R-OO-KASE: Revocable Online/Offline Key Aggregate Searchable Encryption Article Swipe
YOU?
·
· 2020
· Open Access
·
· DOI: https://doi.org/10.1007/s41019-020-00136-y
The existing Key Aggregate Searchable Encryption (KASE) schemes allow searches on the encrypted dataset using a single query trapdoor, with a feature to delegate the search rights of multiple files using a constant size key. However, the operations required to generate the ciphertext and decrypt it in these schemes incur higher computational costs, due to the computationally expensive pairing operations in encryption/decryption. This makes the use of such schemes in resource-constrained devices, such as Radio Frequency Identification Devices, Wireless Sensor Network nodes, Internet of Things nodes, infeasible. Motivated with the goal to reduce the computational cost, in this paper, we propose a Revocable Online/Offline KASE (R-OO-KASE) scheme, based on the idea of splitting the encryption/decryption operations into two distinct phases: online and offline. The offline phase computes the majority of costly operations when the device is on an electrical power source. The online phase generates final output with the minimal computational cost when the message (or ciphertext) and keywords become known. In addition, the proposed scheme R-OO-KASE also offers multi-keyword search capability and allows the data owners to revoke the delegated rights at any point in time, the two features are not supported in the existing schemes. The security analysis and empirical evaluations show that the proposed scheme is efficient to use in resource-constrained devices and provably secure as compared to the existing KASE schemes.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1007/s41019-020-00136-y
- https://link.springer.com/content/pdf/10.1007/s41019-020-00136-y.pdf
- OA Status
- diamond
- Cited By
- 16
- References
- 36
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W3048084818
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3048084818Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1007/s41019-020-00136-yDigital Object Identifier
- Title
-
R-OO-KASE: Revocable Online/Offline Key Aggregate Searchable EncryptionWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2020Year of publication
- Publication date
-
2020-08-06Full publication date if available
- Authors
-
Mukti Padhya, Devesh C. JinwalaList of authors in order
- Landing page
-
https://doi.org/10.1007/s41019-020-00136-yPublisher landing page
- PDF URL
-
https://link.springer.com/content/pdf/10.1007/s41019-020-00136-y.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://link.springer.com/content/pdf/10.1007/s41019-020-00136-y.pdfDirect OA link when available
- Concepts
-
Computer science, Encryption, Ciphertext, Key (lock), Scheme (mathematics), Symmetric-key algorithm, Computer network, Computer security, Public-key cryptography, Mathematics, Mathematical analysisTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
16Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 4, 2024: 2, 2023: 5, 2022: 3, 2021: 2Per-year citation counts (last 5 years)
- References (count)
-
36Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3048084818 |
|---|---|
| doi | https://doi.org/10.1007/s41019-020-00136-y |
| ids.doi | https://doi.org/10.1007/s41019-020-00136-y |
| ids.mag | 3048084818 |
| ids.openalex | https://openalex.org/W3048084818 |
| fwci | 1.46859549 |
| type | article |
| title | R-OO-KASE: Revocable Online/Offline Key Aggregate Searchable Encryption |
| biblio.issue | 4 |
| biblio.volume | 5 |
| biblio.last_page | 418 |
| biblio.first_page | 391 |
| topics[0].id | https://openalex.org/T10237 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Cryptography and Data Security |
| topics[1].id | https://openalex.org/T10764 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9947999715805054 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Privacy-Preserving Technologies in Data |
| topics[2].id | https://openalex.org/T10720 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9927999973297119 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1703 |
| topics[2].subfield.display_name | Computational Theory and Mathematics |
| topics[2].display_name | Complexity and Algorithms in Graphs |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.7834113240242004 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C148730421 |
| concepts[1].level | 2 |
| concepts[1].score | 0.7358053922653198 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[1].display_name | Encryption |
| concepts[2].id | https://openalex.org/C93974786 |
| concepts[2].level | 3 |
| concepts[2].score | 0.6055853962898254 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q1589480 |
| concepts[2].display_name | Ciphertext |
| concepts[3].id | https://openalex.org/C26517878 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5998706817626953 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q228039 |
| concepts[3].display_name | Key (lock) |
| concepts[4].id | https://openalex.org/C77618280 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5037974715232849 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1155772 |
| concepts[4].display_name | Scheme (mathematics) |
| concepts[5].id | https://openalex.org/C65302260 |
| concepts[5].level | 4 |
| concepts[5].score | 0.44992199540138245 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q327675 |
| concepts[5].display_name | Symmetric-key algorithm |
| concepts[6].id | https://openalex.org/C31258907 |
| concepts[6].level | 1 |
| concepts[6].score | 0.4228944480419159 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[6].display_name | Computer network |
| concepts[7].id | https://openalex.org/C38652104 |
| concepts[7].level | 1 |
| concepts[7].score | 0.3193429112434387 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[7].display_name | Computer security |
| concepts[8].id | https://openalex.org/C203062551 |
| concepts[8].level | 3 |
| concepts[8].score | 0.3056580722332001 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q201339 |
| concepts[8].display_name | Public-key cryptography |
| concepts[9].id | https://openalex.org/C33923547 |
| concepts[9].level | 0 |
| concepts[9].score | 0.11813050508499146 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[9].display_name | Mathematics |
| concepts[10].id | https://openalex.org/C134306372 |
| concepts[10].level | 1 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q7754 |
| concepts[10].display_name | Mathematical analysis |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.7834113240242004 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/encryption |
| keywords[1].score | 0.7358053922653198 |
| keywords[1].display_name | Encryption |
| keywords[2].id | https://openalex.org/keywords/ciphertext |
| keywords[2].score | 0.6055853962898254 |
| keywords[2].display_name | Ciphertext |
| keywords[3].id | https://openalex.org/keywords/key |
| keywords[3].score | 0.5998706817626953 |
| keywords[3].display_name | Key (lock) |
| keywords[4].id | https://openalex.org/keywords/scheme |
| keywords[4].score | 0.5037974715232849 |
| keywords[4].display_name | Scheme (mathematics) |
| keywords[5].id | https://openalex.org/keywords/symmetric-key-algorithm |
| keywords[5].score | 0.44992199540138245 |
| keywords[5].display_name | Symmetric-key algorithm |
| keywords[6].id | https://openalex.org/keywords/computer-network |
| keywords[6].score | 0.4228944480419159 |
| keywords[6].display_name | Computer network |
| keywords[7].id | https://openalex.org/keywords/computer-security |
| keywords[7].score | 0.3193429112434387 |
| keywords[7].display_name | Computer security |
| keywords[8].id | https://openalex.org/keywords/public-key-cryptography |
| keywords[8].score | 0.3056580722332001 |
| keywords[8].display_name | Public-key cryptography |
| keywords[9].id | https://openalex.org/keywords/mathematics |
| keywords[9].score | 0.11813050508499146 |
| keywords[9].display_name | Mathematics |
| language | en |
| locations[0].id | doi:10.1007/s41019-020-00136-y |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S2486411021 |
| locations[0].source.issn | 2364-1185, 2364-1541 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2364-1185 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | Data Science and Engineering |
| locations[0].source.host_organization | https://openalex.org/P4310319900 |
| locations[0].source.host_organization_name | Springer Science+Business Media |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| locations[0].source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://link.springer.com/content/pdf/10.1007/s41019-020-00136-y.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Data Science and Engineering |
| locations[0].landing_page_url | https://doi.org/10.1007/s41019-020-00136-y |
| locations[1].id | pmh:oai:doaj.org/article:1e8d26c1742042279f1c71f9d2a52796 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | cc-by-sa |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | https://openalex.org/licenses/cc-by-sa |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | Data Science and Engineering, Vol 5, Iss 4, Pp 391-418 (2020) |
| locations[1].landing_page_url | https://doaj.org/article/1e8d26c1742042279f1c71f9d2a52796 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5023454711 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-0498-4188 |
| authorships[0].author.display_name | Mukti Padhya |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I42014448 |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Computer Engineering, Sardar Vallabhbhai National Institute of Technology (SVNIT), Surat, India |
| authorships[0].institutions[0].id | https://openalex.org/I42014448 |
| authorships[0].institutions[0].ror | https://ror.org/02y394t43 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I42014448 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Sardar Vallabhbhai National Institute of Technology Surat |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Mukti Padhya |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Department of Computer Engineering, Sardar Vallabhbhai National Institute of Technology (SVNIT), Surat, India |
| authorships[1].author.id | https://openalex.org/A5028565396 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-4830-1702 |
| authorships[1].author.display_name | Devesh C. Jinwala |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I42014448 |
| authorships[1].affiliations[0].raw_affiliation_string | Department of Computer Engineering, Sardar Vallabhbhai National Institute of Technology (SVNIT), Surat, India |
| authorships[1].institutions[0].id | https://openalex.org/I42014448 |
| authorships[1].institutions[0].ror | https://ror.org/02y394t43 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I42014448 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Sardar Vallabhbhai National Institute of Technology Surat |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Devesh C. Jinwala |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Department of Computer Engineering, Sardar Vallabhbhai National Institute of Technology (SVNIT), Surat, India |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://link.springer.com/content/pdf/10.1007/s41019-020-00136-y.pdf |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | R-OO-KASE: Revocable Online/Offline Key Aggregate Searchable Encryption |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10237 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Cryptography and Data Security |
| related_works | https://openalex.org/W2322947709, https://openalex.org/W4385192994, https://openalex.org/W4255237014, https://openalex.org/W2358138126, https://openalex.org/W4242847202, https://openalex.org/W2768869846, https://openalex.org/W2951531469, https://openalex.org/W1611563112, https://openalex.org/W2796427561, https://openalex.org/W1992525896 |
| cited_by_count | 16 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 4 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 2 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 5 |
| counts_by_year[3].year | 2022 |
| counts_by_year[3].cited_by_count | 3 |
| counts_by_year[4].year | 2021 |
| counts_by_year[4].cited_by_count | 2 |
| locations_count | 2 |
| best_oa_location.id | doi:10.1007/s41019-020-00136-y |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S2486411021 |
| best_oa_location.source.issn | 2364-1185, 2364-1541 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2364-1185 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | Data Science and Engineering |
| best_oa_location.source.host_organization | https://openalex.org/P4310319900 |
| best_oa_location.source.host_organization_name | Springer Science+Business Media |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| best_oa_location.source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://link.springer.com/content/pdf/10.1007/s41019-020-00136-y.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Data Science and Engineering |
| best_oa_location.landing_page_url | https://doi.org/10.1007/s41019-020-00136-y |
| primary_location.id | doi:10.1007/s41019-020-00136-y |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S2486411021 |
| primary_location.source.issn | 2364-1185, 2364-1541 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2364-1185 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | Data Science and Engineering |
| primary_location.source.host_organization | https://openalex.org/P4310319900 |
| primary_location.source.host_organization_name | Springer Science+Business Media |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319900, https://openalex.org/P4310319965 |
| primary_location.source.host_organization_lineage_names | Springer Science+Business Media, Springer Nature |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://link.springer.com/content/pdf/10.1007/s41019-020-00136-y.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Data Science and Engineering |
| primary_location.landing_page_url | https://doi.org/10.1007/s41019-020-00136-y |
| publication_date | 2020-08-06 |
| publication_year | 2020 |
| referenced_works | https://openalex.org/W1905774212, https://openalex.org/W2131043660, https://openalex.org/W2092335398, https://openalex.org/W2320470009, https://openalex.org/W2145426052, https://openalex.org/W2139910984, https://openalex.org/W17575016, https://openalex.org/W1567573409, https://openalex.org/W3001798361, https://openalex.org/W2554084073, https://openalex.org/W1974267799, https://openalex.org/W86792954, https://openalex.org/W2044772384, https://openalex.org/W4246341622, https://openalex.org/W2487502230, https://openalex.org/W2597254873, https://openalex.org/W2904404331, https://openalex.org/W2982444916, https://openalex.org/W2967524723, https://openalex.org/W3000242650, https://openalex.org/W2231711433, https://openalex.org/W2039768170, https://openalex.org/W1700434006, https://openalex.org/W2147929033, https://openalex.org/W2293178884, https://openalex.org/W1873520610, https://openalex.org/W3011896985, https://openalex.org/W2986080916, https://openalex.org/W2043370600, https://openalex.org/W2784296252, https://openalex.org/W2904312011, https://openalex.org/W2216278026, https://openalex.org/W1545347659, https://openalex.org/W1556212265, https://openalex.org/W2769235379, https://openalex.org/W2998241201 |
| referenced_works_count | 36 |
| abstract_inverted_index.a | 16, 21, 32, 102 |
| abstract_inverted_index.In | 162 |
| abstract_inverted_index.an | 138 |
| abstract_inverted_index.as | 74, 219 |
| abstract_inverted_index.at | 183 |
| abstract_inverted_index.in | 47, 61, 70, 97, 186, 194, 213 |
| abstract_inverted_index.is | 136, 209 |
| abstract_inverted_index.it | 46 |
| abstract_inverted_index.of | 28, 67, 84, 112, 130 |
| abstract_inverted_index.on | 11, 109, 137 |
| abstract_inverted_index.to | 23, 40, 55, 92, 178, 211, 221 |
| abstract_inverted_index.we | 100 |
| abstract_inverted_index.(or | 156 |
| abstract_inverted_index.Key | 3 |
| abstract_inverted_index.The | 1, 124, 142, 198 |
| abstract_inverted_index.and | 44, 122, 158, 173, 201, 216 |
| abstract_inverted_index.any | 184 |
| abstract_inverted_index.are | 191 |
| abstract_inverted_index.due | 54 |
| abstract_inverted_index.not | 192 |
| abstract_inverted_index.the | 12, 25, 37, 42, 56, 65, 90, 94, 110, 114, 128, 134, 149, 154, 164, 175, 180, 188, 195, 206, 222 |
| abstract_inverted_index.two | 118, 189 |
| abstract_inverted_index.use | 66, 212 |
| abstract_inverted_index.KASE | 105, 224 |
| abstract_inverted_index.This | 63 |
| abstract_inverted_index.also | 168 |
| abstract_inverted_index.cost | 152 |
| abstract_inverted_index.data | 176 |
| abstract_inverted_index.goal | 91 |
| abstract_inverted_index.idea | 111 |
| abstract_inverted_index.into | 117 |
| abstract_inverted_index.key. | 35 |
| abstract_inverted_index.show | 204 |
| abstract_inverted_index.size | 34 |
| abstract_inverted_index.such | 68, 73 |
| abstract_inverted_index.that | 205 |
| abstract_inverted_index.this | 98 |
| abstract_inverted_index.when | 133, 153 |
| abstract_inverted_index.with | 20, 89, 148 |
| abstract_inverted_index.Radio | 75 |
| abstract_inverted_index.allow | 9 |
| abstract_inverted_index.based | 108 |
| abstract_inverted_index.cost, | 96 |
| abstract_inverted_index.files | 30 |
| abstract_inverted_index.final | 146 |
| abstract_inverted_index.incur | 50 |
| abstract_inverted_index.makes | 64 |
| abstract_inverted_index.phase | 126, 144 |
| abstract_inverted_index.point | 185 |
| abstract_inverted_index.power | 140 |
| abstract_inverted_index.query | 18 |
| abstract_inverted_index.these | 48 |
| abstract_inverted_index.time, | 187 |
| abstract_inverted_index.using | 15, 31 |
| abstract_inverted_index.(KASE) | 7 |
| abstract_inverted_index.Sensor | 80 |
| abstract_inverted_index.Things | 85 |
| abstract_inverted_index.allows | 174 |
| abstract_inverted_index.become | 160 |
| abstract_inverted_index.costly | 131 |
| abstract_inverted_index.costs, | 53 |
| abstract_inverted_index.device | 135 |
| abstract_inverted_index.higher | 51 |
| abstract_inverted_index.known. | 161 |
| abstract_inverted_index.nodes, | 82, 86 |
| abstract_inverted_index.offers | 169 |
| abstract_inverted_index.online | 121, 143 |
| abstract_inverted_index.output | 147 |
| abstract_inverted_index.owners | 177 |
| abstract_inverted_index.paper, | 99 |
| abstract_inverted_index.reduce | 93 |
| abstract_inverted_index.revoke | 179 |
| abstract_inverted_index.rights | 27, 182 |
| abstract_inverted_index.scheme | 166, 208 |
| abstract_inverted_index.search | 26, 171 |
| abstract_inverted_index.secure | 218 |
| abstract_inverted_index.single | 17 |
| abstract_inverted_index.Network | 81 |
| abstract_inverted_index.dataset | 14 |
| abstract_inverted_index.decrypt | 45 |
| abstract_inverted_index.devices | 215 |
| abstract_inverted_index.feature | 22 |
| abstract_inverted_index.message | 155 |
| abstract_inverted_index.minimal | 150 |
| abstract_inverted_index.offline | 125 |
| abstract_inverted_index.pairing | 59 |
| abstract_inverted_index.phases: | 120 |
| abstract_inverted_index.propose | 101 |
| abstract_inverted_index.scheme, | 107 |
| abstract_inverted_index.schemes | 8, 49, 69 |
| abstract_inverted_index.source. | 141 |
| abstract_inverted_index.Abstract | 0 |
| abstract_inverted_index.Devices, | 78 |
| abstract_inverted_index.However, | 36 |
| abstract_inverted_index.Internet | 83 |
| abstract_inverted_index.Wireless | 79 |
| abstract_inverted_index.analysis | 200 |
| abstract_inverted_index.compared | 220 |
| abstract_inverted_index.computes | 127 |
| abstract_inverted_index.constant | 33 |
| abstract_inverted_index.delegate | 24 |
| abstract_inverted_index.devices, | 72 |
| abstract_inverted_index.distinct | 119 |
| abstract_inverted_index.existing | 2, 196, 223 |
| abstract_inverted_index.features | 190 |
| abstract_inverted_index.generate | 41 |
| abstract_inverted_index.keywords | 159 |
| abstract_inverted_index.majority | 129 |
| abstract_inverted_index.multiple | 29 |
| abstract_inverted_index.offline. | 123 |
| abstract_inverted_index.proposed | 165, 207 |
| abstract_inverted_index.provably | 217 |
| abstract_inverted_index.required | 39 |
| abstract_inverted_index.schemes. | 197, 225 |
| abstract_inverted_index.searches | 10 |
| abstract_inverted_index.security | 199 |
| abstract_inverted_index.Aggregate | 4 |
| abstract_inverted_index.Frequency | 76 |
| abstract_inverted_index.Motivated | 88 |
| abstract_inverted_index.R-OO-KASE | 167 |
| abstract_inverted_index.Revocable | 103 |
| abstract_inverted_index.addition, | 163 |
| abstract_inverted_index.delegated | 181 |
| abstract_inverted_index.efficient | 210 |
| abstract_inverted_index.empirical | 202 |
| abstract_inverted_index.encrypted | 13 |
| abstract_inverted_index.expensive | 58 |
| abstract_inverted_index.generates | 145 |
| abstract_inverted_index.splitting | 113 |
| abstract_inverted_index.supported | 193 |
| abstract_inverted_index.trapdoor, | 19 |
| abstract_inverted_index.Encryption | 6 |
| abstract_inverted_index.Searchable | 5 |
| abstract_inverted_index.capability | 172 |
| abstract_inverted_index.ciphertext | 43 |
| abstract_inverted_index.electrical | 139 |
| abstract_inverted_index.operations | 38, 60, 116, 132 |
| abstract_inverted_index.(R-OO-KASE) | 106 |
| abstract_inverted_index.ciphertext) | 157 |
| abstract_inverted_index.evaluations | 203 |
| abstract_inverted_index.infeasible. | 87 |
| abstract_inverted_index.computational | 52, 95, 151 |
| abstract_inverted_index.multi-keyword | 170 |
| abstract_inverted_index.Identification | 77 |
| abstract_inverted_index.Online/Offline | 104 |
| abstract_inverted_index.computationally | 57 |
| abstract_inverted_index.resource-constrained | 71, 214 |
| abstract_inverted_index.encryption/decryption | 115 |
| abstract_inverted_index.encryption/decryption. | 62 |
| cited_by_percentile_year.max | 98 |
| cited_by_percentile_year.min | 93 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 2 |
| citation_normalized_percentile.value | 0.85389624 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |