{"id":"https://openalex.org/W3198205743","doi":"https://doi.org/10.1186/s13638-021-02006-1","title":"Designated server-aided revocable identity-based keyword search on lattice","display_name":"Designated server-aided revocable identity-based keyword search on lattice","publication_year":2021,"publication_date":"2021-09-06","ids":{"openalex":"https://openalex.org/W3198205743","doi":"https://doi.org/10.1186/s13638-021-02006-1","mag":"3198205743"},"language":"en","primary_location":{"id":"doi:10.1186/s13638-021-02006-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-021-02006-1","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-021-02006-1","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-021-02006-1","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013510393","display_name":"Ying Guo","orcid":"https://orcid.org/0000-0002-7806-8887"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ying Guo","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, 200240, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080296449","display_name":"Fei Meng","orcid":"https://orcid.org/0000-0001-9445-1547"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Meng","raw_affiliation_strings":["School of Mathematics, Shandong University, South Shanda Road, No.27, Jinan, 250100, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Mathematics, Shandong University, South Shanda Road, No.27, Jinan, 250100, China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064067464","display_name":"Leixiao Cheng","orcid":"https://orcid.org/0000-0002-7231-0636"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Leixiao Cheng","raw_affiliation_strings":["School of Mathematical Sciences, Fudan University, Handan Road, No.220, Shanghai, 200433, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Mathematical Sciences, Fudan University, Handan Road, No.220, Shanghai, 200433, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077456653","display_name":"Xiaolei Dong","orcid":"https://orcid.org/0000-0002-5844-0223"},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaolei Dong","raw_affiliation_strings":["Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, 200062, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, 200062, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023159259","display_name":"Zhenfu Cao","orcid":"https://orcid.org/0000-0002-5250-5030"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]},{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]},{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenfu Cao","raw_affiliation_strings":["Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, 518055, China","Institute of Intelligent Science and Technology, Tongji University, Shanghai, 200092, China","Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, 200062, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, 518055, China","institution_ids":["https://openalex.org/I4210136793"]},{"raw_affiliation_string":"Institute of Intelligent Science and Technology, Tongji University, Shanghai, 200092, China","institution_ids":["https://openalex.org/I116953780"]},{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, 200062, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5013510393"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":{"value":1140,"currency":"GBP","value_usd":1398},"apc_paid":{"value":1140,"currency":"GBP","value_usd":1398},"fwci":0.1399,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.56098055,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"2021","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8585885763168335},{"id":"https://openalex.org/keywords/keyword-search","display_name":"Keyword search","score":0.7650385499000549},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6620769500732422},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.6303642988204956},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6053659915924072},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5686097145080566},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5235245227813721},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5078490376472473},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4740283787250519},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.43366432189941406},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4239773452281952},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3639872670173645},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3540641665458679},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.10952043533325195},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07873010635375977}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8585885763168335},{"id":"https://openalex.org/C2988412617","wikidata":"https://www.wikidata.org/wiki/Q7441656","display_name":"Keyword search","level":2,"score":0.7650385499000549},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6620769500732422},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.6303642988204956},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6053659915924072},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5686097145080566},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5235245227813721},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5078490376472473},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4740283787250519},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.43366432189941406},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4239773452281952},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3639872670173645},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3540641665458679},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.10952043533325195},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07873010635375977},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13638-021-02006-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-021-02006-1","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-021-02006-1","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:6ea25fb199f54d289003abfa2195a0d6","is_oa":true,"landing_page_url":"https://doaj.org/article/6ea25fb199f54d289003abfa2195a0d6","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking, Vol 2021, Iss 1, Pp 1-22 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13638-021-02006-1","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-021-02006-1","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-021-02006-1","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6399999856948853,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1797422912","display_name":null,"funder_award_id":"Grant No. 61632012","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4108750496","display_name":null,"funder_award_id":"61632012","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5736169107","display_name":null,"funder_award_id":"2020YFA0712300","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6547269337","display_name":null,"funder_award_id":"PCL2018KP004","funder_id":"https://openalex.org/F4320318558","funder_display_name":"Peng Cheng Laboratory"},{"id":"https://openalex.org/G7379938384","display_name":null,"funder_award_id":"PCL2018KP004","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8965963615","display_name":null,"funder_award_id":"2020YFA0712300","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320318558","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3198205743.pdf","grobid_xml":"https://content.openalex.org/works/W3198205743.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W21280657","https://openalex.org/W74973629","https://openalex.org/W1580750219","https://openalex.org/W1589843374","https://openalex.org/W1983370494","https://openalex.org/W1988169383","https://openalex.org/W1999370902","https://openalex.org/W2038761522","https://openalex.org/W2061949491","https://openalex.org/W2061987977","https://openalex.org/W2106116277","https://openalex.org/W2122973102","https://openalex.org/W2130410178","https://openalex.org/W2144754501","https://openalex.org/W2146813141","https://openalex.org/W2152924492","https://openalex.org/W2161214567","https://openalex.org/W2217128562","https://openalex.org/W2295943987","https://openalex.org/W2546007168","https://openalex.org/W2803867854","https://openalex.org/W2889358002","https://openalex.org/W2897672515","https://openalex.org/W2908345802","https://openalex.org/W2949493693","https://openalex.org/W2952331474","https://openalex.org/W2991960977","https://openalex.org/W2998101369","https://openalex.org/W3014636614","https://openalex.org/W3158841814"],"related_works":["https://openalex.org/W2620043489","https://openalex.org/W4292493860","https://openalex.org/W4235894667","https://openalex.org/W4386242069","https://openalex.org/W2767823571","https://openalex.org/W2984622284","https://openalex.org/W4224241849","https://openalex.org/W4292571928","https://openalex.org/W2949316140","https://openalex.org/W2407999481"],"abstract_inverted_index":{"Abstract":[0],"Public":[1],"key":[2,77,90,97],"encryption":[3,58],"scheme":[4,59,104,117,160],"with":[5,60,79,88,167],"keyword":[6,61,108,137],"search":[7,13,62,128,144],"is":[8],"a":[9,120,154],"promising":[10],"technique":[11],"supporting":[12],"on":[14,170],"encrypted":[15],"data":[16],"without":[17],"leaking":[18],"any":[19],"information":[20],"about":[21],"the":[22,52,89,94,111,127,136,140,148,162,165,171],"keyword.":[23],"In":[24,47,114],"real":[25],"applications,":[26],"it\u2019s":[27],"critical":[28],"to":[29,35,72,86,123],"find":[30],"an":[31],"effective":[32],"revocation":[33],"method":[34],"revoke":[36],"users":[37],"in":[38,110,139],"multi-user":[39],"cryptosystems,":[40],"when":[41],"user\u2019s":[42],"secret":[43],"keys":[44],"are":[45],"exposed.":[46],"this":[48],"paper,":[49],"we":[50],"propose":[51],"first":[53],"designated":[54],"server-aided":[55],"revocable":[56],"identity-based":[57],"(dSR-IBKS)":[63],"from":[64],"lattice.":[65],"The":[66],"dSR-IBKS":[67],"model":[68],"requires":[69],"each":[70],"user":[71],"keep":[73],"just":[74],"one":[75],"private":[76],"corresponding":[78],"his":[80],"identity":[81],"and":[82,125,146],"does":[83],"not":[84],"need":[85],"communicate":[87],"generation":[91],"center":[92],"or":[93],"server":[95],"during":[96],"updating.":[98],"We":[99,152],"have":[100],"proved":[101],"that":[102],"our":[103,116,159],"can":[105,118,134],"achieve":[106],"chosen":[107],"indistinguishability":[109],"standard":[112,172],"model.":[113,173],"particular,":[115],"designate":[119],"unique":[121],"tester":[122],"test":[124,149],"return":[126],"results,":[129],"therefore":[130],"no":[131],"other":[132],"entity":[133],"guess":[135],"embedded":[138],"ciphertext":[141],"by":[142,150],"generating":[143],"queries":[145],"doing":[147],"itself.":[151],"provide":[153],"formal":[155],"security":[156],"proof":[157],"of":[158,164],"assuming":[161],"hardness":[163],"learning":[166],"errors":[168],"problem":[169]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
