{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T18:12:38Z","timestamp":1761156758732,"version":"3.37.3"},"reference-count":35,"publisher":"Oxford University Press (OUP)","issue":"8","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672110","61671082","61976024","61972048"],"award-info":[{"award-number":["61672110","61671082","61976024","61972048"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8,20]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>To date cloud computing may provide considerable storage and computational power for cloud-based applications to support cryptographic operations. Due to this benefit, attribute-based keyword search (ABKS) is able to be implemented in cloud context in order to protect the search privacy of data owner\/user. ABKS is a cryptographic primitive that can provide secure search services for users but also realize fine-grained access control over data. However, there have been two potential problems that prevent the scalability of ABKS applications. First of all, most of the existing ABKS schemes suffer from the outside keyword guessing attack (KGA). Second, match privacy should be considered while supporting multi-keyword search. In this paper, we design an efficient method to combine the keyword search process in ABKS with inner product encryption and deploy several proposed techniques to ensure the flexibility of retrieval mode, the security and efficiency of our scheme. We later put forward an attribute-based conjunctive keyword search scheme against outside KGA to solve the aforementioned problems. We provide security notions for two types of adversaries and our construction is proved secure against chosen keyword attack and outside KGA. Finally, all-side simulation with real-world data set is implemented for the proposed scheme, and the results of the simulation show that our scheme achieves stronger security without yielding significant cost of storage and computation.<\/jats:p>","DOI":"10.1093\/comjnl\/bxz140","type":"journal-article","created":{"date-parts":[[2019,10,14]],"date-time":"2019-10-14T19:27:03Z","timestamp":1571081223000},"page":"1203-1215","source":"Crossref","is-referenced-by-count":3,"title":["Practical Attribute-Based Conjunctive Keyword Search Scheme"],"prefix":"10.1093","volume":"63","author":[{"given":"Yang","family":"Chen","sequence":"first","affiliation":[{"name":"State key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China"},{"name":"State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China"}]},{"given":"Wenmin","family":"Li","sequence":"additional","affiliation":[{"name":"State key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Fei","family":"Gao","sequence":"additional","affiliation":[{"name":"State key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Kaitai","family":"Liang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Surrey, Guildford, U.K"}]},{"given":"Hua","family":"Zhang","sequence":"additional","affiliation":[{"name":"State key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[{"name":"State key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]}],"member":"286","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"2020081712164916800_ref1","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/1314466.1314477","article-title":"A data outsourcing architecture combining cryptography and access control","volume-title":"Proc. of the 2007 ACM Workshop on Computer Security Architecture","author":"Di Vimercati","year":"2007"},{"year":"2004","author":"Boneh","key":"2020081712164916800_ref2"},{"key":"2020081712164916800_ref3","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1109\/TIFS.2018.2866321","article-title":"Passive attacks against searchable encryption","volume":"14","author":"Ning","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"year":"2014","author":"Zheng","key":"2020081712164916800_ref4"},{"year":"2014","author":"Sun","key":"2020081712164916800_ref5"},{"key":"2020081712164916800_ref6","doi-asserted-by":"crossref","first-page":"3008","DOI":"10.1109\/JIOT.2017.2779124","article-title":"Practical attribute-based multi-keyword search scheme in mobile crowdsourcing","volume":"5","author":"Miao","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"2020081712164916800_ref7","doi-asserted-by":"crossref","first-page":"772","DOI":"10.1109\/TSC.2018.2823309","article-title":"Lightweight fine-grained search over encrypted data in fog computing","volume":"12","author":"Miao","year":"2018","journal-title":"IEEE Trans. Serv. Comput."},{"key":"2020081712164916800_ref8","doi-asserted-by":"crossref","DOI":"10.1109\/TSC.2017.2757467","article-title":"Attribute-based keyword search over hierarchical data in cloud computing","author":"Miao","year":"2017","journal-title":"IEEE Trans. Serv. Comput."},{"key":"2020081712164916800_ref9","doi-asserted-by":"crossref","DOI":"10.1109\/TDSC.2018.2864186","article-title":"Attribute-based hybrid Boolean keyword search over outsourced encrypted data","author":"He","year":"2018","journal-title":"IEEE Trans.. Depend. Sec. Comput."},{"key":"2020081712164916800_ref10","doi-asserted-by":"crossref","first-page":"052105","DOI":"10.1007\/s11432-015-5449-9","article-title":"Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack","volume":"60","author":"Qiu","year":"2017","journal-title":"Sci. China Inform. Sci."},{"key":"2020081712164916800_ref11","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1016\/j.jss.2017.12.008","article-title":"Secure multi-keyword ranked search over encrypted cloud data for multiple data owners","volume":"137","author":"Guo","year":"2018","journal-title":"J. Syst. Softw."},{"year":"2006","author":"Byun","key":"2020081712164916800_ref12"},{"year":"2008","author":"Yau","key":"2020081712164916800_ref13"},{"key":"2020081712164916800_ref14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2017.03.038","article-title":"An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks","volume":"403","author":"Huang","year":"2017","journal-title":"Inf. Sci."},{"key":"2020081712164916800_ref15","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.ins.2019.01.074","article-title":"Fine-grained information flow control using attributes","volume":"484","author":"Han","year":"2019","journal-title":"Inf. Sci."},{"year":"2005","author":"Sahai","key":"2020081712164916800_ref16"},{"year":"2007","author":"Bethencourt","key":"2020081712164916800_ref17"},{"year":"2006","author":"Goyal","key":"2020081712164916800_ref18"},{"key":"2020081712164916800_ref19","doi-asserted-by":"crossref","first-page":"58955","DOI":"10.1109\/ACCESS.2018.2875070","article-title":"Generic construction of outsourced attribute-based encryption without key escrow","volume":"6","author":"Chen","year":"2018","journal-title":"IEEE Access"},{"key":"2020081712164916800_ref20","doi-asserted-by":"crossref","DOI":"10.1093\/comjnl\/bxz052","article-title":"Efficient attribute-based data sharing scheme with hidden access structures","author":"Chen","year":"2019","journal-title":"Comput. J."},{"key":"2020081712164916800_ref21","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1109\/TDSC.2016.2608343","article-title":"White-box traceable CP-ABE for cloud storage service: how to catch people leaking their access credentials effectively","volume":"15","author":"Ning","year":"2016","journal-title":"IEEE Trans. Depend. Sec. Comput."},{"key":"2020081712164916800_ref22","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/TIFS.2017.2738601","article-title":"Auditable $\\sigma $-time outsourced attribute-based encryption for access control in cloud computing","volume":"13","author":"Ning","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"2020081712164916800_ref23","doi-asserted-by":"crossref","first-page":"1981","DOI":"10.1109\/TIFS.2015.2442215","article-title":"Searchable attribute-based mechanism with efficient data sharing for secure cloud storage","volume":"10","author":"Liang","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"2020081712164916800_ref24","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1109\/TIFS.2015.2510822","article-title":"Dual-server public-key encryption with keyword search for secure cloud storage","volume":"11","author":"Chen","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"2020081712164916800_ref25","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1016\/j.comcom.2008.11.018","article-title":"Constructing PEKS schemes secure against keyword guessing attacks is possible?","volume":"32","author":"Jeong","year":"2009","journal-title":"Comput. Commun."},{"key":"2020081712164916800_ref26","doi-asserted-by":"crossref","first-page":"2365","DOI":"10.1109\/TIFS.2016.2581316","article-title":"Privacy-preserving and regular language search over encrypted cloud data","volume":"11","author":"Liang","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"2020081712164916800_ref27","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1007\/s10916-016-0617-z","article-title":"m 2-ABKS: attribute-based multi-keyword search over encrypted personal health records in multi-owner setting","volume":"40","author":"Miao","year":"2016","journal-title":"J. Med. Syst."},{"year":"2017","author":"Meng","key":"2020081712164916800_ref28"},{"volume-title":"Introduction to Algorithms","year":"2009","author":"Cormen","key":"2020081712164916800_ref29"},{"year":"2017","author":"Ambrona","key":"2020081712164916800_ref30"},{"year":"1997","author":"Shoup","key":"2020081712164916800_ref31"},{"year":"1979","author":"Schwartz","key":"2020081712164916800_ref32"},{"year":"1979","author":"Zippel","key":"2020081712164916800_ref33"},{"year":"2015","author":"Rouselakis","key":"2020081712164916800_ref34"},{"key":"2020081712164916800_ref35","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s13389-013-0057-3","article-title":"Charm: a framework for rapidly prototyping cryptosystems","volume":"3","author":"Akinyele","year":"2013","journal-title":"J. Crypto. Eng."}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/63\/8\/1203\/33657117\/bxz140.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/63\/8\/1203\/33657117\/bxz140.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T17:24:13Z","timestamp":1695317053000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/63\/8\/1203\/5667449"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":35,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2019,12,9]]},"published-print":{"date-parts":[[2020,8,20]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxz140","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2020,8]]},"published":{"date-parts":[[2019,12,9]]}}}