{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T05:40:07Z","timestamp":1752471607456,"version":"3.41.2"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031972591","type":"print"},{"value":"9783031972607","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-97260-7_19","type":"book-chapter","created":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T05:21:06Z","timestamp":1752470466000},"page":"417-440","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Conjunctive Dynamic SSE Schemes Under Scrutiny: Exposing Privacy Issues in\u00a0SDSSE-CQ-S and\u00a0VCDSSE"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-8279-7330","authenticated-orcid":false,"given":"Bibhas Chandra","family":"Das","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,2]]},"reference":[{"key":"19_CR1","doi-asserted-by":"publisher","unstructured":"Bost, R.: $$\\sum $$o$$\\varphi $$o$$\\varsigma $$: forward secure searchable encryption. In: Weippl, E.R., Katzenbeisser, S., Kruegel, C., Myers, A.C., Halevi, S. (eds.) Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24\u201328 October 2016, pp. 1143\u20131154. ACM (2016). https:\/\/doi.org\/10.1145\/2976749.2978303","DOI":"10.1145\/2976749.2978303"},{"key":"19_CR2","unstructured":"Bost, R., Fouque, P., Pointcheval, D.: Verifiable dynamic symmetric searchable encryption: optimality and forward security. IACR Cryptol. ePrint Arch. 62 (2016). http:\/\/eprint.iacr.org\/2016\/062"},{"key":"19_CR3","doi-asserted-by":"publisher","unstructured":"Bost, R., Minaud, B., Ohrimenko, O.: Forward and backward private searchable encryption from constrained cryptographic primitives. In: Thuraisingham, B., Evans, D., Malkin, T., Xu, D. (eds.) Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, 30 October\u201303 November 2017, pp. 1465\u20131482. ACM (2017). https:\/\/doi.org\/10.1145\/3133956.3133980","DOI":"10.1145\/3133956.3133980"},{"key":"19_CR4","doi-asserted-by":"publisher","unstructured":"Cash, D., Grubbs, P., Perry, J., Ristenpart, T.: Leakage-abuse attacks against searchable encryption. In: Ray, I., Li, N., Kruegel, C. (eds.) Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 12\u201316 October 2015, pp. 668\u2013679. ACM (2015). https:\/\/doi.org\/10.1145\/2810103.2813700","DOI":"10.1145\/2810103.2813700"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-642-40041-4_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"D Cash","year":"2013","unstructured":"Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Ro\u015fu, M.-C., Steiner, M.: Highly-scalable searchable symmetric encryption with support for Boolean queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 353\u2013373. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40041-4_20"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/978-3-642-38348-9_21","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"D Catalano","year":"2013","unstructured":"Catalano, D., Fiore, D.: Practical homomorphic MACs for arithmetic circuits. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 336\u2013352. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38348-9_21"},{"key":"19_CR7","doi-asserted-by":"publisher","unstructured":"Chamani, J.G., Papadopoulos, D., Papamanthou, C., Jalili, R.: New constructions for forward and backward private symmetric searchable encryption. In: Lie, D., Mannan, M., Backes, M., Wang, X. (eds.) Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, 15\u201319 October 2018, pp. 1038\u20131055. ACM (2018). https:\/\/doi.org\/10.1145\/3243734.3243833","DOI":"10.1145\/3243734.3243833"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/11496137_30","volume-title":"Applied Cryptography and Network Security","author":"Y-C Chang","year":"2005","unstructured":"Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442\u2013455. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11496137_30"},{"key":"19_CR9","doi-asserted-by":"publisher","unstructured":"Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Juels, A., Wright, R.N., di\u00a0Vimercati, S.D.C. (eds.) Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, 30 October\u20133 November 2006, pp. 79\u201388. ACM (2006). https:\/\/doi.org\/10.1145\/1180405.1180417","DOI":"10.1145\/1180405.1180417"},{"key":"19_CR10","unstructured":"Etemad, M., K\u00fcp\u00e7\u00fc, A., Papamanthou, C., Evans, D.: Efficient dynamic searchable encryption with forward privacy. CoRR abs\/1710.00208 (2017). http:\/\/arxiv.org\/abs\/1710.00208"},{"issue":"1","key":"19_CR11","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1109\/TDSC.2019.2896258","volume":"18","author":"X Ge","year":"2021","unstructured":"Ge, X., et al.: Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification. IEEE Trans. Dependable Secur. Comput. 18(1), 490\u2013504 (2021). https:\/\/doi.org\/10.1109\/TDSC.2019.2896258","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"19_CR12","unstructured":"Goh, E.: Secure indexes. IACR Cryptol. ePrint Arch. 216 (2003). http:\/\/eprint.iacr.org\/2003\/216"},{"key":"19_CR13","unstructured":"Islam, M.S., Kuzu, M., Kantarcioglu, M.: Access pattern disclosure on searchable encryption: ramification, attack and mitigation. In: 19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, 5\u20138 February 2012. The Internet Society (2012). https:\/\/www.ndss-symposium.org\/ndss2012\/ndss-2012-programme\/access-pattern-disclosure-searchable-encryption-ramification-attack-and-mitigation\/"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-319-56617-7_4","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2017","author":"S Kamara","year":"2017","unstructured":"Kamara, S., Moataz, T.: Boolean searchable symmetric encryption with worst-case sub-linear complexity. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017, Part III. LNCS, vol. 10212, pp. 94\u2013124. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-56617-7_4"},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-642-39884-1_22","volume-title":"Financial Cryptography and Data Security","author":"S Kamara","year":"2013","unstructured":"Kamara, S., Papamanthou, C.: Parallel and dynamic searchable symmetric encryption. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 258\u2013274. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_22"},{"key":"19_CR16","doi-asserted-by":"publisher","unstructured":"Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Yu, T., Danezis, G., Gligor, V.D. (eds.) the ACM Conference on Computer and Communications Security, CCS 2012, Raleigh, NC, USA, 16\u201318 October 2012, pp. 965\u2013976. ACM (2012). https:\/\/doi.org\/10.1145\/2382196.2382298","DOI":"10.1145\/2382196.2382298"},{"key":"19_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-319-02937-5_17","volume-title":"Cryptology and Network Security","author":"K Kurosawa","year":"2013","unstructured":"Kurosawa, K., Ohtaki, Y.: How to update documents verifiably in searchable symmetric encryption. In: Abdalla, M., Nita-Rotaru, C., Dahab, R. (eds.) CANS 2013. LNCS, vol. 8257, pp. 309\u2013328. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-319-02937-5_17"},{"key":"19_CR18","doi-asserted-by":"publisher","unstructured":"Lai, S., et al.: Result pattern hiding searchable encryption for conjunctive queries. In: Lie, D., Mannan, M., Backes, M., Wang, X. (eds.) Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, 15\u201319 October 2018, pp. 745\u2013762. ACM (2018). https:\/\/doi.org\/10.1145\/3243734.3243753","DOI":"10.1145\/3243734.3243753"},{"issue":"10","key":"19_CR19","doi-asserted-by":"publisher","first-page":"2379","DOI":"10.1093\/COMJNL\/BXAC084","volume":"66","author":"H Lu","year":"2023","unstructured":"Lu, H., Chen, J., Ning, J., Zhang, K.: Verifiable conjunctive dynamic searchable symmetric encryption with forward and backward privacy. Comput. J. 66(10), 2379\u20132392 (2023). https:\/\/doi.org\/10.1093\/COMJNL\/BXAC084","journal-title":"Comput. J."},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Patranabis, S., Mukhopadhyay, D.: Forward and backward private conjunctive searchable symmetric encryption. In: 28th Annual Network and Distributed System Security Symposium, NDSS 2021, Virtually, 21\u201325 February 2021. The Internet Society (2021). https:\/\/www.ndss-symposium.org\/ndss-paper\/forward-and-backward-private-conjunctive-searchable-symmetric-encryption\/","DOI":"10.14722\/ndss.2021.23116"},{"key":"19_CR21","doi-asserted-by":"publisher","unstructured":"Song, D.X., Wagner, D.A., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, 14\u201317 May 2000, pp. 44\u201355. IEEE Computer Society (2000). https:\/\/doi.org\/10.1109\/SECPRI.2000.848445","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Stefanov, E., Papamanthou, C., Shi, E.: Practical dynamic searchable encryption with small leakage. In: 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, 23\u201326 February 2014. The Internet Society (2014). https:\/\/www.ndss-symposium.org\/ndss2014\/practical-dynamic-searchable-encryption-small-leakage","DOI":"10.14722\/ndss.2014.23298"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Sun, S., et al.: Practical non-interactive searchable encryption with forward and backward privacy. In: 28th Annual Network and Distributed System Security Symposium, NDSS 2021, Virtually, 21\u201325 February 2021. The Internet Society (2021). https:\/\/www.ndss-symposium.org\/ndss-paper\/practical-non-interactive-searchable-encryption-with-forward-and-backward-privacy\/","DOI":"10.14722\/ndss.2021.24162"},{"key":"19_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-3-030-29962-0_15","volume-title":"Computer Security \u2013 ESORICS 2019","author":"Z Zhang","year":"2019","unstructured":"Zhang, Z., Wang, J., Wang, Y., Su, Y., Chen, X.: Towards efficient verifiable forward secure searchable symmetric encryption. In: Sako, K., Schneider, S., Ryan, P. (eds.) ESORICS 2019. LNCS, vol. 11736, pp. 304\u2013321. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29962-0_15"},{"key":"19_CR25","doi-asserted-by":"publisher","unstructured":"Zuo, C., et al.: Searchable encryption for conjunctive queries with extended forward and backward privacy. Proc. Priv. Enhanc. Technol. 2025(1), 440\u2013455 (2025). https:\/\/doi.org\/10.56553\/POPETS-2025-0024","DOI":"10.56553\/POPETS-2025-0024"},{"key":"19_CR26","unstructured":"Zuo, C., Sun, S., Liu, J.K., Shao, J., Pieprzyk, J., Wei, G.: Forward and backward private dynamic searchable symmetric encryption for conjunctive queries. IACR Cryptol. ePrint Arch. 1357 (2020). https:\/\/eprint.iacr.org\/2020\/1357"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - AFRICACRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97260-7_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T05:21:08Z","timestamp":1752470468000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97260-7_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,2]]},"ISBN":["9783031972591","9783031972607"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97260-7_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,2]]},"assertion":[{"value":"2 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AFRICACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in Africa","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rabat","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"africacrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/africacrypt2025.sciencesconf.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}