{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:41:44Z","timestamp":1761324104295},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s11390-017-1745-8","type":"journal-article","created":{"date-parts":[[2017,5,10]],"date-time":"2017-05-10T05:46:46Z","timestamp":1494395206000},"page":"599-617","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Private Keyword-Search for Database Systems Against Insider Attacks"],"prefix":"10.1007","volume":"32","author":[{"given":"Peng","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]},{"given":"Fuchun","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Qiao-Yan","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,12]]},"reference":[{"key":"1745_CR1","unstructured":"Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In Proc. the IEEE Symposium on Security and Privacy, May 2000, pp.44-55."},{"key":"1745_CR2","doi-asserted-by":"crossref","unstructured":"Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G. Public key encryption with keyword search. In Lecture Notes in Computer Science 3027, Cachin C, Camenisch J L (eds.), Springer, 2004, pp.506-522.","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"1745_CR3","doi-asserted-by":"crossref","unstructured":"Yau WC, Heng S H, Goi B M. Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In Lecture Notes in Computer Science 5060, Rong C M, Jaatun M C, Sandnes F E, Yang L T, Ma J H (eds.), Springer, 2008, pp.100-105.","DOI":"10.1007\/978-3-540-69295-9_10"},{"key":"1745_CR4","doi-asserted-by":"crossref","unstructured":"Baek J, Safavi-Naini R, Susilo W. Public key encryption with keyword search revisited. In Lecture Notes in Computer Science 5072, Gervasi O, Murgante B, Lagan\u00e0 A, Taniar D, Mun Y, Gavrilova M L (eds.), Springer, 2008, pp.1249-1259.","DOI":"10.1007\/978-3-540-69839-5_96"},{"key":"1745_CR5","doi-asserted-by":"crossref","unstructured":"Rhee H S, Park J H, Susilo W, Lee D H. Improved searchable public key encryption with designated tester. In Proc the 4th International Symposium on Information, Computer and Communications Security, March 2009, pp.376-379.","DOI":"10.1145\/1533057.1533108"},{"key":"1745_CR6","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/j.ins.2013.03.008","volume":"238","author":"LM Fang","year":"2013","unstructured":"Fang L M, Susilo W, Ge C P, Wang J D. Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Information Sciences, 2013, 238: 221-241.","journal-title":"Information Sciences"},{"key":"1745_CR7","doi-asserted-by":"crossref","unstructured":"Curtmola R, Garay J A, Kamara S, Ostrovsky R. Searchable symmetric encryption: Improved definitions and efficient constructions. In Proc. the 13th ACM Conference on Computer and Communications Security, October 30-November 3, 2006, pp.79-88.","DOI":"10.1145\/1180405.1180417"},{"key":"1745_CR8","doi-asserted-by":"crossref","unstructured":"Kamara S, Papamanthou C, Roeder T. Dynamic searchable symmetric encryption. In Proc. the ACM Conference on Computer and Communications Security, October 2012, pp.965-976.","DOI":"10.1145\/2382196.2382298"},{"key":"1745_CR9","doi-asserted-by":"crossref","unstructured":"Cash D, Jarecki S, Jutla C, Krawczyk H, Rosu M, Steiner M. Highly-scalable searchable symmetric encryption with support for Boolean queries. In Lecture Notes in Computer Science 8042, Canetti R, Garay J A (eds.), Springer, 2013, pp.353-373.","DOI":"10.1007\/978-3-642-40041-4_20"},{"issue":"11","key":"1745_CR10","doi-asserted-by":"crossref","first-page":"1943","DOI":"10.1109\/TIFS.2014.2359389","volume":"9","author":"Q Tang","year":"2014","unstructured":"Tang Q. Nothing is for free: Security in searching shared and encrypted data. IEEE Transactions on Information Forensics and Security, 2014, 9(11): 1943-1952.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1745_CR11","doi-asserted-by":"crossref","unstructured":"Park D J, Kim K, Lee P J. Public key encryption with conjunctive field keyword search. In Lecture Notes in Computer Science 3325, Lim C H, Yung M (eds.), Springer, 2005, pp.73-86.","DOI":"10.1007\/978-3-540-31815-6_7"},{"key":"1745_CR12","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Song D X, Waters B. New constructions and practical applications for private stream searching (extended abstract). In Proc. IEEE Symposium on Security and Privacy, May 2006, pp.132-139.","DOI":"10.1109\/SP.2006.27"},{"key":"1745_CR13","doi-asserted-by":"crossref","unstructured":"Boneh D, Waters B. Conjunctive, subset, and range queries on encrypted data. In Lecture Notes in Computer Science 4392, Vadhan S P (ed.), Springer, 2007, pp.535-554.","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"1745_CR14","doi-asserted-by":"crossref","unstructured":"Sedghi S, van Liesdonk P, Nikova S, Hartel P, Jonker W. Searching keywords with wildcards on encrypted data. In Lecture Notes in Computer Science 6280, Garay J A, De Prisco R (eds.), Springer, 2010, pp.138-153.","DOI":"10.1007\/978-3-642-15317-4_10"},{"key":"1745_CR15","doi-asserted-by":"crossref","unstructured":"Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H X. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. In Lecture Notes in Computer Science 3621, Shoup V (ed.), Springer, 2005, pp.205-222.","DOI":"10.1007\/11535218_13"},{"issue":"11","key":"1745_CR16","doi-asserted-by":"crossref","first-page":"2266","DOI":"10.1109\/TC.2012.215","volume":"62","author":"P Xu","year":"2013","unstructured":"Xu P, Jin H, Wu Q H, Wang W. Publickey encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack. IEEE Transactions on Computers, 2013, 62(11): 2266-2277.","journal-title":"IEEE Transactions on Computers"},{"key":"1745_CR17","doi-asserted-by":"crossref","unstructured":"Camenisch J, Kohlweiss M, Rial A, Sheedy C. Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data. In Lecture Notes in Computer Science 5443, Jarecki S, Tsudik G (eds.), Springer, 2009, pp.196-214.","DOI":"10.1007\/978-3-642-00468-1_12"},{"key":"1745_CR18","doi-asserted-by":"crossref","unstructured":"Zheng Q J, Xu S H, Ateniese G. VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. In Proc. IEEE INFOCOM, April 27-May 2, 2014, pp.522-530.","DOI":"10.1109\/INFOCOM.2014.6847976"},{"key":"1745_CR19","doi-asserted-by":"crossref","unstructured":"Shi J, Lai J Z, Li Y J, Deng R H, Weng J. Authorized keyword search on encrypted data. In Lecture Notes in Computer Science 8712, Kuty\u0142owski M, Vaidya J (eds.), Springer, 2014, pp.419-435.","DOI":"10.1007\/978-3-319-11203-9_24"},{"key":"1745_CR20","doi-asserted-by":"crossref","unstructured":"Li J W, Li J, Chen X F, Jia C F, Liu Z L. Efficient keyword search over encrypted data with fine-grained access control in hybrid cloud. In Lecture Notes in Computer Science 7645, Xu L, Bertino E, Mu Y (eds.), Springer, 2012, pp.490-502.","DOI":"10.1007\/978-3-642-34601-9_37"},{"key":"1745_CR21","doi-asserted-by":"crossref","unstructured":"Byun J W, Rhee H S, Park H A, Lee D H. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In Lecture Notes in Computer Science 4165, Jonker W, Petkovi\u0107 M (eds.), Springer, 2006, pp.75-83.","DOI":"10.1007\/11844662_6"},{"key":"1745_CR22","doi-asserted-by":"crossref","unstructured":"B\u00f6sch C, Hartel P, Jonker W, Peter A. A survey of provably secure searchable encryption. ACM Computing Surveys, 2015, 47(2): Article No. 18.","DOI":"10.1145\/2636328"},{"key":"1745_CR23","doi-asserted-by":"crossref","unstructured":"Shen E, Shi E, Waters B. Predicate privacy in encryption systems. In Lecture Notes in Computer Science 5444, Reingold O (ed.), Springer, 2009, pp.457-473.","DOI":"10.1007\/978-3-642-00457-5_27"},{"key":"1745_CR24","doi-asserted-by":"crossref","unstructured":"Boneh D, Boyen X, Goh E J. Hierarchical identity based encryption with constant size ciphertext. In Lecture Notes in Computer Science 3494, Cramer R (ed.), Springer, 2005, pp.440-456.","DOI":"10.1007\/11426639_26"},{"key":"1745_CR25","doi-asserted-by":"crossref","unstructured":"Delerabl\u00e9e C, Pointcheval D. Dynamic threshold public-key encryption. In Lecture Notes in Computer Science 5157, Wagner D (ed.), Springer, 2008, pp.317-334.","DOI":"10.1007\/978-3-540-85174-5_18"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-017-1745-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-017-1745-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-017-1745-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T03:56:55Z","timestamp":1569297415000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-017-1745-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["1745"],"URL":"https:\/\/doi.org\/10.1007\/s11390-017-1745-8","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5]]}}}