{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:48:08Z","timestamp":1762004888592,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T00:00:00Z","timestamp":1498089600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602118"],"award-info":[{"award-number":["61602118"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s00500-017-2684-6","type":"journal-article","created":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T23:43:44Z","timestamp":1498088624000},"page":"4829-4841","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data"],"prefix":"10.1007","volume":"21","author":[{"given":"Lanxiang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Linbing","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Kuan-Ching","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wenbo","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,22]]},"reference":[{"issue":"1","key":"2684_CR1","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"N Cao","year":"2014","unstructured":"Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222\u2013233","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"5","key":"2684_CR2","doi-asserted-by":"crossref","first-page":"895","DOI":"10.3233\/JCS-2011-0426","volume":"19","author":"R Curtmola","year":"2011","unstructured":"Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895\u2013934","journal-title":"J Comput Secur"},{"key":"2684_CR3","doi-asserted-by":"publisher","unstructured":"Deng Z, Li K, Li K, Zhou J. A multi-user searchable encryption scheme with keyword authorization in a cloud storage. Future Gener Comput Syst. doi:\n                        10.1016\/j.future.2016.05.017","DOI":"10.1016\/j.future.2016.05.017"},{"key":"2684_CR4","doi-asserted-by":"crossref","unstructured":"Gajek S (2016) Dynamic symmetric searchable encryption from constrained functional encryption. In: Proceedings of the cryptographers\u2019 track at the RSA conference, pp 75\u201389","DOI":"10.1007\/978-3-319-29485-8_5"},{"key":"2684_CR5","doi-asserted-by":"crossref","unstructured":"Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of symposium on the theory of computing (STOC), pp 169\u2013178","DOI":"10.1145\/1536414.1536440"},{"key":"2684_CR6","unstructured":"Goh E-J (2003) Secure indexes. Cryptology ePrint Archive: Report 2003\/216"},{"issue":"3","key":"2684_CR7","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O Goldreich","year":"1996","unstructured":"Goldreich O, Ostrovsky R (1996) Software protection and simulation on oblivious RAMs. J ACM 43(3):431\u2013473","journal-title":"J ACM"},{"key":"2684_CR8","doi-asserted-by":"crossref","unstructured":"Ishai Y, Kushilevitz E, Ostrovsky R, Sahai A (2006) Cryptography from anonymity. In: Proceedings of the 47th annual IEEE symposium on foundations of computer science, pp 239\u2013248","DOI":"10.1109\/FOCS.2006.25"},{"key":"2684_CR9","doi-asserted-by":"crossref","unstructured":"Kiayias A, Oksuz O, Russell A, Tang Q, Wang B (2016) Efficient encrypted keyword search for multi-user data sharing. In: Proceedings of European symposium on research in computer security (ESORICS), pp 173\u2013195","DOI":"10.1007\/978-3-319-45744-4_9"},{"key":"2684_CR10","unstructured":"Mashauri D, Li R, Han H, Gu X , Xu Z, Xu CZ (2015) Adaptive multi-keyword ranked search over encrypted cloud data. In: Proceedings of the international conference on collaborative computing: networking, applications and worksharing, pp 3\u201313"},{"key":"2684_CR11","doi-asserted-by":"crossref","unstructured":"Poon HT, Miri A (2015) An efficient conjunctive keyword and phase search scheme for encrypted cloud storage systems. In: Proceedings of IEEE 8th international conference on cloud computing, pp 508\u2013515","DOI":"10.1109\/CLOUD.2015.74"},{"key":"2684_CR12","doi-asserted-by":"crossref","unstructured":"Rane DD, Ghorpade VR (2015) Multi-user multi-keyword privacy preserving ranked based search over encrypted cloud data. In: Proceedings of the international conference on pervasive computing (ICPC), pp 1\u20134","DOI":"10.1109\/PERVASIVE.2015.7087044"},{"issue":"4","key":"2684_CR13","first-page":"35","volume":"24","author":"A Singhal","year":"2001","unstructured":"Singhal A (2001) Modern information retrieval: a brief overview. IEEE Comput Soc Tech Comm Data Eng Bull 24(4):35\u201343","journal-title":"IEEE Comput Soc Tech Comm Data Eng Bull"},{"key":"2684_CR14","unstructured":"Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings of IEEE symposium on security and privacy, pp 44\u201355"},{"issue":"11","key":"2684_CR15","doi-asserted-by":"crossref","first-page":"1943","DOI":"10.1109\/TIFS.2014.2359389","volume":"9","author":"Q Tang","year":"2014","unstructured":"Tang Q (2014) Nothing is for free: security in searching shared and encrypted data. IEEE Trans Inf Forensics Secur 9(11):1943\u20131952","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"8","key":"2684_CR16","doi-asserted-by":"crossref","first-page":"1467","DOI":"10.1109\/TPDS.2011.282","volume":"23","author":"C Wang","year":"2012","unstructured":"Wang C, Cao N, Li J, Ren K, Lou W (2012) Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans Parallel Distrib Syst 23(8):1467\u20131479","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"2684_CR17","doi-asserted-by":"crossref","unstructured":"Wang B, Yu S, Lou W, Hou YT (2014) Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: Proceedings of IEEE conference on computer communications, pp 2112\u20132120","DOI":"10.1109\/INFOCOM.2014.6848153"},{"key":"2684_CR18","unstructured":"Witten IH, Moffat A (1999) Managing gigabytes: compressing and indexing documents and images, second edition. Morgan Kaufmann"},{"key":"2684_CR19","doi-asserted-by":"crossref","unstructured":"Wong WK, Cheung DW, Kao B, Mamoulis N (2009) Secure kNN computation on encrypted databases. In: Proceedings of ACM SIGMOD international conference on management of data, pp 139\u2013152","DOI":"10.1145\/1559845.1559862"},{"issue":"9","key":"2684_CR20","doi-asserted-by":"crossref","first-page":"1795","DOI":"10.1007\/s00500-013-1202-8","volume":"18","author":"F Xhafa","year":"2014","unstructured":"Xhafa F, Wang J, Chen X, Krause PJ (2014) An efficient PHR service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795\u20131802","journal-title":"Soft Comput"},{"issue":"8","key":"2684_CR21","doi-asserted-by":"crossref","first-page":"107","DOI":"10.14257\/ijmue.2016.11.8.12","volume":"11","author":"Z Xia","year":"2016","unstructured":"Xia Z, Chen L, Sun X, Liu J (2016) A multi-keyword ranked search over encrypted cloud data supporting semantic extension. Int J Multimed Ubiquitous Eng 11(8):107\u2013120","journal-title":"Int J Multimed Ubiquitous Eng"},{"issue":"2","key":"2684_CR22","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340\u2013352","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"2684_CR23","doi-asserted-by":"crossref","unstructured":"Yang C, Zhang W, Xu J, Xu J, Yu N (2012) A fast privacy-preserving multi-keyword search scheme on cloud data. In: Proceedings of the international conference on cloud and service computing (CSC), pp 104\u2013110","DOI":"10.1109\/CSC.2012.23"},{"key":"2684_CR24","doi-asserted-by":"publisher","unstructured":"Ye J, Wang J, Zhao J, Shen J, Li K-C. Fine-grained searchable encryption in multi-user setting. Soft Comput. doi:\n                        10.1007\/s00500-016-2179-x","DOI":"10.1007\/s00500-016-2179-x"},{"issue":"1","key":"2684_CR25","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1016\/j.jnca.2010.07.007","volume":"34","author":"B Zhang","year":"2011","unstructured":"Zhang B, Zhang F (2011) An efficient public key encryption with conjunctive-subset keywords search. J Netw Comput Appl 34(1):262\u2013267","journal-title":"J Netw Comput Appl"},{"key":"2684_CR26","unstructured":"Zhangjie F, Sun X, Qi Liu L, Zhou JS (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190\u2013200"},{"key":"2684_CR27","doi-asserted-by":"crossref","unstructured":"Zhang W, Xiao S, Lin Y, Zhou T, Zhou S (2014) Secure ranked multi-keyword search for multiple data owners in cloud computing. In: Proceedings of the 44th annual IEEE\/IFIP international conference on dependable systems and networks, pp 276\u2013286","DOI":"10.1109\/DSN.2014.36"},{"key":"2684_CR28","doi-asserted-by":"publisher","unstructured":"Zou Q, Wang J, Ye J, Shen J, Chen X (2017) Efficient and secure encrypted image search in mobile cloud computing. Soft Comput. doi:\n                        10.1007\/s00500-016-2153-7","DOI":"10.1007\/s00500-016-2153-7"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-017-2684-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2684-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2684-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,2]],"date-time":"2017-08-02T10:45:13Z","timestamp":1501670713000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-017-2684-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,22]]},"references-count":28,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["2684"],"URL":"https:\/\/doi.org\/10.1007\/s00500-017-2684-6","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2017,6,22]]}}}