{"id":"https://openalex.org/W4413925864","doi":"https://doi.org/10.1109/tdsc.2025.3604813","title":"Proxy-Free Public-Key Authenticated Updatable and Searchable Encryption for Cloud Storage","display_name":"Proxy-Free Public-Key Authenticated Updatable and Searchable Encryption for Cloud Storage","publication_year":2025,"publication_date":"2025-09-02","ids":{"openalex":"https://openalex.org/W4413925864","doi":"https://doi.org/10.1109/tdsc.2025.3604813"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3604813","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3604813","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101447473","display_name":"Hongbo Li","orcid":"https://orcid.org/0000-0003-3825-675X"},"institutions":[{"id":"https://openalex.org/I101479585","display_name":"South China Agricultural University","ror":"https://ror.org/05v9jqt67","country_code":"CN","type":"education","lineage":["https://openalex.org/I101479585"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hongbo Li","raw_affiliation_strings":["South China Agricultural University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"South China Agricultural University, Guangzhou, China","institution_ids":["https://openalex.org/I101479585"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["University of Wollongong, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"University of Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061776471","display_name":"Jian Shen","orcid":"https://orcid.org/0000-0001-9257-6549"},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Shen","raw_affiliation_strings":["School of Information Science and Engineering (School of Cyber Science and Technology), the Zhejiang Key Laboratory of Digital Fashion and Data Governance, and the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation, Zhejiang Sci-Tech University, Hangzhou, China","Zhejiang Sci-Tech University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering (School of Cyber Science and Technology), the Zhejiang Key Laboratory of Digital Fashion and Data Governance, and the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation, Zhejiang Sci-Tech University, Hangzhou, China","institution_ids":["https://openalex.org/I1328775524"]},{"raw_affiliation_string":"Zhejiang Sci-Tech University, Hangzhou, China","institution_ids":["https://openalex.org/I1328775524"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100337572","display_name":"Chen Wang","orcid":"https://orcid.org/0000-0002-3951-3159"},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chen Wang","raw_affiliation_strings":["School of Information Science and Engineering (School of Cyber Science and Technology), the Zhejiang Key Laboratory of Digital Fashion and Data Governance, and the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation, Zhejiang Sci-Tech University, Hangzhou, China","Zhejiang Sci-Tech University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering (School of Cyber Science and Technology), the Zhejiang Key Laboratory of Digital Fashion and Data Governance, and the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation, Zhejiang Sci-Tech University, Hangzhou, China","institution_ids":["https://openalex.org/I1328775524"]},{"raw_affiliation_string":"Zhejiang Sci-Tech University, Hangzhou, China","institution_ids":["https://openalex.org/I1328775524"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064067464","display_name":"Leixiao Cheng","orcid":"https://orcid.org/0000-0002-7231-0636"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Leixiao Cheng","raw_affiliation_strings":["Shandong University, Jinan, China"],"affiliations":[{"raw_affiliation_string":"Shandong University, Jinan, China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011282586","display_name":"Qiong Huang","orcid":"https://orcid.org/0000-0002-7666-8985"},"institutions":[{"id":"https://openalex.org/I101479585","display_name":"South China Agricultural University","ror":"https://ror.org/05v9jqt67","country_code":"CN","type":"education","lineage":["https://openalex.org/I101479585"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiong Huang","raw_affiliation_strings":["South China Agricultural University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"South China Agricultural University, Guangzhou, China","institution_ids":["https://openalex.org/I101479585"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101447473"],"corresponding_institution_ids":["https://openalex.org/I101479585"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13424227,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"1","first_page":"236","last_page":"249"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8003237247467041},{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.7090356349945068},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6026319265365601},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5964815616607666},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5932719707489014},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.5464762449264526},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5072404742240906},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.5010402202606201},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.4734862744808197},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4616362750530243},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.45076996088027954},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.3703957498073578},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.28689470887184143}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8003237247467041},{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.7090356349945068},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6026319265365601},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5964815616607666},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5932719707489014},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.5464762449264526},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5072404742240906},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.5010402202606201},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.4734862744808197},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4616362750530243},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.45076996088027954},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.3703957498073578},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.28689470887184143},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3604813","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3604813","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1487683390","https://openalex.org/W1493744513","https://openalex.org/W1590823599","https://openalex.org/W1851414966","https://openalex.org/W2152924492","https://openalex.org/W2154059840","https://openalex.org/W2161214567","https://openalex.org/W2268989031","https://openalex.org/W2514981978","https://openalex.org/W2597901792","https://openalex.org/W2612330673","https://openalex.org/W2767329275","https://openalex.org/W2797246528","https://openalex.org/W2889358002","https://openalex.org/W2906825992","https://openalex.org/W2908345802","https://openalex.org/W2997594590","https://openalex.org/W3048707933","https://openalex.org/W3091517985","https://openalex.org/W3118241334","https://openalex.org/W3134558659","https://openalex.org/W3204053154","https://openalex.org/W4210511645","https://openalex.org/W4281399814","https://openalex.org/W4281710429","https://openalex.org/W4296079577","https://openalex.org/W4307111153","https://openalex.org/W4311187262","https://openalex.org/W4312884093","https://openalex.org/W4365421284","https://openalex.org/W4380534753","https://openalex.org/W4381163606","https://openalex.org/W4386754075","https://openalex.org/W4388937960","https://openalex.org/W4392449823","https://openalex.org/W4403599192","https://openalex.org/W4403937579"],"related_works":["https://openalex.org/W2034108503","https://openalex.org/W2328593319","https://openalex.org/W2094124631","https://openalex.org/W4214555670","https://openalex.org/W2549192755","https://openalex.org/W4386413025","https://openalex.org/W2291999839","https://openalex.org/W2964281962","https://openalex.org/W4240025130","https://openalex.org/W2794744744"],"abstract_inverted_index":{"Public":[0],"key":[1,127],"authenticated":[2],"encryption":[3,66],"with":[4],"keyword":[5],"search":[6],"(PAEKS)":[7],"is":[8,48,90,129,191],"a":[9,86,107,112,144,150],"cryptographic":[10],"primitive":[11,45,114],"applicable":[12],"in":[13,65,97],"cloud":[14,19,133],"storage":[15],"systems.":[16],"It":[17],"empowers":[18],"servers":[20],"to":[21,42,50,60,95,105,130],"conduct":[22],"searches":[23],"on":[24],"encrypted":[25],"data":[26],"without":[27],"decryption":[28],"while":[29],"safeguarding":[30],"against":[31],"the":[32,43,61,71,75,83,101,132,137,181],"brute-force":[33],"attack":[34],"known":[35],"as":[36],"insider-keyword-guessing":[37],"attacks":[38],"(IKGAs).":[39],"In":[40],"contrast":[41],"pioneering":[44],"PEKS,":[46],"which":[47],"vulnerable":[49],"IKGAs,":[51],"PAEKS":[52,78],"incurs":[53],"additional":[54],"computational":[55],"and":[56,67,104,122,161,167,175,186],"communication":[57],"overhead":[58],"due":[59],"sender":[62],"keys'":[63],"involvement":[64],"trapdoor-generation":[68],"processes.":[69],"Although":[70],"recent":[72],"work":[73],"improves":[74],"efficiency":[76],"of":[77,85,115,136,184],"by":[79],"re-encrypting":[80],"received":[81],"ciphertexts,":[82],"requirement":[84],"fully":[87],"trusted":[88],"proxy":[89],"rather":[91],"costly":[92],"for":[93],"users":[94],"implement":[96],"practice.":[98],"To":[99],"reduce":[100],"economic":[102],"cost":[103],"keep":[106],"high":[108,171],"efficiency,":[109],"we":[110],"propose":[111,149],"new":[113],"<italic":[116],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[117],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Proxy-free":[118],"Public-key":[119],"Authenticated":[120],"Updatable":[121],"Searchable":[123],"Encryption</i>":[124],"(PF-AUKS).":[125],"The":[126],"concept":[128],"let":[131],"server,":[134],"instead":[135],"proxy,":[138],"directly":[139],"convert":[140],"different-source":[141],"ciphertexts":[142],"into":[143],"uniform":[145],"format":[146],"securely.":[147],"We":[148,178],"concrete":[151],"PF-AUKS":[152,185],"scheme":[153,190],"that":[154,188],"supports":[155],"fast":[156],"search,":[157],"constant":[158],"trapdoor":[159],"generation,":[160],"secure":[162,192],"ciphertext":[163],"update.":[164],"Theoretical":[165],"evaluation":[166],"experimental":[168],"results":[169],"illustrate":[170],"algorithm":[172],"running":[173],"speed":[174],"retrieval":[176],"efficiency.":[177],"formally":[179],"define":[180],"security":[182],"model":[183],"prove":[187],"our":[189],"under":[193],"this":[194],"model.":[195]},"counts_by_year":[],"updated_date":"2026-01-19T04:01:09.351973","created_date":"2025-10-10T00:00:00"}
