{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:50:44Z","timestamp":1742914244236,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030688837"},{"type":"electronic","value":"9783030688844"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-68884-4_9","type":"book-chapter","created":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T23:29:09Z","timestamp":1612826949000},"page":"108-121","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Public Key Cryptography Scheme with Equality Test for Heterogeneous Systems in IIoT"],"prefix":"10.1007","author":[{"given":"Abdelrhman","family":"Hassan","sequence":"first","affiliation":[]},{"given":"Rashad","family":"Elhabob","sequence":"additional","affiliation":[]},{"given":"Umar","family":"Ibrahim","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,7]]},"reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-030-24900-7_21","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"J Long","year":"2019","unstructured":"Long, J., Zhang, K., Wang, X., Dai, H.-N.: Lightweight distributed attribute based keyword search system for internet of things. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11637, pp. 253\u2013264. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-24900-7_21"},{"doi-asserted-by":"crossref","unstructured":"Hassan, A., Liu, F., Wang, F., Wang, Y.: Secure image classification with deep neural networks for IoT applications. J. Ambient Intell. Human. Comput. 1\u201319 (2020). DOIurl10.1007\/s12652-020-02565-z","key":"9_CR2","DOI":"10.1007\/s12652-020-02565-z"},{"key":"9_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3008955","author":"H Xiong","year":"2020","unstructured":"Xiong, H., et al.: Heterogeneous signcryption with equality test for IIoT environment. IEEE Internet Things J. (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.3008955","journal-title":"IEEE Internet Things J."},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1007\/s12652-019-01365-4","volume":"11","author":"R Elhabob","year":"2020","unstructured":"Elhabob, R., Zhao, Y., Sella, I., Xiong, H.: An efficient certificateless public key cryptography with authorized equality test in IIoT. J. Ambient Intell. Human. Comput. 11, 1065\u20131083 (2020). https:\/\/doi.org\/10.1007\/s12652-019-01365-4","journal-title":"J. Ambient Intell. Human. Comput."},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"68957","DOI":"10.1109\/ACCESS.2019.2917326","volume":"7","author":"R Elhabob","year":"2019","unstructured":"Elhabob, R., Zhao, Y., Sella, I., Xiong, H.: Efficient certificateless public key cryptography with equality test for internet of vehicles. IEEE Access 7, 68957\u201368969 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2917326","journal-title":"IEEE Access"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-030-05345-1_21","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"MMK Al-Nadwi","year":"2018","unstructured":"Al-Nadwi, M.M.K., Refat, N., Zaman, N., Rahman, M.A., Bhuiyan, M.Z.A., Razali, R.B.: Cloud enabled e-glossary system: a smart campus perspective. In: Wang, G., Chen, J., Yang, L.T. (eds.) SpaCCS 2018. LNCS, vol. 11342, pp. 251\u2013260. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05345-1_21"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-030-05345-1_14","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"K Peng","year":"2018","unstructured":"Peng, K., Zheng, L., Xu, X., Lin, T., Leung, V.C.M.: Balanced iterative reducing and clustering using hierarchies with principal component analysis (PBirch) for intrusion detection over big data in mobile cloud environment. In: Wang, G., Chen, J., Yang, L.T. (eds.) SpaCCS 2018. LNCS, vol. 11342, pp. 166\u2013177. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05345-1_14"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-030-24900-7_4","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"MG Raeini","year":"2019","unstructured":"Raeini, M.G., Nojoumian, M.: Privacy-preserving big data analytics: from theory to practice. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11637, pp. 45\u201359. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-24900-7_4"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506\u2013522. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24676-3_30"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-642-11925-5_9","volume-title":"Topics in Cryptology - CT-RSA 2010","author":"G Yang","year":"2010","unstructured":"Yang, G., Tan, C.H., Huang, Q., Wong, D.S.: Probabilistic public key encryption with equality test. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol. 5985, pp. 119\u2013131. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-11925-5_9"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/j.ins.2015.08.053","volume":"328","author":"S Ma","year":"2016","unstructured":"Ma, S.: Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. 328, 389\u2013402 (2016)","journal-title":"Inf. Sci."},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"SS Al-Riyami","year":"2003","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452\u2013473. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-40061-5_29"},{"key":"9_CR13","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.ins.2018.06.025","volume":"462","author":"H Qu","year":"2018","unstructured":"Qu, H., Yan, Z., Lin, X.J., Zhang, Q., Sun, L.: Certificateless public key encryption with equality test. Inf. Sci. 462, 76\u201392 (2018)","journal-title":"Inf. Sci."},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-642-22497-3_25","volume-title":"Information Security and Privacy","author":"Q Tang","year":"2011","unstructured":"Tang, Q.: Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Parampalli, U., Hawkes, P. (eds.) ACISP 2011. LNCS, vol. 6812, pp. 389\u2013406. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22497-3_25"},{"issue":"12","key":"9_CR15","doi-asserted-by":"publisher","first-page":"1351","DOI":"10.1002\/sec.418","volume":"5","author":"Q Tang","year":"2012","unstructured":"Tang, Q.: Public key encryption supporting plaintext equality test and user-specified authorization. Secur. Commun. Netw. 5(12), 1351\u20131362 (2012)","journal-title":"Secur. Commun. Netw."},{"issue":"4","key":"9_CR16","doi-asserted-by":"publisher","first-page":"986","DOI":"10.1093\/comjnl\/bxu026","volume":"58","author":"S Ma","year":"2015","unstructured":"Ma, S., Zhang, M., Huang, Q., Yang, B.: Public key encryption with delegated equality test in a multi-user setting. Comput. J. 58(4), 986\u20131002 (2015)","journal-title":"Comput. J."},{"issue":"10","key":"9_CR17","doi-asserted-by":"publisher","first-page":"2686","DOI":"10.1093\/comjnl\/bxv025","volume":"58","author":"K Huang","year":"2015","unstructured":"Huang, K., Tso, R., Chen, Y.C., Rahman, S.M.M., Almogren, A., Alamri, A.: PKE-AET: public key encryption with authorized equality test. Comput. J. 58(10), 2686\u20132697 (2015)","journal-title":"Comput. J."},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1007\/s10586-019-02979-1","volume":"23","author":"R Elhabob","year":"2020","unstructured":"Elhabob, R., Zhao, Y., Eltayieb, N., Abdelgader, A.M., Xiong, H.: Identity-based encryption with authorized equivalence test for cloud-assisted IoT. Cluster Comput. 23, 1085\u20131101 (2020). https:\/\/doi.org\/10.1007\/s10586-019-02979-1","journal-title":"Cluster Comput."},{"key":"9_CR19","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.future.2017.03.007","volume":"73","author":"L Wu","year":"2017","unstructured":"Wu, L., Zhang, Y., Choo, K.K.R., He, D.: Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Gener. Comput. Syst. 73, 22\u201331 (2017)","journal-title":"Future Gener. Comput. Syst."},{"key":"9_CR20","doi-asserted-by":"publisher","first-page":"101776","DOI":"10.1016\/j.sysarc.2020.101776","volume":"109","author":"A Hassan","year":"2020","unstructured":"Hassan, A., Wang, Y., Elhabob, R., Eltayieb, N., Li, F.: An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments. J. Syst. Archit. 109, 101776 (2020). https:\/\/doi.org\/10.1016\/j.sysarc.2020.101776","journal-title":"J. Syst. Archit."},{"unstructured":"Elhabob, R., Sella, I., Zhao, Y., Zhu, G., Xiong, H.: A heterogeneous systems public key encryption with equality test in smart city. In: Proceedings of The 18th International Conference on Electronic Business (ICEB), Guilin (2018)","key":"9_CR21"},{"issue":"9","key":"9_CR22","first-page":"4742","volume":"13","author":"R Elhabob","year":"2019","unstructured":"Elhabob, R., Zhao, Y., Sella, I., Xiong, H.: Public key encryption with equality test for heterogeneous systems in cloud computing. KSII Trans. Internet Inf. Syst. (TIIS) 13(9), 4742\u20134770 (2019)","journal-title":"KSII Trans. Internet Inf. Syst. (TIIS)"},{"key":"9_CR23","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/s11277-020-07190-9","volume":"113","author":"R Elhabob","year":"2020","unstructured":"Elhabob, R., Zhao, Y., Hassan, A., Xiong, H.: PKE-ET-HS: public key encryption with equality test for heterogeneous systems in IoT. Wirel. Pers. Commun. 113, 313\u2013335 (2020)","journal-title":"Wirel. Pers. Commun."},{"issue":"8","key":"9_CR24","doi-asserted-by":"publisher","first-page":"3141","DOI":"10.1007\/s11276-017-1524-z","volume":"24","author":"MES Saeed","year":"2018","unstructured":"Saeed, M.E.S., Liu, Q., Tian, G., Gao, B., Li, F.: HOOSC: heterogeneous online\/offline signcryption for the internet of things. Wirel. Netw. 24(8), 3141\u20133160 (2018)","journal-title":"Wirel. Netw."},{"key":"9_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/11586821_29","volume-title":"Cryptography and Coding","author":"L Chen","year":"2005","unstructured":"Chen, L., Cheng, Z.: Security proof of Sakai-Kasahara\u2019s identity-based encryption scheme. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 442\u2013459. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11586821_29"},{"key":"9_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology \u2014 CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44647-8_13"},{"unstructured":"Lynn, B., et al.: The Stanford pairing based crypto library (2006). http:\/\/crypto.stanford.edu\/pbc\/. Accessed 27 March 2013","key":"9_CR27"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-68884-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T23:32:38Z","timestamp":1612827158000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-68884-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030688837","9783030688844"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-68884-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"7 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.spaccs2020.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"131","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}