{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T13:22:20Z","timestamp":1725974540757},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319788128"},{"type":"electronic","value":"9783319788135"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78813-5_27","type":"book-chapter","created":{"date-parts":[[2018,4,10]],"date-time":"2018-04-10T06:03:21Z","timestamp":1523340201000},"page":"530-549","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Query Recovery Attacks on Searchable Encryption Based on Partial Knowledge"],"prefix":"10.1007","author":[{"given":"Guofeng","family":"Wang","sequence":"first","affiliation":[]},{"given":"Chuanyi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yingfei","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Hezhong","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Peiyi","family":"Han","sequence":"additional","affiliation":[]},{"given":"Binxing","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,11]]},"reference":[{"issue":"3","key":"27_CR1","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O Goldreich","year":"1996","unstructured":"Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. J. ACM (JACM) 43(3), 431\u2013473 (1996)","journal-title":"J. ACM (JACM)"},{"issue":"2","key":"27_CR2","first-page":"18","volume":"47","author":"C Bsch","year":"2015","unstructured":"Bsch, C., Hartel, P., Jonker, W., et al.: A survey of provably secure searchable encryption. ACM Comput. Surv. (CSUR) 47(2), 18 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"5","key":"27_CR3","doi-asserted-by":"publisher","first-page":"895","DOI":"10.3233\/JCS-2011-0426","volume":"19","author":"R Curtmola","year":"2011","unstructured":"Curtmola, R., Garay, J., Kamara, S., et al.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895\u2013934 (2011)","journal-title":"J. Comput. Secur."},{"doi-asserted-by":"crossref","unstructured":"He, W., Akhawe, D., Jain, S., et al.: Shadowcrypt: encrypted web applications for everyone. In: Proceedings of the 2014 ACM Special Interest Group on Security, Audit and Control, Scottsdale Arizona, USA, pp. 1028\u20131039 (2014)","key":"27_CR4","DOI":"10.1145\/2660267.2660326"},{"unstructured":"Lau, B., Chung, S., Song, C., et al.: Mimesis aegis: a mimicry privacy shielda system\u2019s approach to data privacy on public cloud. In: Proceedings of the 23rd USENIX Security Symposium, SanDiego California, USA, pp. 33\u201348 (2014)","key":"27_CR5"},{"unstructured":"Skyhigh Networks. \nhttps:\/\/www.skyhighnetworks.com\/","key":"27_CR6"},{"unstructured":"CipherCloud. \nhttps:\/\/www.ciphercloud.com\/","key":"27_CR7"},{"unstructured":"Islam, M.S., Kuzu, M., Kantarcioglu, M.: Access pattern disclosure on searchable encryption: ramification, attack and mitigation. In: NDSS, vol. 20, p. 12 (2012)","key":"27_CR8"},{"doi-asserted-by":"crossref","unstructured":"Cash, D., Grubbs, P., Perry, J., et al.: Leakage-abuse attacks against searchable encryption. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 668\u2013679. ACM (2015)","key":"27_CR9","DOI":"10.1145\/2810103.2813700"},{"unstructured":"Zhang, Y., Katz, J., Papamanthou, C.: All your queries are belong to us: the power of file-injection attacks on searchable encryption. IACR Cryptology ePrint Archive, 2016:172 (2016)","key":"27_CR10"},{"doi-asserted-by":"crossref","unstructured":"Pouliot, D., Wright, C.V.: The shadow nemesis: inference attacks on efficiently deployable, efficiently searchable encryption. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1341\u20131352. ACM (2016)","key":"27_CR11","DOI":"10.1145\/2976749.2978401"},{"key":"27_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-642-40041-4_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"D Cash","year":"2013","unstructured":"Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Ro\u015fu, M.-C., Steiner, M.: Highly-scalable searchable symmetric encryption with support for boolean queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 353\u2013373. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-40041-4_20"},{"doi-asserted-by":"crossref","unstructured":"Li, J., Wang, Q., Wang, C., et al.: Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, pp. 1\u20135. IEEE (2010)","key":"27_CR13","DOI":"10.1109\/INFCOM.2010.5462196"},{"doi-asserted-by":"crossref","unstructured":"Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 965\u2013976. ACM (2012)","key":"27_CR14","DOI":"10.1145\/2382196.2382298"},{"unstructured":"Bitglass. \nhttp:\/\/www.bitglass.com\/","key":"27_CR15"},{"unstructured":"Virtru. \nhttp:\/\/www.virtru.com\/","key":"27_CR16"},{"unstructured":"Enron Email Dataset. \nwww.cs.cmu.edu\/~.\/enron\/\n\n. Accessed 13 May 2015","key":"27_CR17"},{"issue":"3","key":"27_CR18","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1108\/eb046814","volume":"14","author":"M Porter","year":"1980","unstructured":"Porter, M.: An algorithm for suffix striping. Program 14(3), 130\u2013137 (1980)","journal-title":"Program"},{"unstructured":"Common-English-Words. \nhttp:\/\/www.textfixer.com\/tutorials\/common-english-words.txt\/","key":"27_CR19"},{"unstructured":"Gartner Report: How to Evaluate and Operate a Cloud Access Security Broker, 8 December 2015","key":"27_CR20"},{"key":"27_CR21","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.ins.2013.11.021","volume":"265","author":"C Liu","year":"2014","unstructured":"Liu, C., Zhu, L., Wang, M., et al.: Search pattern leakage in searchable encryption: attacks and new construction. Inf. Sci. 265, 176\u2013188 (2014)","journal-title":"Inf. Sci."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78813-5_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,10]],"date-time":"2018-04-10T06:19:05Z","timestamp":1523341145000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78813-5_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319788128","9783319788135"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78813-5_27","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}