{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:39:05Z","timestamp":1742913545134,"version":"3.40.3"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031828515"},{"type":"electronic","value":"9783031828522"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-82852-2_5","type":"book-chapter","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T13:02:00Z","timestamp":1741784520000},"page":"105-127","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-user Dynamic Searchable Encryption for\u00a0Prefix-Fixing Predicates from\u00a0Symmetric-Key Primitives"],"prefix":"10.1007","author":[{"given":"Takato","family":"Hirano","sequence":"first","affiliation":[]},{"given":"Yutaka","family":"Kawai","sequence":"additional","affiliation":[]},{"given":"Yoshihiro","family":"Koseki","sequence":"additional","affiliation":[]},{"given":"Satoshi","family":"Yasuda","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4028-8603","authenticated-orcid":false,"given":"Yohei","family":"Watanabe","sequence":"additional","affiliation":[]},{"given":"Takumi","family":"Amada","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1092-8489","authenticated-orcid":false,"given":"Mitsugu","family":"Iwamoto","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3658-0409","authenticated-orcid":false,"given":"Kazuo","family":"Ohta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,13]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Aljabri, J., Michala, A.L., Singer, J.: ELSA: A keyword-based searchable encryption for cloud-edge assisted industrial internet of things. In: IEEE International Symposium on Cluster, Cloud and Internet Computing (CCGrid 2022), pp. 259\u2013268 (2022)","DOI":"10.1109\/CCGrid54584.2022.00035"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Aljabri, J., Michala, A.L., Singer, J.: ELSA: Edge lightweight searchable attribute-based encryption multi-keyword scalability. In: IEEE Conference on Dependable and Secure Computing (DSC 2022), pp.\u00a01\u20134 (2022)","DOI":"10.1109\/DSC54232.2022.9888846"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Bag, A., Patranabis, S., Mukhopadhyay, D.: Tokenised multi-client provisioning for dynamic searchable encryption with forward and backward privacy. In: ACM Symposium on Information, Computer and Communications Security, ASIACCS 2024, p. 1691\u20131707. Association for Computing Machinery (2024)","DOI":"10.1145\/3634737.3657018"},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"210462","DOI":"10.1109\/ACCESS.2020.3038838","volume":"8","author":"A Bakas","year":"2020","unstructured":"Bakas, A., Dang, H.V., Michalas, A., Zalitko, A.: The cloud we share: access control on symmetrically encrypted data in untrusted clouds. IEEE Access 8, 210462\u2013210477 (2020)","journal-title":"IEEE Access"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506\u2013522. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24676-3_30"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology \u2014 CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44647-8_13"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/978-3-642-42045-0_15","volume-title":"Advances in Cryptology - ASIACRYPT 2013","author":"D Boneh","year":"2013","unstructured":"Boneh, D., Waters, B.: Constrained pseudorandom functions and their applications. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013. LNCS, vol. 8270, pp. 280\u2013300. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-42045-0_15"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Bost, R., Minaud, B., Ohrimenko, O.: Forward and backward private searchable encryption from constrained cryptographic primitives. In: ACM SIGSAC Conference on Computer and Communications Security. CCS 2017, pp. 1465\u20131482. ACM, New York, NY, USA (2017)","DOI":"10.1145\/3133956.3133980"},{"key":"5_CR9","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/978-3-642-54631-0_29","volume-title":"Public Key Cryptography - PKC 2014","author":"E Boyle","year":"2014","unstructured":"Boyle, E., Goldwasser, S., Ivan, I.: Functional signatures and pseudorandom functions. In: Krawczyk, H. (ed.) Public Key Cryptography - PKC 2014, vol. 8383, pp. 501\u2013519. Springer, Berlin Heidelberg (2014)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Cash, D., Grubbs, P., Perry, J., Ristenpart, T.: Leakage-abuse attacks against searchable encryption. In: ACM SIGSAC Conference on Computer and Communications Security. CCS 2015, pp. 668\u2013679. ACM, New York, NY, USA (2015)","DOI":"10.1145\/2810103.2813700"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Cash, D., et al.: Dynamic searchable encryption in very-large databases: Data structures and implementation. In: Network and Distributed System Security Symposium, NDSS 2014. The Internet Society (2014)","DOI":"10.14722\/ndss.2014.23264"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Chamani, J.G., Papadopoulos, D., Papamanthou, C., Jalili, R.: New constructions for forward and backward private symmetric searchable encryption. In: ACM SIGSAC Conference on Computer and Communications Security. CCS 2018, pp. 1038\u20131055. ACM, New York, NY, USA (2018)","DOI":"10.1145\/3243734.3243833"},{"issue":"1","key":"5_CR13","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/TDSC.2021.3127546","volume":"20","author":"JG Chamani","year":"2023","unstructured":"Chamani, J.G., Wang, Y., Papadopoulos, D., Zhang, M., Jalili, R.: Multi-user dynamic searchable symmetric encryption with corrupted participants. IEEE Trans. Dependable Secure Comput. 20(1), 114\u2013130 (2023)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: ACM SIGSAC Conference on Computer and Communications Security. CCS 2006, pp. 79\u201388. ACM, New York, NY, USA (2006)","DOI":"10.1145\/1180405.1180417"},{"issue":"5","key":"5_CR15","doi-asserted-by":"publisher","first-page":"895","DOI":"10.3233\/JCS-2011-0426","volume":"19","author":"R Curtmola","year":"2011","unstructured":"Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: Improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895\u2013934 (2011)","journal-title":"J. Comput. Secur."},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/978-3-030-61638-0_18","volume-title":"Applied Cryptography and Network Security Workshops","author":"H-V Dang","year":"2020","unstructured":"Dang, H.-V., Ullah, A., Bakas, A., Michalas, A.: Attribute-based symmetric searchable encryption. In: Zhou, J., et al. (eds.) ACNS 2020. LNCS, vol. 12418, pp. 318\u2013336. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-61638-0_18"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Demertzis, I., Chamani, J.G., Papadopoulos, D., Papamanthou, C.: Dynamic searchable encryption with small client storage. In: Network and Distributed System Security Symposium, NDSS 2020. The Internet Society (2020)","DOI":"10.14722\/ndss.2020.24423"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM SIGSAC Conference on Computer and Communications Security. CCS 2006, pp. 89\u201398. ACM, New York, NY, USA (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Hahn, F., Kerschbaum, F.: Searchable encryption with secure and efficient updates. In: ACM SIGSAC Conference on Computer and Communications Security. CCS 2014, pp. 310\u2013320. ACM, New York, NY, USA (2014)","DOI":"10.1145\/2660267.2660297"},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/978-3-642-25516-8_12","volume-title":"Cryptography and Coding","author":"M Hattori","year":"2011","unstructured":"Hattori, M., et al.: Ciphertext-policy delegatable hidden vector encryption and its application to searchable encryption in multi-user setting. In: Chen, L. (ed.) IMACC 2011. LNCS, vol. 7089, pp. 190\u2013209. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25516-8_12"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Jarecki, S., Jutla, C., Krawczyk, H., Rosu, M., Steiner, M.: Outsourced symmetric private information retrieval. In: ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, pp. 875\u2013888. ACM, New York, NY, USA (2013)","DOI":"10.1145\/2508859.2516730"},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-642-39884-1_22","volume-title":"Financial Cryptography and Data Security","author":"S Kamara","year":"2013","unstructured":"Kamara, S., Papamanthou, C.: Parallel and dynamic searchable symmetric encryption. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 258\u2013274. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_22"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: ACM SIGSAC Conference on Computer and Communications Security. CCS 2012, pp. 965\u2013976. ACM, New York, NY, USA (2012)","DOI":"10.1145\/2382196.2382298"},{"issue":"5","key":"5_CR24","first-page":"2419","volume":"18","author":"SK Kermanshahi","year":"2021","unstructured":"Kermanshahi, S.K., et al.: Multi-client cloud-based symmetric searchable encryption. IEEE Trans. Dependable Secure Comput. 18(5), 2419\u20132437 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Papadopoulos, S., Triandopoulos, N., Zacharias, T.: Delegatable pseudorandom functions and applications. In: ACM SIGSAC Conference on Computer and Communications Security, CCS 2007, pp. 669\u2013684. CCS 2013, ACM, New York, NY, USA (2013)","DOI":"10.1145\/2508859.2516668"},{"issue":"1","key":"5_CR26","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1109\/TDSC.2019.2894411","volume":"18","author":"J Li","year":"2021","unstructured":"Li, J., et al.: Searchable symmetric encryption with forward search privacy. IEEE Trans. Dependable Secure Comput. 18(1), 460\u2013474 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"5_CR27","unstructured":"Meng, L., Chen, L., Tian, Y., Manulis, M., Liu, S.: FEASE: fast and expressive asymmetric searchable encryption. In: Balzarotti, D., Xu, W. (eds.) USENIX Security 2024. USENIX Association (2024)"},{"key":"5_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-319-68637-0_3","volume-title":"Provable Security","author":"R Meng","year":"2017","unstructured":"Meng, R., Zhou, Y., Ning, J., Liang, K., Han, J., Susilo, W.: An efficient key-policy attribute-based searchable encryption in prime-order groups. In: Okamoto, T., Yu, Y., Au, M.H., Li, Y. (eds.) ProvSec 2017. LNCS, vol. 10592, pp. 39\u201356. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68637-0_3"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Michalas, A.: The lord of the shares: combining attribute-based encryption and searchable encryption for flexible data sharing. In: ACM\/SIGAPP Symposium on Applied Computing, SAC 2019, pp. 146\u2013155. ACM, New York, NY, USA (2019)","DOI":"10.1145\/3297280.3297297"},{"key":"5_CR30","first-page":"254","volume-title":"Secure IT Systems, NordSec 2019","author":"A Michalas","year":"2019","unstructured":"Michalas, A., Bakas, A., Dang, H.V., Zalitko, A.: MicroSCOPE: enabling access control in searchable encryption with the use of attribute-based encryption and SGX. In: Askarov, A., Hansen, R.R., Rafnsson, W. (eds.) Secure IT Systems, NordSec 2019, pp. 254\u2013270. Springer International Publishing, Cham (2019)"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Miers, I., Mohassel, P.: IO-DSSE: scaling dynamic searchable encryption to millions of indexes by improving locality. In: Network and Distributed System Security Symposium, NDSS 2017 (2017)","DOI":"10.14722\/ndss.2017.23394"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Naveed, M., Prabhakaran, M., Gunter, C.: Dynamic searchable encryption via blind storage. In: IEEE Symposium on Security and Privacy, S &P 2014, pp. 639\u2013654 (2014)","DOI":"10.1109\/SP.2014.47"},{"issue":"3","key":"5_CR33","doi-asserted-by":"publisher","first-page":"3503","DOI":"10.1109\/JSYST.2023.3283389","volume":"17","author":"S Niu","year":"2023","unstructured":"Niu, S., Hu, Y., Zhou, S., Shao, H., Wang, C.: Attribute-based searchable encryption in edge computing for lightweight devices. IEEE Syst. J. 17(3), 3503\u20133514 (2023)","journal-title":"IEEE Syst. J."},{"issue":"3","key":"5_CR34","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1108\/eb046814","volume":"14","author":"MF Porter","year":"1980","unstructured":"Porter, M.F.: An algorithm for suffix stripping. Program 14(3), 130\u2013137 (1980)","journal-title":"Program"},{"key":"5_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology - EUROCRYPT 2005","author":"A Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) Advances in Cryptology - EUROCRYPT 2005. Lecture Notes in Computer Science, vol. 3494, pp. 457\u2013473. Springer, Berlin Heidelberg (2005)"},{"key":"5_CR36","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium on Security and Privacy, S &P 2000, pp. 44\u201355 (2000)"},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"Stefanov, E., Papamanthou, C., Shi, E.: Practical dynamic searchable encryption with small leakage. In: Network and Distributed System Security Symposium, NDSS 2014. The Internet Society (2014)","DOI":"10.14722\/ndss.2014.23298"},{"key":"5_CR38","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-319-45744-4_8","volume-title":"Computer Security - ESORICS 2016","author":"SF Sun","year":"2016","unstructured":"Sun, S.F., Liu, J.K., Sakzad, A., Steinfeld, R., Yuen, T.H.: An efficient non-interactive multi-client searchable encryption with support for Boolean queries. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) Computer Security - ESORICS 2016, pp. 154\u2013172. Springer International Publishing, Cham (2016)"},{"issue":"1","key":"5_CR39","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1109\/TDSC.2020.2973633","volume":"19","author":"SF Sun","year":"2022","unstructured":"Sun, S.F., et al.: Non-interactive multi-client searchable encryption: realization and implementation. IEEE Trans. Dependable Secure Comput. 19(1), 452\u2013467 (2022)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"5_CR40","doi-asserted-by":"crossref","unstructured":"Sun, S., et al.: Practical non-interactive searchable encryption with forward and backward privacy. In: Network and Distributed System Security Symposium, NDSS 2021. The Internet Society (2021)","DOI":"10.14722\/ndss.2021.24162"},{"key":"5_CR41","unstructured":"The CALO Project: enron email dataset (may 7, 2015 version) (2015). https:\/\/www.cs.cmu.edu\/~.\/enron\/"},{"key":"5_CR42","unstructured":"Wang, J., Chow, S.S.M.: Omnes pro uno: practical multi-writer encrypted database. In: Butler, K.R.B., Thomas, K. (eds.) USENIX Security 2022, pp. 2371\u20132388. USENIX Association (2022)"},{"key":"5_CR43","doi-asserted-by":"crossref","unstructured":"Wang, J., Chow, S.S.M.: Unus pro omnibus: multi-client searchable encryption via access control. In: Network and Distributed System Security Symposium, NDSS 2024. The Internet Society (2024)","DOI":"10.14722\/ndss.2024.23288"},{"key":"5_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1007\/978-3-319-89500-0_45","volume-title":"Information and Communications Security","author":"L Xu","year":"2018","unstructured":"Xu, L., Xu, C., Liu, J.K., Zuo, C., Zhang, P.: A multi-client dynamic searchable symmetric encryption system with physical deletion. In: Qing, S., Mitchell, C., Chen, L., Liu, D. (eds.) ICICS 2017. LNCS, vol. 10631, pp. 516\u2013528. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89500-0_45"},{"key":"5_CR45","doi-asserted-by":"crossref","unstructured":"Yang, J., Liu, F., Luo, X., Hong, J., Li, J., Xue, K.: Forward private multi-client searchable encryption with efficient access control in cloud storage. In: GLOBECOM 2022, pp. 3791\u20133796 (2022)","DOI":"10.1109\/GLOBECOM48099.2022.10001146"},{"key":"5_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-319-31301-6_15","volume-title":"Selected Areas in Cryptography \u2013 SAC 2015","author":"AA Yavuz","year":"2016","unstructured":"Yavuz, A.A., Guajardo, J.: Dynamic searchable symmetric encryption with minimal leakage and efficient updates on commodity hardware. In: Dunkelman, O., Keliher, L. (eds.) SAC 2015. LNCS, vol. 9566, pp. 241\u2013259. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-31301-6_15"},{"issue":"12","key":"5_CR47","doi-asserted-by":"publisher","first-page":"11014","DOI":"10.1109\/JIOT.2023.3242964","volume":"10","author":"H Yin","year":"2023","unstructured":"Yin, H., Zhang, W., Deng, H., Qin, Z., Li, K.: An attribute-based searchable encryption scheme for cloud-assisted IIoT. IEEE Internet Things J. 10(12), 11014\u201311023 (2023)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"5_CR48","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/TCC.2021.3119407","volume":"11","author":"Y Zhang","year":"2023","unstructured":"Zhang, Y., Zhu, T., Guo, R., Xu, S., Cui, H., Cao, J.: Multi-keyword searchable and verifiable attribute-based encryption over cloud data. IEEE Trans. Cloud Comput. 11(1), 971\u2013983 (2023)","journal-title":"IEEE Trans. Cloud Comput."}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography \u2013 SAC 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-82852-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T13:02:16Z","timestamp":1741784536000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-82852-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031828515","9783031828522"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-82852-2_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Selected Areas in Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Montreal, QC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sacworkshop.org\/SAC24\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}