{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:39:22Z","timestamp":1725799162896},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319083674"},{"type":"electronic","value":"9783319083681"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08368-1_8","type":"book-chapter","created":{"date-parts":[[2014,8,13]],"date-time":"2014-08-13T21:09:44Z","timestamp":1407964184000},"page":"70-78","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Pairing-Free Public Key Encryption with Keyword Searching for Cloud Storage Services"],"prefix":"10.1007","author":[{"given":"Thokozani Felix","family":"Vallent","sequence":"first","affiliation":[]},{"given":"Hyunsung","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,14]]},"reference":[{"key":"8_CR1","first-page":"1","volume":"4","author":"NM James","year":"2013","unstructured":"James, N.M., Daniel, E., Vasanthi, N.A.: Survey on privacy-preserving methods for storage in cloud computing. IJCA Proc. Amrita Int. Conf. Women Comput. 4, 1\u20134 (2013)","journal-title":"IJCA Proc. Amrita Int. Conf. Women Comput."},{"issue":"2","key":"8_CR2","first-page":"71","volume":"15","author":"ST Hsu","year":"2013","unstructured":"Hsu, S.T., Yang, C.C., Hwang, M.S.: A study of public key encryption with keyword search. Int. J. Netw. Secur. 15(2), 71\u201379 (2013)","journal-title":"Int. J. Netw. Secur."},{"issue":"8","key":"8_CR3","doi-asserted-by":"publisher","first-page":"1467","DOI":"10.1109\/TPDS.2011.267","volume":"23","author":"J Li","year":"2012","unstructured":"Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Enabling efficient fuzzy keyword search over encrypted data in cloud computing. IEEE Trans. Parallel Distrib. Syst. 23(8), 1467\u20131479 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1016\/j.jnca.2011.03.010","volume":"35","author":"Q Liu","year":"2012","unstructured":"Liu, Q., Wang, G., Wu, J.: Secure and privacy preserving for keyword searching for cloud storage services. J. Netw. Comput. Appl. 35, 927\u2013933 (2012)","journal-title":"J. Netw. Comput. Appl."},{"key":"8_CR5","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/978-3-642-22365-5_23","volume-title":"Secure and Trust Computing, Data Management, and Applications","author":"I Agudo","year":"2011","unstructured":"Agudo, I., Nu\u00f1ez, D., Giammatteo, G., Rizomiliotis, P., Lambrinoudakis, C.: Cryptography goes to the cloud. In: Lee, C., Seigneur, J.-M., Park, J.J., Wagner, R.R. (eds.) STA 2011 Workshops. CCIS, vol. 187, pp. 190\u2013197. Springer, Heidelberg (2011)"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506\u2013522. Springer, Heidelberg (2004)"},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.compeleceng.2012.11.002","volume":"39","author":"D Koo","year":"2013","unstructured":"Koo, D., Hur, J., Yoon, H.: Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comput. Electron. Eng. 39, 34\u201346 (2013)","journal-title":"Comput. Electron. Eng."},{"key":"8_CR8","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 44\u201355 (2000)"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1249","DOI":"10.1007\/978-3-540-69839-5_96","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2008","author":"J Baek","year":"2008","unstructured":"Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., Murgante, B., Lagan\u00e0, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008, Part I. LNCS, vol. 5072, pp. 1249\u20131259. Springer, Heidelberg (2008)"},{"issue":"4","key":"8_CR11","first-page":"350","volume":"1","author":"WB Jian","year":"2011","unstructured":"Jian, W.B., Her, C.T., Gwo, J.F.: Security improvement against malicious server\u2019s attack for a dPEKS scheme. Int. J. Inf. Educ. Technol. 1(4), 350\u2013353 (2011)","journal-title":"Int. J. Inf. Educ. Technol."},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-642-16441-5_11","volume-title":"Public Key Infrastructures, Services and Applications","author":"Q Tang","year":"2010","unstructured":"Tang, Q., Chen, L.: Public-key encryption with registered keyword search. In: Martinelli, F., Preneel, B. (eds.) EuroPKI 2009. LNCS, vol. 6391, pp. 163\u2013178. Springer, Heidelberg (2010)"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/11844662_6","volume-title":"Secure Data Management","author":"JW Byun","year":"2006","unstructured":"Byun, J.W., Rhee, H.S., Park, H.-A., Lee, D.-H.: Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2006. LNCS, vol. 4165, pp. 75\u201383. Springer, Heidelberg (2006)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Yang, H.M., Xu, C.X., Zhao, H.T.: An efficient public key encryption with keyword scheme not using pairing. In: First International Conference on Instrumentation, Measurement, Computer Communication and Control, pp. 900\u2013904 (2011)","DOI":"10.1109\/IMCCC.2011.227"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/11751595_33","volume-title":"Computational Science and Its Applications - ICCSA 2006","author":"D Khader","year":"2006","unstructured":"Khader, D.: Public key encryption with keyword search based on k-resilient IBE. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Lagan\u00e1, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3982, pp. 298\u2013308. Springer, Heidelberg (2006)"},{"key":"8_CR16","volume-title":"An Introduction to Mathematical Cryptography","author":"J Hoffstein","year":"2008","unstructured":"Hoffstein, J., Pipher, J., Silverman, J.H.: An Introduction to Mathematical Cryptography. Springer, New York (2008)"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1007\/11600930_50","volume-title":"Internet and Network Economics","author":"RW Zhu","year":"2005","unstructured":"Zhu, R.W., Yang, G., Wong, D.S.: An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices. In: Deng, X., Ye, Y. (eds.) WINE 2005. LNCS, vol. 3828, pp. 500\u2013509. Springer, Heidelberg (2005)"},{"issue":"15","key":"8_CR18","doi-asserted-by":"publisher","first-page":"2895","DOI":"10.1016\/j.ins.2010.04.002","volume":"180","author":"X Cao","year":"2010","unstructured":"Cao, X., Kou, W., Du, X.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchange. Inf. Sci. 180(15), 2895\u20132903 (2010)","journal-title":"Inf. Sci."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","e-Infrastructure and e-Services for Developing Countries"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08368-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T15:11:24Z","timestamp":1558969884000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-08368-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319083674","9783319083681"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08368-1_8","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"14 August 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}