{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T10:09:26Z","timestamp":1764842966343,"version":"3.44.0"},"reference-count":25,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T00:00:00Z","timestamp":1736294400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["High-Confidence Computing"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1016\/j.hcc.2025.100297","type":"journal-article","created":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T11:46:44Z","timestamp":1736596004000},"page":"100297","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"title":["Less leakage and more precise: Efficient wildcard keyword search over encrypted data"],"prefix":"10.1016","volume":"5","author":[{"given":"Yunling","family":"Wang","sequence":"first","affiliation":[]},{"given":"Chenyang","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Yifei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Fu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0667-077X","authenticated-orcid":false,"given":"Yong","family":"Yu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.hcc.2025.100297_b1","series-title":"2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000","first-page":"44","article-title":"Practical techniques for searches on encrypted data","author":"Song","year":"2000"},{"key":"10.1016\/j.hcc.2025.100297_b2","series-title":"Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security","first-page":"232","article-title":"Injection-secure structured and searchable symmetric encryption","volume":"vol. 14443","author":"Amjad","year":"2023"},{"key":"10.1016\/j.hcc.2025.100297_b3","series-title":"44th IEEE Symposium on Security and Privacy","first-page":"1401","article-title":"Rethinking searchable symmetric encryption","author":"Gui","year":"2023"},{"issue":"1","key":"10.1016\/j.hcc.2025.100297_b4","doi-asserted-by":"crossref","first-page":"430","DOI":"10.56553\/popets-2024-0025","article-title":"MAPLE: Markov process leakage attacks on encrypted search","volume":"2024","author":"Kamara","year":"2024","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"10.1016\/j.hcc.2025.100297_b5","doi-asserted-by":"crossref","unstructured":"J. Wang, S.-F. Sun, T. Li, S. Qi, X. Chen, Practical volume-hiding encrypted multi-maps with optimal overhead and beyond, in: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022, pp. 2825\u20132839.","DOI":"10.1145\/3548606.3559345"},{"key":"10.1016\/j.hcc.2025.100297_b6","doi-asserted-by":"crossref","unstructured":"K. Du, J. Wang, J. Wu, Y. Wang, Scalable Equi-Join Queries over Encrypted Database, in: Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, 2024, pp. 4002\u20134016.","DOI":"10.1145\/3658644.3690377"},{"key":"10.1016\/j.hcc.2025.100297_b7","series-title":"32nd USENIX Security Symposium, USENIX Security 2023","first-page":"5953","article-title":"High recovery with fewer injections: Practical binary volumetric injection attacks against dynamic searchable encryption","author":"Zhang","year":"2023"},{"issue":"2","key":"10.1016\/j.hcc.2025.100297_b8","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2023.100115","article-title":"Attribute-based keyword search encryption for power data protection","volume":"3","author":"Zhang","year":"2023","journal-title":"High-Confidence Comput."},{"key":"10.1016\/j.hcc.2025.100297_b9","series-title":"Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings","first-page":"235","article-title":"Secure keyword search using bloom filter with specified character positions","volume":"vol. 7496","author":"Suga","year":"2012"},{"issue":"7","key":"10.1016\/j.hcc.2025.100297_b10","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1145\/362686.362692","article-title":"Space\/time trade-offs in hash coding with allowable errors","volume":"13","author":"Bloom","year":"1970","journal-title":"Commun. ACM"},{"key":"10.1016\/j.hcc.2025.100297_b11","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1007\/s10207-015-0302-0","article-title":"Efficient wildcard search over encrypted data","volume":"15","author":"Hu","year":"2016","journal-title":"Int. J. Inf. Secur."},{"key":"10.1016\/j.hcc.2025.100297_b12","doi-asserted-by":"crossref","unstructured":"J. Wu, K. Du, J. Wang, S.-F. Sun, Y. Wang, Y. Li, W. Tian, Y. Wang, Compressed Cookies: Practical Wildcard Symmetric Searchable Encryption with Optimized Storage, in: ProvSec 2024, 2024.","DOI":"10.1007\/978-981-96-0954-3_6"},{"key":"10.1016\/j.hcc.2025.100297_b13","series-title":"Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies","first-page":"75","article-title":"Cuckoo filter: Practically better than bloom","author":"Fan","year":"2014"},{"key":"10.1016\/j.hcc.2025.100297_b14","series-title":"27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020","article-title":"Revisiting leakage abuse attacks","author":"Blackstone","year":"2020"},{"key":"10.1016\/j.hcc.2025.100297_b15","series-title":"28th Annual Network and Distributed System Security Symposium","article-title":"Practical non-interactive searchable encryption with forward and backward privacy","author":"Sun","year":"2021"},{"issue":"1","key":"10.1016\/j.hcc.2025.100297_b16","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1109\/TDSC.2020.2973633","article-title":"Non-interactive multi-client searchable encryption: Realization and implementation","volume":"19","author":"Sun","year":"2022","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"1","key":"10.1016\/j.hcc.2025.100297_b17","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2022.100100","article-title":"Efficient secure and verifiable KNN set similarity search over outsourced clouds","volume":"3","author":"Jiang","year":"2023","journal-title":"High-Confidence Comput."},{"issue":"2","key":"10.1016\/j.hcc.2025.100297_b18","doi-asserted-by":"crossref","DOI":"10.1016\/j.hcc.2022.100058","article-title":"Search geometric ranges efficiently as keywords over encrypted spatial data","volume":"2","author":"Guo","year":"2022","journal-title":"High-Confidence Comput."},{"key":"10.1016\/j.hcc.2025.100297_b19","series-title":"Security and Cryptography for Networks: 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings 7","first-page":"138","article-title":"Searching keywords with wildcards on encrypted data","author":"Sedghi","year":"2010"},{"key":"10.1016\/j.hcc.2025.100297_b20","series-title":"Secure Data Management: 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedings 8","first-page":"114","article-title":"Conjunctive wildcard search over encrypted data","author":"B\u00f6sch","year":"2011"},{"key":"10.1016\/j.hcc.2025.100297_b21","series-title":"Network and System Security - 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings","first-page":"266","article-title":"Searchable symmetric encryption supporting queries with multiple-character wildcards","volume":"vol. 9955","author":"Zhao","year":"2016"},{"issue":"12","key":"10.1016\/j.hcc.2025.100297_b22","doi-asserted-by":"crossref","first-page":"7475","DOI":"10.1002\/int.22595","article-title":"Practical wildcard searchable encryption with tree-based index","volume":"36","author":"Zhang","year":"2021","journal-title":"Int. J. Intell. Syst."},{"issue":"3","key":"10.1016\/j.hcc.2025.100297_b23","first-page":"2178","article-title":"Secure and practical wildcard searchable encryption system based on inner product","volume":"16","author":"Li","year":"2022","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.hcc.2025.100297_b24","article-title":"Secure and flexible wildcard queries","author":"Wang","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.hcc.2025.100297_b25","doi-asserted-by":"crossref","unstructured":"Y. Wang, S.F. Sun, J. Wang, X. Chen, J.K. Liu, D. Gu, Practical Non-interactive Encrypted Conjunctive Search with Leakage Suppression, in: Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, 2024, pp. 2825\u20132839.","DOI":"10.1145\/3658644.3670355"}],"container-title":["High-Confidence Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295225000017?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295225000017?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T04:27:55Z","timestamp":1758688075000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2667295225000017"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["S2667295225000017"],"URL":"https:\/\/doi.org\/10.1016\/j.hcc.2025.100297","relation":{},"ISSN":["2667-2952"],"issn-type":[{"type":"print","value":"2667-2952"}],"subject":[],"published":{"date-parts":[[2025,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Less leakage and more precise: Efficient wildcard keyword search over encrypted data","name":"articletitle","label":"Article Title"},{"value":"High-Confidence Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.hcc.2025.100297","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 The Author(s). Published by Elsevier B.V. on behalf of Shandong University.","name":"copyright","label":"Copyright"}],"article-number":"100297"}}