{"id":"https://openalex.org/W4223962538","doi":"https://doi.org/10.1145/3508398.3519362","title":"MK-RS-PKE: Multi-Keyword Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms","display_name":"MK-RS-PKE: Multi-Keyword Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms","publication_year":2022,"publication_date":"2022-04-14","ids":{"openalex":"https://openalex.org/W4223962538","doi":"https://doi.org/10.1145/3508398.3519362"},"language":"en","primary_location":{"id":"doi:10.1145/3508398.3519362","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3508398.3519362","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005096549","display_name":"Israt Jahan Mouri","orcid":"https://orcid.org/0000-0003-0160-4212"},"institutions":[{"id":"https://openalex.org/I183697816","display_name":"Bangladesh University of Engineering and Technology","ror":"https://ror.org/05a1qpv97","country_code":"BD","type":"education","lineage":["https://openalex.org/I183697816"]}],"countries":["BD"],"is_corresponding":true,"raw_author_name":"Israt Jahan Mouri","raw_affiliation_strings":["Bangladesh University of Engineering and Technology (BUET), Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Bangladesh University of Engineering and Technology (BUET), Dhaka, Bangladesh","institution_ids":["https://openalex.org/I183697816"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066225174","display_name":"Muhammad Ridowan","orcid":"https://orcid.org/0000-0002-5964-675X"},"institutions":[{"id":"https://openalex.org/I183697816","display_name":"Bangladesh University of Engineering and Technology","ror":"https://ror.org/05a1qpv97","country_code":"BD","type":"education","lineage":["https://openalex.org/I183697816"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Muhammad Ridowan","raw_affiliation_strings":["Bangladesh University of Engineering and Technology (BUET), Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Bangladesh University of Engineering and Technology (BUET), Dhaka, Bangladesh","institution_ids":["https://openalex.org/I183697816"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059669108","display_name":"Muhammad Abdullah Adnan","orcid":"https://orcid.org/0000-0003-3219-9053"},"institutions":[{"id":"https://openalex.org/I183697816","display_name":"Bangladesh University of Engineering and Technology","ror":"https://ror.org/05a1qpv97","country_code":"BD","type":"education","lineage":["https://openalex.org/I183697816"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Muhammad Abdullah Adnan","raw_affiliation_strings":["Bangladesh University of Engineering and Technology (BUET), Dhaka, Bangladesh"],"affiliations":[{"raw_affiliation_string":"Bangladesh University of Engineering and Technology (BUET), Dhaka, Bangladesh","institution_ids":["https://openalex.org/I183697816"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5005096549"],"corresponding_institution_ids":["https://openalex.org/I183697816"],"apc_list":null,"apc_paid":null,"fwci":0.2653,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.59057004,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"376","last_page":"378"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9746999740600586,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8342661261558533},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.7657598257064819},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7458391785621643},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7039049863815308},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6560949087142944},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5153940916061401},{"id":"https://openalex.org/keywords/keyword-search","display_name":"Keyword search","score":0.5052908062934875},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.4793844223022461},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.4255138337612152},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.36402812600135803},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3260784149169922},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27078425884246826},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11318936944007874}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8342661261558533},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.7657598257064819},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7458391785621643},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7039049863815308},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6560949087142944},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5153940916061401},{"id":"https://openalex.org/C2988412617","wikidata":"https://www.wikidata.org/wiki/Q7441656","display_name":"Keyword search","level":2,"score":0.5052908062934875},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.4793844223022461},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.4255138337612152},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.36402812600135803},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3260784149169922},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27078425884246826},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11318936944007874}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3508398.3519362","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3508398.3519362","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2016575873","https://openalex.org/W2606882085","https://openalex.org/W2796172907","https://openalex.org/W2949495942","https://openalex.org/W3036501423","https://openalex.org/W4224023723"],"related_works":["https://openalex.org/W4389670110","https://openalex.org/W2429057255","https://openalex.org/W2187546663","https://openalex.org/W148745890","https://openalex.org/W2944823289","https://openalex.org/W2611942503","https://openalex.org/W4315621326","https://openalex.org/W2899790217","https://openalex.org/W2598865957","https://openalex.org/W1503401473"],"abstract_inverted_index":{"Since":[0],"more":[1,3],"and":[2,45,64],"data":[4,27],"from":[5],"lightweight":[6,37],"platforms":[7,38],"like":[8,39],"IoT":[9,40,86,95],"devices":[10,41,96],"or":[11],"mobile":[12],"apps":[13],"are":[14],"being":[15],"outsourced":[16],"to":[17,22,57],"the":[18,20,50,55,58,66,77,89],"cloud,":[19],"need":[21],"ensure":[23],"privacy":[24],"while":[25],"retaining":[26],"usability":[28],"is":[29,102],"essential.":[30],"This":[31],"paper":[32],"designs":[33],"a":[34,73],"framework":[35,112],"where":[36],"can":[42,62,97],"encrypt":[43],"documents":[44,70,90],"generate":[46],"document":[47,56],"indexes":[48],"using":[49,76],"public":[51],"key":[52],"before":[53],"uploading":[54],"cloud.":[59],"An":[60],"admin":[61],"search":[63],"retrieve":[65],"top-k":[67],"most":[68],"relevant":[69],"that":[71,84],"match":[72],"multi-keyword":[74],"query":[75],"private":[78],"key.":[79],"Most":[80],"existing":[81],"searchable":[82],"encryption":[83],"supports":[85],"returns":[87],"all":[88],"matching":[91],"queried":[92],"keywords.":[93],"However,":[94],"produce":[98],"massive":[99],"data,":[100],"which":[101],"not":[103],"practical":[104],"for":[105],"such":[106],"schemes.":[107],"We":[108],"formally":[109],"name":[110],"our":[111],"Multi-keyword":[113],"Ranked":[114],"Searchable":[115],"Public-Key":[116],"Encryption":[117],"(MK-RS-PKE).":[118]},"counts_by_year":[{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
