{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:30:34Z","timestamp":1761611434834,"version":"3.37.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319686363"},{"type":"electronic","value":"9783319686370"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68637-0_2","type":"book-chapter","created":{"date-parts":[[2017,10,16]],"date-time":"2017-10-16T10:07:56Z","timestamp":1508148476000},"page":"24-38","source":"Crossref","is-referenced-by-count":18,"title":["Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption"],"prefix":"10.1007","author":[{"given":"Yunling","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jianfeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shi-Feng","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Joseph K.","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,17]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/11602897_35","volume-title":"Information and Communications Security","author":"L Ballard","year":"2005","unstructured":"Ballard, L., Kamara, S., Monrose, F.: Achieving efficient conjunctive keyword searches over encrypted data. In: Qing, S., Mao, W., L\u00f3pez, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 414\u2013426. Springer, Heidelberg (2005). doi: 10.1007\/11602897_35"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), Oakland, California, USA, 20\u201323 May 2007, pp. 321\u2013334 (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/11774716_15","volume-title":"Public Key Infrastructure","author":"JW Byun","year":"2006","unstructured":"Byun, J.W., Lee, D.H., Lim, J.: Efficient conjunctive keyword search on encrypted data storage system. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol. 4043, pp. 184\u2013196. Springer, Heidelberg (2006). doi: 10.1007\/11774716_15"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Cash, D., Jaeger, J., Jarecki, S., Jutla, C.S., Krawczyk, H., Rosu, M., Steiner, M.: Dynamic searchable encryption in very-large databases: data structures and implementation. In: 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, 23\u201326 February 2014 (2014)","DOI":"10.14722\/ndss.2014.23264"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-642-40041-4_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"D Cash","year":"2013","unstructured":"Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Ro\u015fu, M.-C., Steiner, M.: Highly-scalable searchable symmetric encryption with support for boolean queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 353\u2013373. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-40041-4_20"},{"issue":"5","key":"2_CR6","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1109\/TDSC.2014.2366471","volume":"12","author":"X Chen","year":"2015","unstructured":"Chen, X., Li, J., Huang, X., Ma, J., Lou, W.: New publicly verifiable databases with efficient updates. IEEE Trans. Dependable Sec. Comput. 12(5), 546\u2013556 (2015)","journal-title":"IEEE Trans. Dependable Sec. Comput."},{"issue":"10","key":"2_CR7","doi-asserted-by":"crossref","first-page":"3184","DOI":"10.1109\/TC.2015.2512870","volume":"65","author":"X Chen","year":"2016","unstructured":"Chen, X., Li, J., Weng, J., Ma, J., Lou, W.: Verifiable computation over large database with incremental updates. IEEE Trans. Comput. 65(10), 3184\u20133195 (2016)","journal-title":"IEEE Trans. Comput."},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, 30 October\u20133 November 2006, pp. 79\u201388 (2006)","DOI":"10.1145\/1180405.1180417"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-319-29485-8_5","volume-title":"Topics in Cryptology - CT-RSA 2016","author":"S Gajek","year":"2016","unstructured":"Gajek, S.: Dynamic symmetric searchable encryption from constrained functional encryption. In: Sako, K. (ed.) CT-RSA 2016. LNCS, vol. 9610, pp. 75\u201389. Springer, Cham (2016). doi: 10.1007\/978-3-319-29485-8_5"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Goh, E.: Secure indexes. IACR Cryptology ePrint Archive 2003:216 (2003)","DOI":"10.1108\/09696470310476981"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-24852-1_3","volume-title":"Applied Cryptography and Network Security","author":"P Golle","year":"2004","unstructured":"Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31\u201345. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-24852-1_3"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: The ACM Conference on Computer and Communications Security, CCS 2012, Raleigh, NC, USA, 16\u201318 October 2012, pp. 965\u2013976 (2012)","DOI":"10.1145\/2382196.2382298"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-319-60055-0_12","volume-title":"Information Security and Privacy","author":"SK Kermanshahi","year":"2017","unstructured":"Kermanshahi, S.K., Liu, J.K., Steinfeld, R.: Multi-user cloud-based secure keyword search. In: Pieprzyk, J., Suriadi, S. (eds.) ACISP 2017. LNCS, vol. 10342, pp. 227\u2013247. Springer, Cham (2017). doi: 10.1007\/978-3-319-60055-0_12"},{"issue":"6","key":"2_CR14","doi-asserted-by":"crossref","first-page":"1992","DOI":"10.1109\/TC.2015.2462840","volume":"65","author":"JK Liu","year":"2016","unstructured":"Liu, J.K., Liang, K., Susilo, W., Liu, J., Xiang, Y.: Two-factor data security protection mechanism for cloud storage system. IEEE Trans. Comput. 65(6), 1992\u20132004 (2016)","journal-title":"IEEE Trans. Comput."},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-540-68914-0_7","volume-title":"Applied Cryptography and Network Security","author":"T Nishide","year":"2008","unstructured":"Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: Bellovin, S.M., Gennaro, R., Keromytis, A., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 111\u2013129. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-68914-0_7"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Ryu, E., Takagi, T.: Efficcient conjunctive keyword-searchable encryption. In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, 21\u201323 May 2007, Niagara Falls, Canada, vol. 1, pp. 409\u2013414 (2007)","DOI":"10.1109\/AINAW.2007.166"},{"key":"2_CR17","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE S & P 2000, Berkeley, California, USA, 14\u201317 May 2000, pp. 44\u201355 (2000)"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Stefanov, E., Papamanthou, C., Shi, E.: Practical dynamic searchable encryption with small leakage. In: 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, 23\u201326 February 2014 (2014)","DOI":"10.14722\/ndss.2014.23298"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-319-45744-4_8","volume-title":"Computer Security \u2013 ESORICS 2016","author":"S-F Sun","year":"2016","unstructured":"Sun, S.-F., Liu, J.K., Sakzad, A., Steinfeld, R., Yuen, T.H.: An efficient non-interactive multi-client searchable encryption with support for boolean queries. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9878, pp. 154\u2013172. Springer, Cham (2016). doi: 10.1007\/978-3-319-45744-4_8"},{"issue":"11","key":"2_CR20","doi-asserted-by":"crossref","first-page":"3293","DOI":"10.1109\/TC.2015.2401036","volume":"64","author":"J Wang","year":"2015","unstructured":"Wang, J., Chen, X., Huang, X., You, I., Xiang, Y.: Verifiable auditing for outsourced database in cloud computing. IEEE Trans. Comput. 64(11), 3293\u20133303 (2015)","journal-title":"IEEE Trans. Comput."},{"issue":"2","key":"2_CR21","doi-asserted-by":"crossref","first-page":"667","DOI":"10.2298\/CSIS121104028W","volume":"10","author":"J Wang","year":"2013","unstructured":"Wang, J., Ma, H., Tang, Q., Li, J., Zhu, H., Ma, S., Chen, X.: Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10(2), 667\u2013684 (2013)","journal-title":"Comput. Sci. Inf. Syst."},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-540-89641-8_13","volume-title":"Cryptology and Network Security","author":"P Wang","year":"2008","unstructured":"Wang, P., Wang, H., Pieprzyk, J.: Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 178\u2013195. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-89641-8_13"},{"issue":"8","key":"2_CR23","doi-asserted-by":"crossref","first-page":"1661","DOI":"10.1109\/TIFS.2016.2549004","volume":"11","author":"S Wang","year":"2016","unstructured":"Wang, S., Liang, K., Liu, J.K., Chen, J., Yu, J., Xie, W.: Attribute-based data sharing scheme revisited in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(8), 1661\u20131673 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"2_CR24","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1007\/BF03391580","volume":"1","author":"Y Wang","year":"2016","unstructured":"Wang, Y., Wang, J., Chen, X.: Secure searchable encryption: a survey. J. Commun. Inf. Netw. 1(4), 52\u201365 (2016)","journal-title":"J. Commun. Inf. Netw."},{"key":"2_CR25","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.ins.2016.04.015","volume":"379","author":"Y Zhang","year":"2017","unstructured":"Zhang, Y., Chen, X., Li, J., Wong, D.S., Li, H., You, I.: Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf. Sci. 379, 42\u201361 (2017)","journal-title":"Inf. Sci."},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Zuo, C., Macindoe, J., Yang, S., Steinfeld, R., Liu, J.K.: Trusted boolean search on cloud using searchable symmetric encryption. In: IEEE Trustcom 2016, pp. 113\u2013120. IEEE (2016)","DOI":"10.1109\/TrustCom.2016.0053"}],"container-title":["Lecture Notes in Computer Science","Provable Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68637-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,4]],"date-time":"2022-08-04T17:44:56Z","timestamp":1659635096000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68637-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319686363","9783319686370"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68637-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}