{"id":"https://openalex.org/W4385525550","doi":"https://doi.org/10.1109/tifs.2023.3301740","title":"ABAEKS: Attribute-Based Authenticated Encryption With Keyword Search Over Outsourced Encrypted Data","display_name":"ABAEKS: Attribute-Based Authenticated Encryption With Keyword Search Over Outsourced Encrypted Data","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4385525550","doi":"https://doi.org/10.1109/tifs.2023.3301740"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3301740","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3301740","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000037502","display_name":"Fucai Luo","orcid":"https://orcid.org/0000-0001-7961-5750"},"institutions":[{"id":"https://openalex.org/I75059550","display_name":"Zhejiang Gongshang University","ror":"https://ror.org/0569mkk41","country_code":"CN","type":"education","lineage":["https://openalex.org/I75059550"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fucai Luo","raw_affiliation_strings":["School of Computer Science and Technology, Zhejiang Gongshang University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-7961-5750","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Zhejiang Gongshang University, Hangzhou, China","institution_ids":["https://openalex.org/I75059550"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102003407","display_name":"Haiyan Wang","orcid":"https://orcid.org/0000-0002-5702-9897"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haiyan Wang","raw_affiliation_strings":["Department of New Networks, Peng Cheng Laboratory, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0002-5702-9897","affiliations":[{"raw_affiliation_string":"Department of New Networks, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079564012","display_name":"Changlu Lin","orcid":"https://orcid.org/0000-0002-2868-3398"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changlu Lin","raw_affiliation_strings":["School of Mathematics and Statistics and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-2868-3398","affiliations":[{"raw_affiliation_string":"School of Mathematics and Statistics and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032278260","display_name":"Xingfu Yan","orcid":"https://orcid.org/0000-0002-3026-0976"},"institutions":[{"id":"https://openalex.org/I187400657","display_name":"South China Normal University","ror":"https://ror.org/01kq0pv72","country_code":"CN","type":"education","lineage":["https://openalex.org/I187400657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingfu Yan","raw_affiliation_strings":["School of Computer Science, South China Normal University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-3026-0976","affiliations":[{"raw_affiliation_string":"School of Computer Science, South China Normal University, Guangzhou, China","institution_ids":["https://openalex.org/I187400657"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5000037502"],"corresponding_institution_ids":["https://openalex.org/I75059550"],"apc_list":null,"apc_paid":null,"fwci":4.4306,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.9556703,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"18","issue":null,"first_page":"4970","last_page":"4983"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.9125913381576538},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8826769590377808},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6927043199539185},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5976957082748413},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.5942758321762085},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5802147388458252},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.498319149017334},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.4826946258544922},{"id":"https://openalex.org/keywords/keyword-search","display_name":"Keyword search","score":0.4667162299156189},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33207452297210693},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.259459912776947},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.18316489458084106}],"concepts":[{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.9125913381576538},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8826769590377808},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6927043199539185},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5976957082748413},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.5942758321762085},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5802147388458252},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.498319149017334},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.4826946258544922},{"id":"https://openalex.org/C2988412617","wikidata":"https://www.wikidata.org/wiki/Q7441656","display_name":"Keyword search","level":2,"score":0.4667162299156189},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33207452297210693},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.259459912776947},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.18316489458084106},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2023.3301740","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3301740","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.46000000834465027}],"awards":[{"id":"https://openalex.org/G8236054015","display_name":null,"funder_award_id":"PCL2022A03","funder_id":"https://openalex.org/F4320318558","funder_display_name":"Peng Cheng Laboratory"},{"id":"https://openalex.org/G8426896344","display_name":null,"funder_award_id":"2022GXNSFBA035650","funder_id":"https://openalex.org/F4320322768","funder_display_name":"Natural Science Foundation of Guangxi Province"}],"funders":[{"id":"https://openalex.org/F4320318558","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06"},{"id":"https://openalex.org/F4320322768","display_name":"Natural Science Foundation of Guangxi Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W74973629","https://openalex.org/W1720304360","https://openalex.org/W1851414966","https://openalex.org/W1873520610","https://openalex.org/W1988169383","https://openalex.org/W2058785578","https://openalex.org/W2061949491","https://openalex.org/W2113333997","https://openalex.org/W2113717903","https://openalex.org/W2114664664","https://openalex.org/W2122973102","https://openalex.org/W2144754501","https://openalex.org/W2147929033","https://openalex.org/W2161214567","https://openalex.org/W2180461881","https://openalex.org/W2296067100","https://openalex.org/W2314118214","https://openalex.org/W2396162732","https://openalex.org/W2400700555","https://openalex.org/W2597901792","https://openalex.org/W2775185027","https://openalex.org/W2797246528","https://openalex.org/W2889358002","https://openalex.org/W2913048961","https://openalex.org/W2943600914","https://openalex.org/W2946102956","https://openalex.org/W2956670684","https://openalex.org/W2982169647","https://openalex.org/W2986135088","https://openalex.org/W2997594590","https://openalex.org/W2997854921","https://openalex.org/W3006556966","https://openalex.org/W3014636614","https://openalex.org/W3023478445","https://openalex.org/W3128330616","https://openalex.org/W3159761532","https://openalex.org/W3168139176","https://openalex.org/W3200116816","https://openalex.org/W3201545989","https://openalex.org/W4205765479","https://openalex.org/W4211035912","https://openalex.org/W4281399814","https://openalex.org/W4285196392","https://openalex.org/W4311187262","https://openalex.org/W6682311248","https://openalex.org/W6762350473","https://openalex.org/W6763309651","https://openalex.org/W6772816594","https://openalex.org/W6775053127"],"related_works":["https://openalex.org/W653900512","https://openalex.org/W1559280668","https://openalex.org/W3110702597","https://openalex.org/W3123347851","https://openalex.org/W4285128331","https://openalex.org/W1503401473","https://openalex.org/W2952212080","https://openalex.org/W2803867854","https://openalex.org/W2089744189","https://openalex.org/W1622109882"],"abstract_inverted_index":{"The":[0],"widespread":[1],"adoption":[2],"of":[3,10,31,108,127],"cloud":[4],"computing":[5],"and":[6,19,47,78,90,98,111,129,140],"the":[7,13,37,105,116,130],"exponential":[8],"growth":[9],"data":[11,17,34],"highlight":[12],"need":[14],"for":[15],"secure":[16],"sharing":[18],"querying.":[20],"Attribute-based":[21],"keyword":[22,56,75],"search":[23,76],"(ABKS)":[24],"has":[25,86],"emerged":[26],"as":[27],"an":[28,80],"efficient":[29,81,139],"means":[30],"searching":[32],"encrypted":[33],"stored":[35],"in":[36,115],"cloud.":[38],"However,":[39],"existing":[40],"ABKS":[41,144],"schemes":[42],"incur":[43],"high":[44],"end-to-end":[45,88],"delay":[46],"are":[48],"vulnerable":[49],"to":[50,93],"quantum":[51,95],"computer":[52,96],"attacks":[53,58,97],"and/or":[54],"(insider)":[55,99],"guessing":[57],"(KGA).":[59],"To":[60],"address":[61],"these":[62],"vulnerabilities,":[63],"this":[64],"paper":[65],"introduces":[66],"a":[67,123],"new":[68],"concept":[69],"called":[70],"attribute-based":[71],"authenticated":[72],"encryption":[73],"with":[74],"(ABAEKS)":[77],"proposes":[79],"ABAEKS":[82,85,109,136],"scheme.":[83],"Our":[84],"low":[87],"delay,":[89],"is":[91,137],"resistant":[92],"both":[94],"KGA.":[100],"In":[101],"addition,":[102],"we":[103,121],"formalize":[104],"security":[106,114],"model":[107],"system":[110],"prove":[112],"its":[113],"random":[117],"oracle":[118],"model.":[119],"Finally,":[120],"conduct":[122],"comprehensive":[124],"performance":[125],"evaluation":[126],"ABAEKS,":[128],"experimental":[131],"results":[132],"show":[133],"that":[134],"our":[135],"computationally":[138],"outperforms":[141],"current":[142],"state-of-the-art":[143],"schemes.":[145]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":17},{"year":2024,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
