{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T12:32:17Z","timestamp":1763037137369,"version":"3.37.3"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,11,8]],"date-time":"2017-11-08T00:00:00Z","timestamp":1510099200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"the National Science and Technology Major Project","award":["2013ZX03002006"],"award-info":[{"award-number":["2013ZX03002006"]}]},{"name":"the Liaoning Province Science and Technology Projects","award":["2013217004"],"award-info":[{"award-number":["2013217004"]}]},{"name":"the Liaoning Province Doctor Startup Fund","award":["20141012"],"award-info":[{"award-number":["20141012"]}]},{"name":"the Fundamental Research Funds for the Central Universities","award":["N130317002"],"award-info":[{"award-number":["N130317002"]}]},{"name":"the Shenyang Province Science and Technology Projects","award":["F14231108"],"award-info":[{"award-number":["F14231108"]}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61772127","61472184"],"award-info":[{"award-number":["61772127","61472184"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61321491","61272546"],"award-info":[{"award-number":["61321491","61272546"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s10207-017-0394-9","type":"journal-article","created":{"date-parts":[[2017,11,8]],"date-time":"2017-11-08T20:44:34Z","timestamp":1510173874000},"page":"549-568","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Integrity-verifiable conjunctive keyword searchable encryption in cloud storage"],"prefix":"10.1007","volume":"17","author":[{"given":"Yuxi","family":"Li","sequence":"first","affiliation":[]},{"given":"Fucai","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yuhai","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Muqing","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Zifeng","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,8]]},"reference":[{"issue":"2","key":"394_CR1","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1145\/1556154.1556173","volume":"40","author":"C Cachin","year":"2009","unstructured":"Cachin, C., Keidar, I., Shraer, A.: Trusting the cloud. ACM Sigact News 40(2), 81\u201386 (2009)","journal-title":"Trusting the cloud. ACM Sigact News"},{"key":"394_CR2","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1007\/978-3-642-14992-4_13","volume":"6054","author":"S Kamara","year":"2010","unstructured":"Kamara, S., Lauter, K.: Cryptographic cloud storage. Financ. Cryptogr. Data Secur. 6054, 136\u2013149 (2010)","journal-title":"Financ. Cryptogr. Data Secur."},{"key":"394_CR3","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data, security and privacy. In: Proceedings of 2000 IEEE Symposium on IEEE, pp. 44\u201355 (2000)"},{"key":"394_CR4","unstructured":"Goh, E.J.: Secure indexes. In: IACR Cryptology ePrint Archive, p. 216 (2003)"},{"key":"394_CR5","doi-asserted-by":"publisher","unstructured":"Chang, Y.C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) Applied Cryptography and Network Security. ACNS 2005. Lecture Notes in Computer Science, vol. 3531, pp. 442\u2013455. Springer, Berlin, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11496137_30","DOI":"10.1007\/11496137_30"},{"key":"394_CR6","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 79\u201388, ACM (2006)","DOI":"10.1145\/1180405.1180417"},{"key":"394_CR7","doi-asserted-by":"crossref","unstructured":"Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM Conference on Computer and Communications Securitypp, pp. 965\u2013976, ACM (2012)","DOI":"10.1145\/2382196.2382298"},{"key":"394_CR8","doi-asserted-by":"crossref","unstructured":"Cash, D. Jaeger, J., Jarecki, S., Jutla, C., Krawczyk, H. Rosu, M.C., Steiner, M.: Dynamic searchable encryption in very large databases: data structures and implementation. In: Proceedings of NDSS (2014)","DOI":"10.14722\/ndss.2014.23264"},{"key":"394_CR9","doi-asserted-by":"crossref","unstructured":"Stefanov, E., Papamanthou, C., Shi, E.: Practical dynamic searchable encryption with small leakage. In: Proceedings of NDSS (2014)","DOI":"10.14722\/ndss.2014.23298"},{"key":"394_CR10","doi-asserted-by":"publisher","unstructured":"Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) Applied Cryptography and Network Security. ACNS 2004. Lecture Notes in Computer Science, vol. 3089, pp. 31\u201345. Springer, Berlin, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24852-1_3","DOI":"10.1007\/978-3-540-24852-1_3"},{"key":"394_CR11","unstructured":"Kamara, S., Papamanthou, C., Roeder, T.: CS2: a searchable cryptographic cloud storage system. TechReport MSR-TR-2011-58, Microsoft Research (2011)"},{"key":"394_CR12","doi-asserted-by":"publisher","unstructured":"Byun, J.W., Lee, D.H., Lim, J.: Efficient conjunctive keyword search on encrypted data storage system. In: Atzen, A.S., Lioy, A. (eds.) Public Key Infrastructure. EuroPKI 2006. Lecture Notes in Computer Science, vol. 4043, pp. 184\u2013196. Springer, Berlin (2006). https:\/\/doi.org\/10.1007\/11774716","DOI":"10.1007\/11774716"},{"issue":"1","key":"394_CR13","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"N Cao","year":"2014","unstructured":"Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222\u2013233 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"394_CR14","doi-asserted-by":"publisher","unstructured":"Ballard, L., Kamara, S., Monrose, F.: Achieving efficient conjunctive keyword searches over encrypted data. In: Qing, S., Mao, W., L\u00f3pez, J., Wang, G. (eds.) Information and Communications Security. ICICS 2005. Lecture Notes in Computer Science, vol. 3783, pp. 414\u2013426. Springer, Berlin (2005). https:\/\/doi.org\/10.1007\/11602897_35","DOI":"10.1007\/11602897_35"},{"key":"394_CR15","doi-asserted-by":"crossref","unstructured":"Kurosawa, K., Ohtaki, Y.: UC-Secure Searchable Symmetric Encryption, Financial Cryptography and Data Security, pp. 285\u2013298. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-32946-3_21"},{"key":"394_CR16","doi-asserted-by":"publisher","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) Advances in Cryptology\u2014EUROCRYPT 2004. Eurocrypt 2004. Lecture Notes in Computer Science, vol. 3027, pp. 506\u2013522. Springer, Berlin (2004). https:\/\/doi.org\/10.1007\/978-3-540-24676-3_30","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"394_CR17","doi-asserted-by":"publisher","unstructured":"Gentry, C.: Practical identity-based encryption without random oracles. In: Vaudenay, S. (ed.) Advances in Cryptology\u2014EUROCRYPT 2006. Eurocrypt 2006. Lecture Notes in Computer Science, vol. 4004, pp. 445\u2013464. Springer, Berlin (2006). https:\/\/doi.org\/10.1007\/11761679_27","DOI":"10.1007\/11761679_27"},{"key":"394_CR18","doi-asserted-by":"publisher","unstructured":"Baek, J., Safavi-Naini, R., Susilo, W.: Public Key Encryption with Keyword Search Revisited. In: Gervasi, O., Murgante, B., Lagan\u00e0, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) Computational Science and Its Applications\u2014ICCSA 2008. ICCSA 2008. Lecture Notes in Computer Science, vol. 5072, pp. 1249\u20131259. Springer, Berlin (2008). https:\/\/doi.org\/10.1007\/978-3-540-69839-5_96","DOI":"10.1007\/978-3-540-69839-5_96"},{"key":"394_CR19","doi-asserted-by":"crossref","DOI":"10.1201\/b17668","volume-title":"Introduction to Modern Cryptography","author":"J Katz","year":"2014","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography. CRC Press, Boca Raton (2014)"},{"key":"394_CR20","doi-asserted-by":"publisher","unstructured":"Merkle, R.C.: A Certified Digital Signature. In: Brassard, G. (ed.) Advances in Cryptology\u2014CRYPTO\u2019 89 Proceedings. CRYPTO 1989. Lecture Notes in Computer Science, vol. 435, pp. 218\u2013238. Springer, New York (1990). https:\/\/doi.org\/10.1007\/0-387-34805-0_21","DOI":"10.1007\/0-387-34805-0_21"},{"key":"394_CR21","doi-asserted-by":"publisher","unstructured":"Papamanthou, C., Tamassia, R., Triandopoulos, N.: Optimal Verification of Operations on Dynamic Sets. In: Rogaway, P. (ed.) Advances in Cryptology\u2014CRYPTO 2011. CRYPTO 2011. Lecture Notes in Computer Science, vol. 6841, pp. 91\u2013110. Springer, Berlin (2011). https:\/\/doi.org\/10.1007\/978-3-642-22792-9_6","DOI":"10.1007\/978-3-642-22792-9_6"},{"key":"394_CR22","doi-asserted-by":"crossref","unstructured":"Stefanov, E., Van Dijk, M., Shi, E. et\u00a0al.: Path ORAM: an extremely simple oblivious RAM protocol. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer Communications security, pp. 299\u2013310 (2013)","DOI":"10.1145\/2508859.2516660"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-017-0394-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-017-0394-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-017-0394-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T11:13:50Z","timestamp":1603278830000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-017-0394-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,8]]},"references-count":22,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["394"],"URL":"https:\/\/doi.org\/10.1007\/s10207-017-0394-9","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2017,11,8]]}}}