":[53],"transmitted":[54],"server":[58,66],"in":[59,125,160],"an":[60,72],"encrypted":[61,77],"manner.":[62],"Consequently,":[63],"authorized":[68],"carry":[70],"out":[71],"on":[75],"data":[78],"retrieval":[80],"without":[81],"revealing":[82],"private":[83,100],"details.":[84],"Edward":[85],"Snowden\u2019s":[86],"disclosures":[87],"underscored":[88],"risk":[90],"capable":[92],"adversaries":[93],"infiltrating":[94],"user":[95],"devices":[96],"surreptitiously":[98],"accessing":[99],"information":[101],"via":[102],"covert":[103],"backdoors.":[104],"this,":[107],"cryptographic":[108,144],"reverse":[109,145],"firewalls":[110,146],"(CRFs)":[111],"were":[112],"proposed.":[113],"applying":[115],"CRF":[116],"techniques":[117],"PKEET":[119],"for":[120],"securing":[121],"personalization":[122],"contextualization":[124],"has":[127],"yet":[128],"be":[130],"realized.":[131],"Thus,":[132],"work":[134],"introduces":[135],"a":[136],"novel":[137],"(ET-PKE-CRF)":[147],"approach.":[148],"performance":[150],"evaluation":[151],"demonstrates":[152],"that":[153],"ET-PKE-CRF":[155],"scheme":[156],"substantially":[157],"enhances":[158],"efficiency":[159],"terms":[161],"communication":[163],"computation,":[165],"outperforming":[166],"current":[167],"advanced":[168],"solutions.":[169]},"counts_by_year":[{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
