{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T01:01:10Z","timestamp":1760576470745,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819531813","type":"print"},{"value":"9789819531820","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3182-0_27","type":"book-chapter","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:17:45Z","timestamp":1760555865000},"page":"432-440","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Designated-Server Public-Key Encryption Scheme with\u00a0Keyword Search Based on\u00a0Lattices"],"prefix":"10.1007","author":[{"given":"Yuchen","family":"Zou","sequence":"first","affiliation":[]},{"given":"Hongbo","family":"Li","sequence":"additional","affiliation":[]},{"given":"Pingbin","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Qiong","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"issue":"6","key":"27_CR1","doi-asserted-by":"publisher","first-page":"1269","DOI":"10.1109\/TDSC.2018.2867462","volume":"17","author":"R Behnia","year":"2018","unstructured":"Behnia, R., Ozmen, M.O., Yavuz, A.A.: Lattice-based public key searchable encryption from experimental perspectives. IEEE Trans. Dependable Secure Comput. 17(6), 1269\u20131282 (2018)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pp. 197\u2013206 (2008)","DOI":"10.1145\/1374376.1374407"},{"key":"27_CR3","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1016\/j.ins.2019.01.004","volume":"481","author":"H Li","year":"2019","unstructured":"Li, H., Huang, Q., Shen, J., Yang, G., Susilo, W.: Designated-server identity-based authenticated encryption with keyword search for encrypted emails. Inf. Sci. 481, 330\u2013343 (2019)","journal-title":"Inf. Sci."},{"key":"27_CR4","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.future.2024.04.039","volume":"158","author":"J Li","year":"2024","unstructured":"Li, J., Yan, M., Peng, J., Huang, H., Abd El-Latif, A.A.: A lattice-based efficient certificateless public key encryption for big data security in clouds. Futur. Gener. Comput. Syst. 158, 255\u2013266 (2024)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Lin, Z., Li, H., Chen, X., Xiao, M., Huang, Q.: Identity-based encryption with disjunctive, conjunctive and range keyword search from lattices. IEEE Trans. Inf. Forensics Secur. (2024)","DOI":"10.1109\/TIFS.2024.3459646"},{"issue":"11","key":"27_CR6","doi-asserted-by":"publisher","first-page":"e3531","DOI":"10.1002\/ett.3531","volume":"30","author":"Y Mao","year":"2019","unstructured":"Mao, Y., Fu, X., Guo, C., Wu, G.: Public key encryption with conjunctive keyword search secure against keyword guessing attack from lattices. Trans. Emerg. Telecommun. Technol. 30(11), e3531 (2019)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"6","key":"27_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1568318.1568324","volume":"56","author":"O Regev","year":"2009","unstructured":"Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM (JACM) 56(6), 1\u201340 (2009)","journal-title":"J. ACM (JACM)"},{"issue":"2","key":"27_CR8","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303\u2013332 (1999)","journal-title":"SIAM Rev."},{"key":"27_CR9","unstructured":"Shoup, V., et\u00a0al.: Ntl: a library for doing number theory (2001)"},{"key":"27_CR10","doi-asserted-by":"publisher","first-page":"28926","DOI":"10.1109\/ACCESS.2024.3368908","volume":"12","author":"M Wang","year":"2024","unstructured":"Wang, M., Sun, L., Cao, Z., Dong, X.: Ipo-peks: effective inner product outsourcing public key searchable encryption from lattice in the iot. IEEE Access 12, 28926\u201328937 (2024)","journal-title":"IEEE Access"},{"key":"27_CR11","doi-asserted-by":"publisher","first-page":"103104","DOI":"10.1016\/j.sysarc.2024.103104","volume":"149","author":"A Wu","year":"2024","unstructured":"Wu, A., Li, F., Xin, X., Zhang, Y., Zhu, J.: Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage. J. Syst. Architect. 149, 103104 (2024)","journal-title":"J. Syst. Architect."},{"issue":"1","key":"27_CR12","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1504\/IJWGS.2018.088357","volume":"14","author":"R Xie","year":"2018","unstructured":"Xie, R., Xu, C., He, C., Zhang, X.: Lattice-based searchable public-key encryption scheme for secure cloud storage. Int. J. Web Grid Serv. 14(1), 3\u201320 (2018)","journal-title":"Int. J. Web Grid Serv."},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Xu, L., Yuan, X., Steinfeld, R., Wang, C., Xu, C.: Multi-writer searchable encryption: an lwe-based realization and implementation. In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, pp. 122\u2013133 (2019)","DOI":"10.1145\/3321705.3329814"},{"key":"27_CR14","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.ins.2019.04.051","volume":"494","author":"X Zhang","year":"2019","unstructured":"Zhang, X., Tang, Y., Wang, H., Xu, C., Miao, Y., Cheng, H.: Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage. Inf. Sci. 494, 193\u2013207 (2019)","journal-title":"Inf. Sci."},{"key":"27_CR15","doi-asserted-by":"publisher","first-page":"907","DOI":"10.1007\/s11277-018-5357-6","volume":"100","author":"X Zhang","year":"2018","unstructured":"Zhang, X., Xu, C.: Trapdoor security lattice-based public-key searchable encryption with a designated cloud server. Wireless Pers. Commun. 100, 907\u2013921 (2018)","journal-title":"Wireless Pers. Commun."},{"issue":"2","key":"27_CR16","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1049\/cje.2018.01.012","volume":"27","author":"X Zhang","year":"2018","unstructured":"Zhang, X., Xu, C., Xie, R., Jin, C.: Designated cloud server public key encryption with keyword search from lattice in the standard model. Chin. J. Electron. 27(2), 304\u2013309 (2018)","journal-title":"Chin. J. Electron."},{"issue":"4","key":"27_CR17","doi-asserted-by":"publisher","first-page":"e4960","DOI":"10.1002\/ett.4960","volume":"35","author":"Y Zhou","year":"2024","unstructured":"Zhou, Y., Tang, B., Yang, Y.: A lattice-based searchable encryption scheme with multi-user authorization for the certificateless cloud computing environment. Trans. Emerg. Telecommun. Technol. 35(4), e4960 (2024)","journal-title":"Trans. Emerg. Telecommun. Technol."}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3182-0_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:17:47Z","timestamp":1760555867000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3182-0_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"ISBN":["9789819531813","9789819531820"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3182-0_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,15]]},"assertion":[{"value":"15 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dspp2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}