{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T05:37:53Z","timestamp":1769578673446,"version":"3.49.0"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172307"],"award-info":[{"award-number":["62172307"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21A20466"],"award-info":[{"award-number":["U21A20466"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972294"],"award-info":[{"award-number":["61972294"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61932016"],"award-info":[{"award-number":["61932016"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Blockchain Core Technology Strategic Research Program of Ministry of Education of China","award":["2020KJ010301"],"award-info":[{"award-number":["2020KJ010301"]}]},{"name":"Special Project on Science and Technology Program of Hubei Provience","award":["2020AEA013"],"award-info":[{"award-number":["2020AEA013"]}]},{"name":"Special Project on Science and Technology Program of Hubei Provience","award":["2021BAA025"],"award-info":[{"award-number":["2021BAA025"]}]},{"DOI":"10.13039\/501100003819","name":"Natural Science Foundation of Hubei Province","doi-asserted-by":"publisher","award":["2020CFA052"],"award-info":[{"award-number":["2020CFA052"]}],"id":[{"id":"10.13039\/501100003819","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Wuhan Municipal Science and Technology Project","award":["2020010601012187"],"award-info":[{"award-number":["2020010601012187"]}]},{"name":"Foundation of Guangxi Key Laboratory of Trusted Software","award":["kx202001"],"award-info":[{"award-number":["kx202001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1109\/jsyst.2022.3182788","type":"journal-article","created":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T19:27:51Z","timestamp":1656703671000},"page":"2101-2112","source":"Crossref","is-referenced-by-count":3,"title":["Isoga: An Isogeny-Based Quantum-Resist Searchable Encryption Scheme Against Keyword Guessing Attacks"],"prefix":"10.1109","volume":"17","author":[{"given":"Qing","family":"Fan","sequence":"first","affiliation":[{"name":"School of Mathematics and Statistics, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2446-7436","authenticated-orcid":false,"given":"Debiao","family":"He","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6432-4926","authenticated-orcid":false,"given":"Jianhua","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9958-3255","authenticated-orcid":false,"given":"Cong","family":"Peng","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5701-3465","authenticated-orcid":false,"given":"Lianhai","family":"Wang","sequence":"additional","affiliation":[{"name":"Shandong Provincial Key Laboratory of Computer Networks, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"}]}],"member":"263","reference":[{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102429"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329814"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01253-9"},{"key":"ref12","article-title":"Status report on the second round of the NIST post-quantum cryptography standardization process","author":"alagic","year":"2020"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3497760"},{"key":"ref15","article-title":"Public-key authenticated encryption with keyword search: A generic construction and its quantum-resistant instantiation","author":"liu","year":"2020","journal-title":"Cryptology-eprint-archive"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/5280806"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2867462"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1142\/S0219749915500148"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.11.726"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102271"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45724-2_16"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS53863.2021.00085"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144598347011"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3124807"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.04.012"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03332-3_15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19962-7_4"},{"key":"ref19","first-page":"1019","article-title":"FS-PEKS: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted Industrial Internet of Things","volume":"18","author":"zhang","year":"2021","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2021.3071779"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25405-5_2"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9002-x"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09494-6"},{"key":"ref25","first-page":"154","article-title":"Supersingular isogeny key encapsulation","volume":"152","author":"azarderakhsh","year":"2017","journal-title":"NIST Post-Quantum Standardization Project"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.04.051"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64834-3_19"},{"key":"ref21","article-title":"Cryptanalysis of&#x201D; FS-PEKS: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted Industrial Internet of Things","volume":"2020","author":"liu","year":"2020","journal-title":"IACR Cryptology ePrint"},{"key":"ref28","first-page":"395","article-title":"CSIDH: An efficient post-quantum commutative group action","author":"castryck","year":"0","journal-title":"Proc Int Conf Theory Appl Cryptology Inf Secur"},{"key":"ref27","article-title":"Isog&#x00E9;nies entre courbes elliptiques","volume":"273","author":"v\u00e9lu","year":"1971","journal-title":"CR Acad Sci Paris S&#x00E9;r AB"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64834-3_19"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/11844662_6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2957691"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_30"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2959383"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2017.2769645"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.2989296"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2021.3134015"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4267003\/10146391\/09813496.pdf?arnumber=9813496","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T18:40:24Z","timestamp":1687804824000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9813496\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":38,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2022.3182788","relation":{},"ISSN":["1932-8184","1937-9234","2373-7816"],"issn-type":[{"value":"1932-8184","type":"print"},{"value":"1937-9234","type":"electronic"},{"value":"2373-7816","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6]]}}}