{"id":"https://openalex.org/W2802459942","doi":"https://doi.org/10.3390/sym10050161","title":"Searching on Encrypted E-Data Using Random Searchable Encryption (RanSCrypt) Scheme","display_name":"Searching on Encrypted E-Data Using Random Searchable Encryption (RanSCrypt) Scheme","publication_year":2018,"publication_date":"2018-05-15","ids":{"openalex":"https://openalex.org/W2802459942","doi":"https://doi.org/10.3390/sym10050161","mag":"2802459942"},"language":"en","primary_location":{"id":"doi:10.3390/sym10050161","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym10050161","pdf_url":"https://www.mdpi.com/2073-8994/10/5/161/pdf?version=1527745949","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2073-8994/10/5/161/pdf?version=1527745949","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085741772","display_name":"Syed Ahsan","orcid":"https://orcid.org/0000-0001-9545-9903"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"M Ahsan","raw_affiliation_strings":["Department of Computer System &amp; Technology, Faculty of Computer Science &amp; Information Technology University of Malaya, Kuala Lumpur 50603, Malaysia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer System &amp; Technology, Faculty of Computer Science &amp; Information Technology University of Malaya, Kuala Lumpur 50603, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102309320","display_name":"Mohd Idna Bin Idris","orcid":null},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Mohd Idna Bin Idris","raw_affiliation_strings":["Department of Computer System &amp; Technology, Faculty of Computer Science &amp; Information Technology University of Malaya, Kuala Lumpur 50603, Malaysia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer System &amp; Technology, Faculty of Computer Science &amp; Information Technology University of Malaya, Kuala Lumpur 50603, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004213577","display_name":"Ainuddin Wahid Abdul Wahab","orcid":"https://orcid.org/0000-0003-1062-0329"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Ainuddin Bin Abdul Wahab","raw_affiliation_strings":["Department of Computer System &amp; Technology, Faculty of Computer Science &amp; Information Technology University of Malaya, Kuala Lumpur 50603, Malaysia"],"raw_orcid":"https://orcid.org/0000-0003-1062-0329","affiliations":[{"raw_affiliation_string":"Department of Computer System &amp; Technology, Faculty of Computer Science &amp; Information Technology University of Malaya, Kuala Lumpur 50603, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066848056","display_name":"Ihsan Ali","orcid":"https://orcid.org/0000-0002-9549-2540"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Ihsan Ali","raw_affiliation_strings":["Department of Computer System &amp; Technology, Faculty of Computer Science &amp; Information Technology University of Malaya, Kuala Lumpur 50603, Malaysia"],"raw_orcid":"https://orcid.org/0000-0002-9549-2540","affiliations":[{"raw_affiliation_string":"Department of Computer System &amp; Technology, Faculty of Computer Science &amp; Information Technology University of Malaya, Kuala Lumpur 50603, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003815140","display_name":"Nawsher Khan","orcid":"https://orcid.org/0000-0002-9058-4809"},"institutions":[{"id":"https://openalex.org/I181063083","display_name":"Abdul Wali Khan University Mardan","ror":"https://ror.org/03b9y4e65","country_code":"PK","type":"education","lineage":["https://openalex.org/I181063083"]},{"id":"https://openalex.org/I82952536","display_name":"King Khalid University","ror":"https://ror.org/052kwzs30","country_code":"SA","type":"education","lineage":["https://openalex.org/I82952536"]}],"countries":["PK","SA"],"is_corresponding":false,"raw_author_name":"Nawsher Khan","raw_affiliation_strings":["Collage of Computer Science, King Khalid University, Abha 61421, Saudi Arabia","Department of Computer Science, Abdul Wali Khan University, Mardan 23200, Pakistan"],"raw_orcid":"https://orcid.org/0000-0002-9058-4809","affiliations":[{"raw_affiliation_string":"Collage of Computer Science, King Khalid University, Abha 61421, Saudi Arabia","institution_ids":["https://openalex.org/I82952536"]},{"raw_affiliation_string":"Department of Computer Science, Abdul Wali Khan University, Mardan 23200, Pakistan","institution_ids":["https://openalex.org/I181063083"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041315628","display_name":"Mohammed Al-Garwi","orcid":null},"institutions":[{"id":"https://openalex.org/I82952536","display_name":"King Khalid University","ror":"https://ror.org/052kwzs30","country_code":"SA","type":"education","lineage":["https://openalex.org/I82952536"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohammed Al-Garwi","raw_affiliation_strings":["Collage of Computer Science, King Khalid University, Abha 61421, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Collage of Computer Science, King Khalid University, Abha 61421, Saudi Arabia","institution_ids":["https://openalex.org/I82952536"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059014782","display_name":"Atiq Ur Rahman","orcid":"https://orcid.org/0000-0001-5439-1121"},"institutions":[{"id":"https://openalex.org/I118590987","display_name":"Northern Border University","ror":"https://ror.org/03j9tzj20","country_code":"SA","type":"education","lineage":["https://openalex.org/I118590987"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Atiq Rahman","raw_affiliation_strings":["Faculty of Computing and Information Technology, Northern Border University, Rafha 76323, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Faculty of Computing and Information Technology, Northern Border University, Rafha 76323, Saudi Arabia","institution_ids":["https://openalex.org/I118590987"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5085741772","https://openalex.org/A5102309320"],"corresponding_institution_ids":["https://openalex.org/I33849332"],"apc_list":{"value":2000,"currency":"CHF","value_usd":2165},"apc_paid":{"value":2000,"currency":"CHF","value_usd":2165},"fwci":0.1694,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.58547477,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"10","issue":"5","first_page":"161","last_page":"161"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7913780212402344},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7523636817932129},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.5759772658348083},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5731145739555359},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5545427799224854},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5497194528579712},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.49009549617767334},{"id":"https://openalex.org/keywords/key-space","display_name":"Key space","score":0.48261746764183044},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4821619391441345},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.466969758272171},{"id":"https://openalex.org/keywords/keyword-search","display_name":"Keyword search","score":0.46491557359695435},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4342808723449707},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4258127510547638},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.4161219894886017},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.41347530484199524},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.26410382986068726},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.132038414478302},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.0948697030544281}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7913780212402344},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7523636817932129},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.5759772658348083},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5731145739555359},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5545427799224854},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5497194528579712},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.49009549617767334},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.48261746764183044},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4821619391441345},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.466969758272171},{"id":"https://openalex.org/C2988412617","wikidata":"https://www.wikidata.org/wiki/Q7441656","display_name":"Keyword search","level":2,"score":0.46491557359695435},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4342808723449707},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4258127510547638},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.4161219894886017},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.41347530484199524},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.26410382986068726},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.132038414478302},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0948697030544281},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/sym10050161","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym10050161","pdf_url":"https://www.mdpi.com/2073-8994/10/5/161/pdf?version=1527745949","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:795ca9b3b10f4b2aa34b2579c4b5f705","is_oa":true,"landing_page_url":"https://doaj.org/article/795ca9b3b10f4b2aa34b2579c4b5f705","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Symmetry, Vol 10, Iss 5, p 161 (2018)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2073-8994/10/5/161/","is_oa":true,"landing_page_url":"https://dx.doi.org/10.3390/sym10050161","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Symmetry; Volume 10; Issue 5; Pages: 161","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/sym10050161","is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym10050161","pdf_url":"https://www.mdpi.com/2073-8994/10/5/161/pdf?version=1527745949","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Symmetry","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7799999713897705,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2802459942.pdf","grobid_xml":"https://content.openalex.org/works/W2802459942.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W1511886987","https://openalex.org/W1580750219","https://openalex.org/W1851414966","https://openalex.org/W1979493600","https://openalex.org/W1988374166","https://openalex.org/W2028161339","https://openalex.org/W2041480327","https://openalex.org/W2048334094","https://openalex.org/W2052544413","https://openalex.org/W2054701320","https://openalex.org/W2080574324","https://openalex.org/W2096156163","https://openalex.org/W2104348420","https://openalex.org/W2108343866","https://openalex.org/W2112064109","https://openalex.org/W2114296561","https://openalex.org/W2131043660","https://openalex.org/W2132257180","https://openalex.org/W2134894205","https://openalex.org/W2145426052","https://openalex.org/W2148997402","https://openalex.org/W2161214567","https://openalex.org/W2166957790","https://openalex.org/W2169691038","https://openalex.org/W2255431140","https://openalex.org/W2275530856","https://openalex.org/W2322860310","https://openalex.org/W2328151479","https://openalex.org/W2490265015","https://openalex.org/W2526477928","https://openalex.org/W2597901792","https://openalex.org/W2610479618","https://openalex.org/W2654728129","https://openalex.org/W6629782021","https://openalex.org/W6639572707","https://openalex.org/W6682311248","https://openalex.org/W7073570497"],"related_works":["https://openalex.org/W2400145589","https://openalex.org/W2898739679","https://openalex.org/W3048445852","https://openalex.org/W2000093475","https://openalex.org/W2241715175","https://openalex.org/W2625565351","https://openalex.org/W2990532276","https://openalex.org/W1995502611","https://openalex.org/W2286165442","https://openalex.org/W242407388"],"abstract_inverted_index":{"Cloud":[0],"computing":[1],"is":[2,231,247],"intensifying":[3],"the":[4,30,49,53,109,112,127,137,143,171,181,195,203,207,222,240],"necessity":[5],"for":[6,10,77],"searchable":[7],"encryption":[8],"(SE)":[9],"data":[11,18,37,82,175,196],"protection":[12],"in":[13,36,80,148],"cloud":[14],"storage.":[15],"SE":[16,147],"encrypts":[17],"to":[19,48,63,94,98,104,124,156,184,194,237],"preserve":[20],"its":[21,100],"confidentiality":[22],"while":[23],"offering":[24],"a":[25,58,64,81,95,149,161,174,214],"secure":[26,43,78],"search":[27,42,79,182,208],"facility":[28],"on":[29,219],"encrypted":[31],"data.":[32],"Typical":[33],"index-based":[34],"SEs":[35,56],"sharing":[38,83,176],"scenarios":[39],"can":[40,200],"effectively":[41],"keyword":[44,54,97],"indexes.":[45],"However,":[46],"due":[47,236],"smaller":[50],"size":[51],"of":[52,111,173,191,217,239],"space,":[55],"using":[57],"public":[59,150],"key":[60,151,163],"are":[61,116,136],"susceptible":[62],"Keyword":[65,223],"Guessing":[66],"Attack":[67,225],"(KGA)":[68],"and":[69,102,134,168,187,227,251],"other":[70],"statistical":[71],"information":[72],"leakage.":[73],"In":[74],"this":[75],"paper,":[76],"scenario,":[84],"we":[85,212],"propose":[86],"Random":[87],"Searchable":[88],"enCryption":[89],"(RanSCrypt)":[90],"that":[91,229],"adds":[92],"randomness":[93],"transformed":[96],"increase":[99],"space":[101],"aspires":[103],"make":[105],"it":[106],"irreversible.":[107],"At":[108],"core":[110],"mechanism,":[113],"two":[114,128],"keywords":[115,130],"garbled":[117,129],"with":[118,165],"randomness,":[119],"still":[120],"enabling":[121],"another":[122],"party":[123],"determine":[125],"if":[126],"(RanSCrypt\u2019s":[131],"terms":[132],"REST":[133],"Trapdoor)":[135],"same":[138],"or":[139],"not":[140],"without":[141,169],"knowing":[142],"actual":[144],"keywords.":[145],"As":[146],"setting":[152,164],"suffers":[153],"from":[154,206,233],"vulnerability":[155],"KGA,":[157],"RanSCrypt":[158,178,230,246],"transfers":[159],"into":[160],"symmetric":[162],"minimum":[166],"overhead":[167],"losing":[170],"features":[172],"scenario.":[177],"also":[179],"adulterates":[180],"result":[183,209],"add":[185],"perplexity":[186],"provides":[188],"full":[189],"control":[190],"access":[192],"only":[193],"receiver.":[197],"The":[198],"receiver":[199],"cull":[201],"out":[202],"erroneous":[204],"results":[205],"locally.":[210],"Finally,":[211],"introduce":[213],"new":[215],"type":[216],"attack":[218,235],"SE,":[220],"namely,":[221],"Luring":[224],"(KLA),":[226],"show":[228],"safe":[232],"KLA":[234],"adulteration":[238],"result.":[241],"Our":[242],"security":[243],"analysis":[244],"proves":[245],"invulnerable":[248],"against":[249],"KGA":[250],"leaks":[252],"no":[253],"information.":[254]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
