{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:05:23Z","timestamp":1725869123819},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491080"},{"type":"electronic","value":"9783319491097"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49109-7_12","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T09:03:15Z","timestamp":1477040595000},"page":"123-132","source":"Crossref","is-referenced-by-count":1,"title":["Asymmetric Searchable Encryption from Inner Product Encryption"],"prefix":"10.1007","author":[{"given":"Siyu","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Aijun","family":"Ge","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chuangui","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Xu\u2019an","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Kamara S. and Lauter K.: Cryptographic cloud storage. In: Proc. of Financial Cryptography and Data Security, pp. 136-149(2010)","DOI":"10.1007\/978-3-642-14992-4_13"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Feng D., Zhang M., Zhang Y. and Xu Z.: Study on cloud computing security. In: Ruan Jian Xue Bao\/Journal of Software, vol.22, no.1, pp. 71-83(2011)","DOI":"10.3724\/SP.J.1001.2011.03958"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Yuriyama M. and Kushida T.: Integrated cloud computing environment with IT resources and sensor devices. In: International Journal of Space-Based and Situated Computing, vol.1, no.2\/3, pp. 163-173(2011)","DOI":"10.1504\/IJSSC.2011.040342"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Ronaldc P., Stephan S. and Christoph S.: A privacy-friendly architecture for future cloud computing. In: International Journal of Grid and Utility Computing, vol.4 no.4, pp. 265-277(2013)","DOI":"10.1504\/IJGUC.2013.057120"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Ma K. and Zhang L.: Bookmarklet-triggered unified literature sharing services in the cloud. In: International Journal of Grid and Utility Computing, vol.5, no.4, pp. 217-226(2014)","DOI":"10.1504\/IJGUC.2014.065382"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Yang W., Zhang C. and Mu B.: Towards mashup optimisation with global constraints in the cloud. In: International Journal of Grid and Utility Computing, vol.5, no.4, pp. 227-235(2014)","DOI":"10.1504\/IJGUC.2014.065383"},{"key":"12_CR7","unstructured":"Song D., Wagner D. and Perrig A.: Practical techniques for searches on encrypted data. In: Proc. of SP\u201900, pp. 44-55(2000)"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Boneh D., Crescenzo G., Ostrovsky R., et al.: Public key encryption with keyword search. In: Proc. of Advances in Cryptology-EUROCRYPT, pp. 506-522(2004)","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Park J., Kim K., and Lee P.: Public key encryption with conjunctive field keyword search. In: LNCS 3325, pp. 73-86(2004)","DOI":"10.1007\/978-3-540-31815-6_7"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Khader D.: Public key encryption with keyword search based on K-resilient IBE. In: LNCS 4707, pp. 298-308(2006)","DOI":"10.1007\/11751595_33"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Boneh D. and Waters B.: Conjunctive, subset, and range queries on encrypted data. In: Proc. of Theory of cryptography, pp. 535-554(2007)","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"12_CR12","unstructured":"Yong H. and Lee P.: Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: Proc. of the First international conference on Pairing-Based Cryptography, pp. 2-22(2007)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Baek J., Safavinaini R. and Susilo W.: Public key encryption with keyword search revisited. In: LNCS 2005, pp. 1249-1259(2008)","DOI":"10.1007\/978-3-540-69839-5_96"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Katz J., Sahai A., and Waters B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Proc. of Advances in Cryptology-EUROCRYPT, pp. 146-162(2008)","DOI":"10.1007\/978-3-540-78967-3_9"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Rhee H., Park J., Susilo W., et al.: Trapdoor security in a searchable public-key encryption scheme with a designated tester, Journal of Systems and Software, vol.83, no.5, pp. 763-771(2010)","DOI":"10.1016\/j.jss.2009.11.726"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Lewko A., Okamoto T., Sahai A., et al.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Proc. of Advances in Cryptology-EUROCRYPT, pp. 62-91(2010)","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Yang H., Xu C., and Zhao H.: An efficient public key encryption with keyword scheme not using pairing. In: Proc. of First International Conference on Instrumentation, pp. 900-904(2011)","DOI":"10.1109\/IMCCC.2011.227"},{"key":"12_CR18","unstructured":"Zhao Y., Chen X., Ma H., et al.: A new trapdoor-indistinguishable public key encryption with keyword search. In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol.3, no.1\/2, pp. 72-81(2012)"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Lv Z., Hong C., Zhang M., et al.: Expressive and secure searchable encryption in the public key setting. In: Proc. of Information Security, pp. 364-376(2014)","DOI":"10.1007\/978-3-319-13257-0_21"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Guillevic A.: Comparing the pairing efficiency over composite-order and prime-order elliptic curves. In: Proc. of Applied Cryptography and Network Security, pp. 357-372(2013)","DOI":"10.1007\/978-3-642-38980-1_22"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49109-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T21:59:58Z","timestamp":1568498398000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49109-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491080","9783319491097"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49109-7_12","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}