{"id":"https://openalex.org/W7127339544","doi":"https://doi.org/10.1109/tetc.2026.3658629","title":"Traceable and Revocable Attribute-Based Conjunctive Keyword Search","display_name":"Traceable and Revocable Attribute-Based Conjunctive Keyword Search","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7127339544","doi":"https://doi.org/10.1109/tetc.2026.3658629"},"language":null,"primary_location":{"id":"doi:10.1109/tetc.2026.3658629","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetc.2026.3658629","pdf_url":null,"source":{"id":"https://openalex.org/S2496326734","display_name":"IEEE Transactions on Emerging Topics in Computing","issn_l":"2168-6750","issn":["2168-6750","2376-4562"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121552940","display_name":"Jinguo Li","orcid":null},"institutions":[{"id":"https://openalex.org/I23632641","display_name":"Shanghai University of Electric Power","ror":"https://ror.org/02w4tny03","country_code":"CN","type":"education","lineage":["https://openalex.org/I23632641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jinguo Li","raw_affiliation_strings":["College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai, China"],"raw_orcid":"https://orcid.org/0000-0002-7980-0312","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai, China","institution_ids":["https://openalex.org/I23632641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013574625","display_name":"Chunlin Li","orcid":"https://orcid.org/0009-0007-5263-6579"},"institutions":[{"id":"https://openalex.org/I23632641","display_name":"Shanghai University of Electric Power","ror":"https://ror.org/02w4tny03","country_code":"CN","type":"education","lineage":["https://openalex.org/I23632641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunlin Li","raw_affiliation_strings":["College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai, China"],"raw_orcid":"https://orcid.org/0009-0007-5263-6579","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai, China","institution_ids":["https://openalex.org/I23632641"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Kai Zhang","orcid":"https://orcid.org/0000-0001-9728-4051"},"institutions":[{"id":"https://openalex.org/I23632641","display_name":"Shanghai University of Electric Power","ror":"https://ror.org/02w4tny03","country_code":"CN","type":"education","lineage":["https://openalex.org/I23632641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai, China"],"raw_orcid":"https://orcid.org/0000-0001-9728-4051","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai, China","institution_ids":["https://openalex.org/I23632641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5124874854","display_name":"Yin He","orcid":null},"institutions":[{"id":"https://openalex.org/I23632641","display_name":"Shanghai University of Electric Power","ror":"https://ror.org/02w4tny03","country_code":"CN","type":"education","lineage":["https://openalex.org/I23632641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yin He","raw_affiliation_strings":["College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai, China"],"raw_orcid":"https://orcid.org/0009-0004-0195-6140","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai, China","institution_ids":["https://openalex.org/I23632641"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5121552940"],"corresponding_institution_ids":["https://openalex.org/I23632641"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.22100607,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":"1","first_page":"240","last_page":"253"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.8525000214576721,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.8525000214576721,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.0625,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.035599999129772186,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.7303000092506409},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.535099983215332},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5264000296592712},{"id":"https://openalex.org/keywords/keyword-search","display_name":"Keyword search","score":0.49639999866485596},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.39890000224113464},{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.39079999923706055},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.38690000772476196},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.36390000581741333},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.36070001125335693},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.36010000109672546}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8626999855041504},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.7303000092506409},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.628600001335144},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.535099983215332},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5264000296592712},{"id":"https://openalex.org/C2988412617","wikidata":"https://www.wikidata.org/wiki/Q7441656","display_name":"Keyword search","level":2,"score":0.49639999866485596},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.39890000224113464},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.39079999923706055},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.38690000772476196},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.36390000581741333},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.36070001125335693},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.36010000109672546},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.35530000925064087},{"id":"https://openalex.org/C84392682","wikidata":"https://www.wikidata.org/wiki/Q1952404","display_name":"Multilinear map","level":2,"score":0.3544999957084656},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.33340001106262207},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3248000144958496},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.31470000743865967},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3077000081539154},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.30329999327659607},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.295199990272522},{"id":"https://openalex.org/C75165309","wikidata":"https://www.wikidata.org/wiki/Q2258979","display_name":"Search engine indexing","level":2,"score":0.2888999879360199},{"id":"https://openalex.org/C65647387","wikidata":"https://www.wikidata.org/wiki/Q1781706","display_name":"Conjunctive query","level":3,"score":0.28700000047683716},{"id":"https://openalex.org/C2778717966","wikidata":"https://www.wikidata.org/wiki/Q4189076","display_name":"Protection mechanism","level":3,"score":0.2842000126838684},{"id":"https://openalex.org/C13424479","wikidata":"https://www.wikidata.org/wiki/Q5687237","display_name":"Haystack","level":2,"score":0.2833000123500824},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.2797999978065491},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2791999876499176},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.2720000147819519},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2653999924659729},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.26019999384880066},{"id":"https://openalex.org/C168297262","wikidata":"https://www.wikidata.org/wiki/Q6031182","display_name":"Information protection policy","level":2,"score":0.2565999925136566},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.2549000084400177}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tetc.2026.3658629","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tetc.2026.3658629","pdf_url":null,"source":{"id":"https://openalex.org/S2496326734","display_name":"IEEE Transactions on Emerging Topics in Computing","issn_l":"2168-6750","issn":["2168-6750","2376-4562"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Emerging Topics in Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1611947856","display_name":null,"funder_award_id":"62372285","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1481965140","https://openalex.org/W1493744513","https://openalex.org/W1513551553","https://openalex.org/W1558439324","https://openalex.org/W1603256047","https://openalex.org/W1982946433","https://openalex.org/W2108072891","https://openalex.org/W2137943631","https://openalex.org/W2138001464","https://openalex.org/W2147929033","https://openalex.org/W2161214567","https://openalex.org/W2403036368","https://openalex.org/W2514941450","https://openalex.org/W2553376019","https://openalex.org/W2764317140","https://openalex.org/W2795339516","https://openalex.org/W2810148429","https://openalex.org/W2963180904","https://openalex.org/W2967320897","https://openalex.org/W3010457411","https://openalex.org/W3014636614","https://openalex.org/W3152886916","https://openalex.org/W3188123618","https://openalex.org/W3198147790","https://openalex.org/W3198560242","https://openalex.org/W3210239242","https://openalex.org/W4205187614","https://openalex.org/W4226118446","https://openalex.org/W4313031774","https://openalex.org/W4320009812","https://openalex.org/W4362683567","https://openalex.org/W4385525550","https://openalex.org/W4386453587","https://openalex.org/W4389076754","https://openalex.org/W4409095673","https://openalex.org/W4409257433","https://openalex.org/W4413343945","https://openalex.org/W7081944795"],"related_works":[],"abstract_inverted_index":{"The":[0],"Attribute-Based":[1],"Keyword":[2],"Search":[3],"(ABKS)":[4],"scheme":[5],"provides":[6],"a":[7,60],"secure,":[8],"efficient,":[9],"and":[10,38,62,80],"expressive":[11],"method":[12],"for":[13,70,111],"data":[14,26],"outsourcing":[15],"to":[16,23,34,42,92],"the":[17,35,71],"cloud,":[18],"offering":[19],"fine-grained":[20],"access":[21,46,94],"control":[22],"prevent":[24],"unauthorized":[25],"usage.":[27],"However,":[28],"existing":[29],"ABKS":[30],"schemes":[31],"primarily":[32],"cater":[33],"single-owner":[36],"model":[37],"lack":[39],"effective":[40],"mechanisms":[41],"trace":[43],"or":[44],"revoke":[45,93],"from":[47,96,107],"malicious":[48,97,105],"users":[49,106],"who":[50],"leak":[51],"decryption":[52,109],"keys.":[53],"In":[54],"this":[55],"paper,":[56],"we":[57],"introduce":[58],"TR-ABCKS,":[59],"traceable":[61],"revocable":[63],"attribute-based":[64],"conjunctive":[65,77],"keyword":[66,78],"search":[67,79],"scheme.":[68],"Designed":[69],"multi-to-":[72],"multi":[73],"model,":[74],"TR-ABCKS":[75,100],"supports":[76],"features":[81],"an":[82],"efficient":[83],"revocation":[84],"mechanism":[85],"utilizing":[86],"binary":[87],"trees":[88],"with":[89],"multilinear":[90],"maps":[91],"permissions":[95],"users.":[98],"Additionally,":[99],"achieves":[101],"white-box":[102],"traceability,":[103],"preventing":[104],"leaking":[108],"keys":[110],"economic":[112],"gain.":[113],"Our":[114],"comprehensive":[115],"security":[116],"analysis":[117],"confirms":[118],"TR-ABCKS's":[119],"semantic":[120],"security,":[121],"validated":[122],"by":[123],"experimental":[124],"simulations,":[125],"showcasing":[126],"its":[127],"effectiveness.":[128]},"counts_by_year":[],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2026-02-04T00:00:00"}
