{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T17:55:28Z","timestamp":1732038928231},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T00:00:00Z","timestamp":1580256000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T00:00:00Z","timestamp":1580256000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s11277-020-07190-9","type":"journal-article","created":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T01:02:20Z","timestamp":1580259740000},"page":"313-335","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["PKE-ET-HS: Public Key Encryption with Equality Test for Heterogeneous Systems in IoT"],"prefix":"10.1007","volume":"113","author":[{"given":"Rashad","family":"Elhabob","sequence":"first","affiliation":[]},{"given":"Yanan","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Alzubair","family":"Hassan","sequence":"additional","affiliation":[]},{"given":"Hu","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,29]]},"reference":[{"issue":"1","key":"7190_CR1","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/s11277-019-06405-y","volume":"108","author":"Y Harbi","year":"2019","unstructured":"Harbi, Y., Aliouat, Z., Harous, S., Bentaleb, A., & Refoufi, A. (2019). A review of security in internet of things. Wireless Personal Communications, 108(1), 325\u2013344.","journal-title":"Wireless Personal Communications"},{"key":"7190_CR2","doi-asserted-by":"publisher","first-page":"8317","DOI":"10.1109\/JSEN.2019.2919508","volume":"19","author":"H Xiong","year":"2019","unstructured":"Xiong, H., Mei, Q., Zhao, Y., Peng, L., & Zhang, H. (2019). Scalable and forward secure network attestation with privacy-preserving in cloud-assisted internet of things. IEEE Sensors Journal, 19, 8317\u20138331.","journal-title":"IEEE Sensors Journal"},{"issue":"3","key":"7190_CR3","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/s11277-011-0414-4","volume":"61","author":"R Prasad","year":"2011","unstructured":"Prasad, R., & Reichert, F. (2011). Special issue on internet of things and future applications. Wireless Personal Communications, 61(3), 491\u2013493.","journal-title":"Wireless Personal Communications"},{"key":"7190_CR4","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1109\/TII.2019.2921516","volume":"16","author":"H Xiong","year":"2019","unstructured":"Xiong, H., Bao, Y., Nie, X., & Assor, Y. I. (2019). Server-aided attribute-based signature supporting expressive access structures for industrial internet of things. IEEE Transactions on Industrial Informatics, 16, 1013\u20131023.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"2","key":"7190_CR5","doi-asserted-by":"publisher","first-page":"1521","DOI":"10.1007\/s11277-017-5209-9","volume":"102","author":"J Tang","year":"2018","unstructured":"Tang, J., Dong, T., Li, L., & Shao, L. (2018). Intelligent monitoring system based on internet of things. Wireless Personal Communications, 102(2), 1521\u20131537.","journal-title":"Wireless Personal Communications"},{"key":"7190_CR6","unstructured":"Xiong, H., Mei, Q., & Zhao, Y. (2019). Efficient and provably secure certificateless parallel key-insulated signature without pairing for IIoT environments. IEEE Systems Journal, 1\u201311."},{"issue":"2","key":"7190_CR7","doi-asserted-by":"publisher","first-page":"e57","DOI":"10.1002\/spy2.57","volume":"2","author":"N Eltayieb","year":"2019","unstructured":"Eltayieb, N., Wang, P., Hassan, A., Elhabob, R., & Li, F. (2019). ASDS: Attribute-based secure data sharing scheme for reliable cloud environment. Security and Privacy, 2(2), e57.","journal-title":"Security and Privacy"},{"key":"7190_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01365-4","author":"R Elhabob","year":"2019","unstructured":"Elhabob, R., Zhao, Y., Sella, I., & Xiong, H. (2019). An efficient certificateless public key cryptography with authorized equality test in IIoT. Journal of Ambient Intelligence and Humanized Computing. https:\/\/doi.org\/10.1007\/s12652-019-01365-4.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"2","key":"7190_CR9","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MCC.2015.23","volume":"2","author":"H-L Truong","year":"2015","unstructured":"Truong, H.-L., & Dustdar, S. (2015). Principles for engineering IoT cloud systems. IEEE Cloud Computing, 2(2), 68\u201376.","journal-title":"IEEE Cloud Computing"},{"issue":"2","key":"7190_CR10","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1007\/s11277-016-3273-1","volume":"90","author":"R Pitchai","year":"2016","unstructured":"Pitchai, R., Jayashri, S., & Raja, J. (2016). Searchable encrypted data file sharing method using public cloud service for secure storage in cloud computing. Wireless Personal Communications, 90(2), 947\u2013960.","journal-title":"Wireless Personal Communications"},{"key":"7190_CR11","doi-asserted-by":"publisher","first-page":"101653","DOI":"10.1016\/j.sysarc.2019.101653","volume":"102","author":"N Eltayieb","year":"2020","unstructured":"Eltayieb, N., Elhabob, R., Hassan, A., & Li, F. (2020). A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. Journal of Systems Architecture, 102, 101653.","journal-title":"Journal of Systems Architecture"},{"issue":"4","key":"7190_CR12","doi-asserted-by":"publisher","first-page":"711","DOI":"10.15388\/Informatica.2019.226","volume":"30","author":"Q Mei","year":"2019","unstructured":"Mei, Q., Zhao, Y., & Xiong, H. (2019). A new provably secure certificateless signature with revocation in the standard model. Informatica, 30(4), 711\u2013728.","journal-title":"Informatica"},{"key":"7190_CR13","doi-asserted-by":"crossref","unstructured":"Sadeghi, A.-R., Wachsmann, C., & Waidner, M. (2015). Security and privacy challenges in industrial internet of things. In Proceedings of the 52nd annual design automation conference (p\u00a054). ACM.","DOI":"10.1145\/2744769.2747942"},{"key":"7190_CR14","doi-asserted-by":"publisher","first-page":"68957","DOI":"10.1109\/ACCESS.2019.2917326","volume":"7","author":"R Elhabob","year":"2019","unstructured":"Elhabob, R., Zhao, Y., Sella, I., & Xiong, H. (2019). Efficient certificateless public key cryptography with equality test for internet of vehicles. IEEE Access, 7, 68957\u201368969.","journal-title":"IEEE Access"},{"key":"7190_CR15","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1016\/j.future.2019.03.008","volume":"97","author":"H Xiong","year":"2019","unstructured":"Xiong, H., Zhao, Y., Peng, L., Zhang, H., & Yeh, K.-H. (2019). Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Future Generation Computer Systems, 97, 453\u2013461.","journal-title":"Future Generation Computer Systems"},{"issue":"1","key":"7190_CR16","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCOM.2017.1600363CM","volume":"55","author":"J Zhou","year":"2017","unstructured":"Zhou, J., Cao, Z., Dong, X., & Vasilakos, A. V. (2017). Security and privacy for cloud-based IoT: Challenges. IEEE Communications Magazine, 55(1), 26\u201333.","journal-title":"IEEE Communications Magazine"},{"issue":"4","key":"7190_CR17","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MCC.2016.79","volume":"3","author":"C Esposito","year":"2016","unstructured":"Esposito, C., Castiglione, A., Martini, B., & Choo, K.-K. R. (2016). Cloud manufacturing: Security, privacy, and forensic concerns. IEEE Cloud Computing, 3(4), 16\u201322.","journal-title":"IEEE Cloud Computing"},{"key":"7190_CR18","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.sysarc.2019.07.005","volume":"98","author":"N Eltayieb","year":"2019","unstructured":"Eltayieb, N., Elhabob, R., Hassan, A., & Li, F. (2019). An efficient attribute-based online\/offline searchable encryption and its application in cloud-based reliable smart grid. Journal of Systems Architecture, 98, 165\u2013172.","journal-title":"Journal of Systems Architecture"},{"issue":"2","key":"7190_CR19","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/s11277-018-6035-4","volume":"104","author":"A Aziz","year":"2019","unstructured":"Aziz, A., & Singh, K. (2019). Lightweight security scheme for internet of things. Wireless Personal Communications, 104(2), 577\u2013593.","journal-title":"Wireless Personal Communications"},{"issue":"9","key":"7190_CR20","first-page":"4742","volume":"13","author":"R Elhabob","year":"2019","unstructured":"Elhabob, R., Zhao, Y., Sella, I., & Xiong, H. (2019). Public key encryption with equality test for heterogeneous systems in cloud computing. KSII Transactions on Internet and Information Systems (TIIS), 13(9), 4742\u20134770.","journal-title":"KSII Transactions on Internet and Information Systems (TIIS)"},{"key":"7190_CR21","doi-asserted-by":"crossref","unstructured":"Boneh, D., Di\u00a0Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques, (pp 506\u2013522). Springer.","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"7190_CR22","doi-asserted-by":"crossref","unstructured":"Yang, G., Tan, C.\u00a0H., Huang, Q., & Wong, D.\u00a0S. (2010). Probabilistic public key encryption with equality test. In Cryptographers track at the RSA conference, (pp 119\u2013131). Springer.","DOI":"10.1007\/978-3-642-11925-5_9"},{"issue":"4","key":"7190_CR23","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1504\/IJACT.2012.048079","volume":"2","author":"Q Tang","year":"2012","unstructured":"Tang, Q. (2012). Public key encryption schemes supporting equality test with authorisation of different granularity. International Journal of Applied Cryptography, 2(4), 304\u2013321.","journal-title":"International Journal of Applied Cryptography"},{"key":"7190_CR24","doi-asserted-by":"publisher","first-page":"2686","DOI":"10.1093\/comjnl\/bxv025","volume":"58","author":"K Huang","year":"2015","unstructured":"Huang, K., Tso, R., Chen, Y.-C., Rahman, S. M. M., Almogren, A., & Alamri, A. (2015). Pke-aet: Public key encryption with authorized equality test. The Computer Journal, 58, 2686\u20132697.","journal-title":"The Computer Journal"},{"issue":"11","key":"7190_CR25","doi-asserted-by":"publisher","first-page":"1689","DOI":"10.1093\/comjnl\/bxw033","volume":"59","author":"HT Lee","year":"2016","unstructured":"Lee, H. T., Ling, S., Seo, J. H., & Wang, H. (2016). Cca2 attack and modification of Huang et al.\u2019s public key encryption with authorized equality test. The Computer Journal, 59(11), 1689\u20131694.","journal-title":"The Computer Journal"},{"key":"7190_CR26","doi-asserted-by":"publisher","first-page":"12702","DOI":"10.1109\/ACCESS.2017.2716971","volume":"5","author":"Y Xu","year":"2017","unstructured":"Xu, Y., Wang, M., Zhong, H., Cui, J., Liu, L., & Franqueira, V. N. L. (2017). Verifiable public key encryption scheme with equality test in 5g networks. IEEE Access, 5, 12702\u201312713.","journal-title":"IEEE Access"},{"key":"7190_CR27","unstructured":"Elhabob, R., Sella, I., Zhao, Y., Zhu, G., & Xiong, H. (2018). A heterogeneous systems public key encryption with equality test in smart city. In ICEB 2018 Proceedings. 98."},{"key":"7190_CR28","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/j.ins.2015.08.053","volume":"328","author":"S Ma","year":"2016","unstructured":"Ma, S. (2016). Identity-based encryption with outsourced equality test in cloud computing. Information Sciences, 328, 389\u2013402.","journal-title":"Information Sciences"},{"key":"7190_CR29","first-page":"1249","volume":"2008","author":"J Baek","year":"2008","unstructured":"Baek, J., Safavi-Naini, R., & Susilo, W. (2008). Public key encryption with keyword search revisited. Computational Science and Its Applications-ICCSA, 2008, 1249\u20131259.","journal-title":"Computational Science and Its Applications-ICCSA"},{"key":"7190_CR30","doi-asserted-by":"crossref","unstructured":"Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., & Shi, H. (2005). Searchable encryption revisited: Consistency properties, relation to anonymous ibe, and extensions. In Crypto (vol. 3621, pp. 205\u2013222). Springer.","DOI":"10.1007\/11535218_13"},{"key":"7190_CR31","doi-asserted-by":"crossref","unstructured":"Tang, Q. (2011). Towards public key encryption scheme supporting equality test with fine-grained authorization. In Australasian conference on information security and privacy (pp 389\u2013406). Springer.","DOI":"10.1007\/978-3-642-22497-3_25"},{"issue":"12","key":"7190_CR32","doi-asserted-by":"publisher","first-page":"1351","DOI":"10.1002\/sec.418","volume":"5","author":"Q Tang","year":"2012","unstructured":"Tang, Q. (2012). Public key encryption supporting plaintext equality test and user-specified authorization. Security and Communication Networks, 5(12), 1351\u20131362.","journal-title":"Security and Communication Networks"},{"key":"7190_CR33","first-page":"986","volume":"54","author":"S Ma","year":"2014","unstructured":"Ma, S., Zhang, M., Huang, Q., & Yang, B. (2014). Public key encryption with delegated equality test in a multi-user setting. The Computer Journal, 54, 986\u20131002.","journal-title":"The Computer Journal"},{"issue":"3","key":"7190_CR34","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1109\/TIFS.2014.2378592","volume":"10","author":"S Ma","year":"2015","unstructured":"Ma, S., Huang, Q., Zhang, M., & Yang, B. (2015). Efficient public key encryption with equality test supporting flexible authorization. IEEE Transactions on Information Forensics and Security, 10(3), 458\u2013470.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7190_CR35","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/j.ins.2016.09.013","volume":"373","author":"HT Lee","year":"2016","unstructured":"Lee, H. T., Ling, S., Seo, J. H., & Wang, H. (2016). Semi-generic construction of public key encryption and identity-based encryption with equality test. Information Sciences, 373, 419\u2013440.","journal-title":"Information Sciences"},{"key":"7190_CR36","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.future.2017.03.007","volume":"73","author":"L Wu","year":"2017","unstructured":"Wu, L., Zhang, Y., Choo, K.-K. R., & He, D. (2017). Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Generation Computer Systems, 73, 22\u201331.","journal-title":"Future Generation Computer Systems"},{"key":"7190_CR37","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-019-02979-1","author":"R Elhabob","year":"2019","unstructured":"Elhabob, R., Zhao, Y., Eltayieb, N., Abdelgader, A. M. S., & Xiong, H. (2019). Identity-based encryption with authorized equivalence test for cloud-assisted IoT. Cluster Computing. https:\/\/doi.org\/10.1007\/s10586-019-02979-1.","journal-title":"Cluster Computing"},{"key":"7190_CR38","doi-asserted-by":"crossref","unstructured":"Boneh, D., & Franklin, M.. (2001). Identity-based encryption from the weil pairing. In Annual international cryptology conference (pp. 213\u2013229). Springer.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"7190_CR39","unstructured":"Lynn, B. (2013). The stanford pairing based crypto library. Privacy Preservation Scheme for Multicast Communications in Smart Buildings of the Smart Grid, 324."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07190-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-020-07190-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07190-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:13:23Z","timestamp":1611792803000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-020-07190-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,29]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["7190"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07190-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,29]]},"assertion":[{"value":"29 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}