{"id":"https://openalex.org/W4403578209","doi":"https://doi.org/10.1145/3627673.3679522","title":"Post-Quantum Searchable Encryption Supporting User-Authorization for Outsourced Data Management","display_name":"Post-Quantum Searchable Encryption Supporting User-Authorization for Outsourced Data Management","publication_year":2024,"publication_date":"2024-10-20","ids":{"openalex":"https://openalex.org/W4403578209","doi":"https://doi.org/10.1145/3627673.3679522"},"language":"en","primary_location":{"id":"doi:10.1145/3627673.3679522","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3627673.3679522","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd ACM International Conference on Information and Knowledge Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102714724","display_name":"Shiyuan Xu","orcid":"https://orcid.org/0000-0001-9076-1695"},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Shiyuan Xu","raw_affiliation_strings":["Department of Computer Science, The University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081921130","display_name":"Yibo Cao","orcid":"https://orcid.org/0009-0008-0826-1164"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yibo Cao","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100408555","display_name":"Xue Chen","orcid":"https://orcid.org/0000-0002-9456-3124"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]},{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xue Chen","raw_affiliation_strings":["Department of Computer Science, The University of Hong Kong &amp; The Hong Kong Polytechnic University, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Hong Kong &amp; The Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I14243506","https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021523270","display_name":"Yu Guo","orcid":"https://orcid.org/0000-0002-9078-7462"},"institutions":[{"id":"https://openalex.org/I25254941","display_name":"Beijing Normal University","ror":"https://ror.org/022k4wk35","country_code":"CN","type":"education","lineage":["https://openalex.org/I25254941"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Guo","raw_affiliation_strings":["School of Artificial Intelligence, Beijing Normal University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Beijing Normal University, Beijing, China","institution_ids":["https://openalex.org/I25254941"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075048645","display_name":"Yuer Yang","orcid":"https://orcid.org/0000-0001-6489-286X"},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Yuer Yang","raw_affiliation_strings":["Department of Computer Science, The University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054549656","display_name":"Fangda Guo","orcid":"https://orcid.org/0000-0003-2401-6499"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fangda Guo","raw_affiliation_strings":["CAS Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"CAS Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025130883","display_name":"Siu Ming Yiu","orcid":"https://orcid.org/0000-0002-3975-8500"},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Siu-Ming Yiu","raw_affiliation_strings":["Department of Computer Science, The University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I889458895"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5102714724"],"corresponding_institution_ids":["https://openalex.org/I889458895"],"apc_list":null,"apc_paid":null,"fwci":3.8227,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.94244399,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2702","last_page":"2711"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7157665491104126},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6864792108535767},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.6629678010940552},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48724737763404846},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.4063509404659271},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3305927515029907}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7157665491104126},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6864792108535767},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.6629678010940552},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48724737763404846},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.4063509404659271},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3305927515029907}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3627673.3679522","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3627673.3679522","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd ACM International Conference on Information and Knowledge Management","raw_type":"proceedings-article"},{"id":"pmh:oai:hub.hku.hk:10722/359702","is_oa":false,"landing_page_url":"https://hub.hku.hk/handle/10722/359702","pdf_url":null,"source":{"id":"https://openalex.org/S4377196271","display_name":"The HKU Scholars Hub (University of Hong Kong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I889458895","host_organization_name":"University of Hong Kong","host_organization_lineage":["https://openalex.org/I889458895"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference_Paper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W121367636","https://openalex.org/W1592092778","https://openalex.org/W2400700555","https://openalex.org/W2501174062","https://openalex.org/W2560631572","https://openalex.org/W2597901792","https://openalex.org/W2618686994","https://openalex.org/W2791603174","https://openalex.org/W2889358002","https://openalex.org/W2924667697","https://openalex.org/W2943600914","https://openalex.org/W2958449681","https://openalex.org/W2980098516","https://openalex.org/W2993938324","https://openalex.org/W3158841814","https://openalex.org/W3171854304","https://openalex.org/W3197596929","https://openalex.org/W3216318461","https://openalex.org/W4210288541","https://openalex.org/W4220854638","https://openalex.org/W4226173152","https://openalex.org/W4226286700","https://openalex.org/W4280602049","https://openalex.org/W4281399814","https://openalex.org/W4283781252","https://openalex.org/W4296918486","https://openalex.org/W4310054767","https://openalex.org/W4318323571","https://openalex.org/W4387846504","https://openalex.org/W4387849011","https://openalex.org/W4387986864","https://openalex.org/W4389538565","https://openalex.org/W4389609651","https://openalex.org/W4391174664","https://openalex.org/W4394882806","https://openalex.org/W4399174688"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W4289281780","https://openalex.org/W4235015634","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W4237598585","https://openalex.org/W2359552542"],"abstract_inverted_index":{"With":[0],"the":[1,30,53,80,145,184,192],"widespread":[2],"development":[3],"of":[4,32,55,122,147],"database":[5],"systems,":[6],"data":[7,45,132],"security":[8,111,212],"has":[9],"become":[10],"crucial":[11],"when":[12],"it":[13,88],"comes":[14],"to":[15,28,51,57,82,91,104,143,158,183,205,226],"sharing":[16],"among":[17],"users":[18,59,78,103],"and":[19,48,191,210,229],"servers.":[20],"A":[21],"straightforward":[22],"approach":[23],"involves":[24],"using":[25],"searchable":[26],"encryption":[27,67,141],"ensure":[29],"confidentiality":[31],"shared":[33],"data.":[34],"However,":[35],"in":[36,213],"certain":[37],"scenarios,":[38],"varying":[39],"user":[40,168,185,193],"tiers":[41],"are":[42],"granted":[43],"disparate":[44],"searching":[46],"privileges,":[47],"administrators":[49],"need":[50],"restrict":[52],"searchability":[54],"ciphertexts":[56],"select":[58],"exclusively.":[60],"To":[61],"address":[62],"this":[63,115],"issue,":[64],"public":[65,148],"key":[66,149],"with":[68,234],"authorized":[69,77,167,181,199],"keyword":[70,85,127],"search":[71,105,172],"(PEAKS)":[72],"was":[73],"proposed,":[74],"wherein":[75],"solely":[76],"possess":[79],"ability":[81],"conduct":[83,219],"targeted":[84],"searches.":[86],"Nonetheless,":[87],"is":[89,112,203],"vulnerable":[90],"resist":[92],"quantum":[93,110,163,215],"computing":[94],"attacks.":[95],"As":[96],"a":[97,119,171,187,195,214,223],"result,":[98],"research":[99],"focusing":[100],"on":[101,222],"authorizing":[102],"for":[106,130,197],"keywords":[107],"while":[108],"achieving":[109],"far-reaching.":[113],"In":[114],"paper,":[116],"we":[117,152],"propose":[118],"lattice-based":[120],"variant":[121],"PEAKS":[123],"(L-PEAKS)":[124],"that":[125],"enables":[126],"dataset":[128],"authorization":[129],"outsourced":[131],"management.":[133,150],"Unlike":[134],"existing":[135,235],"schemes,":[136],"our":[137],"design":[138],"incorporates":[139],"identity-based":[140],"(IBE)":[142],"overcome":[144],"bottleneck":[146],"Besides,":[151],"utilize":[153],"several":[154],"lattice":[155],"sampling":[156],"algorithms":[157],"defend":[159],"against":[160,208],"attacks":[161],"from":[162,174],"adversaries.":[164],"Specifically,":[165],"each":[166],"must":[169],"obtain":[170],"privilege":[173],"an":[175,180],"authority.":[176],"The":[177],"authority":[178],"distributes":[179],"token":[182],"within":[186],"specific":[188],"time":[189],"period,":[190],"generates":[194],"trapdoor":[196],"any":[198],"keywords.":[200],"Our":[201],"scheme":[202],"proven":[204],"be":[206],"secure":[207],"IND-sID-CKA":[209],"T-EUF":[211],"setting.":[216],"We":[217],"also":[218],"comprehensive":[220],"evaluations":[221],"commodity":[224],"machine":[225],"assess":[227],"completeness":[228],"provide":[230],"theoretical":[231],"complexity":[232],"comparisons":[233],"state-of-the-art":[236],"schemes.":[237]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":9}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
