{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T08:02:02Z","timestamp":1771920122781,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819655656","type":"print"},{"value":"9789819655663","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-5566-3_5","type":"book-chapter","created":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T20:23:04Z","timestamp":1749846184000},"page":"73-95","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["FineDReaM: A Boolean Query Searchable KP-ABE-Based Fine-Grained Authorized Encrypted-Data Retrieval Mechanism"],"prefix":"10.1007","author":[{"given":"Suryakant","family":"Prasad","sequence":"first","affiliation":[]},{"given":"Y. Sreenivasa","family":"Rao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,14]]},"reference":[{"key":"5_CR1","volume":"65","author":"M Ali","year":"2022","unstructured":"Ali, M., Sadeghi, M.R., Liu, X., Miao, Y., Vasilakos, A.V.: Verifiable online\/offline multi-keyword search for cloud-assisted industrial internet of things. J. Inf. Secur. Appl. 65, 103101 (2022)","journal-title":"J. Inf. Secur. Appl."},{"issue":"3","key":"5_CR2","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TCC.2018.2825983","volume":"8","author":"MH Ameri","year":"2018","unstructured":"Ameri, M.H., Delavar, M., Mohajeri, J., Salmasizadeh, M.: A key-policy attribute-based temporary keyword search scheme for secure cloud storage. IEEE Trans. Cloud Comput. 8(3), 660\u2013671 (2018)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"4","key":"5_CR3","doi-asserted-by":"publisher","first-page":"2513","DOI":"10.1109\/JIOT.2021.3063846","volume":"9","author":"Y Bao","year":"2021","unstructured":"Bao, Y., Qiu, W., Cheng, X.: Secure and lightweight fine-grained searchable data sharing for iot-oriented and cloud-assisted smart healthcare system. IEEE Internet Things J. 9(4), 2513\u20132526 (2021)","journal-title":"IEEE Internet Things J."},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, 2007, SP \u201907, pp. 321\u2013334 (2007)","DOI":"10.1109\/SP.2007.11"},{"issue":"2","key":"5_CR5","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1109\/TCC.2019.2892116","volume":"9","author":"P Chaudhari","year":"2021","unstructured":"Chaudhari, P., Das, M.L.: Privacy preserving searchable encryption with fine-grained access control. IEEE Trans. Cloud Comput. 9(2), 753\u2013762 (2021). https:\/\/doi.org\/10.1109\/TCC.2019.2892116","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"2","key":"5_CR6","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1109\/TSC.2019.2959306","volume":"15","author":"Y Chen","year":"2022","unstructured":"Chen, Y., Li, W., Gao, F., Wen, Q., Zhang, H., Wang, H.: Practical attribute-based multi-keyword ranked search scheme in cloud computing. IEEE Trans. Serv. Comput. 15(2), 724\u2013735 (2022)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"3","key":"5_CR7","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1109\/TDSC.2016.2599883","volume":"15","author":"H Cui","year":"2016","unstructured":"Cui, H., Wan, Z., Deng, R.H., Wang, G., Li, Y.: Efficient and expressive keyword search over encrypted data in cloud. IEEE Trans. Dependable Secure Comput. 15(3), 409\u2013422 (2016)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89\u201398 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"5_CR9","doi-asserted-by":"publisher","unstructured":"Li, J., Wang, M., Lu, Y., Zhang, Y., Wang, H.: Abks-skga: attribute-based keyword search secure against keyword guessing attack. Comput. Stand. Interfaces 74, 103471 (2021). https:\/\/doi.org\/10.1016\/j.csi.2020.103471. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0920548920303573","DOI":"10.1016\/j.csi.2020.103471"},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/j.ins.2018.12.004","volume":"479","author":"Y Lu","year":"2019","unstructured":"Lu, Y., Wang, G., Li, J.: Keyword guessing attacks on a public key encryption with keyword search scheme without random oracle and its improvement. Inf. Sci. 479, 270\u2013276 (2019). https:\/\/doi.org\/10.1016\/j.ins.2018.12.004","journal-title":"Inf. Sci."},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-319-68637-0_3","volume-title":"Provable Security","author":"R Meng","year":"2017","unstructured":"Meng, R., Zhou, Y., Ning, J., Liang, K., Han, J., Susilo, W.: An efficient key-policy attribute-based searchable encryption in prime-order groups. In: Okamoto, T., Yu, Y., Au, M.H., Li, Y. (eds.) ProvSec 2017. LNCS, vol. 10592, pp. 39\u201356. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-68637-0_3"},{"issue":"4","key":"5_CR12","doi-asserted-by":"publisher","first-page":"1382","DOI":"10.1109\/TSC.2023.3327816","volume":"17","author":"YS Rao","year":"2024","unstructured":"Rao, Y.S., Prasad, S., Bera, S., Das, A.K., Susilo, W.: Boolean searchable attribute-based signcryption with search results self-verifiability mechanism for data storage and retrieval in clouds. IEEE Trans. Serv. Comput. 17(4), 1382\u20131399 (2024). https:\/\/doi.org\/10.1109\/TSC.2023.3327816","journal-title":"IEEE Trans. Serv. Comput."},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_27"},{"key":"5_CR14","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy, S &P 2000, pp. 44\u201355. IEEE (2000)"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"B Waters","year":"2011","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53\u201370. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19379-8_4"},{"issue":"6","key":"5_CR16","doi-asserted-by":"publisher","first-page":"1242","DOI":"10.1109\/JSAC.2020.2986620","volume":"38","author":"Y Yu","year":"2020","unstructured":"Yu, Y., Shi, J., Li, H., Li, Y., Du, X., Guizani, M.: Key-policy attribute-based encryption with keyword search in virtualized environments. IEEE J. Sel. Areas Commun. 38(6), 1242\u20131251 (2020)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"5_CR17","doi-asserted-by":"publisher","first-page":"1771","DOI":"10.1109\/TIFS.2022.3172627","volume":"17","author":"K Zhang","year":"2022","unstructured":"Zhang, K., Jiang, Z., Ning, J., Huang, X.: Subversion-resistant and consistent attribute-based keyword search for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 17, 1771\u20131784 (2022). https:\/\/doi.org\/10.1109\/TIFS.2022.3172627","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"5_CR18","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/TCC.2021.3119407","volume":"11","author":"Y Zhang","year":"2023","unstructured":"Zhang, Y., Zhu, T., Guo, R., Xu, S., Cui, H., Cao, J.: Multi-keyword searchable and verifiable attribute-based encryption over cloud data. IEEE Trans. Cloud Comput. 11(1), 971\u2013983 (2023). https:\/\/doi.org\/10.1109\/TCC.2021.3119407","journal-title":"IEEE Trans. Cloud Comput."},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Zhao, X., Huang, Z.: Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing. Cluster Comput., 1\u201317 (2024)","DOI":"10.1007\/s10586-024-04423-5"},{"key":"5_CR20","doi-asserted-by":"publisher","unstructured":"Zheng, Q., Xu, S., Ateniese, G.: Vabks: verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, pp. 522\u2013530 (2014). https:\/\/doi.org\/10.1109\/INFOCOM.2014.6847976","DOI":"10.1109\/INFOCOM.2014.6847976"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-5566-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T20:23:06Z","timestamp":1749846186000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-5566-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819655656","9789819655663"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-5566-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seoul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icisc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icisc.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}