{"id":"https://openalex.org/W7105226899","doi":"https://doi.org/10.1109/tce.2025.3632071","title":"Secure and Privacy-Preserving Post-Quantum Attribute-Based Searchable Encryption for Edge-Driven Transportation Systems","display_name":"Secure and Privacy-Preserving Post-Quantum Attribute-Based Searchable Encryption for Edge-Driven Transportation Systems","publication_year":2025,"publication_date":"2025-11-12","ids":{"openalex":"https://openalex.org/W7105226899","doi":"https://doi.org/10.1109/tce.2025.3632071"},"language":null,"primary_location":{"id":"doi:10.1109/tce.2025.3632071","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3632071","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Chintureena Thingom","orcid":"https://orcid.org/0000-0003-4305-7026"},"institutions":[{"id":"https://openalex.org/I4210145126","display_name":"Aditya Birla (India)","ror":"https://ror.org/03pztks36","country_code":"IN","type":"company","lineage":["https://openalex.org/I4210145126"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Chintureena Thingom","raw_affiliation_strings":["Department of CSE, Aditya University, Surampalem, Andhra Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, Aditya University, Surampalem, Andhra Pradesh, India","institution_ids":["https://openalex.org/I4210145126"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Bhagavan Konduri","orcid":null},"institutions":[{"id":"https://openalex.org/I875944469","display_name":"Koneru Lakshmaiah Education Foundation","ror":"https://ror.org/02k949197","country_code":"IN","type":"education","lineage":["https://openalex.org/I875944469"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Bhagavan Konduri","raw_affiliation_strings":["Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Guntur, Andhra Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Guntur, Andhra Pradesh, India","institution_ids":["https://openalex.org/I875944469"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Isha Das","orcid":"https://orcid.org/0009-0007-7812-4627"},"institutions":[{"id":"https://openalex.org/I102782458","display_name":"Chittagong University of Engineering & Technology","ror":"https://ror.org/052qsay17","country_code":"BD","type":"education","lineage":["https://openalex.org/I102782458"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Isha Das","raw_affiliation_strings":["Network Communication and IoT Laboratory, Chittagong University of Engineering and Technology, Chattogram, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Network Communication and IoT Laboratory, Chittagong University of Engineering and Technology, Chattogram, Bangladesh","institution_ids":["https://openalex.org/I102782458"]}]},{"author_position":"middle","author":{"id":null,"display_name":"V. Rama Krishna","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"V. Rama Krishna","raw_affiliation_strings":["CVR College of Engineering, Hyderabad, India"],"affiliations":[{"raw_affiliation_string":"CVR College of Engineering, Hyderabad, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Rahul Suryoda","orcid":null},"institutions":[{"id":"https://openalex.org/I4210163794","display_name":"Data Management (Italy)","ror":"https://ror.org/017j5za44","country_code":"IT","type":"company","lineage":["https://openalex.org/I4210163794"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Rahul Suryoda","raw_affiliation_strings":["Data Governance, Data Analytics (Enterprise Performance Management), AI &#x0026; ML, Seattle, WD, USA"],"affiliations":[{"raw_affiliation_string":"Data Governance, Data Analytics (Enterprise Performance Management), AI &#x0026; ML, Seattle, WD, USA","institution_ids":["https://openalex.org/I4210163794"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Shrabani Mallick","orcid":null},"institutions":[{"id":"https://openalex.org/I86381314","display_name":"Vikram University","ror":"https://ror.org/002k8gm39","country_code":"IN","type":"education","lineage":["https://openalex.org/I86381314"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Shrabani Mallick","raw_affiliation_strings":["Department of CSE, Dr. B. R. Ambedkar Institute of Technology, Sri Vijaya Puram, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE, Dr. B. R. Ambedkar Institute of Technology, Sri Vijaya Puram, India","institution_ids":["https://openalex.org/I86381314"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Faheem Ahmad Reegu","orcid":"https://orcid.org/0000-0002-9167-3061"},"institutions":[{"id":"https://openalex.org/I91450128","display_name":"Jazan University","ror":"https://ror.org/02bjnq803","country_code":"SA","type":"education","lineage":["https://openalex.org/I91450128"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Faheem Ahmad Reegu","raw_affiliation_strings":["Department of Electrical and Electronic Engineering, College of Engineering and Computer Science, Jazan University, Jazan, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronic Engineering, College of Engineering and Computer Science, Jazan University, Jazan, Saudi Arabia","institution_ids":["https://openalex.org/I91450128"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Feruza Saidova","orcid":null},"institutions":[{"id":"https://openalex.org/I55383850","display_name":"Tashkent State University of Economics","ror":"https://ror.org/029t9db68","country_code":"UZ","type":"education","lineage":["https://openalex.org/I55383850"]}],"countries":["UZ"],"is_corresponding":false,"raw_author_name":"Feruza Saidova","raw_affiliation_strings":["Department of Foreign Languages, Tashkent State University of Economics, Tashkent, Uzbekistan"],"affiliations":[{"raw_affiliation_string":"Department of Foreign Languages, Tashkent State University of Economics, Tashkent, Uzbekistan","institution_ids":["https://openalex.org/I55383850"]}]},{"author_position":"last","author":{"id":null,"display_name":"Deepak Kumar Goyal","orcid":null},"institutions":[{"id":"https://openalex.org/I56308077","display_name":"Indian Institute of Management Rohtak","ror":"https://ror.org/018gn0t60","country_code":"IN","type":"education","lineage":["https://openalex.org/I56308077"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Deepak Kumar Goyal","raw_affiliation_strings":["Vaish College of Engineering, Rohtak, Haryana, India"],"affiliations":[{"raw_affiliation_string":"Vaish College of Engineering, Rohtak, Haryana, India","institution_ids":["https://openalex.org/I56308077"]}]}],"institutions":[],"countries_distinct_count":5,"institutions_distinct_count":9,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4210145126"],"apc_list":null,"apc_paid":null,"fwci":2.4958,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.93578455,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"72","issue":"1","first_page":"1865","last_page":"1875"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9172999858856201,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9172999858856201,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.013500000350177288,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.011900000274181366,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6725000143051147},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5605000257492065},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5275999903678894},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.503600001335144},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.45989999175071716},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4214000105857849},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.4185999929904938},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4171999990940094},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.400299996137619},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.3953999876976013}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.795799970626831},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6725000143051147},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5630000233650208},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5605000257492065},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.535099983215332},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5275999903678894},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.503600001335144},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.45989999175071716},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4214000105857849},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.4185999929904938},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4171999990940094},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.400299996137619},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.3953999876976013},{"id":"https://openalex.org/C2778950925","wikidata":"https://www.wikidata.org/wiki/Q4672474","display_name":"Access structure","level":4,"score":0.3846000134944916},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.367000013589859},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.3605000078678131},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.3596999943256378},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3580000102519989},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.35100001096725464},{"id":"https://openalex.org/C155527597","wikidata":"https://www.wikidata.org/wiki/Q1727777","display_name":"Signcryption","level":4,"score":0.34790000319480896},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.34299999475479126},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.3264000117778778},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.3151000142097473},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.30570000410079956},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.28360000252723694},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.2703000009059906},{"id":"https://openalex.org/C113328881","wikidata":"https://www.wikidata.org/wiki/Q599809","display_name":"Dictionary attack","level":3,"score":0.2637999951839447},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.26190000772476196},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2612000107765198},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.25839999318122864},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.25369998812675476},{"id":"https://openalex.org/C47796450","wikidata":"https://www.wikidata.org/wiki/Q508378","display_name":"Intelligent transportation system","level":2,"score":0.2531000077724457},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.2526000142097473}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2025.3632071","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3632071","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"To":[0],"address":[1],"the":[2,17,76,97,106,132,156],"risks":[3],"of":[4,163],"data":[5,126,178],"leakage":[6],"and":[7,51,67,84,108,125,142,151,159,166],"unauthorized":[8],"access":[9,65,77,109,136],"in":[10,16,145,161],"Intelligent":[11],"Transportation":[12],"Systems":[13],"(ITS),":[14],"particularly":[15],"post-quantum":[18,147,175],"era":[19],"where":[20],"traditional":[21],"cryptographic":[22],"algorithms":[23],"are":[24],"vulnerable,":[25],"this":[26],"paper":[27],"proposes":[28],"a":[29,112,146,171],"novel":[30],"Post-Quantum":[31],"Attribute-Based":[32],"Searchable":[33],"Encryption":[34],"(PQ-ABSE)":[35],"scheme.":[36],"The":[37,54],"scheme":[38,57,98,133],"is":[39],"designed":[40],"to":[41],"resist":[42],"quantum":[43],"attacks":[44],"while":[45,122],"providing":[46],"privacy-preserving":[47],"search,":[48],"key":[49,63,94,119],"aggregation,":[50],"lightweight":[52],"computation.":[53],"proposed":[55],"PQ-ABSE":[56],"ensures":[58,85],"end-to-end":[59],"privacy":[60],"protection":[61],"during":[62],"generation,":[64],"control,":[66],"partial":[68,81],"decryption":[69],"phases.":[70],"By":[71],"embedding":[72],"search":[73,107],"keywords":[74],"into":[75,111],"policy,":[78],"it":[79,170],"achieves":[80,134],"policy":[82],"hiding":[83],"keyword":[86,139],"confidentiality":[87],"under":[88],"quantum-resilient":[89],"assumptions.":[90],"Moreover,":[91],"by":[92],"leveraging":[93],"aggregation":[95],"techniques,":[96],"consolidates":[99],"all":[100],"file":[101,124],"identifiers":[102],"that":[103,131],"meet":[104],"both":[105,164],"conditions":[110],"single":[113],"aggregate":[114],"key,":[115],"significantly":[116],"reducing":[117],"user-side":[118],"storage":[120],"overhead":[121],"ensuring":[123],"security.":[127],"Security":[128],"analysis":[129,150],"confirms":[130],"hidden":[135],"structure":[137],"security,":[138],"ciphertext":[140],"indistinguishability,":[141],"trapdoor":[143],"indistinguishability":[144],"setting.":[148],"Theoretical":[149],"simulation":[152],"results":[153],"further":[154],"demonstrate":[155],"scheme\u2019s":[157],"practicality":[158],"efficiency":[160],"terms":[162],"computational":[165],"communication":[167],"overhead,":[168],"making":[169],"promising":[172],"solution":[173],"for":[174],"secure":[176],"ITS":[177],"management.":[179]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-26T06:05:38.182114","created_date":"2025-11-12T00:00:00"}
