{"id":"https://openalex.org/W7143461970","doi":"https://doi.org/10.48550/arxiv.2603.26224","title":"Privacy-Enhancing Encryption in Data Sharing: A Survey on Security, Performance and Functionality","display_name":"Privacy-Enhancing Encryption in Data Sharing: A Survey on Security, Performance and Functionality","publication_year":2026,"publication_date":"2026-03-27","ids":{"openalex":"https://openalex.org/W7143461970","doi":"https://doi.org/10.48550/arxiv.2603.26224"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.26224","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.26224","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.26224","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5130953757","display_name":"Yongyang Lv","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lv, Yongyang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130964174","display_name":"Xiaohong Li","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li, Xiaohong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032257261","display_name":"Ruitao Feng","orcid":"https://orcid.org/0000-0001-9080-6865"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Feng, Ruitao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130997088","display_name":"Xinyu Li","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li, Xinyu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015858067","display_name":"Guangdong Bai","orcid":"https://orcid.org/0000-0002-6390-9890"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bai, Guangdong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130911040","display_name":"Leo Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang, Leo","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130986749","display_name":"Lili Quan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Quan, Lili","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5130967705","display_name":"Willy Susilo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Susilo, Willy","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5130953757"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.766700029373169,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.766700029373169,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.09960000216960907,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.06369999796152115,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.7271000146865845},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7221999764442444},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.527999997138977},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.45350000262260437},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.44749999046325684},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4424000084400177},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4106000065803528},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.35370001196861267}],"concepts":[{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.7271000146865845},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7221999764442444},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6694999933242798},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.527999997138977},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4912000000476837},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.45350000262260437},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.44749999046325684},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4424000084400177},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.41110000014305115},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4106000065803528},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.35370001196861267},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.34779998660087585},{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.3472999930381775},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3368000090122223},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.3091999888420105},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.30869999527931213},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.29429998993873596},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.2840999960899353},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.27489998936653137},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.26809999346733093},{"id":"https://openalex.org/C196879817","wikidata":"https://www.wikidata.org/wiki/Q872685","display_name":"Data governance","level":4,"score":0.2646999955177307},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.2590999901294708},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.25850000977516174},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.25130000710487366}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.26224","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.26224","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.26224","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.26224","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6784614324569702,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"vigorous":[1],"development":[2],"of":[3,28,60,108,171],"the":[4,40,58,165],"Internet":[5],"has":[6],"spurred":[7],"exponential":[8],"data":[9,12,43,54,66,128,136,172,192],"growth,":[10],"yet":[11],"is":[13,57],"predominantly":[14],"stored":[15],"in":[16,71,97,120],"isolated":[17],"user":[18],"entities,":[19],"hampering":[20],"its":[21,146],"full":[22],"value":[23],"realization.":[24],"In":[25],"large-scale":[26],"deployment":[27],"``AI+industries''":[29],"such":[30],"as":[31],"smart":[32,38],"medical":[33],"care,":[34],"intelligent":[35],"transportation":[36],"and":[37,45,50,74,87,102,123,140,159,168,183],"homes,":[39],"gap":[41],"between":[42],"supply":[44],"demand":[46],"continues":[47],"to":[48,113],"widen,":[49],"establishing":[51],"an":[52],"effective":[53],"sharing":[55,67,129,137,173,193],"mechanism":[56],"core":[59],"promoting":[61],"high-quality":[62],"industrial":[63],"development.":[64],"However,":[65],"faces":[68],"significant":[69],"challenges":[70],"security,":[72,99,166],"performance,":[73,167],"functional":[75,169],"adaptability.":[76],"Privacy-enhancing":[77],"encryption":[78,198],"technologies,":[79],"including":[80],"Attribute-Based":[81],"Encryption":[82,89],"(ABE),":[83],"Proxy":[84],"Re-encryption":[85],"(PRE),":[86],"Searchable":[88],"(SE),":[90],"offer":[91],"promising":[92],"solutions":[93],"with":[94,155],"distinct":[95],"advantages":[96],"enhancing":[98],"improving":[100],"flexibility,":[101],"enabling":[103],"efficient":[104],"sharing.":[105],"Statistical":[106],"analysis":[107],"relevant":[109],"literature":[110],"from":[111],"2020":[112],"2025":[114],"reveals":[115],"a":[116,135],"rising":[117],"research":[118,185],"trend":[119],"ABE,":[121,152],"PRE":[122,154],"SE,":[124,153],"focusing":[125],"on":[126,164,196],"their":[127,161],"applications.":[130],"Firstly,":[131],"this":[132,149,176],"work":[133,150,177],"proposes":[134],"process":[138],"framework":[139],"identifies":[141],"20":[142],"potential":[143],"attacks":[144],"across":[145],"stages.":[147],"Secondly,":[148],"integrates":[151],"12":[156],"enhancement":[157],"technologies":[158],"examines":[160],"multi-dimensional":[162],"impacts":[163],"adaptability":[170],"schemes.":[174],"Lastly,":[175],"outlines":[178],"key":[179],"application":[180],"scenarios,":[181],"challenges,":[182],"future":[184],"directions,":[186],"providing":[187],"valuable":[188],"insights":[189],"for":[190],"advancing":[191],"mechanisms":[194],"based":[195],"privacy-enhancing":[197],"technologies.":[199]},"counts_by_year":[],"updated_date":"2026-03-31T06:07:48.031334","created_date":"2026-03-31T00:00:00"}
