{"id":"https://openalex.org/W4296437242","doi":"https://doi.org/10.1109/tsc.2022.3207750","title":"Secure and Practical Wildcard Searchable Encryption System Based on Inner Product","display_name":"Secure and Practical Wildcard Searchable Encryption System Based on Inner Product","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4296437242","doi":"https://doi.org/10.1109/tsc.2022.3207750"},"language":"en","primary_location":{"id":"doi:10.1109/tsc.2022.3207750","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2022.3207750","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100345631","display_name":"Yu Li","orcid":"https://orcid.org/0000-0001-6932-7667"},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yu Li","raw_affiliation_strings":["Shanghai Key Laboratory of Trustworthy Computing, School of Software Engineering, East China Normal University, Shanghai, China"],"raw_orcid":"https://orcid.org/0000-0001-6932-7667","affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, School of Software Engineering, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081596329","display_name":"Jianting Ning","orcid":"https://orcid.org/0000-0001-7165-398X"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianting Ning","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-7165-398X","affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022828079","display_name":"Jie Chen","orcid":"https://orcid.org/0000-0001-6757-6416"},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Chen","raw_affiliation_strings":["Shanghai Key Laboratory of Trustworthy Computing, School of Software Engineering, East China Normal University, Shanghai, China"],"raw_orcid":"https://orcid.org/0000-0001-6757-6416","affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, School of Software Engineering, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100345631"],"corresponding_institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"],"apc_list":null,"apc_paid":null,"fwci":3.1908,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.92830278,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9555000066757202,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8624822497367859},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7758750915527344},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5856245160102844},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5571542978286743},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5169400572776794},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.49453994631767273},{"id":"https://openalex.org/keywords/functional-encryption","display_name":"Functional encryption","score":0.4567606747150421},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42921626567840576},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3875352740287781},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3728492259979248},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.10125410556793213},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09078580141067505}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8624822497367859},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7758750915527344},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5856245160102844},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5571542978286743},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5169400572776794},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.49453994631767273},{"id":"https://openalex.org/C2780746774","wikidata":"https://www.wikidata.org/wiki/Q17014981","display_name":"Functional encryption","level":4,"score":0.4567606747150421},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42921626567840576},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3875352740287781},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3728492259979248},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.10125410556793213},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09078580141067505}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsc.2022.3207750","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2022.3207750","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W65414435","https://openalex.org/W177444027","https://openalex.org/W209244779","https://openalex.org/W265050821","https://openalex.org/W1589843374","https://openalex.org/W1596208550","https://openalex.org/W1724472458","https://openalex.org/W1929869986","https://openalex.org/W1999078045","https://openalex.org/W2026892462","https://openalex.org/W2053207841","https://openalex.org/W2080574324","https://openalex.org/W2082190228","https://openalex.org/W2093175219","https://openalex.org/W2120976781","https://openalex.org/W2122590785","https://openalex.org/W2147929033","https://openalex.org/W2152924492","https://openalex.org/W2160331838","https://openalex.org/W2161214567","https://openalex.org/W2165111290","https://openalex.org/W2395093458","https://openalex.org/W2475324355","https://openalex.org/W2624841517","https://openalex.org/W2766270866","https://openalex.org/W2809798689","https://openalex.org/W2887752428","https://openalex.org/W2889153834","https://openalex.org/W2891250116","https://openalex.org/W2914247668","https://openalex.org/W3021104834","https://openalex.org/W3037797584","https://openalex.org/W3049294938","https://openalex.org/W3091517985","https://openalex.org/W3208862805","https://openalex.org/W6671828919","https://openalex.org/W6682311248","https://openalex.org/W6795817340"],"related_works":["https://openalex.org/W4312792038","https://openalex.org/W2769459874","https://openalex.org/W1993945719","https://openalex.org/W2915067502","https://openalex.org/W2231057570","https://openalex.org/W3004922236","https://openalex.org/W222001389","https://openalex.org/W4315815885","https://openalex.org/W2030024189","https://openalex.org/W2888614508"],"abstract_inverted_index":{"As":[0],"cloud":[1],"computing":[2],"is":[3,27,90,112,158],"widely":[4],"used":[5],"in":[6,188,194],"a":[7,29,63,83,94,162],"variety":[8],"of":[9,18,65,155,192],"different":[10],"applications,":[11],"how":[12],"to":[13,47,67,114,123,143],"continuously":[14],"improve":[15],"the":[16,40,52,68,103,141,148,195],"efficiency":[17],"processing":[19],"data":[20,23],"while":[21],"protecting":[22],"privacy":[24],"and":[25,49,72,135,173,180],"security":[26,142,146,153],"still":[28],"problem":[30],"worth":[31],"investigating.":[32],"Existing":[33],"searchable":[34,76,86],"encryption":[35,87,98],"schemes":[36],"mainly":[37],"focus":[38],"on":[39,70,93,118,161],"exact":[41],"matching":[42],"patterns,":[43],"which":[44,89],"are":[45],"insufficient":[46],"meet":[48],"cope":[50],"with":[51],"increasing":[53],"demands":[54],"for":[55],"fuzzy":[56],"search.":[57,127],"In":[58,78],"particular,":[59],"there":[60],"has":[61],"been":[62],"lack":[64],"attention":[66],"research":[69],"practical":[71],"privacy-preserving":[73],"fully":[74,125],"wildcard":[75,85,126],"encryption.":[77],"this":[79],"article,":[80],"we":[81,139],"propose":[82],"new":[84],"system,":[88],"built":[91],"based":[92],"novel":[95],"inner":[96,109],"product":[97,110],"scheme":[99],"that":[100],"can":[101],"address":[102],"above":[104],"challenges":[105],"simultaneously.":[106],"A":[107],"two-dimensional":[108],"relation":[111],"introduced":[113],"remove":[115],"all":[116],"restrictions":[117],"wildcards,":[119],"allowing":[120],"our":[121,156,183],"system":[122,169,184],"support":[124],"To":[128],"resist":[129],"active":[130],"attacks":[131],"from":[132],"malicious":[133],"adversaries":[134],"prevent":[136],"information":[137],"leakage,":[138],"enhance":[140],"adaptive":[144],"simulation-based":[145],"under":[147],"SXDH":[149],"assumption.":[150],"The":[151],"corresponding":[152],"proof":[154,164],"construction":[157],"implicitly":[159],"established":[160],"hash":[163],"system.":[165],"Our":[166],"elaborately":[167],"constructed":[168],"removes":[170],"redundant":[171],"parameters":[172],"extra":[174],"complex":[175],"computations,":[176],"ensuring":[177],"its":[178],"practicality":[179],"efficiency.":[181],"Finally,":[182],"shows":[185],"better":[186],"performance":[187],"more":[189],"than":[190],"86%":[191],"cases":[193],"conducted":[196],"experiments.":[197]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
