{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T21:15:45Z","timestamp":1768338945627,"version":"3.49.0"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,11,20]],"date-time":"2020-11-20T00:00:00Z","timestamp":1605830400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,20]],"date-time":"2020-11-20T00:00:00Z","timestamp":1605830400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472066"],"award-info":[{"award-number":["61472066"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11276-020-02462-5","type":"journal-article","created":{"date-parts":[[2020,11,20]],"date-time":"2020-11-20T07:03:16Z","timestamp":1605855796000},"page":"1063-1076","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Equality test with an anonymous authorization in cloud computing"],"prefix":"10.1007","volume":"27","author":[{"given":"Hisham","family":"Abdalla","sequence":"first","affiliation":[]},{"given":"Hu","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Abubaker","family":"Wahaballa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3105-3079","authenticated-orcid":false,"given":"Mohammed","family":"Ramadan","sequence":"additional","affiliation":[]},{"given":"Zhiguang","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,20]]},"reference":[{"issue":"6","key":"2462_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"D Whitfield","year":"1976","unstructured":"Whitfield, D., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2462_CR2","doi-asserted-by":"crossref","unstructured":"Dan, B., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques (pp. 506\u2013522). Berlin, Heidelberg: Springer.","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"2462_CR3","doi-asserted-by":"crossref","unstructured":"Yang, G., Tan, C. H., Huang, Q., & Wong, D. S. (2010). Probabilistic public key encryption with equality test. CT-RSA, CA, USA, March 1 (pp. 119\u2013131). Springer.","DOI":"10.1007\/978-3-642-11925-5_9"},{"issue":"4","key":"2462_CR4","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1504\/IJACT.2012.048079","volume":"2","author":"Q Tang","year":"2012","unstructured":"Tang, Q. (2012). Public key encryption schemes supporting equality test with authorisation of different granularity. International Journal of Applied Cryptography, 2(4), 304\u2013321.","journal-title":"International Journal of Applied Cryptography"},{"key":"2462_CR5","first-page":"223","volume":"25","author":"R Mohammed","year":"2019","unstructured":"Mohammed, R., Yongjian, L., Fagen, L., Shijie, Z., & Hisham, A. (2019). IBEETRSA: Identity-based encryption with equality test over RSA for wireless body area network. Mobile Networks and Applications, 25, 223\u2013233.","journal-title":"Mobile Networks and Applications"},{"key":"2462_CR6","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxu026","author":"S Ma","year":"2014","unstructured":"Ma, S., Zhang, M., Huang, Q., & Yang, B. (2014). Public key encryption with delegated equality test in a multi-user setting. The Computer Journal,. https:\/\/doi.org\/10.1093\/comjnl\/bxu026.","journal-title":"The Computer Journal"},{"key":"2462_CR7","doi-asserted-by":"publisher","first-page":"12702","DOI":"10.1109\/ACCESS.2017.2716971","volume":"5","author":"X Yan","year":"2017","unstructured":"Yan, X., Wang, M., Zhong, H., Cui, J., Liu, L., & Franqueira, V. N. L. (2017). Verifiable public key encryption scheme with equality test in 5G networks. IEEE Access, 5, 12702\u201312713.","journal-title":"IEEE Access"},{"key":"2462_CR8","doi-asserted-by":"crossref","unstructured":"Tang, Q. (2011). Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Proceedings of 16th Australasian conference information security and privacy. Melbourne, Australia (Vol. 6812, pp. 389\u2013406).","DOI":"10.1007\/978-3-642-22497-3_25"},{"issue":"12","key":"2462_CR9","doi-asserted-by":"publisher","first-page":"1351","DOI":"10.1002\/sec.418","volume":"5","author":"Q Tang","year":"2012","unstructured":"Tang, Q. (2012). Public key encryption supporting plaintext equality test and user-specified authorization. Security and Communication Networks, 5(12), 1351\u20131362.","journal-title":"Security and Communication Networks"},{"key":"2462_CR10","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxv025","author":"K Huang","year":"2015","unstructured":"Huang, K., Tso, R., Chen, Y.-C., Rahman, S. M. M., Almogren, A., & Alamri, A. (2015). PKE-AET: Public key encryption with authorized equality test. The Computer Journal,. https:\/\/doi.org\/10.1093\/comjnl\/bxv025.","journal-title":"The Computer Journal"},{"key":"2462_CR11","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.future.2017.03.007","volume":"73","author":"L Wu","year":"2017","unstructured":"Wu, L., Zhang, Y., Choo, K. K. R., & He, D. (2017). Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Generation Computer Systems, 73, 22\u201331.","journal-title":"Future Generation Computer Systems"},{"key":"2462_CR12","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1109\/TIFS.2014.2378592","volume":"10","author":"S Ma","year":"2015","unstructured":"Ma, S., Huang, Q., Zhang, M., & Yang, B. (2015). Efficient public key encryption with equality test supporting flexible authorization. IEEE Transactions on Information Forensics and Security, 10, 458\u2013470.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2462_CR13","doi-asserted-by":"crossref","unstructured":"Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In Advances in cryptology, CRYPTO 2001 (pp. 213\u2013229). Springer.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"2462_CR14","unstructured":"Andrew, Y. C. (1982). Protocols for secure computations. In 23rd annual symposium on foundations of computer science (sfcs 1982) (pp. 160\u2013164). IEEE."},{"issue":"8","key":"2462_CR15","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MCOM.2018.1701148","volume":"56","author":"M Du","year":"2018","unstructured":"Du, M., Wang, K., Chen, Y., Wang, X., & Sun, Y. (2018). Big data privacy preserving in multi-access edge computing for heterogeneous Internet of Things. IEEE Communications Magazine, 56(8), 62\u201367.","journal-title":"IEEE Communications Magazine"},{"key":"2462_CR16","unstructured":"MIRACL, Multiprecision Integer and Rational Arithmetic C\/C++ Library. https:\/\/indigo.ie\/mscott\/."},{"issue":"6","key":"2462_CR17","first-page":"5140","volume":"5","author":"S Ramesh","year":"2014","unstructured":"Ramesh, S., & Bhaskaran, V. M. (2014). An improved remote user authentication scheme with elliptic curve cryptography and smart card without using bilinear pairings. International Journal of Engineering and Technology (IJET), 5(6), 5140\u20135154.","journal-title":"International Journal of Engineering and Technology (IJET)"},{"issue":"99","key":"2462_CR18","first-page":"1","volume":"PP","author":"D Wang","year":"2014","unstructured":"Wang, D., He, D., Wang, P., & Chu, C. H. (2014). Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment. IEEE Transactions on Dependable and Secure Computing, PP(99), 1\u201315.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"4","key":"2462_CR19","doi-asserted-by":"publisher","first-page":"1477","DOI":"10.1007\/s11277-012-0535-4","volume":"68","author":"Q Jiang","year":"2013","unstructured":"Jiang, Q., Ma, J., Li, G., & Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications, 68(4), 1477\u20131491.","journal-title":"Wireless Personal Communications"},{"key":"2462_CR20","doi-asserted-by":"crossref","unstructured":"Kouichi, S., & Shizuya, H. (1995). Relationships among the computational powers of breaking discrete log cryptosystems. In Advances in cryptology EUROCRYPT\u201995 (pp. 341\u2013355). Berlin\/Heidelberg: Springer.","DOI":"10.1007\/3-540-49264-X_28"},{"issue":"14","key":"2462_CR21","doi-asserted-by":"publisher","first-page":"3046","DOI":"10.3390\/s19143046","volume":"19","author":"Y Ming","year":"2019","unstructured":"Ming, Y., & Erxiu, W. (2019). Identity-based encryption with filtered equality test for smart city applications. Sensors, 19(14), 3046.","journal-title":"Sensors"},{"issue":"4","key":"2462_CR22","first-page":"389","volume":"10","author":"D He","year":"2013","unstructured":"He, D., & Chen, J. (2013). An efficient certificate-less designated verifier signature scheme. The International Arab Journal of Information Technology, 10(4), 389\u2013396.","journal-title":"The International Arab Journal of Information Technology"},{"issue":"4","key":"2462_CR23","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1016\/j.compeleceng.2011.05.009","volume":"37","author":"D Hea","year":"2011","unstructured":"Hea, D., Chen, J., & Zhang, R. (2011). An efficient identity-based blind signature scheme without bilinear pairings. Computers & Electrical Engineering, 37(4), 444\u2013450.","journal-title":"Computers & Electrical Engineering"},{"key":"2462_CR24","first-page":"169","volume":"4","author":"R Rivest","year":"1978","unstructured":"Rivest, R., Adleman, L., & Dertouzos, M. (1978). On data banks and privacy homomorphisms. Foundations of Secure Computation, 4, 169\u2013179.","journal-title":"Foundations of Secure Computation"},{"key":"2462_CR25","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.jisa.2018.09.002","volume":"43","author":"S Tushar","year":"2018","unstructured":"Tushar, S., & Takeshi, K. (2018). Outsourcing private equality tests to the cloud. Journal of Information Security and Applications, 43, 83\u201398.","journal-title":"Journal of Information Security and Applications"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02462-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-020-02462-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02462-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T14:24:48Z","timestamp":1620311088000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-020-02462-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,20]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["2462"],"URL":"https:\/\/doi.org\/10.1007\/s11276-020-02462-5","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,20]]},"assertion":[{"value":"20 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}