{"id":"https://openalex.org/W3134593463","doi":"https://doi.org/10.1186/s13638-020-01875-2","title":"Ciphertext-policy attribute-based encryption with hidden sensitive policy from keyword search techniques in smart city","display_name":"Ciphertext-policy attribute-based encryption with hidden sensitive policy from keyword search techniques in smart city","publication_year":2021,"publication_date":"2021-02-03","ids":{"openalex":"https://openalex.org/W3134593463","doi":"https://doi.org/10.1186/s13638-020-01875-2","mag":"3134593463"},"language":"en","primary_location":{"id":"doi:10.1186/s13638-020-01875-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-020-01875-2","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-020-01875-2","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-020-01875-2","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080296449","display_name":"Fei Meng","orcid":"https://orcid.org/0000-0001-9445-1547"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fei Meng","raw_affiliation_strings":["Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, South Shanda Road, No. 27, Jinan, 250100, China","School of Mathematics, Shandong University, South Shanda Road, No. 27, Jinan, 250100, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, South Shanda Road, No. 27, Jinan, 250100, China","institution_ids":[]},{"raw_affiliation_string":"School of Mathematics, Shandong University, South Shanda Road, No. 27, Jinan, 250100, China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064067464","display_name":"Leixiao Cheng","orcid":"https://orcid.org/0000-0002-7231-0636"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Leixiao Cheng","raw_affiliation_strings":["School of Mathematics, Shandong University, South Shanda Road, No. 27, Jinan, 250100, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Mathematics, Shandong University, South Shanda Road, No. 27, Jinan, 250100, China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101406685","display_name":"Mingqiang Wang","orcid":"https://orcid.org/0000-0001-9221-4230"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingqiang Wang","raw_affiliation_strings":["Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, South Shanda Road, No. 27, Jinan, 250100, China","School of Mathematics, Shandong University, South Shanda Road, No. 27, Jinan, 250100, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, South Shanda Road, No. 27, Jinan, 250100, China","institution_ids":[]},{"raw_affiliation_string":"School of Mathematics, Shandong University, South Shanda Road, No. 27, Jinan, 250100, China","institution_ids":["https://openalex.org/I154099455"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5080296449"],"corresponding_institution_ids":["https://openalex.org/I154099455"],"apc_list":{"value":1140,"currency":"GBP","value_usd":1398},"apc_paid":{"value":1140,"currency":"GBP","value_usd":1398},"fwci":1.959,"has_fulltext":true,"cited_by_count":21,"citation_normalized_percentile":{"value":0.88360291,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"2021","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.8434503078460693},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.817730188369751},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.8156585693359375},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.734232485294342},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6184217929840088},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.5953909754753113},{"id":"https://openalex.org/keywords/access-structure","display_name":"Access structure","score":0.4912406802177429},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.45550796389579773},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.34619131684303284},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3461330533027649},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2386319637298584},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.1465752124786377},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1119738221168518}],"concepts":[{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.8434503078460693},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.817730188369751},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.8156585693359375},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.734232485294342},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6184217929840088},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.5953909754753113},{"id":"https://openalex.org/C2778950925","wikidata":"https://www.wikidata.org/wiki/Q4672474","display_name":"Access structure","level":4,"score":0.4912406802177429},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.45550796389579773},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.34619131684303284},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3461330533027649},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2386319637298584},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.1465752124786377},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1119738221168518},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13638-020-01875-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-020-01875-2","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-020-01875-2","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:950a56d0fb564c78896a7a38965582b4","is_oa":true,"landing_page_url":"https://doaj.org/article/950a56d0fb564c78896a7a38965582b4","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking, Vol 2021, Iss 1, Pp 1-22 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13638-020-01875-2","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-020-01875-2","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-020-01875-2","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.4399999976158142}],"awards":[{"id":"https://openalex.org/G1467633583","display_name":null,"funder_award_id":"MMJJ20180210","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G279538958","display_name":null,"funder_award_id":"61672019","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7163822104","display_name":null,"funder_award_id":"61832012","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3134593463.pdf","grobid_xml":"https://content.openalex.org/works/W3134593463.grobid-xml"},"referenced_works_count":41,"referenced_works":["https://openalex.org/W39353691","https://openalex.org/W70096886","https://openalex.org/W86792954","https://openalex.org/W154883872","https://openalex.org/W177444027","https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1513551553","https://openalex.org/W1546886278","https://openalex.org/W1588309063","https://openalex.org/W1596208550","https://openalex.org/W1682451491","https://openalex.org/W1763482972","https://openalex.org/W1976420017","https://openalex.org/W1982949197","https://openalex.org/W1988169383","https://openalex.org/W2086298846","https://openalex.org/W2108072891","https://openalex.org/W2113976134","https://openalex.org/W2114623221","https://openalex.org/W2116626915","https://openalex.org/W2117616411","https://openalex.org/W2125974812","https://openalex.org/W2138001464","https://openalex.org/W2144754501","https://openalex.org/W2147929033","https://openalex.org/W2161214567","https://openalex.org/W2211075457","https://openalex.org/W2238048589","https://openalex.org/W2530459946","https://openalex.org/W2548207196","https://openalex.org/W2565477418","https://openalex.org/W2744007235","https://openalex.org/W2796172907","https://openalex.org/W2887159137","https://openalex.org/W3158841814","https://openalex.org/W6600195515","https://openalex.org/W6600236328","https://openalex.org/W6605925933","https://openalex.org/W6767474165","https://openalex.org/W6813952895"],"related_works":["https://openalex.org/W2553096087","https://openalex.org/W2788225348","https://openalex.org/W1588309063","https://openalex.org/W1906282778","https://openalex.org/W1663161527","https://openalex.org/W2539919741","https://openalex.org/W2147871863","https://openalex.org/W2949725016","https://openalex.org/W2981554290","https://openalex.org/W2061336256"],"abstract_inverted_index":{"Abstract":[0],"Countless":[1],"data":[2,21],"generated":[3],"in":[4,36,109],"Smart":[5],"city":[6],"may":[7],"contain":[8],"private":[9],"and":[10,13,115,120,137,171,188],"sensitive":[11,101,119],"information":[12,134],"should":[14],"be":[15,23,191,210],"protected":[16],"from":[17],"unauthorized":[18],"users.":[19,204],"The":[20],"can":[22,190],"encrypted":[24],"by":[25,86],"Attribute-based":[26],"encryption":[27,187],"(CP-ABE),":[28],"which":[29],"allows":[30],"encrypter":[31],"to":[32,79,193,202,209],"specify":[33],"access":[34,50,106,155],"policies":[35,107],"the":[37,49,57,63,81,110,116,127,141,153,179,183,214],"ciphertext.":[38],"But,":[39],"traditional":[40],"CP-ABE":[41,84,145],"schemes":[42,146],"are":[43],"limited":[44],"because":[45],"of":[46,65,83,140,186],"two":[47,105],"shortages:":[48],"policy":[51,102,149],"is":[52,60,113,118,168,199],"public":[53,114,128],"i.e.,":[54,67],"privacy":[55,82],"exposed;":[56],"decryption":[58,162,189],"time":[59,163],"linear":[61],"with":[62,147],"complexity":[64],"policy,":[66,129],"huge":[68],"computational":[69,184],"overheads.":[70],"In":[71,91],"this":[72],"work,":[73],"we":[74,93],"introduce":[75],"a":[76,95],"novel":[77],"method":[78],"protect":[80],"scheme":[85,167,198,208],"keyword":[87],"search":[88],"(KS)":[89],"techniques.":[90],"detail,":[92],"define":[94],"new":[96],"security":[97,103],"model":[98],"called":[99],"chosen":[100],":":[104],"embedded":[108],"ciphertext,":[111],"one":[112],"other":[117],"hidden.":[121],"If":[122],"user's":[123],"attributes":[124],"don't":[125],"satisfy":[126],"he/she":[130],"cannot":[131],"get":[132],"any":[133],"(attribute":[135],"name":[136],"its":[138],"values)":[139],"hidden":[142,148],"one.":[143],"Previous":[144],"only":[150],"work":[151],"on":[152],"\u201cAND-gate\u201d":[154],"structure":[156],"or":[157,161],"their":[158],"ciphertext":[159],"size":[160],"maybe":[164],"super-polynomial.":[165],"Our":[166],"more":[169,200],"expressive":[170],"compact.":[172],"Since,":[173],"IoT":[174],"devices":[175],"spread":[176],"all":[177],"over":[178],"smart":[180],"city,":[181],"so":[182],"overhead":[185],"shifted":[192],"third":[194],"parties.":[195],"Therefore,":[196],"our":[197,207],"applicable":[201],"resource-constrained":[203],"We":[205],"prove":[206],"selective":[211],"secure":[212],"under":[213],"decisional":[215],"bilinear":[216],"Diffie-Hellman":[217],"(DBDH)":[218],"assumption.":[219]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
