{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T18:26:10Z","timestamp":1776277570951,"version":"3.50.1"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319457437","type":"print"},{"value":"9783319457444","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45744-4_8","type":"book-chapter","created":{"date-parts":[[2016,9,14]],"date-time":"2016-09-14T04:54:30Z","timestamp":1473828870000},"page":"154-172","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":98,"title":["An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries"],"prefix":"10.1007","author":[{"given":"Shi-Feng","family":"Sun","sequence":"first","affiliation":[]},{"given":"Joseph K.","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Amin","family":"Sakzad","sequence":"additional","affiliation":[]},{"given":"Ron","family":"Steinfeld","sequence":"additional","affiliation":[]},{"given":"Tsz Hon","family":"Yuen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,15]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Asghar, M.R., Russello, G., Crispo, B., Ion, M.: Supporting complex queries and access policies for multi-user encrypted databases. In: CCSW 2013, Berlin, Germany, 4 November, pp. 77\u201388 (2013)","DOI":"10.1145\/2517488.2517492"},{"issue":"2","key":"8_CR2","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1109\/TCC.2014.2359460","volume":"3","author":"J Baek","year":"2015","unstructured":"Baek, J., Vu, Q.H., Liu, J.K., Huang, X., Xiang, Y.: A secure cloud computing based framework for big data information management of smart grid. IEEE Trans. Cloud Comput. 3(2), 233\u2013244 (2015)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-540-79104-1_6","volume-title":"Information Security Practice and Experience","author":"F Bao","year":"2008","unstructured":"Bao, F., Deng, R.H., Ding, X., Yang, Y.: Private query on encrypted data in multi-user settings. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 71\u201385. Springer, Heidelberg (2008)"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE S&P 2007, Oakland, California, USA, 20\u201323 May 2007, pp. 321\u2013334 (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506\u2013522. Springer, Heidelberg (2004)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Cash, D., Jaeger, J., Jarecki, S., Jutla, C., Krawczyk, H., Rosu, M., Steiner, M.: Dynamic searchable encryption in very-large databases: data structures and implementation. In: NDSS 2014, San Diego, California, USA, 23\u201326 February 2014","DOI":"10.14722\/ndss.2014.23264"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-642-40041-4_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"D Cash","year":"2013","unstructured":"Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Ro\u015fu, M.-C., Steiner, M.: Highly-scalable searchable symmetric encryption with support for boolean queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 353\u2013373. Springer, Heidelberg (2013)"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/978-3-642-17373-8_33","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"M Chase","year":"2010","unstructured":"Chase, M., Kamara, S.: Structured encryption and controlled disclosure. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 577\u2013594. Springer, Heidelberg (2010)"},{"issue":"4","key":"8_CR9","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MPRV.2013.72","volume":"12","author":"C Chu","year":"2013","unstructured":"Chu, C., Zhu, W.T., Han, J., Liu, J.K., Xu, J., Zhou, J.: Security concerns in popular cloud storage services. IEEE Pervasive Comput. 12(4), 50\u201357 (2013)","journal-title":"IEEE Pervasive Comput."},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Cramer, R., Shoup, V.: Signature schemes based on the strong RSA assumption. In: ACM CCS 1999, Singapore, 1\u20134 November 1999, pp. 46\u201351 (1999)","DOI":"10.1145\/319709.319716"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: ACM CCS 2006, Alexandria, VA, USA, 30 October\u20133 November 2006, pp. 79\u201388 (2006)","DOI":"10.1145\/1180405.1180417"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-540-70567-3_10","volume-title":"Data and Applications Security XXII","author":"C Dong","year":"2008","unstructured":"Dong, C., Russello, G., Dulay, N.: Shared and searchable encrypted data for untrusted servers. In: Atluri, V. (ed.) DAS 2008. LNCS, vol. 5094, pp. 127\u2013143. Springer, Heidelberg (2008)"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/3-540-48910-X_9","volume-title":"Advances in Cryptology - EUROCRYPT 1999","author":"R Gennaro","year":"1999","unstructured":"Gennaro, R., Halevi, S., Rabin, T.: Secure hash-and-sign signatures without the random oracle. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 123\u2013139. Springer, Heidelberg (1999)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Goh, E.: Secure indexes. IACR Cryptology ePrint Archive, 2003:216 (2003)","DOI":"10.1108\/09696470310476981"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-24852-1_3","volume-title":"Applied Cryptography and Network Security","author":"P Golle","year":"2004","unstructured":"Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31\u201345. Springer, Heidelberg (2004)"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Jarecki, S., Jutla, C., Krawczyk, H., Rosu, M., Steiner, M.: Outsourced symmetric private information retrieval. In: ACM CCS 2013, pp. 875\u2013888. ACM (2013)","DOI":"10.1145\/2508859.2516730"},{"key":"8_CR17","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/978-3-642-39884-1_22","volume-title":"Financial Cryptography and Data Security","author":"Seny Kamara","year":"2013","unstructured":"Kamara, S., Papamanthou, C.: Parallel and dynamic searchable symmetric encryption. In: FC 2013, Okinawa, Japan, 1\u20135 April 2013, pp. 258\u2013274 (2013)"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: ACM CCS 2012, Raleigh, NC, USA, 16\u201318 October 2012, pp. 965\u2013976 (2012)","DOI":"10.1145\/2382196.2382298"},{"key":"8_CR19","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1007\/978-3-642-32946-3_21","volume-title":"Financial Cryptography and Data Security","author":"Kaoru Kurosawa","year":"2012","unstructured":"Kurosawa, K., Ohtaki, Y.: UC-secure searchable symmetric encryption. In: FC 2012, Kralendijk, Bonaire, 27 Februray\u20132 March 2012, pp. 285\u2013298 (2012)"},{"issue":"10","key":"8_CR20","doi-asserted-by":"publisher","first-page":"1667","DOI":"10.1109\/TIFS.2014.2346023","volume":"9","author":"K Liang","year":"2014","unstructured":"Liang, K., Au, M.H., Liu, J.K., Susilo, W., Wong, D.S., Yang, G., Phuong, T.V.X., Xie, Q.: A dfa-based functional proxy re-encryption scheme for secure public cloud data sharing. IEEE Trans. Inf. Forensics Secur. 9(10), 1667\u20131680 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/978-3-319-11203-9_15","volume-title":"Computer Security - ESORICS 2014","author":"K Liang","year":"2014","unstructured":"Liang, K., Liu, J.K., Wong, D.S., Susilo, W.: An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ICAIS 2014, Part I. LNCS, vol. 8712, pp. 257\u2013272. Springer, Heidelberg (2014)"},{"issue":"8","key":"8_CR22","doi-asserted-by":"publisher","first-page":"1578","DOI":"10.1109\/TIFS.2015.2419186","volume":"10","author":"K Liang","year":"2015","unstructured":"Liang, K., Susilo, W., Liu, J.K.: Privacy-preserving ciphertext multi-sharing control for big data storage. IEEE Trans. Inf. Forensics Secur. 10(8), 1578\u20131589 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR23","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.future.2014.10.014","volume":"52","author":"J Liu","year":"2015","unstructured":"Liu, J., Huang, X., Liu, J.K.: Secure sharing of personal health records in cloud computing: ciphertext-policy attribute-based signcryption. Future Gener. Comp. Syst. 52, 67\u201376 (2015)","journal-title":"Future Gener. Comp. Syst."},{"issue":"6","key":"8_CR24","doi-asserted-by":"publisher","first-page":"1992","DOI":"10.1109\/TC.2015.2462840","volume":"65","author":"JK Liu","year":"2016","unstructured":"Liu, J.K., Liang, K., Susilo, W., Liu, J., Xiang, Y.: Two-factor data security protection mechanism for cloud storage system. IEEE Trans. Comput. 65(6), 1992\u20132004 (2016)","journal-title":"IEEE Trans. Comput."},{"issue":"3","key":"8_CR25","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/S0022-0000(76)80043-8","volume":"13","author":"GL Miller","year":"1976","unstructured":"Miller, G.L.: Riemann\u2019s hypothesis and tests for primality. J. Comput. Syst. Sci. 13(3), 300\u2013317 (1976)","journal-title":"J. Comput. Syst. Sci."},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Naveed, M., Prabhakaran, M., Gunter, C.A.: Dynamic searchable encryption via blind storage. In: IEEE SP 2014, Berkeley, CA, USA, 18\u201321 May 2014, pp. 639\u2013654 (2014)","DOI":"10.1109\/SP.2014.47"},{"key":"8_CR27","unstructured":"Popa, R.A., Zeldovich, N.: Multi-key searchable encryption. IACR Cryptology ePrint Archive 2013:508 (2013)"},{"issue":"1","key":"8_CR28","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/0022-314X(80)90084-0","volume":"12","author":"MO Rabin","year":"1980","unstructured":"Rabin, M.O.: Probabilistic algorithm for testing primality. J. Number Theor. 12(1), 128\u2013138 (1980)","journal-title":"J. Number Theor."},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Raykova, M., Vo, B., Bellovin, S.M., Malkin, T.: Secure anonymous database search. In: CCSW 2009, Chicago, IL, USA, 13 November 2009, pp. 115\u2013126 (2009)","DOI":"10.1145\/1655008.1655025"},{"key":"8_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-319-23318-5_17","volume-title":"Information Security","author":"C Van Rompay","year":"2015","unstructured":"Van Rompay, C., Molva, R., \u00d6nen, M.: Multi-user searchable encryption in the cloud. In: L\u00f3pez, J., Mitchell, C.J. (eds.) ISC 2015. LNCS, vol. 9290, pp. 299\u2013316. Springer, Heidelberg (2015)"},{"key":"8_CR31","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814549","volume-title":"A Computational Introduction to Number Theory and Algebra","author":"V Shoup","year":"2008","unstructured":"Shoup, V.: A Computational Introduction to Number Theory and Algebra. Cambridge University Press, New York (2008). Also available on the Internet"},{"key":"8_CR32","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE S&P 2000, Berkeley, California, USA, 14\u201317 May 2000, pp. 44\u201355 (2000)"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Yang, Y., Lu, H., Weng, J.: Multi-user private keyword search for cloud computing. In: CloudCom 2011, Athens, Greece, 29 November\u20131 December 2011, pp. 264\u2013271 (2011)","DOI":"10.1109\/CloudCom.2011.43"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2016"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45744-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T18:37:02Z","timestamp":1749580622000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-45744-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319457437","9783319457444"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45744-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"15 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heraklion","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}