{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:55:58Z","timestamp":1757310958398,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030625757"},{"type":"electronic","value":"9783030625764"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62576-4_10","type":"book-chapter","created":{"date-parts":[[2020,11,20]],"date-time":"2020-11-20T01:57:56Z","timestamp":1605837476000},"page":"190-212","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Improved Indistinguishability for Searchable Symmetric Encryption"],"prefix":"10.1007","author":[{"given":"Moesfa Soeheila","family":"Mohamad","sequence":"first","affiliation":[]},{"given":"Ji-Jian","family":"Chin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,20]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Bosch, C., et al.: Distributed searchable symmetric encryption. In: Proceedings of the Twelfth Annual Conference on Privacy, Security and Trust (PST 2014). IEEE (2014)","DOI":"10.1109\/PST.2014.6890956"},{"key":"10_CR2","unstructured":"Bost, R.: $$ {o} \\phi o \\varsigma $$-forward secure searchable encryption. In: Proceedings of the 23rd ACM SIGSAC Conference on Computer and Communications Security (CCS 2016), pp. 1143\u20131154. ACM (2016)"},{"key":"10_CR3","unstructured":"Bost, R., Fouque, P.A.: Thwarting leakage abuse attacks against searchable encryption a formal approach and applications to database padding. Cryptology ePrint Archive, Report 2017\/1060 (2017). http:\/\/eprint.iacr.org\/2017\/1060\/"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Cash, D., Grubbs, P., Perry, J., Ristenpart, T.: Leakage-abuse attacks against searchable encryption. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 668\u2013679. ACM (2015)","DOI":"10.1145\/2810103.2813700"},{"key":"10_CR5","unstructured":"Cash, D., et al.: Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation. Cryptology ePrint Archive, Report 2014\/853 (2014). http:\/\/eprint.iacr.org\/2014\/853"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/11496137_30","volume-title":"Applied Cryptography and Network Security","author":"Y-C Chang","year":"2005","unstructured":"Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442\u2013455. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11496137_30"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/978-3-642-17373-8_33","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"M Chase","year":"2010","unstructured":"Chase, M., Kamara, S.: Structured encryption and controlled disclosure. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 577\u2013594. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17373-8_33"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-319-75650-9_13","volume-title":"Foundations and Practice of Security","author":"S Cui","year":"2018","unstructured":"Cui, S., Asghar, M.R., Galbraith, S.D., Russello, G.: ObliviousDB: practical and efficient searchable encryption with controllable leakage. In: Imine, A., Fernandez, J.M., Marion, J.-Y., Logrippo, L., Garcia-Alfaro, J. (eds.) FPS 2017. LNCS, vol. 10723, pp. 189\u2013205. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75650-9_13"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Juels, A., Wright, R.N., di Vimercati, S.D.C. (eds.) ACM Conference on Computer and Communications Security, CCS 2006, pp. 79\u201388. ACM (2006)","DOI":"10.1145\/1180405.1180417"},{"key":"10_CR10","unstructured":"Goh, E.J.: Secure indexes. Cryptology ePrint Archive, Report 2003\/216 (2003). http:\/\/eprint.iacr.org\/2003\/216\/"},{"key":"10_CR11","unstructured":"Islam, M.S., Kuzu, M., Kantarcioglu, M.: Access pattern disclosure on searchable encryption: ramification, attack and mitigation. In: 19th Annual Network and Distributed System Security Symposium, NDSS 2012. The Internet Society (2012)"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-642-39884-1_22","volume-title":"Financial Cryptography and Data Security","author":"S Kamara","year":"2013","unstructured":"Kamara, S., Papamanthou, C.: Parallel and dynamic searchable symmetric encryption. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 258\u2013274. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_22"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Yu, T., Danezis, G., Gligor, V.D. (eds.) ACM Conference on Computer and Communications Security - CCS 2012, pp. 965\u2013976. ACM (2012)","DOI":"10.1145\/2382196.2382298"},{"key":"10_CR14","unstructured":"Kamara, S., Moataz, T.: Boolean searchable symmetric encryption with worst-case sub-linear complexity. Cryptology ePrint Archive, Report 2017\/126 (2017). http:\/\/eprint.iacr.org\/2017\/126\/"},{"key":"10_CR15","unstructured":"Kamara, S., Moataz, T., Ohrimenko, O.: Structured encryption and leakage suppression. Cryptology ePrint Archive, Report 2018\/551 (2018). http:\/\/eprint.iacr.org\/2018\/551\/"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-642-32946-3_21","volume-title":"Financial Cryptography and Data Security","author":"K Kurosawa","year":"2012","unstructured":"Kurosawa, K., Ohtaki, Y.: UC-secure searchable symmetric encryption. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 285\u2013298. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32946-3_21"},{"key":"10_CR17","unstructured":"Lacharit\u00e9, M.S., Patterson, K.G.: Frequency-smoothing encryption: preventing snapshot attacks on deterministically-encrypted data. Cryptology ePrint Archive, Report 2017\/1068 (2017). http:\/\/eprint.iacr.org\/2017\/1068\/"},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.ins.2013.11.021","volume":"265","author":"C Liu","year":"2014","unstructured":"Liu, C., Zhu, L., Wang, M., Tan, Y.: Search pattern leakage in searchable encryption: attacks and new construction. Inf. Sci. 265, 176\u2013188 (2014)","journal-title":"Inf. Sci."},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Moataz, T., Shikfa, A.: Boolean symmetric searchable encryption. In: Chen, K., Xie, Q., Qiu, W., Li, N., Tzeng, W.G. (eds.) 8th ACM Symposium on Information, Computer and Communications Security - ASIACCS 2013, pp. 265\u2013276. ACM (2013)","DOI":"10.1145\/2484313.2484347"},{"key":"10_CR20","unstructured":"Mohamad, M.S., Tan, S.Y., Chin, J.J.: Searchable symmetric encryption: defining strength against query recovery attacks. In: Proceedings of the 6th International Cryptology and Information Security Conference 2018, pp. 85\u201393 (2018)"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Naveed, M., Prabhakaran, M., Gunter, C.A.: Dynamic searchable encryption via blind storage. In: 2014 IEEE Symposium on Security and Privacy, SP 2014, pp. 639\u2013654. IEEE Computer Society (2014)","DOI":"10.1109\/SP.2014.47"},{"issue":"1","key":"10_CR22","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1587\/transfun.E102.A.114","volume":"E102A","author":"W Ogata","year":"2019","unstructured":"Ogata, W., Kurosawa, K.: No-dictionary searchable symmetric encryption. IEICE Trans. Fundam. E102A(1), 114\u2013124 (2019)","journal-title":"IEICE Trans. Fundam."},{"key":"10_CR23","unstructured":"Pouliot, D., Griffy, S., Wright, C.V.: The strength of weak randomization: efficiently searchable encryption with minimal leakage. Cryptology ePrint Archive, Report 2017\/1098 (2017). http:\/\/eprint.iacr.org\/2017\/1098\/"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Pouliot, D., Wright, C.V.: Shadow nemesis: inference attacks on efficiently deployable, efficiently searchable encryption. In: 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1341\u20131352. ACM (2016)","DOI":"10.1145\/2976749.2978401"},{"key":"10_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-540-88625-9_23","volume-title":"Information and Communications Security","author":"S Sedghi","year":"2008","unstructured":"Sedghi, S., Doumen, J., Hartel, P., Jonker, W.: Towards an information theoretic analysis of searchable encryption. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol. 5308, pp. 345\u2013360. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-88625-9_23"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Stefanov, E., Papamanthou, C., Shi, E.: Practical dynamic searchable encryption with small leakage. In: Network and Distributed System Security Symposium - NDSS 2014. Internet Society (2014). https:\/\/www.ndss-symposium.org\/ndss2014\/programme\/practical-dynamic-searchable-encryption-small-leakage\/","DOI":"10.14722\/ndss.2014.23298"},{"key":"10_CR27","unstructured":"Wright, C.V., Pouliot, D.: Early detection and analysis of leakage abuse vulnerabilities. Cryptology ePrint Archive, Report 2017\/1052 (2017). http:\/\/eprint.iacr.org\/2017\/1052\/"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Yoshizawa, T., Watanabe, Y., Shikata, J.: Unconditionally secure searchable encryption. In: 2017 51st Annual Conference on Information Sciences and Systems (CISS), pp. 1\u20136, March 2017","DOI":"10.1109\/CISS.2017.7926154"},{"key":"10_CR29","unstructured":"Zhang, Y., Katz, J., Papamanthou, C.: All Your Queries Are Belong To Us: The Power of File-Injection Attacks on Searchable Encryption. Cryptology ePrint Archive, Report 2016\/172 (2016). http:\/\/eprint.iacr.org\/2016\/172\/"}],"container-title":["Lecture Notes in Computer Science","Provable and Practical Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62576-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T23:13:21Z","timestamp":1619306001000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-62576-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030625757","9783030625764"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62576-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"20 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/scripts.ntu.edu.sg\/NewsnEvents\/Pages\/Events-PROVSEC2020.aspx","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"59","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}