{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T01:26:01Z","timestamp":1768526761657,"version":"3.49.0"},"reference-count":61,"publisher":"Wiley","issue":"10","license":[{"start":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T00:00:00Z","timestamp":1649289600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T00:00:00Z","timestamp":1649289600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Int J of Intelligent Sys"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1002\/int.22884","type":"journal-article","created":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T07:37:18Z","timestamp":1649317038000},"page":"7356-7378","update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Forward privacy multikeyword ranked search over encrypted database"],"prefix":"10.1155","volume":"37","author":[{"given":"Shaohua","family":"Zhao","sequence":"first","affiliation":[{"name":"The State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0532-9783","authenticated-orcid":false,"given":"Hua","family":"Zhang","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China"}]},{"given":"Xin","family":"Zhang","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China"}]},{"given":"Wenmin","family":"Li","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China"}]},{"given":"Fei","family":"Gao","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China"}]},{"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[{"name":"The State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China"}]}],"member":"311","published-online":{"date-parts":[[2022,4,7]]},"reference":[{"key":"e_1_2_11_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.22443"},{"key":"e_1_2_11_3_1","doi-asserted-by":"crossref","unstructured":"XiaY CaiJ LiY et al. A precision\u2010preferred comprehensive information extraction system for clinical articles in traditional Chinese Medicine.Int J Intell Syst.2021:1\u201017.doi:10.1002\/int.22748","DOI":"10.1002\/int.22748"},{"key":"e_1_2_11_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465171"},{"key":"e_1_2_11_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.03.003"},{"key":"e_1_2_11_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2021.1004261"},{"key":"e_1_2_11_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2993293"},{"key":"e_1_2_11_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3417978"},{"key":"e_1_2_11_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.282"},{"key":"e_1_2_11_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.45"},{"key":"e_1_2_11_11_1","doi-asserted-by":"crossref","unstructured":"LaiS PatranabisS SakzadA et al. Result pattern hiding searchable encryption for conjunctive queries Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security; 2018:745\u2010762.","DOI":"10.1145\/3243734.3243753"},{"key":"e_1_2_11_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2596138"},{"key":"e_1_2_11_13_1","doi-asserted-by":"crossref","unstructured":"FuZ ShuJ SunX ZhangD. Semantic keyword search based on trie over encrypted cloud data. Proceedings of the 2nd International Workshop On Security In Cloud Computing. ACM;2014:59\u201062.","DOI":"10.1145\/2600075.2600081"},{"key":"e_1_2_11_14_1","first-page":"12","article-title":"Access pattern disclosure on searchable encryption: ramification, attack and mitigation","volume":"20","author":"Islam MS","year":"2012","journal-title":"NDSS"},{"key":"e_1_2_11_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.11.021"},{"key":"e_1_2_11_16_1","unstructured":"ZhangY KatzJ PapamanthouC.All your queries are belong to us: the power of file\u2010injection attacks on searchable encryption.25th {USENIX$USENIX$} Security Symposium ({USENIX$USENIX$} Security 16);2016:707\u2010720."},{"key":"e_1_2_11_17_1","doi-asserted-by":"crossref","unstructured":"KimKS KimM LeeD ParkJH KimWH. Forward secure dynamic searchable symmetric encryption with efficient updates. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security;2017:1449\u20101463.","DOI":"10.1145\/3133956.3133970"},{"key":"e_1_2_11_18_1","doi-asserted-by":"crossref","unstructured":"SongX DongC YuanD et al. Forward private searchable symmetric encryption with optimized I\/O efficiency.IEEE Trans Depend Secure Comput.2018;17(5):912\u2010927.","DOI":"10.1109\/TDSC.2018.2822294"},{"key":"e_1_2_11_19_1","doi-asserted-by":"crossref","unstructured":"PatranabisS MukhopadhyayD. Forward and backward private conjunctive searchable symmetric encryption. NDSS Symposium 2021 (virtual).","DOI":"10.14722\/ndss.2021.23116"},{"key":"e_1_2_11_20_1","doi-asserted-by":"crossref","unstructured":"SunW WangB CaoN et al. Privacy\u2010preserving multi\u2010keyword text search in the cloud supporting similarity\u2010based ranking. Proceedings of the 8th ACM SIGSAC Symposium on Information Computer and Communications Security; 2013:71\u201082.","DOI":"10.1145\/2484313.2484322"},{"key":"e_1_2_11_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2401003"},{"key":"e_1_2_11_22_1","doi-asserted-by":"crossref","unstructured":"WangC CaoN LiJ RenK LouW. Secure ranked keyword search over encrypted cloud data. 2010 IEEE 30th International Conference on Distributed Computing Systems. IEEE;2010:253\u2010262.","DOI":"10.1109\/ICDCS.2010.34"},{"key":"e_1_2_11_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2593444"},{"key":"e_1_2_11_24_1","doi-asserted-by":"crossref","unstructured":"WongWK CheungDWl KaoB MamoulisN. Secure kNN computation on encrypted databases. Proceedings of the 2009 ACM SIGMOD International Conference on Management of data. ACM; 2009:139\u2010152.","DOI":"10.1145\/1559845.1559862"},{"key":"e_1_2_11_25_1","unstructured":"YaoB LiF XiaoX.Secure nearest neighbor revisited.2013 IEEE 29th international conference on data engineering (ICDE) IEEE;2013:733\u2010744."},{"key":"e_1_2_11_26_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2011-0426"},{"key":"e_1_2_11_27_1","doi-asserted-by":"crossref","unstructured":"ChaseM KamaraS. Structured encryption and controlled disclosure. International Conference on the Theory and Application of Cryptology and Information Security. Springer;2010:577\u2010594.","DOI":"10.1007\/978-3-642-17373-8_33"},{"key":"e_1_2_11_28_1","doi-asserted-by":"crossref","unstructured":"BostR. \u03a3o\u03c6o\u03c2: forward secure searchable encryption. Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM; 2016:1143\u20101154.","DOI":"10.1145\/2976749.2978303"},{"key":"e_1_2_11_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2355202"},{"key":"e_1_2_11_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.04.003"},{"key":"e_1_2_11_31_1","unstructured":"WangLL LoK ChandrasekharY ReasR KohlmeierS. CORD\u201019: the Covid\u201019 open research dataset2020."},{"key":"e_1_2_11_32_1","unstructured":"SongDX WagnerD PerrigA.Practical techniques for searches on encrypted data.Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000 IEEE;2000:44\u201055."},{"key":"e_1_2_11_33_1","doi-asserted-by":"crossref","unstructured":"BonehD DiCrescenzoG OstrovskyR PersianoG. Public key encryption with keyword search. International Conference on the Theory and Applications of Cryptographic Techniques. Springer;2004:506\u2010522.","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"e_1_2_11_34_1","doi-asserted-by":"crossref","unstructured":"LiJ WangQ WangC CaoN RenK LouW. Fuzzy keyword search over encrypted data in cloud computing. 2010 Proceedings IEEE INFOCOM. IEEE;2010:1\u20105.","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"e_1_2_11_35_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TCC.2021.3092358","article-title":"Scalable Fuzzy Keyword Ranked Search over Encrypted Data on Hybrid Clouds","author":"Zhang H","year":"2021","journal-title":"IEEE Trans Cloud Comput"},{"key":"e_1_2_11_36_1","doi-asserted-by":"crossref","unstructured":"XuZ KangW LiR YowK XuCZ. Efficient multi\u2010keyword ranked query on encrypted data in the cloud. 2012 IEEE 18th International Conference on Parallel and Distributed Systems. IEEE;2012:244\u2010251.","DOI":"10.1109\/ICPADS.2012.42"},{"key":"e_1_2_11_37_1","doi-asserted-by":"crossref","unstructured":"ZhuY WangZ WangJ. Collusion\u2010resisting secure nearest neighbor query over encrypted data in cloud revisited. 2016 IEEE\/ACM 24th International Symposium on Quality of Service (IWQoS). IEEE;2016:1\u20106.","DOI":"10.1109\/IWQoS.2016.7590443"},{"key":"e_1_2_11_38_1","doi-asserted-by":"crossref","unstructured":"ZhangH GuoZ ZhaoS et al. Privacy\u2010preserving linear region search service.IEEE Trans Serv Comput.2017;14(1):207\u2010221.","DOI":"10.1109\/TSC.2017.2777970"},{"key":"e_1_2_11_39_1","doi-asserted-by":"crossref","unstructured":"LiuQ NieX LiuX PengT WuJ. Verifiable ranked search over dynamic encrypted data in cloud computing. 2017 IEEE\/ACM 25th International Symposium on Quality of Service (IWQoS). IEEE;2017:1\u20106.","DOI":"10.1109\/IWQoS.2017.7969156"},{"key":"e_1_2_11_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2896258"},{"key":"e_1_2_11_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0757-8"},{"key":"e_1_2_11_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.02.019"},{"issue":"6","key":"e_1_2_11_43_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3356468","article-title":"Secure deduplication system with active key update and its application in IoT","volume":"10","author":"Li J","year":"2019","journal-title":"ACM Trans Intell Syst Technol"},{"key":"e_1_2_11_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2844727"},{"key":"e_1_2_11_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.01.046"},{"key":"e_1_2_11_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.09.064"},{"key":"e_1_2_11_47_1","doi-asserted-by":"crossref","unstructured":"RenP LiF WangY ZhouH LiuP.IPSadas: identity\u2010privacy\u2010aware secure and anonymous data aggregation scheme.Int J Intell Syst.2021;1\u201035.doi:10.1002\/int.22793","DOI":"10.1002\/int.22793"},{"key":"e_1_2_11_48_1","doi-asserted-by":"crossref","unstructured":"WangX LiangZ KoeASV et al. Secure and efficient parameters aggregation protocol for federated incremental learning and its applications.Int J Intell Syst. 2021:1\u201017.doi:10.1002\/int.22727","DOI":"10.1002\/int.22727"},{"key":"e_1_2_11_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106782"},{"key":"e_1_2_11_50_1","doi-asserted-by":"crossref","unstructured":"WangB YuS LouW HouYT. Privacy\u2010preserving multi\u2010keyword fuzzy search over encrypted data in the cloud. IEEE INFOCOM 2014\u2010IEEE Conference on Computer Communications. IEEE;2014:2112\u20102120.","DOI":"10.1109\/INFOCOM.2014.6848153"},{"key":"e_1_2_11_51_1","doi-asserted-by":"crossref","unstructured":"GolleP StaddonJ WatersB. Secure conjunctive keyword search over encrypted data. International Conference on Applied Cryptography and Network Security. Springer;2004:31\u201045.","DOI":"10.1007\/978-3-540-24852-1_3"},{"key":"e_1_2_11_52_1","doi-asserted-by":"crossref","unstructured":"BonehD WatersB. Conjunctive subset and range queries on encrypted data. Theory of Cryptography Conference. Springer;2007:535\u2010554.","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"e_1_2_11_53_1","doi-asserted-by":"crossref","unstructured":"CashD JareckiS JutlaC KrawczykH Ro\u015fuMC SteinerM. Highly\u2010scalable searchable symmetric encryption with support for boolean queries. Annual Cryptology Conference. Springer;2013:353\u2010373.","DOI":"10.1007\/978-3-642-40041-4_20"},{"key":"e_1_2_11_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.12.003"},{"key":"e_1_2_11_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2903502"},{"key":"e_1_2_11_56_1","doi-asserted-by":"crossref","unstructured":"ChangYC MitzenmacherM. Privacy preserving keyword searches on remote encrypted data. International Conference on Applied Cryptography and Network Security. Springer;2005:442\u2010455.","DOI":"10.1007\/11496137_30"},{"key":"e_1_2_11_57_1","first-page":"72","article-title":"Practical dynamic searchable encryption with small leakage","volume":"71","author":"Stefanov E","year":"2014","journal-title":"NDSS"},{"key":"e_1_2_11_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2894411"},{"key":"e_1_2_11_59_1","doi-asserted-by":"crossref","unstructured":"SunSF SteinfeldR LaiS et al. Practical non\u2010interactive searchable encryption with forward and backward privacy. Proceedings Network and Distributed System Security Symposium. Internet Society; 2021.","DOI":"10.14722\/ndss.2021.24162"},{"key":"e_1_2_11_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-018-0517-6"},{"issue":"1","key":"e_1_2_11_61_1","first-page":"25","article-title":"VBTree: forward secure conjunctive queries over encrypted data for cloud computing","volume":"28","author":"Wu Z","year":"2019","journal-title":"LDB J"},{"key":"e_1_2_11_62_1","unstructured":"ZuoC SunSF LiuJK ShaoJ PieprzykJ WeiG.Forward and backward private dynamic searchable symmetric encryption for conjunctive queries.Cryptol ePrint Arch;2020."}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/int.22884","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/int.22884","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/int.22884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T15:38:23Z","timestamp":1675957103000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/int.22884"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,7]]},"references-count":61,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["10.1002\/int.22884"],"URL":"https:\/\/doi.org\/10.1002\/int.22884","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"value":"0884-8173","type":"print"},{"value":"1098-111X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,7]]},"assertion":[{"value":"2022-02-15","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-03-17","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-04-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}