{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T00:00:45Z","timestamp":1751241645127},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030249069"},{"type":"electronic","value":"9783030249076"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24907-6_30","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:02:46Z","timestamp":1562770966000},"page":"397-411","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Verifiable Encryption Scheme Supporting Fuzzy Search"],"prefix":"10.1007","author":[{"given":"Ruwei","family":"Huang","sequence":"first","affiliation":[]},{"given":"Zhikun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Guang","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"30_CR1","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the 2000 IEEE Symposium on Security & Privacy (S&P), Piscataway, pp. 44\u201355 (2000)"},{"issue":"11","key":"30_CR2","first-page":"5671","volume":"11","author":"ZL Mei","year":"2017","unstructured":"Mei, Z.L., Wu, B., Tian, S.L., et al.: Fuzzy keyword search method over ciphertexts supporting access control. KSII Trans. Internet Inf. Syst. 11(11), 5671\u20135693 (2017)","journal-title":"KSII Trans. Internet Inf. Syst."},{"issue":"1","key":"30_CR3","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"N Cao","year":"2014","unstructured":"Cao, N., Wang, C., Li, M., et al.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222\u2013233 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"5","key":"30_CR4","doi-asserted-by":"publisher","first-page":"1566","DOI":"10.1109\/TC.2015.2448099","volume":"65","author":"W Zhang","year":"2016","unstructured":"Zhang, W., Lin, Y., Xiao, S., et al.: Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing. IEEE Trans. Comput. 65(5), 1566\u20131577 (2016)","journal-title":"IEEE Trans. Comput."},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Chai, Q, Gong, G.: Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: Proceedings of IEEE International Conference on Communications, Ottawa, pp. 917\u2013922 (2012)","DOI":"10.1109\/ICC.2012.6364125"},{"issue":"4","key":"30_CR6","first-page":"61","volume":"3","author":"J Wang","year":"2012","unstructured":"Wang, J., Ma, H., Tang, Q., et al.: A new efficient verifiable fuzzy keyword search scheme. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 3(4), 61\u201371 (2012)","journal-title":"J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl."},{"issue":"2","key":"30_CR7","first-page":"348","volume":"54","author":"KX Wang","year":"2017","unstructured":"Wang, K.X., Li, Y.X., Zhou, F.C., et al.: Multi-keyword fuzzy search over encrypted data. J. Comput. Res. Dev. 54(2), 348\u2013360 (2017)","journal-title":"J. Comput. Res. Dev."},{"issue":"1","key":"30_CR8","first-page":"137","volume":"35","author":"Y Yang","year":"2019","unstructured":"Yang, Y., Zhang, Y.C., Liu, J.: Chinese multi-keyword fuzzy rank search over encrypted cloud data based on locality-sensitive hashing. J. Inf. Sci. Eng. 35(1), 137\u2013158 (2019)","journal-title":"J. Inf. Sci. Eng."},{"key":"30_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/3-540-45811-5_29","volume-title":"Information Security","author":"MT Goodrich","year":"2002","unstructured":"Goodrich, M.T., Tamassia, R., Hasi\u0107, J.: An efficient dynamic and distributed cryptographic accumulator. In: Chan, A.H., Gligor, V. (eds.) ISC 2002. LNCS, vol. 2433, pp. 372\u2013388. Springer, Heidelberg (2002). \n                    https:\/\/doi.org\/10.1007\/3-540-45811-5_29"},{"key":"30_CR10","unstructured":"Sion, R.: Query execution assurance for outsourced databases. In: Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, pp. 601\u2013612 (2005)"},{"issue":"5","key":"30_CR11","doi-asserted-by":"publisher","first-page":"895","DOI":"10.3233\/JCS-2011-0426","volume":"19","author":"R Curtmola","year":"2011","unstructured":"Curtmola, R., Garay, J., Kamara, S., et al.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895\u2013934 (2011)","journal-title":"J. Comput. Secur."},{"issue":"12","key":"30_CR12","first-page":"2391","volume":"34","author":"RW Huang","year":"2011","unstructured":"Huang, R.W., Gui, X.L., Yu, S., et al.: A computable encryption method for privacy protection in cloud environments. J. Comput. 34(12), 2391\u20132402 (2011)","journal-title":"J. Comput."},{"key":"30_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-319-02937-5_17","volume-title":"Cryptology and Network Security","author":"K Kurosawa","year":"2013","unstructured":"Kurosawa, K., Ohtaki, Y.: How to update documents verifiably in searchable symmetric encryption. In: Abdalla, M., Nita-Rotaru, C., Dahab, R. (eds.) CANS 2013. LNCS, vol. 8257, pp. 309\u2013328. Springer, Cham (2013). \n                    https:\/\/doi.org\/10.1007\/978-3-319-02937-5_17"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24907-6_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:07:35Z","timestamp":1562771255000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24907-6_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030249069","9783030249076"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24907-6_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}