{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:10:54Z","timestamp":1743102654571,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491479"},{"type":"electronic","value":"9783319491486"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49148-6_4","type":"book-chapter","created":{"date-parts":[[2016,11,9]],"date-time":"2016-11-09T09:50:38Z","timestamp":1478685038000},"page":"39-44","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Improved Asymmetric Searchable Encryption Scheme"],"prefix":"10.1007","author":[{"given":"Qi","family":"Wu","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,10]]},"reference":[{"key":"4_CR1","unstructured":"National Bureau of Standards. Data Encryption Standard, FIPS-Pub. 46. National Bureau of Standards, U. S. Department of Commerce, Washington D.C. (1977)"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Daemon, J., Rijmen, V.: The Design of Rijndael: AES \u2013 The Advanced Encryption Standard. Springer, Heidelberg (2002)","DOI":"10.1007\/978-3-662-04722-4_1"},{"issue":"2","key":"4_CR3","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"4_CR4","unstructured":"Song, XD., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, USA, pp. 44\u201355. IEEE (2000)"},{"key":"4_CR5","volume-title":"Research on Public Key Encryption with Keyword Search","author":"L Fang","year":"2012","unstructured":"Fang, L.: Research on Public Key Encryption with Keyword Search. Nanjing University of Aeronautics and Astronautics, Nanjing (2012)"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506\u2013522. Springer, Heidelberg (2004). doi:10.1007\/978-3-540-24676-3_30"},{"issue":"3","key":"4_CR7","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/s00145-007-9006-6","volume":"21","author":"M Abdalla","year":"2008","unstructured":"Abdalla, M., Bellare, M., Catalano, D., et al.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. J. Cryptology 21(3), 350\u2013391 (2008)","journal-title":"J. Cryptology"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/11751595_33","volume-title":"Computational Science and Its Applications - ICCSA 2006","author":"D Khader","year":"2006","unstructured":"Khader, D.: Public key encryption with keyword search based on k-resilient IBE. In: Gavrilova, M., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Lagan\u00e1, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3982, pp. 298\u2013308. Springer, Heidelberg (2006). doi:10.1007\/11751595_33"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-540-77026-8_21","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2007","author":"G Crescenzo","year":"2007","unstructured":"Crescenzo, G., Saraswat, V.: Public key encryption with searchable keywords based on jacobi symbols. In: Srinathan, K., Rangan, C.,Pandu, Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 282\u2013296. Springer, Heidelberg (2007). doi:10.1007\/978-3-540-77026-8_21"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-540-73489-5_2","volume-title":"Pairing-based cryptography \u2013 pairing 2007","author":"YH Hwang","year":"2007","unstructured":"Hwang, Y.H., Lee, P.J.: Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 2\u201322. Springer, Heidelberg (2007). doi:10.1007\/978-3-540-73489-5_2"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1249","DOI":"10.1007\/978-3-540-69839-5_96","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2008","author":"J Baek","year":"2008","unstructured":"Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., Murgante, B., Lagan\u00e0, A., Taniar, D., Mun, Y., Gavrilova, Marina, L. (eds.) ICCSA 2008. LNCS, vol. 5072, pp. 1249\u20131259. Springer, Heidelberg (2008). doi:10.1007\/978-3-540-69839-5_96"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Rhee, H.S, Park, J.H, Susilo, W., et al.: Improved searchable public key encryption with designated tester. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia, pp. 376\u2013379. ACM (2009)","DOI":"10.1145\/1533057.1533108"},{"issue":"1\/2","key":"4_CR13","first-page":"72","volume":"3","author":"Y Zhao","year":"2012","unstructured":"Zhao, Y., Chen, X., Ma, H., et al.: A new trapdoor-indistinguishable public key encryption with keyword search. J. Wirel. Mobile Netw. Ubiquit. Comput. Dependable Appl. 3(1\/2), 72\u201381 (2012)","journal-title":"J. Wirel. Mobile Netw. Ubiquit. Comput. Dependable Appl."},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Yang, H., Xu, C., Zhao, H.: An efficient public key encryption with keyword scheme not using pairing. In: Proceedings of the 1st International Conference on Instrumentation, Measurement, Computer, Communication and Control, Beijing, China, pp. 900\u2013904. IEEE (2011)","DOI":"10.1109\/IMCCC.2011.227"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Luo, W., Tan, J.: Public key encryption with keyword search based on factoring. In: Proceedings of the 2nd International Conference on Cloud Computing and Intelligent Systems, Hangzhou, China, pp. 1245\u20131247. IEEE (2012)","DOI":"10.1109\/CCIS.2012.6664583"},{"issue":"3","key":"4_CR16","first-page":"440","volume":"21","author":"Q Xia","year":"2015","unstructured":"Xia, Q., Ni, J., Kanpogninge, A., et al.: Searchable public-key encryption with data sharing in dynamic groups for mobile cloud storage. J. Univ. Comput. Sci. 21(3), 440\u2013453 (2015)","journal-title":"J. Univ. Comput. Sci."},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"S133","DOI":"10.3233\/thc-150945","volume":"23","author":"Z Shao","year":"2015","unstructured":"Shao, Z., Yang, B., Zhang, W., et al.: Secure medical information sharing in cloud computing. Technol. Health Care 23, S133\u2013S137 (2015)","journal-title":"Technol. Health Care"},{"issue":"11","key":"4_CR18","first-page":"118","volume":"40","author":"P Liu","year":"2014","unstructured":"Liu, P., Zu, L., Bai, C., et al.: A verifiable public key searchable encryption scheme. Comput. Eng. 40(11), 118\u2013120 (2014)","journal-title":"Comput. Eng."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49148-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T16:50:13Z","timestamp":1709830213000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-49148-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491479","9783319491486"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49148-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"10 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zhangjiajie","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/trust.csu.edu.cn\/conference\/SpaCCS2016\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}