{"id":"https://openalex.org/W4408324963","doi":"https://doi.org/10.1109/tifs.2025.3550054","title":"Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search","display_name":"Lightweight Multi-User Public-Key Authenticated Encryption With Keyword Search","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4408324963","doi":"https://doi.org/10.1109/tifs.2025.3550054"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3550054","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3550054","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002020276","display_name":"Yongliang Xu","orcid":"https://orcid.org/0000-0001-7571-5498"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yongliang Xu","raw_affiliation_strings":["School of Mathematics and Statistics, Fuzhou University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Statistics, Fuzhou University, Fuzhou, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089664772","display_name":"Hang Cheng","orcid":"https://orcid.org/0000-0003-2443-2820"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hang Cheng","raw_affiliation_strings":["School of Mathematics and Statistics, Fuzhou University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Statistics, Fuzhou University, Fuzhou, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074149291","display_name":"Jiguo Li","orcid":"https://orcid.org/0000-0002-6532-2081"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiguo Li","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058120371","display_name":"Ximeng Liu","orcid":"https://orcid.org/0000-0002-4238-3295"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ximeng Liu","raw_affiliation_strings":["College of Computer and Data Science, Fuzhou University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Data Science, Fuzhou University, Fuzhou, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101889358","display_name":"Xinpeng Zhang","orcid":"https://orcid.org/0000-0002-0212-3501"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinpeng Zhang","raw_affiliation_strings":["School of Computer Science, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101717904","display_name":"Meiqing Wang","orcid":"https://orcid.org/0000-0002-3544-3704"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meiqing Wang","raw_affiliation_strings":["School of Mathematics and Statistics, Fuzhou University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Statistics, Fuzhou University, Fuzhou, China","institution_ids":["https://openalex.org/I80947539"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5002020276"],"corresponding_institution_ids":["https://openalex.org/I80947539"],"apc_list":null,"apc_paid":null,"fwci":37.7203,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.99680416,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"20","issue":null,"first_page":"3234","last_page":"3246"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8756669759750366},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.6040084362030029},{"id":"https://openalex.org/keywords/keyword-search","display_name":"Keyword search","score":0.5981225967407227},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.563831090927124},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5309236645698547},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5054106712341309},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37184828519821167},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3568838834762573},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.33655846118927},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3222341239452362}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8756669759750366},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.6040084362030029},{"id":"https://openalex.org/C2988412617","wikidata":"https://www.wikidata.org/wiki/Q7441656","display_name":"Keyword search","level":2,"score":0.5981225967407227},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.563831090927124},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5309236645698547},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5054106712341309},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37184828519821167},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3568838834762573},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.33655846118927},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3222341239452362}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3550054","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3550054","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1064780937","display_name":null,"funder_award_id":"0038/2022/A","funder_id":"https://openalex.org/F4320323893","funder_display_name":"Fundo para o Desenvolvimento das Ci\u00eancias e da Tecnologia"},{"id":"https://openalex.org/G3455523125","display_name":null,"funder_award_id":"2020J01497","funder_id":"https://openalex.org/F4320321878","funder_display_name":"Natural Science Foundation of Fujian Province"},{"id":"https://openalex.org/G3988656123","display_name":null,"funder_award_id":"62172098","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4292056625","display_name":null,"funder_award_id":"62471141","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321878","display_name":"Natural Science Foundation of Fujian Province","ror":null},{"id":"https://openalex.org/F4320323893","display_name":"Fundo para o Desenvolvimento das Ci\u00eancias e da Tecnologia","ror":"https://ror.org/05vna4324"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W1610688607","https://openalex.org/W1851414966","https://openalex.org/W2120976781","https://openalex.org/W2146828512","https://openalex.org/W2147929033","https://openalex.org/W2152924492","https://openalex.org/W2161214567","https://openalex.org/W2268989031","https://openalex.org/W2314118214","https://openalex.org/W2514981978","https://openalex.org/W2597901792","https://openalex.org/W2949495942","https://openalex.org/W2952201977","https://openalex.org/W2980098516","https://openalex.org/W2991120477","https://openalex.org/W3007218738","https://openalex.org/W3018546377","https://openalex.org/W3033487065","https://openalex.org/W3159761532","https://openalex.org/W4220948165","https://openalex.org/W4280601159","https://openalex.org/W4296437242","https://openalex.org/W4311187262","https://openalex.org/W4321021982","https://openalex.org/W4322576481","https://openalex.org/W4360993064","https://openalex.org/W4362683518","https://openalex.org/W4365421284","https://openalex.org/W4376456651","https://openalex.org/W4382119154","https://openalex.org/W4385453131","https://openalex.org/W4388937960","https://openalex.org/W4389778745","https://openalex.org/W4389947142","https://openalex.org/W4390144371","https://openalex.org/W4390481444","https://openalex.org/W4390604269","https://openalex.org/W4390660175","https://openalex.org/W4391097098","https://openalex.org/W4391827214","https://openalex.org/W4391854850","https://openalex.org/W4392405738","https://openalex.org/W4392449823","https://openalex.org/W4400878369","https://openalex.org/W4403144485","https://openalex.org/W4406119406"],"related_works":["https://openalex.org/W2126037447","https://openalex.org/W2888183313","https://openalex.org/W1503401473","https://openalex.org/W4243688874","https://openalex.org/W4252709806","https://openalex.org/W2081673223","https://openalex.org/W3191337274","https://openalex.org/W2154930424","https://openalex.org/W2808647302","https://openalex.org/W4243905050"],"abstract_inverted_index":{"Data":[0],"confidentiality,":[1],"a":[2,24,82,124,140,196],"fundamental":[3],"security":[4,191],"element":[5],"for":[6,27],"dependable":[7],"cloud":[8],"storage,":[9],"has":[10,21],"been":[11],"drawing":[12],"widespread":[13],"concern.":[14],"Public-key":[15],"encryption":[16,88],"with":[17,64,90,156],"keyword":[18,91,100],"search":[19,65,92],"(PEKS)":[20],"emerged":[22],"as":[23,195],"promising":[25],"approach":[26,120,162],"privacy":[28,62,168],"protection":[29,63],"while":[30,104,169,188],"enabling":[31],"efficient":[32],"retrieval":[33],"of":[34,38,42,60,108,118,149,159],"encrypted":[35],"data.":[36],"One":[37],"the":[39,98,106,131,147,157,175],"typical":[40],"applications":[41],"PEKS":[43],"is":[44],"searching":[45],"sensitive":[46],"electronic":[47],"medical":[48],"records":[49],"(EMR)":[50],"in":[51,113],"healthcare":[52],"clouds.":[53],"However,":[54],"many":[55],"traditional":[56],"countermeasures":[57],"fall":[58],"short":[59],"balancing":[61],"efficiency,":[66],"and":[67,110,137,151,166],"they":[68],"often":[69],"fail":[70],"to":[71,199],"support":[72],"multi-user":[73,85,114],"EMR":[74],"sharing.":[75],"To":[76],"resolve":[77],"these":[78],"challenges,":[79],"we":[80],"propose":[81],"novel":[83],"lightweight":[84],"public-key":[86],"authenticated":[87],"scheme":[89],"(LM-PAEKS).":[93],"Our":[94,161],"design":[95],"effectively":[96],"counters":[97],"inside":[99],"guessing":[101],"attack":[102],"(IKGA)":[103],"maintaining":[105],"sizes":[107,148],"ciphertext":[109,150,164],"trapdoor":[111,152,167],"constant":[112],"scenarios.":[115],"The":[116],"novelty":[117],"our":[119],"relies":[121],"on":[122,174],"introducing":[123],"dedicated":[125],"receiver":[126],"server":[127],"that":[128,182],"skillfully":[129],"transforms":[130],"complex":[132],"many-to-many":[133],"relationship":[134],"between":[135],"senders":[136],"receivers":[138],"into":[139],"streamlined":[141],"one-to-one":[142],"relationship.":[143],"This":[144],"transformation":[145],"prevents":[146],"from":[153],"scaling":[154],"linearly":[155],"number":[158],"participants.":[160],"ensures":[163],"indistinguishability":[165],"avoiding":[170],"bilinear":[171],"pairing":[172],"operations":[173],"client":[176],"side.":[177],"Comparative":[178],"performance":[179],"analysis":[180],"demonstrates":[181],"LM-PAEKS":[183],"features":[184],"significant":[185],"computational":[186],"efficiency":[187],"meeting":[189],"higher":[190],"requirements,":[192],"positioning":[193],"it":[194],"robust":[197],"alternative":[198],"existing":[200],"solutions.":[201]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":12}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
