{"id":"https://openalex.org/W4388937960","doi":"https://doi.org/10.1109/tifs.2023.3336160","title":"Server-Aided Public Key Authenticated Searchable Encryption With Constant Ciphertext and Constant Trapdoor","display_name":"Server-Aided Public Key Authenticated Searchable Encryption With Constant Ciphertext and Constant Trapdoor","publication_year":2023,"publication_date":"2023-11-23","ids":{"openalex":"https://openalex.org/W4388937960","doi":"https://doi.org/10.1109/tifs.2023.3336160"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3336160","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3336160","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064067464","display_name":"Leixiao Cheng","orcid":"https://orcid.org/0000-0002-7231-0636"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]},{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Leixiao Cheng","raw_affiliation_strings":["School of Mathematics, Shandong University, Jinan, China","School of Cyber Science and Technology, Shandong University, Qingdao, China"],"raw_orcid":"https://orcid.org/0000-0002-7231-0636","affiliations":[{"raw_affiliation_string":"School of Mathematics, Shandong University, Jinan, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080296449","display_name":"Fei Meng","orcid":"https://orcid.org/0000-0001-9445-1547"},"institutions":[{"id":"https://openalex.org/I4403928416","display_name":"Beijing Institute of Mathematical Sciences and Applications","ror":"https://ror.org/05t6hvr95","country_code":null,"type":"education","lineage":["https://openalex.org/I4403928416","https://openalex.org/I99065089"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Meng","raw_affiliation_strings":["Yanqi Lake Beijing Institute of Mathematical Sciences and Applications, Beijing, China","Yau Mathematical Sciences Center, Tsinghua University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-9445-1547","affiliations":[{"raw_affiliation_string":"Yanqi Lake Beijing Institute of Mathematical Sciences and Applications, Beijing, China","institution_ids":["https://openalex.org/I4403928416"]},{"raw_affiliation_string":"Yau Mathematical Sciences Center, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5064067464"],"corresponding_institution_ids":["https://openalex.org/I154099455","https://openalex.org/I80143920"],"apc_list":null,"apc_paid":null,"fwci":3.5387,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.94249501,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"19","issue":null,"first_page":"1388","last_page":"1400"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9822999835014343,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8267802000045776},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7360638976097107},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.7168148159980774},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5716379284858704},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5487644076347351},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5167152285575867},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.5122694373130798},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4410780966281891},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35676175355911255}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8267802000045776},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7360638976097107},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7168148159980774},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5716379284858704},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5487644076347351},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5167152285575867},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.5122694373130798},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4410780966281891},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35676175355911255}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2023.3336160","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3336160","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4569418997","display_name":null,"funder_award_id":"ZR2022QF043","funder_id":"https://openalex.org/F4320324174","funder_display_name":"Natural Science Foundation of Shandong Province"}],"funders":[{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320324174","display_name":"Natural Science Foundation of Shandong Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1720304360","https://openalex.org/W1851414966","https://openalex.org/W2087223825","https://openalex.org/W2147929033","https://openalex.org/W2161214567","https://openalex.org/W2268989031","https://openalex.org/W2296398181","https://openalex.org/W2397111273","https://openalex.org/W2425475030","https://openalex.org/W2514981978","https://openalex.org/W2597901792","https://openalex.org/W2764301848","https://openalex.org/W2766749922","https://openalex.org/W2767329275","https://openalex.org/W2898327097","https://openalex.org/W2908345802","https://openalex.org/W2914247668","https://openalex.org/W2975754231","https://openalex.org/W2991120477","https://openalex.org/W2997594590","https://openalex.org/W3007218738","https://openalex.org/W3015253085","https://openalex.org/W3018546377","https://openalex.org/W3037797584","https://openalex.org/W3038204796","https://openalex.org/W3159761532","https://openalex.org/W3196834371","https://openalex.org/W3204053154","https://openalex.org/W3205329844","https://openalex.org/W3208451968","https://openalex.org/W3211012931","https://openalex.org/W4205320985","https://openalex.org/W4281382238","https://openalex.org/W4281399814","https://openalex.org/W4296079577","https://openalex.org/W4296918486","https://openalex.org/W4297902788","https://openalex.org/W4311187262","https://openalex.org/W4312400442","https://openalex.org/W4312468801","https://openalex.org/W4320717211","https://openalex.org/W4376456651","https://openalex.org/W4385834353"],"related_works":["https://openalex.org/W2993833576","https://openalex.org/W2776877297","https://openalex.org/W2127920220","https://openalex.org/W3125718803","https://openalex.org/W3119288169","https://openalex.org/W2945097178","https://openalex.org/W4388741024","https://openalex.org/W4320855289","https://openalex.org/W3122953031","https://openalex.org/W1611563112"],"abstract_inverted_index":{"Public":[0],"key":[1,57,93,116],"authenticated":[2,117],"encryption":[3,13,118],"with":[4,53,119,233],"keyword":[5,18,52,120,155],"search":[6,63,70,121,162,175],"(PAEKS)":[7],"is":[8,26,197,231],"an":[9],"advanced":[10],"asymmetric":[11],"searchable":[12],"technique":[14],"secure":[15],"against":[16],"inside":[17],"guessing":[19],"attacks.":[20],"A":[21],"common":[22],"application":[23],"of":[24,126,132,147,180,205,240,251],"PAEKS":[25,41,100,235],"searching":[27],"for":[28,64,71,85,102,163,176],"encrypted":[29,66,72,165,178],"Electronic":[30],"Health":[31],"Records":[32],"(EHR)":[33],"within":[34],"a":[35,77,137,141,171,215],"healthcare":[36],"cloud.":[37],"Nevertheless,":[38],"the":[39,43,50,65,86,98,113,124,130,145,151,154,168,177,193,200,203,206,226],"standard":[40,99],"necessitates":[42],"sender":[44,138,152,185],"(e.g.,":[45,79],"doctor)":[46],"to":[47,58,62,69,161,174,218],"separately":[48],"encrypt":[49],"same":[51,87],"each":[54,90],"receiver\u2019s":[55],"public":[56,92,115],"enable":[59],"multiple":[60,75,184],"researchers":[61],"EHR.":[67],"Similarly,":[68],"EHRs":[73],"from":[74],"senders,":[76],"receiver":[78,142,160,169,188],"researcher)":[80],"must":[81],"create":[82],"distinct":[83],"trapdoors":[84],"keyword,":[88],"using":[89],"sender\u2019s":[91],"separately.":[94],"These":[95],"features":[96],"render":[97],"impractical":[101],"use":[103],"in":[104,129,192,199],"multi-user":[105],"scenarios.":[106],"To":[107],"resolve":[108],"this":[109],"challenge,":[110],"we":[111,213,244],"introduce":[112],"server-aided":[114],"(SA-PAEKS)":[122],"scheme,":[123,253],"novelty":[125],"which":[127],"lies":[128],"incorporation":[131],"two":[133,149],"additional":[134],"servers,":[135,150],"specifically":[136],"server":[139],"and":[140,167,187,208,222,237,248],"server.":[143],"With":[144],"help":[146],"these":[148],"encrypts":[153],"just":[156],"once,":[157],"allowing":[158],"any":[159,181,234],"his":[164],"EHR,":[166],"creates":[170],"single":[172],"trapdoor":[173,209],"EHR":[179],"sender.":[182],"When":[183],"servers":[186,189],"are":[190],"introduced":[191],"system,":[194],"our":[195,252],"scheme":[196,236],"scalable":[198],"sense":[201],"that":[202],"size":[204],"ciphertext":[207,220],"remains":[210],"constant.":[211],"Furthermore,":[212],"provide":[214,245],"generic":[216],"approach":[217,230],"achieve":[219],"deduplication":[221],"fast":[223],"search,":[224],"enhancing":[225],"overall":[227],"efficiency.":[228],"This":[229],"compatible":[232],"may":[238],"be":[239],"independent":[241],"interest.":[242],"Finally,":[243],"both":[246],"theoretical":[247],"experimental":[249],"evaluations":[250],"demonstrating":[254],"its":[255],"competitive":[256],"performance.":[257]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":17},{"year":2024,"cited_by_count":3}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
