{"id":"https://openalex.org/W4388505084","doi":"https://doi.org/10.1109/tsc.2023.3331000","title":"QPause: Quantum-Resistant Password-Protected Data Outsourcing for Cloud Storage","display_name":"QPause: Quantum-Resistant Password-Protected Data Outsourcing for Cloud Storage","publication_year":2023,"publication_date":"2023-11-08","ids":{"openalex":"https://openalex.org/W4388505084","doi":"https://doi.org/10.1109/tsc.2023.3331000"},"language":"en","primary_location":{"id":"doi:10.1109/tsc.2023.3331000","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2023.3331000","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115467726","display_name":"Jingwei Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jingwei Jiang","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin, China","Henan Key Laboratory of Network Cryptography Technology"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]},{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030674762","display_name":"Ding Wang","orcid":"https://orcid.org/0000-0002-1667-2237"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ding Wang","raw_affiliation_strings":["Key Laboratory of Data and Intelligent System Security, Ministry of Education, Nankai University, Tianjin, China","Key Laboratory of Data and Intelligent System Security (Nankai University), Ministry of Education, Tianjin, China","Henan Key Laboratory of Network Cryptography Technology"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Data and Intelligent System Security, Ministry of Education, Nankai University, Tianjin, China","institution_ids":["https://openalex.org/I205237279"]},{"raw_affiliation_string":"Key Laboratory of Data and Intelligent System Security (Nankai University), Ministry of Education, Tianjin, China","institution_ids":["https://openalex.org/I205237279"]},{"raw_affiliation_string":"Henan Key Laboratory of Network Cryptography Technology","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101907653","display_name":"Guoyin Zhang","orcid":"https://orcid.org/0000-0001-6925-3039"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guoyin Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5115467726"],"corresponding_institution_ids":["https://openalex.org/I151727225","https://openalex.org/I4210132990"],"apc_list":null,"apc_paid":null,"fwci":1.3986,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.85313795,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"17","issue":"3","first_page":"1140","last_page":"1153"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7832136750221252},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.6981915831565857},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5846208930015564},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5355759859085083},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5209020972251892},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.49099376797676086},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.42273852229118347},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3814540207386017},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06458768248558044}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7832136750221252},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.6981915831565857},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5846208930015564},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5355759859085083},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5209020972251892},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.49099376797676086},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.42273852229118347},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3814540207386017},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06458768248558044}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsc.2023.3331000","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2023.3331000","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.8299999833106995}],"awards":[{"id":"https://openalex.org/G4762923990","display_name":null,"funder_award_id":"21JCZXJC00100","funder_id":"https://openalex.org/F4320323993","funder_display_name":"Natural Science Foundation of Tianjin City"},{"id":"https://openalex.org/G5908625500","display_name":null,"funder_award_id":"21JCZDJC00190","funder_id":"https://openalex.org/F4320323993","funder_display_name":"Natural Science Foundation of Tianjin City"},{"id":"https://openalex.org/G6401220598","display_name":null,"funder_award_id":"62222208","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320323993","display_name":"Natural Science Foundation of Tianjin City","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":66,"referenced_works":["https://openalex.org/W27238938","https://openalex.org/W56544557","https://openalex.org/W74973629","https://openalex.org/W1480477462","https://openalex.org/W1511886987","https://openalex.org/W1595771334","https://openalex.org/W1967308747","https://openalex.org/W1983370494","https://openalex.org/W2007466965","https://openalex.org/W2024859348","https://openalex.org/W2038761522","https://openalex.org/W2048755632","https://openalex.org/W2056711010","https://openalex.org/W2072554986","https://openalex.org/W2084652510","https://openalex.org/W2096024255","https://openalex.org/W2104863136","https://openalex.org/W2122637856","https://openalex.org/W2126483728","https://openalex.org/W2140745722","https://openalex.org/W2141335864","https://openalex.org/W2141420453","https://openalex.org/W2149473266","https://openalex.org/W2154059840","https://openalex.org/W2159339434","https://openalex.org/W2168676717","https://openalex.org/W2218132318","https://openalex.org/W2230072610","https://openalex.org/W2351133878","https://openalex.org/W2400700555","https://openalex.org/W2405288614","https://openalex.org/W2514873781","https://openalex.org/W2519540563","https://openalex.org/W2621151780","https://openalex.org/W2734150319","https://openalex.org/W2739993935","https://openalex.org/W2781738013","https://openalex.org/W2794501668","https://openalex.org/W2795139011","https://openalex.org/W2886714247","https://openalex.org/W2913851998","https://openalex.org/W2918274086","https://openalex.org/W2963204447","https://openalex.org/W2967898990","https://openalex.org/W2983813777","https://openalex.org/W3007412953","https://openalex.org/W3014782383","https://openalex.org/W3019884349","https://openalex.org/W3037853801","https://openalex.org/W3100931082","https://openalex.org/W3108801278","https://openalex.org/W3154781724","https://openalex.org/W3165229199","https://openalex.org/W3168081317","https://openalex.org/W3178039307","https://openalex.org/W3205985117","https://openalex.org/W3215903849","https://openalex.org/W4214704132","https://openalex.org/W4254706618","https://openalex.org/W4281392221","https://openalex.org/W4288057720","https://openalex.org/W4313378981","https://openalex.org/W4324007193","https://openalex.org/W4388867451","https://openalex.org/W6713878235","https://openalex.org/W6857964490"],"related_works":["https://openalex.org/W2021087413","https://openalex.org/W2359085393","https://openalex.org/W2377774403","https://openalex.org/W2237863779","https://openalex.org/W2156083280","https://openalex.org/W2387329106","https://openalex.org/W2969720675","https://openalex.org/W2557836603","https://openalex.org/W2090295280","https://openalex.org/W2565480008"],"abstract_inverted_index":{"Cloud":[0],"storage":[1,25],"provides":[2],"an":[3,106],"efficient":[4],"and":[5,37,50,75,103,121,204],"convenient":[6],"way":[7],"to":[8,17,27,35,53,58,109,125],"manage":[9,38,76],"data,":[10],"but":[11],"it":[12,122],"also":[13],"poses":[14],"significant":[15],"challenges":[16],"data":[18,33,78,153,188],"security.":[19],"The":[20,42,215],"central":[21],"issue":[22],"with":[23,70,79,175,211],"cloud":[24,133,157],"is":[26,105,123,202],"ensure":[28],"the":[29,32,39,65,84,91,100,140,169],"ability":[30],"of":[31,67,86,90],"owner":[34],"control":[36],"outsourced":[40,77],"data.":[41,61],"password-protected":[43,129,152,187],"secret":[44,51],"sharing":[45,52],"(PPSS)":[46],"integrates":[47],"password":[48],"authentication":[49],"offer":[54],"a":[55,71,127,150,162,176,184],"fresh":[56],"approach":[57],"secure":[59,171,177,203],"private":[60],"Users":[62],"can":[63,95],"share":[64],"risk":[66],"device":[68],"corruption":[69],"well-designed":[72],"PPSS":[73,93,165],"scheme":[74,131,155,166,190,201,222],"only":[80],"human-memorizable":[81],"passwords.":[82],"To":[83],"best":[85],"our":[87,200,220],"knowledge,":[88],"none":[89],"existing":[92],"schemes":[94],"resist":[96],"security":[97],"threats":[98],"in":[99],"post-quantum":[101,114],"era,":[102],"there":[104],"urgent":[107],"need":[108],"design":[110,126,161],"quantum-resistant":[111,128,151,164,185],"solutions.":[112],"However,":[113],"cryptography":[115],"varies":[116],"significantly":[117],"from":[118],"traditional":[119],"cryptography,":[120],"challenging":[124],"secret-sharing":[130],"for":[132,156],"storage.":[134,158],"In":[135,194],"this":[136,145,180],"work,":[137],"we":[138,182,196],"take":[139],"first":[141,160],"substantial":[142],"step":[143],"towards":[144],"challenge":[146],"by":[147],"proposing":[148],"QPause,":[149],"outsourcing":[154,189],"We":[159],"basic":[163],"based":[167],"on":[168],"lattice":[170],"against":[172,191,209],"semi-honest":[173],"adversaries":[174,210],"channel.":[178],"On":[179],"foundation,":[181],"propose":[183],"round-optimal":[186],"strong":[192],"adversaries.":[193],"addition,":[195],"formally":[197],"prove":[198],"that":[199,219],"robust":[205],"under":[206],"various":[207],"attacks":[208],"quantum":[212],"computing":[213],"capabilities.":[214],"comparison":[216],"results":[217],"show":[218],"new":[221],"outperforms":[223],"its":[224],"foremost":[225],"counterparts.":[226]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
