{"id":"https://openalex.org/W4392449823","doi":"https://doi.org/10.1109/tmc.2024.3373626","title":"Re-PAEKS: Public-Key Authenticated Re-Encryption With Keyword Search","display_name":"Re-PAEKS: Public-Key Authenticated Re-Encryption With Keyword Search","publication_year":2024,"publication_date":"2024-03-05","ids":{"openalex":"https://openalex.org/W4392449823","doi":"https://doi.org/10.1109/tmc.2024.3373626"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2024.3373626","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2024.3373626","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000037502","display_name":"Fucai Luo","orcid":"https://orcid.org/0000-0001-7961-5750"},"institutions":[{"id":"https://openalex.org/I75059550","display_name":"Zhejiang Gongshang University","ror":"https://ror.org/0569mkk41","country_code":"CN","type":"education","lineage":["https://openalex.org/I75059550"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fucai Luo","raw_affiliation_strings":["School of Computer Science and Technology, Zhejiang Gongshang University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-7961-5750","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Zhejiang Gongshang University, Hangzhou, China","institution_ids":["https://openalex.org/I75059550"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102003407","display_name":"Haiyan Wang","orcid":"https://orcid.org/0000-0002-5702-9897"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haiyan Wang","raw_affiliation_strings":["Department of New Networks, Peng Cheng Laboratory, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0002-5702-9897","affiliations":[{"raw_affiliation_string":"Department of New Networks, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032278260","display_name":"Xingfu Yan","orcid":"https://orcid.org/0000-0002-3026-0976"},"institutions":[{"id":"https://openalex.org/I187400657","display_name":"South China Normal University","ror":"https://ror.org/01kq0pv72","country_code":"CN","type":"education","lineage":["https://openalex.org/I187400657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingfu Yan","raw_affiliation_strings":["School of Computer Science, South China Normal University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-3026-0976","affiliations":[{"raw_affiliation_string":"School of Computer Science, South China Normal University, Guangzhou, China","institution_ids":["https://openalex.org/I187400657"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5000037502"],"corresponding_institution_ids":["https://openalex.org/I75059550"],"apc_list":null,"apc_paid":null,"fwci":3.9736,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.94111808,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"23","issue":"10","first_page":"10077","last_page":"10092"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8234124183654785},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.6208207607269287},{"id":"https://openalex.org/keywords/keyword-search","display_name":"Keyword search","score":0.6133871674537659},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5719690322875977},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5477872490882874},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4924405515193939},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4310499429702759},{"id":"https://openalex.org/keywords/authenticated-encryption","display_name":"Authenticated encryption","score":0.4199782609939575},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4121444821357727},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3080589175224304}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8234124183654785},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.6208207607269287},{"id":"https://openalex.org/C2988412617","wikidata":"https://www.wikidata.org/wiki/Q7441656","display_name":"Keyword search","level":2,"score":0.6133871674537659},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5719690322875977},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5477872490882874},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4924405515193939},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4310499429702759},{"id":"https://openalex.org/C128619300","wikidata":"https://www.wikidata.org/wiki/Q15263584","display_name":"Authenticated encryption","level":3,"score":0.4199782609939575},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4121444821357727},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3080589175224304}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmc.2024.3373626","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2024.3373626","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G277891089","display_name":null,"funder_award_id":"62302445","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7440696079","display_name":null,"funder_award_id":"62302173","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W46948259","https://openalex.org/W64397452","https://openalex.org/W74973629","https://openalex.org/W1590823599","https://openalex.org/W1622109882","https://openalex.org/W1851414966","https://openalex.org/W1992259749","https://openalex.org/W2000181148","https://openalex.org/W2043533815","https://openalex.org/W2058785578","https://openalex.org/W2061949491","https://openalex.org/W2113333997","https://openalex.org/W2113717903","https://openalex.org/W2114664664","https://openalex.org/W2122973102","https://openalex.org/W2147929033","https://openalex.org/W2161214567","https://openalex.org/W2180461881","https://openalex.org/W2280409606","https://openalex.org/W2400700555","https://openalex.org/W2514981978","https://openalex.org/W2597901792","https://openalex.org/W2726147677","https://openalex.org/W2767329275","https://openalex.org/W2889358002","https://openalex.org/W2903949249","https://openalex.org/W2943600914","https://openalex.org/W2980098516","https://openalex.org/W2982169647","https://openalex.org/W3023478445","https://openalex.org/W3159761532","https://openalex.org/W3180045103","https://openalex.org/W3200116816","https://openalex.org/W3201545989","https://openalex.org/W4205765479","https://openalex.org/W4226173152","https://openalex.org/W4281399814","https://openalex.org/W4285279389","https://openalex.org/W4296079577","https://openalex.org/W4296918486","https://openalex.org/W4299827018","https://openalex.org/W4311187262","https://openalex.org/W4377079727","https://openalex.org/W4381946520","https://openalex.org/W4385453131","https://openalex.org/W4386485362","https://openalex.org/W4390045288"],"related_works":["https://openalex.org/W2592488952","https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2757111556","https://openalex.org/W2385965183","https://openalex.org/W4289281780","https://openalex.org/W1503401473","https://openalex.org/W767161385","https://openalex.org/W2115968409","https://openalex.org/W2033075522"],"abstract_inverted_index":{"The":[0],"rapid":[1],"development":[2],"of":[3,10,30,42,50,67,89,150,188,217,236],"cloud":[4],"computing":[5],"and":[6,22,40,91,104,152,166,174,184,220,239,250],"the":[7,28,47,51,56,65,84,148,179,186,193,214,218,225,237,240,245,253,256],"exponential":[8],"growth":[9],"data":[11,20,32,38,53,69,81,102],"have":[12],"led":[13],"to":[14,76,114,169,203,261],"an":[15],"increasing":[16],"demand":[17],"for":[18],"secure":[19,31,68,101,205],"sharing":[21,39,103],"querying.":[23,105],"Proxy":[24],"re-encryption":[25,94,141],"(PRE)":[26],"addresses":[27],"issue":[29,66],"sharing,":[33],"since":[34,71],"it":[35,72],"enables":[36,99],"controlled":[37],"delegation":[41,187],"access":[43,189],"rights":[44,190],"without":[45],"revealing":[46],"actual":[48],"content":[49],"encrypted":[52,80],"stored":[54,82],"in":[55,83,224],"cloud;":[57],"public-key":[58,139,153],"encryption":[59,155,196],"with":[60,95,142,156],"keyword":[61,96,118,143,157],"search":[62,78,97,144,158],"(PEKS)":[63],"tackles":[64],"querying,":[70],"allows":[73],"resource-constrained":[74],"clients":[75],"effectively":[77],"over":[79],"cloud.":[85],"As":[86],"a":[87,134,232],"combination":[88],"PRE":[90,151],"PEKS,":[92],"proxy":[93],"(PRES)":[98],"both":[100,170],"Despite":[106],"their":[107],"merits,":[108],"existing":[109],"PRES":[110],"schemes":[111],"are":[112,200],"vulnerable":[113],"quantum":[115,171,207],"computer":[116,172,208],"attacks,":[117],"guessing":[119],"attacks":[120,173],"(KGAs),":[121],"or":[122],"incur":[123],"high":[124],"end-to-end":[125,164,258],"delay.":[126],"To":[127],"address":[128],"these":[129],"vulnerabilities,":[130],"this":[131],"paper":[132],"introduces":[133],"novel":[135],"cryptographic":[136],"primitive":[137],"called":[138],"authenticated":[140,154],"(Re-PAEKS),":[145],"which":[146,199],"combines":[147],"strengths":[149],"(PAEKS).":[159],"Our":[160],"Re-PAEKS":[161,219,246,254],"has":[162],"low":[163],"delay,":[165],"is":[167,247],"resistant":[168],"KGAs.":[175],"Technically,":[176],"we":[177,212,230],"improve":[178],"previous":[180],"lattice-based":[181,194],"PAEKS":[182],"scheme":[183],"achieve":[185],"by":[191],"exploiting":[192],"identity-based":[195],"(IBE)":[197],"techniques,":[198],"widely":[201],"believed":[202],"be":[204],"against":[206],"attacks.":[209],"In":[210],"addition,":[211],"formalize":[213],"security":[215,223],"model":[216],"prove":[221],"its":[222],"random":[226],"oracle":[227],"model.":[228],"Finally,":[229],"conduct":[231],"comprehensive":[233],"performance":[234],"evaluation":[235],"Re-PAEKS,":[238],"experimental":[241],"results":[242],"show":[243],"that":[244],"computationally":[248],"efficient":[249],"practical.":[251],"Particularly,":[252],"enjoys":[255],"lowest":[257],"delay":[259],"compared":[260],"current":[262],"state-of-the-art":[263],"PRES.":[264]},"counts_by_year":[{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
