{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T04:12:35Z","timestamp":1770351155585,"version":"3.49.0"},"reference-count":160,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2023,3,4]]},"DOI":"10.1080\/19393555.2022.2033367","type":"journal-article","created":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T18:49:56Z","timestamp":1649011796000},"page":"76-119","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":6,"title":["Searchable encryption : A survey"],"prefix":"10.1080","volume":"32","author":[{"given":"Dhruti","family":"Sharma","sequence":"first","affiliation":[{"name":"Information Technology Department, Sarvajanik College of Engineering and Technology, Surat, India"}]}],"member":"301","published-online":{"date-parts":[[2022,4,3]]},"reference":[{"key":"cit0001","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346876"},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69839-5_96"},{"key":"cit0004","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79104-1_6"},{"key":"cit0005","unstructured":"Beimel, A. (1996). Secure schemes for secret sharing and key distribution (Unpublished doctoral dissertation). Technion-Israel Institute of technology, Faculty of computer science.Technion-Israel Institute of technology, Faculty of computer science."},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74143-5_30"},{"key":"cit0007","first-page":"274","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201993. Lecture Notes in Computer Science","author":"Benaloh J.","year":"1993"},{"issue":"1","key":"cit0008","first-page":"60","volume":"2","author":"Bhardwaj S.","year":"2010","journal-title":"International Journal of Engineering and Information Technology"},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46706-0_31"},{"key":"cit0010","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_13"},{"key":"cit0011","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"cit0013","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_16"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_29"},{"issue":"2","key":"cit0015","first-page":"18","volume":"47","author":"B\u00f6sch C.","year":"2014","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978303"},{"key":"cit0017","first-page":"62","volume":"2016","author":"Bost R.","year":"2016","journal-title":"IACR Cryptol. ePrint Arch"},{"key":"cit0018","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133980"},{"key":"cit0019","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_17"},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.1007\/11774716_15"},{"key":"cit0021","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"cit0022","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23264"},{"key":"cit0023","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_20"},{"key":"cit0024","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364125"},{"key":"cit0025","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_30"},{"key":"cit0026","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_33"},{"key":"cit0027","volume-title":"IEEE Transactions on Cloud Computing","author":"Chaudhari P.","year":"2019"},{"key":"cit0028","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"cit0029","doi-asserted-by":"publisher","DOI":"10.1109\/ICICIC.2009.369"},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30428-6_15"},{"key":"cit0031","first-page":"110","author":"Cheney W.","year":"2009","journal-title":"The Australian Mathematical Society"},{"key":"cit0032","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714623"},{"key":"cit0033","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"cit0034","volume-title":"Dynamic searchable encryption with small client storage","author":"Demertzis I.","year":"2019"},{"key":"cit0035","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.05.017"},{"key":"cit0036","doi-asserted-by":"publisher","DOI":"10.1109\/ICNIDC.2012.6418809"},{"key":"cit0037","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2017.08.001"},{"key":"cit0038","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.07.005"},{"key":"cit0039","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E98.B.190"},{"key":"cit0040","doi-asserted-by":"crossref","unstructured":"Gentry, C. (2009). A fully homomorphic encryption scheme (Unpublished doctoral dissertation). Stanford University.","DOI":"10.1145\/1536414.1536440"},{"key":"cit0041","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_1"},{"key":"cit0042","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243833"},{"key":"cit0043","first-page":"216","volume":"2003","author":"Goh Eu-Jin","year":"2003","journal-title":"IACR Cryptology ePrint Archive"},{"key":"cit0044","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"cit0045","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24852-1_3"},{"key":"cit0046","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"cit0047","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.26"},{"key":"cit0048","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.11.013"},{"key":"cit0049","volume-title":"IEEE Transactions on Services Computing","author":"Guo C.","year":"2017"},{"key":"cit0050","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5201"},{"key":"cit0051","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0296"},{"key":"cit0052","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.03.038"},{"key":"cit0053","doi-asserted-by":"publisher","DOI":"10.5755\/j01.itc.43.3.6429"},{"key":"cit0054","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73489-5_2"},{"key":"cit0055","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1497-6"},{"key":"cit0056","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14992-4_13"},{"key":"cit0057","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_22"},{"key":"cit0058","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"cit0059","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41320-9_12"},{"key":"cit0060","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_9"},{"key":"cit0061","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60055-0_12"},{"key":"cit0062","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2950934"},{"key":"cit0063","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29962-0_17"},{"key":"cit0064","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_9"},{"key":"cit0065","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2013.62"},{"key":"cit0066","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_21"},{"key":"cit0067","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484345"},{"key":"cit0068","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"cit0069","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_31"},{"key":"cit0070","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142488"},{"key":"cit0071","volume-title":"IEEE Transactions","author":"Li J.","year":"2019"},{"key":"cit0072","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2015.33"},{"key":"cit0073","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7224730"},{"key":"cit0074","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-017-0394-9"},{"key":"cit0075","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2442215"},{"key":"cit0076","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.02.024"},{"key":"cit0077","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2014.119"},{"key":"cit0078","unstructured":"Lu, Y. (2012). Privacy preserving logarithmic-time search on encrypted data in cloud Ndss. In Ndss. Internet Society."},{"key":"cit0079","volume":"8783","author":"Lv Z.","year":"2014","journal-title":"Information Security. ISC 2014. Lecture Notes in Computer Science"},{"key":"cit0080","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2014.45"},{"key":"cit0081","volume-title":"Conference on the theory and application of cryptology","author":"Merkle R. C.","year":"1989"},{"key":"cit0082","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.2989296"},{"key":"cit0083","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484347"},{"key":"cit0084","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-62576-4_10"},{"key":"cit0085","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906985"},{"issue":"2017","key":"cit0086","first-page":"89","volume":"11","author":"Mohamad M.","year":"2017","journal-title":"Malaysian Journal of Mathematical Sciences"},{"issue":"2019","key":"cit0087","first-page":"31","volume":"13","author":"Mohamad M.","year":"2019","journal-title":"Malaysian Journal of Mathematical Sciences"},{"key":"cit0088","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3403"},{"key":"cit0089","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100289"},{"key":"cit0090","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258606"},{"key":"cit0091","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"cit0092","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453875"},{"key":"cit0093","doi-asserted-by":"publisher","DOI":"10.1007\/11537878_14"},{"key":"cit0094","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2004.1320027"},{"key":"cit0095","volume-title":"TrustBus 2005. Lecture Notes in Computer Science, vol. 3592. Springer, Berlin, Heidelberg","author":"Park H. A., Byun J.W., Lee D.H","year":"2005"},{"key":"cit0096","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28914-9_24"},{"key":"cit0097","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00070"},{"key":"cit0098","doi-asserted-by":"publisher","DOI":"10.3390\/a10020052"},{"key":"cit0099","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-017-0232-y"},{"key":"cit0100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45402-2_70"},{"key":"cit0101","doi-asserted-by":"publisher","DOI":"10.1587\/elex.6.237"},{"key":"cit0102","volume":"5","author":"Salam M. I.","year":"2015","journal-title":"Hum. Cent. Comput"},{"key":"cit0103","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"cit0104","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.03.026"},{"key":"cit0105","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26961-0_21"},{"key":"cit0106","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6435138"},{"key":"cit0107","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2019.10023071"},{"key":"cit0108","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-020-04829-4"},{"key":"cit0109","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_27"},{"key":"cit0110","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-018-0489-y"},{"key":"cit0111","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"cit0112","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23298"},{"key":"cit0113","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_8"},{"key":"cit0114","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2917772"},{"key":"cit0115","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24162"},{"key":"cit0116","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.282"},{"key":"cit0117","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243782"},{"key":"cit0118","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2973633"},{"key":"cit0119","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.08.004"},{"key":"cit0120","doi-asserted-by":"publisher","DOI":"10.1109\/ICITCS.2015.7292892"},{"key":"cit0121","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-4030-6.ch004"},{"key":"cit0122","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.89"},{"key":"cit0123","first-page":"49","volume":"2","author":"Wang J.","year":"2012","journal-title":"Journal of Internet Services and Information Security (JISIS)"},{"key":"cit0124","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2961169"},{"key":"cit0125","volume":"2022","author":"Wang J.","year":"2019","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"cit0126","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02744-5_9"},{"key":"cit0127","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.09.035"},{"key":"cit0128","doi-asserted-by":"publisher","DOI":"10.1007\/BF03391580"},{"key":"cit0129","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75248-6_8"},{"key":"cit0130","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89641-8_13"},{"issue":"3","key":"cit0131","first-page":"222","volume":"25","author":"Wang Y.","year":"2019","journal-title":"J. Univers Comput. Sci"},{"key":"cit0132","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68637-0_2"},{"key":"cit0133","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0197318"},{"key":"cit0134","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0167157"},{"key":"cit0135","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_36"},{"key":"cit0136","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3224-8"},{"key":"cit0137","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60055-0_11"},{"key":"cit0138","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.05.056"},{"key":"cit0139","doi-asserted-by":"publisher","DOI":"10.1504\/IJACT.2009.028029"},{"key":"cit0140","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2787588"},{"key":"cit0141","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.76"},{"key":"cit0142","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69295-9_10"},{"key":"cit0143","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17610-4_17"},{"key":"cit0144","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2013.778985"},{"key":"cit0145","volume-title":"Selected Areas in Cryptography \u2013 SAC 2015. SAC 2015. Lecture Notes in Computer Science, vol. 9566. Springer, Cham","author":"Yavuz A. A.","year":"2015"},{"key":"cit0146","first-page":"6201","author":"Ye J.","year":"2016","journal-title":"Soft Computing"},{"key":"cit0147","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2997932"},{"key":"cit0148","doi-asserted-by":"publisher","DOI":"10.1007\/s13174-010-0007-6"},{"key":"cit0149","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2016.0059"},{"key":"cit0150","first-page":"1","volume":"2020","author":"Zhang X.","year":"2020","journal-title":"Security and Communication Networks"},{"key":"cit0151","volume":"63","author":"Zhang R.","year":"2020","journal-title":"Science China Information Sciences"},{"key":"cit0152","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2017.2762296"},{"key":"cit0153","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2016.62"},{"key":"cit0154","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.007"},{"key":"cit0155","doi-asserted-by":"publisher","DOI":"10.22667\/JOWUA.2012.03.31.072"},{"key":"cit0156","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847976"},{"key":"cit0157","doi-asserted-by":"publisher","DOI":"10.1007\/s00542-019-04515-y"},{"key":"cit0158","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98989-1_12"},{"key":"cit0159","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29962-0_14"},{"key":"cit0160","author":"Zuo C.","year":"2020","journal-title":"IACR Cryptol. Cryptology ePrint Archive"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2022.2033367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T12:30:59Z","timestamp":1675168259000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2022.2033367"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,3]]},"references-count":160,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,3,4]]}},"alternative-id":["10.1080\/19393555.2022.2033367"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2022.2033367","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,3]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-04-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}