{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:55:35Z","timestamp":1762005335276,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T00:00:00Z","timestamp":1619481600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T00:00:00Z","timestamp":1619481600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11042-021-10844-w","type":"journal-article","created":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T08:02:17Z","timestamp":1619510537000},"page":"26049-26068","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security"],"prefix":"10.1007","volume":"80","author":[{"given":"Aniseh","family":"Najafi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0082-036X","authenticated-orcid":false,"given":"Hamid Haj Seyyed","family":"Javadi","sequence":"additional","affiliation":[]},{"given":"Majid","family":"Bayat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,27]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 506\u2013522","key":"10844_CR1","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"10844_CR2","first-page":"62","volume":"2016","author":"R Bost","year":"2016","unstructured":"Bost R, Fouque PA, Pointcheval D (2016) Verifiable dynamic symmetric searchable encryption: Optimality and forward security. IACR Cryptology ePrint Archive 2016:62","journal-title":"IACR Cryptology ePrint Archive"},{"doi-asserted-by":"crossref","unstructured":"Byun JW, Rhee HS, Park HA, Lee DH (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Workshop on secure data management. Springer, pp 75\u201383","key":"10844_CR3","DOI":"10.1007\/11844662_6"},{"issue":"1","key":"10844_CR4","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"N Cao","year":"2013","unstructured":"Cao N, Wang C, Li M, Ren K, Lou W (2013) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222\u2013233","journal-title":"IEEE Trans Parallel Distrib Syst"},{"doi-asserted-by":"crossref","unstructured":"Cash D, Jaeger J, Jarecki S, Jutla CS, Krawczyk H, Rosu MC, Steiner M (2014) Dynamic searchable encryption in very-large databases: Data structures and implementation. In: NDSS, vol 14. Citeseer, pp 23\u201326","key":"10844_CR5","DOI":"10.14722\/ndss.2014.23264"},{"doi-asserted-by":"crossref","unstructured":"Cash D, Jarecki S, Jutla C, Krawczyk H, Ro\u015fu MC, Steiner M (2013) Highly-scalable searchable symmetric encryption with support for boolean queries. In: Advances in cryptology\u2013CRYPTO 2013. Springer, pp 353\u2013373","key":"10844_CR6","DOI":"10.1007\/978-3-642-40041-4_20"},{"doi-asserted-by":"crossref","unstructured":"Chai Q, Gong G (2012) Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE International conference on communications (ICC). IEEE, pp 917\u2013922","key":"10844_CR7","DOI":"10.1109\/ICC.2012.6364125"},{"doi-asserted-by":"crossref","unstructured":"Chang YC, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. In: International conference on applied cryptography and network security. Springer, pp 442\u2013455","key":"10844_CR8","DOI":"10.1007\/11496137_30"},{"issue":"12","key":"10844_CR9","doi-asserted-by":"publisher","first-page":"2833","DOI":"10.1109\/TIFS.2016.2599293","volume":"11","author":"R Chen","year":"2016","unstructured":"Chen R, Mu Y, Yang G, Guo F, Huang X, Wang X, Wang Y (2016) Server-aided public key encryption with keyword search. IEEE Trans Inform Forens Secur 11(12):2833\u20132842","journal-title":"IEEE Trans Inform Forens Secur"},{"issue":"3","key":"10844_CR10","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1147\/rd.383.0243","volume":"38","author":"D Coppersmith","year":"1994","unstructured":"Coppersmith D (1994) The data encryption standard (des) and its strength against attacks. IBM J Res Develop 38(3):243\u2013250","journal-title":"IBM J Res Develop"},{"issue":"5","key":"10844_CR11","doi-asserted-by":"publisher","first-page":"895","DOI":"10.3233\/JCS-2011-0426","volume":"19","author":"R Curtmola","year":"2011","unstructured":"Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: Improved definitions and efficient constructions. J Comput Secur 19(5):895\u2013934","journal-title":"J Comput Secur"},{"issue":"9","key":"10844_CR12","doi-asserted-by":"publisher","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","volume":"27","author":"Z Fu","year":"2015","unstructured":"Fu Z, Ren K, Shu J, Sun X, Huang F (2015) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9):2546\u20132559","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"12","key":"10844_CR13","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1109\/TIFS.2017.2730365","volume":"12","author":"Z Fu","year":"2017","unstructured":"Fu Z, Wu X, Wang Q, Ren K (2017) Enabling central keyword-based semantic extension search over encrypted outsourced data. IEEE Trans Inform Forensics Secur 12(12):2986\u20132997","journal-title":"IEEE Trans Inform Forensics Secur"},{"key":"10844_CR14","first-page":"216","volume":"2003","author":"EJ Goh","year":"2003","unstructured":"Goh EJ, et al. (2003) Secure indexes. IACR Cryptology ePrint Archive 2003:216","journal-title":"IACR Cryptology ePrint Archive"},{"doi-asserted-by":"crossref","unstructured":"Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. In: International conference on applied cryptography and network security. Springer, pp 31\u201345","key":"10844_CR15","DOI":"10.1007\/978-3-540-24852-1_3"},{"doi-asserted-by":"crossref","unstructured":"Ishai Y, Kushilevitz E, Lu S, Ostrovsky R (2016) Private large-scale databases with distributed searchable symmetric encryption. In: Cryptographers\u2019 track at the RSA conference. Springer, pp 90\u2013107","key":"10844_CR16","DOI":"10.1007\/978-3-319-29485-8_6"},{"key":"10844_CR17","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.ins.2017.03.037","volume":"403","author":"X Jiang","year":"2017","unstructured":"Jiang X, Yu J, Yan J, Hao R (2017) Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data. Inf Sci 403:22\u201341","journal-title":"Inf Sci"},{"doi-asserted-by":"crossref","unstructured":"Kamara S, Papamanthou C, Roeder T (2012) Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM conference on Computer and communications security. ACM, pp 965\u2013976","key":"10844_CR18","DOI":"10.1145\/2382196.2382298"},{"doi-asserted-by":"crossref","unstructured":"Kurosawa K, Ohtaki Y (2012) Uc-secure searchable symmetric encryption. In: International conference on financial cryptography and data security. Springer, pp 285\u2013298","key":"10844_CR19","DOI":"10.1007\/978-3-642-32946-3_21"},{"issue":"3","key":"10844_CR20","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1109\/TDSC.2015.2406704","volume":"13","author":"H Li","year":"2016","unstructured":"Li H, Yang Y, Luan TH, Liang X, Zhou L, Shen XS (2016) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans Depend Secure Comput 13(3):312\u2013325","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"10844_CR21","doi-asserted-by":"publisher","first-page":"86328","DOI":"10.1109\/ACCESS.2020.2992773","volume":"8","author":"Y Li","year":"2020","unstructured":"Li Y, Zhou F, Xu Z, Ge Y (2020) An efficient two-server ranked dynamic searchable encryption scheme. IEEE Access 8:86328\u201386344","journal-title":"IEEE Access"},{"issue":"20","key":"10844_CR22","doi-asserted-by":"publisher","first-page":"20739","DOI":"10.1007\/s11042-016-3971-4","volume":"76","author":"X Liao","year":"2017","unstructured":"Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76(20):20739\u201320753","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"10844_CR23","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2019","unstructured":"Liao X, Yu Y, Li B, Li Z, Qin Z (2019) A new payload partition strategy in color image steganography. IEEE Trans Circ Syst Video Technol 30 (3):685\u2013696","journal-title":"IEEE Trans Circ Syst Video Technol"},{"doi-asserted-by":"crossref","unstructured":"Liu Q, Tian Y, Wu J, Peng T, Wang G (2019) Enabling verifiable and dynamic ranked search over outsourced data. IEEE Trans Serv Comput","key":"10844_CR24","DOI":"10.1109\/TSC.2019.2922177"},{"unstructured":"Lu CC, Tseng SY (2002) Integrated design of aes (advanced encryption standard) encrypter and decrypter. In: Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors. IEEE, pp 277\u2013285","key":"10844_CR25"},{"doi-asserted-by":"crossref","unstructured":"Najafi A, Javadi HHS, Bayat M (2019) Verifiable ranked search over encrypted data with forward and backward privacy. Future Generation Computer Systems","key":"10844_CR26","DOI":"10.1016\/j.future.2019.06.018"},{"doi-asserted-by":"crossref","unstructured":"Ramasamy R, Vivek SS, George P, Kshatriya BSR (2017) Dynamic verifiable encrypted keyword search using bitmap index and homomorphic mac. In: 2017 IEEE 4Th international conference on cyber security and cloud computing (CSCloud). IEEE, pp 357\u2013362","key":"10844_CR27","DOI":"10.1109\/CSCloud.2017.47"},{"doi-asserted-by":"crossref","unstructured":"Rizomiliotis P, Gritzalis S (2015) Oram based forward privacy preserving dynamic searchable symmetric encryption schemes. In: Proceedings of the 2015 ACM workshop on cloud computing security workshop. ACM, pp 65\u201376","key":"10844_CR28","DOI":"10.1145\/2808425.2808429"},{"doi-asserted-by":"crossref","unstructured":"Shen E, Shi E, Waters B (2009) Predicate privacy in encryption systems. In: Theory of cryptography conference. Springer, pp 457\u2013473","key":"10844_CR29","DOI":"10.1007\/978-3-642-00457-5_27"},{"doi-asserted-by":"crossref","unstructured":"Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000. IEEE, pp 44\u201355","key":"10844_CR30","DOI":"10.1109\/SECPRI.2000.848445"},{"doi-asserted-by":"crossref","unstructured":"Stefanov E, Papamanthou C, Shi E (2014) Practical dynamic searchable encryption with small leakage. In: NDSS, vol 71, pp 72\u201375","key":"10844_CR31","DOI":"10.14722\/ndss.2014.23298"},{"doi-asserted-by":"crossref","unstructured":"Sun W, Liu X, Lou W, Hou YT, Li H (2015) Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: Computer communications (INFOCOM), 2015 IEEE conference on. IEEE, pp 2110\u20132118","key":"10844_CR32","DOI":"10.1109\/INFOCOM.2015.7218596"},{"issue":"11","key":"10844_CR33","doi-asserted-by":"publisher","first-page":"3025","DOI":"10.1109\/TPDS.2013.282","volume":"25","author":"W Sun","year":"2013","unstructured":"Sun W, Wang B, Cao N, Li M, Lou W, Hou YT, Li H (2013) Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans Parallel Distrib Syst 25(11):3025\u20133035","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"8-9","key":"10844_CR34","doi-asserted-by":"publisher","first-page":"1151","DOI":"10.1007\/s11265-017-1299-6","volume":"90","author":"SS Vivek","year":"2018","unstructured":"Vivek SS, Ramasamy R, George P, Kshatriya BSR (2018) Dynamic verifiable encrypted keyword search. J Signal Process Syst 90(8-9):1151\u20131165","journal-title":"J Signal Process Syst"},{"doi-asserted-by":"crossref","unstructured":"Wang P, Wang H, Pieprzyk J (2008) Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. In: International conference on cryptology and network security. Springer, pp 178\u2013195","key":"10844_CR35","DOI":"10.1007\/978-3-540-89641-8_13"},{"issue":"6","key":"10844_CR36","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1109\/TIFS.2016.2523941","volume":"11","author":"S Wang","year":"2016","unstructured":"Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inform Forens Secur 11(6):1265\u20131277","journal-title":"IEEE Trans Inform Forens Secur"},{"doi-asserted-by":"crossref","unstructured":"Wong WK, Cheung DWL, Kao B, Mamoulis N (2009) Secure knn computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data. ACM, pp 139\u2013152","key":"10844_CR37","DOI":"10.1145\/1559845.1559862"},{"issue":"2","key":"10844_CR38","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2015","unstructured":"Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distribut Syst 27(2):340\u2013352","journal-title":"IEEE Trans Parallel Distribut Syst"},{"issue":"11","key":"10844_CR39","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1109\/TC.2012.215","volume":"62","author":"P Xu","year":"2012","unstructured":"Xu P, Jin H, Wu Q, Wang W (2012) Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack. IEEE Trans Comput 62(11):2266\u20132277","journal-title":"IEEE Trans Comput"},{"doi-asserted-by":"crossref","unstructured":"Yoshino M, Kunihiro N, Naganuma K, Sato H (2012) Symmetric inner-product predicate encryption based on three groups. In: International conference on provable security. Springer, pp 215\u2013234","key":"10844_CR40","DOI":"10.1007\/978-3-642-33272-2_14"},{"issue":"3","key":"10844_CR41","first-page":"21","volume":"16","author":"R Zhang","year":"2016","unstructured":"Zhang R, Xue R, Yu T, Liu L (2016) Dynamic and efficient private keyword search over inverted index\u2013based encrypted data. ACM Trans Int Technol (TOIT) 16(3):21","journal-title":"ACM Trans Int Technol (TOIT)"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10844-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10844-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10844-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T06:17:05Z","timestamp":1625552225000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10844-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,27]]},"references-count":41,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["10844"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10844-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,4,27]]},"assertion":[{"value":"10 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 April 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}