{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T13:30:18Z","timestamp":1772199018066,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819529605","type":"print"},{"value":"9789819529612","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-2961-2_17","type":"book-chapter","created":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T14:02:35Z","timestamp":1760364155000},"page":"329-349","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["More Practical Non-interactive Encrypted Conjunctive Search with\u00a0Leakage and\u00a0Storage Suppression"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-4022-7466","authenticated-orcid":false,"given":"Huu Ngoc Duc","family":"Nguyen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8124-6800","authenticated-orcid":false,"given":"Shujie","family":"Cui","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0374-3593","authenticated-orcid":false,"given":"Shangqi","family":"Lai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0629-6792","authenticated-orcid":false,"given":"Tsz Hon","family":"Yuen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6656-6240","authenticated-orcid":false,"given":"Joseph K.","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,10]]},"reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/11602897_35","volume-title":"Information and Communications Security","author":"L Ballard","year":"2005","unstructured":"Ballard, L., Kamara, S., Monrose, F.: Achieving efficient conjunctive keyword searches over encrypted data. In: Qing, S., Mao, W., L\u00f3pez, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 414\u2013426. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11602897_35"},{"issue":"4","key":"17_CR2","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1080\/15427951.2004.10129096","volume":"1","author":"A Broder","year":"2003","unstructured":"Broder, A., Mitzenmacher, M.: Network applications of bloom filters: a survey. Internet Math. 1(4), 485\u2013509 (2003). https:\/\/doi.org\/10.1080\/15427951.2004.10129096","journal-title":"Internet Math."},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/11774716_15","volume-title":"Public Key Infrastructure","author":"JW Byun","year":"2006","unstructured":"Byun, J.W., Lee, D.H., Lim, J.: Efficient conjunctive keyword search on encrypted data storage system. In: Atzeni, A.S., Lioy, A. (eds.) EuroPKI 2006. LNCS, vol. 4043, pp. 184\u2013196. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11774716_15"},{"key":"17_CR4","unstructured":"CALO Project: Enron Email Dataset (2015). https:\/\/www.cs.cmu.edu\/~enron\/"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-642-40041-4_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"D Cash","year":"2013","unstructured":"Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Ro\u015fu, M.-C., Steiner, M.: Highly-scalable searchable symmetric encryption with support for boolean queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 353\u2013373. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40041-4_20"},{"issue":"1","key":"17_CR6","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.jalgor.2003.12.001","volume":"55","author":"G Cormode","year":"2005","unstructured":"Cormode, G., Muthukrishnan, S.: An improved data stream summary: the count-min sketch and its applications. J. Algorithms 55(1), 58\u201375 (2005). https:\/\/doi.org\/10.1016\/j.jalgor.2003.12.001","journal-title":"J. Algorithms"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-24852-1_3","volume-title":"Applied Cryptography and Network Security","author":"P Golle","year":"2004","unstructured":"Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 31\u201345. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24852-1_3"},{"key":"17_CR8","unstructured":"Google: Stream Library (2017). https:\/\/github.com\/addthis\/stream-lib"},{"issue":"1","key":"17_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3376122","volume":"25","author":"TM Graf","year":"2020","unstructured":"Graf, T.M., Lemire, D.: Xor filters: faster and smaller than bloom and cuckoo filters. J. Exp. Algorithmics 25(1), 1\u201316 (2020). https:\/\/doi.org\/10.1145\/3376122","journal-title":"J. Exp. Algorithmics"},{"key":"17_CR10","unstructured":"Graf, T.M., Lemire, D.: Fast Approximate Membership Filters in Java (2021). https:\/\/github.com\/FastFilter\/fastfilter_java"},{"issue":"1","key":"17_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3510449","volume":"27","author":"TM Graf","year":"2022","unstructured":"Graf, T.M., Lemire, D.: Binary fuse filters: fast and smaller than Xor filters. J. Exp. Algorithmics 27(1), 1\u201315 (2022). https:\/\/doi.org\/10.1145\/3510449","journal-title":"J. Exp. Algorithmics"},{"key":"17_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-319-56617-7_4","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2017","author":"S Kamara","year":"2017","unstructured":"Kamara, S., Moataz, T.: Boolean searchable symmetric encryption with worst-case sub-linear complexity. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10212, pp. 94\u2013124. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-56617-7_4"},{"key":"17_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-030-02641-7_6","volume-title":"Cryptology and Network Security","author":"J Katz","year":"2018","unstructured":"Katz, J., Maffei, M., Malavolta, G., Schr\u00f6der, D.: Subset predicate encryption and its applications. In: Capkun, S., Chow, S.S.M. (eds.) CANS 2017. LNCS, vol. 11261, pp. 115\u2013134. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-02641-7_6"},{"key":"17_CR14","unstructured":"Lai, S., et\u00a0al.: Boolean Query SSE Schemes (2018). https:\/\/github.com\/MonashCybersecurityLab\/Boolean-Query-SSE"},{"key":"17_CR15","doi-asserted-by":"publisher","unstructured":"Lai, S., et\u00a0al.: Result pattern hiding searchable encryption for conjunctive queries. In: Lie, D., Mannan, M., Backes, M., Wang, X. (eds.) Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, 15\u201319 October 2018, pp. 745\u2013762. ACM (2018). https:\/\/doi.org\/10.1145\/3243734.3243753","DOI":"10.1145\/3243734.3243753"},{"key":"17_CR16","doi-asserted-by":"publisher","first-page":"107510","DOI":"10.1109\/access.2020.3001014","volume":"8","author":"C Ma","year":"2020","unstructured":"Ma, C., Gu, Y., Li, H.: Practical searchable symmetric encryption supporting conjunctive queries without keyword pair result pattern leakage. IEEE Access 8, 107510\u2013107526 (2020). https:\/\/doi.org\/10.1109\/access.2020.3001014","journal-title":"IEEE Access"},{"key":"17_CR17","unstructured":"Nguyen, H.N.D., Cui, S., Lai, S., Yuen, T.H., Liu, J.K.: More practical non-interactive encrypted conjunctive search with leakage and storage suppression. Cryptology ePrint Archive, Paper 2025\/1377 (2025). https:\/\/eprint.iacr.org\/2025\/1377"},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-540-89641-8_13","volume-title":"Cryptology and Network Security","author":"P Wang","year":"2008","unstructured":"Wang, P., Wang, H., Pieprzyk, J.: Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 178\u2013195. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-89641-8_13"},{"key":"17_CR19","doi-asserted-by":"publisher","unstructured":"Wang, Y., Sun, S.F., Wang, J., Chen, X., Liu, J.K., Gu, D.: Practical non-interactive encrypted conjunctive search with leakage suppression. In: Luo, B., Liao, X., Xu, J., Kirda, E., Lie, D. (eds.) Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, 14\u201318 October 2024, pp. 4658\u20134672. ACM (2024). https:\/\/doi.org\/10.1145\/3658644.3670355","DOI":"10.1145\/3658644.3670355"},{"key":"17_CR20","unstructured":"Zhang, Y., Katz, J., Papamanthou, C.: All your queries are belong to us: the power of file-injection attacks on searchable encryption. In: Holz, T., Savage, S. (eds.) 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, 10\u201312 August 2016, pp. 707\u2013720. USENIX Association (2016)"}],"container-title":["Lecture Notes in Computer Science","Provable and Practical Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-2961-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T12:47:59Z","timestamp":1772196479000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-2961-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,10]]},"ISBN":["9789819529605","9789819529612"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-2961-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,10]]},"assertion":[{"value":"10 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Yokohama","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sulab-sever.u-aizu.ac.jp\/provsec2025\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}