{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:19:59Z","timestamp":1725851999488},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319315492"},{"type":"electronic","value":"9783319315508"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31550-8_2","type":"book-chapter","created":{"date-parts":[[2016,3,22]],"date-time":"2016-03-22T10:26:20Z","timestamp":1458642380000},"page":"17-31","source":"Crossref","is-referenced-by-count":1,"title":["Distributed Multi-user, Multi-key Searchable Encryptions Resilient Fault Tolerance"],"prefix":"10.1007","author":[{"given":"Huafei","family":"Zhu","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,16]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-540-79104-1_6","volume-title":"Information Security Practice and Experience","author":"F Bao","year":"2008","unstructured":"Bao, F., Deng, R.H., Ding, X., Yang, Y.: Private query on encrypted data in multi-user settings. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 71\u201385. Springer, Heidelberg (2008)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Barak, B., Halevi, S.: A model and architecture for pseudo-random generation with applications to dev random. In: ACM Conference on Computer and Communications Security, pp. 203\u2013212 (2005)","DOI":"10.1145\/1102120.1102148"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-3-540-74143-5_30","volume-title":"Advances in Cryptology - CRYPTO 2007","author":"M Bellare","year":"2007","unstructured":"Bellare, M., Boldyreva, A., O\u2019Neill, A.: Deterministic and efficiently searchable encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 535\u2013552. Springer, Heidelberg (2007)"},{"issue":"3","key":"2_CR4","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/1455526.1455529","volume":"12","author":"J Bethencourt","year":"2009","unstructured":"Bethencourt, J., Song, D.X., Waters, B.: New techniques for private stream searching. ACM Trans. Inf. Syst. Secur. 12(3), 16 (2009)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506\u2013522. Springer, Heidelberg (2004)"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-3-540-70936-7_29","volume-title":"Theory of Cryptography","author":"D Boneh","year":"2007","unstructured":"Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535\u2013554. Springer, Heidelberg (2007)"},{"issue":"6","key":"2_CR8","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B Chor","year":"1998","unstructured":"Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM 45(6), 965\u2013981 (1998)","journal-title":"J. ACM"},{"issue":"1","key":"2_CR9","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"N Cao","year":"2014","unstructured":"Cao, N., Wang, C., Li, M., et al.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222\u2013233 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J.A., Kamara, S.: Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: ACM Conference on Computer and Communications Security, pp. 79\u201388 (2006)","DOI":"10.1145\/1180405.1180417"},{"issue":"3","key":"2_CR11","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1006\/jcss.1999.1689","volume":"60","author":"Y Gertner","year":"2000","unstructured":"Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sci. 60(3), 592\u2013629 (2000)","journal-title":"J. Comput. Syst. Sci."},{"key":"2_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44412-2","volume-title":"Challenges of Information Management Beyond the Cloud","author":"JN Gathegi","year":"2014","unstructured":"Gathegi, J.N.: Clouding big data: information privacy considerations. In: Gathegi, J.N., Tonta, Y., Kurbano\u011flu, S., Al, U., Ta\u015fkin, Z. (eds.) Challenges of Information Management Beyond the Cloud. Springer, Heidelberg (2014)"},{"key":"2_CR13","unstructured":"Goh, E.-J.: Secure indexes. IACR Cryptology ePrint Archive, p. 216 (2003)"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/BFb0054868","volume-title":"Algorithmic Number Theory","author":"J Hoffstein","year":"1998","unstructured":"Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: a ring-based public key cryptosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 267\u2013288. Springer, Heidelberg (1998)"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: ACM Conference on Computer and Communications Security, pp. 965\u2013976 (2012)","DOI":"10.1145\/2382196.2382298"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Hahn, F., Kerschbaum, F.: Searchable encryption with secure, efficient updates. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer, Communications Security. ACM, pp. 310\u2013320 (2014)","DOI":"10.1145\/2660267.2660297"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"L\u00f3pez-Alt, A., Tromer, E., Vaikuntanathan, V.: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: STOC, pp. 1219\u20131234 (2012)","DOI":"10.1145\/2213977.2214086"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","first-page":"182","volume-title":"Computer Security - ESORICS 2014","author":"JK Liu","year":"2014","unstructured":"Liu, J.K., Au, M.H., Huang, X., Susilo, W., Zhou, J., Yu, Y.: New insight to preserve online survey accuracy and privacy in big data era. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ICAIS 2014, Part II. LNCS, vol. 8713, pp. 182\u2013199. Springer, Heidelberg (2014)"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-642-36594-2_20","volume-title":"Theory of Cryptography","author":"T Malkin","year":"2013","unstructured":"Malkin, T.: Secure computation for big data. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 355\u2013355. Springer, Heidelberg (2013)"},{"issue":"4","key":"2_CR20","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s00145-007-0565-3","volume":"20","author":"R Ostrovsky","year":"2007","unstructured":"Ostrovsky, R., Skeith, W.E.: Private searching on streaming data. J. Cryptology 20(4), 397\u2013430 (2007)","journal-title":"J. Cryptology"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Pappas, V., Raykova, M., Vo, B., Bellovin, S.M., Malkin, T.: Private search in the real world. In: ACSAC, pp. 83\u201392 (2011)","DOI":"10.1145\/2076732.2076744"},{"key":"2_CR22","unstructured":"Popa, R.A., Zeldovich, N.: Multi-key searchable encryption. IACR Cryptology ePrint Archive, p. 508 (2013)"},{"key":"2_CR23","unstructured":"Popa, R., Stark, E., Helfer, J., Valdez, S., Zeldovich, N., Kaashoek, M.F., Balakrishnan, H.: Building web applications on top of encrypted data using mylar. In: NSDI (USENIX Symposium of Networked Systems Design and Implementation) (2014)"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Orencik, C., Selcuk, A., Savas, E., et al.: Multi-Keyword search over encrypted data with scoring, search pattern obfuscation. Int. J. Inf. Secur. 1\u201319 (2015)","DOI":"10.1007\/s10207-015-0294-9"},{"key":"2_CR25","unstructured":"Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical report TR-81, Aiken Computation Laboratory, Harvard University (1981)"},{"issue":"5","key":"2_CR26","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MSP.2011.155","volume":"10","author":"M Raykova","year":"2012","unstructured":"Raykova, M., Cui, A., Vo, B., Liu, B., Malkin, T., Bellovin, S.M., Stolfo, S.J.: Usable, secure, private search. IEEE Secur. Privacy 10(5), 53\u201360 (2012)","journal-title":"IEEE Secur. Privacy"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Raykova, M., Vo, B., Bellovin, S.M., Malkin, T.: Secure anonymous database search. In: CCSW, pp. 115\u2013126 (2009)","DOI":"10.1145\/1655008.1655025"},{"key":"2_CR28","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.is.2013.08.004","volume":"48","author":"BK Samanthula","year":"2015","unstructured":"Samanthula, B.K., Elmehdwi, Y., Howser, G., Madria, S.: A secure data sharing and query processing framework via federation of cloud computing. Inf. Syst. 48, 196\u2013212 (2015)","journal-title":"Inf. Syst."},{"key":"2_CR29","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium on Security and Privacy, pp. 44\u201355 (2000)"},{"issue":"9","key":"2_CR30","doi-asserted-by":"crossref","first-page":"2424","DOI":"10.1109\/TKDE.2015.2407330","volume":"27","author":"Yuzhe Tang","year":"2015","unstructured":"Tang, Y., Liu, L.: Privacy-preserving multi-keyword search in information networks (2015)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Yang, Y.: Towards multi-user private keyword search for cloud computing. In: IEEE CLOUD, pp. 758\u2013759 (2011)","DOI":"10.1109\/CloudCom.2011.43"},{"key":"2_CR32","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.future.2014.06.004","volume":"43","author":"JJ Yang","year":"2015","unstructured":"Yang, J.J., Li, J.Q., Niu, Y.: A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener. Comput. Syst. 43, 74\u201386 (2015)","journal-title":"Future Gener. Comput. Syst."}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31550-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:25:42Z","timestamp":1559413542000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31550-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319315492","9783319315508"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31550-8_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}