{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:32:50Z","timestamp":1762507970867,"version":"3.37.3"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572267","61303197"],"award-info":[{"award-number":["61572267","61303197"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2016FQ02"],"award-info":[{"award-number":["ZR2016FQ02"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2019.2961169","type":"journal-article","created":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T23:56:55Z","timestamp":1577145415000},"page":"11732-11742","source":"Crossref","is-referenced-by-count":20,"title":["Efficient Verifiable Key-Aggregate Keyword Searchable Encryption for Data Sharing in Outsourcing Storage"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6593-1429","authenticated-orcid":false,"given":"Xuqi","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1228-4894","authenticated-orcid":false,"given":"Xiangguo","family":"Cheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0928-3823","authenticated-orcid":false,"given":"Yu","family":"Xie","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.282"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382250"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_7"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2791601"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ComComAp.2013.6533622"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2013.06.009"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_27"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2896258"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.45"},{"key":"ref12","first-page":"1","article-title":"An efficient symmetric searchable encryption scheme for cloud storage","volume":"7","author":"jiang","year":"2017","journal-title":"J Internet Serv Inf Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2866031"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73489-5_2"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68637-0_3"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2442215"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7064902"},{"key":"ref28","first-page":"480","article-title":"Broadcast encryption","volume":"773","author":"fiat","year":"1993","journal-title":"Proc Crypto"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2389959"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2771382"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_16"},{"key":"ref6","first-page":"1","article-title":"Secure Indexes","author":"goh","year":"2003"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_9"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40367-0_10"},{"key":"ref8","first-page":"535","article-title":"Deterministic and efficiently searchable encryption","author":"bellare","year":"2006","journal-title":"Proc Annu Int Cryptol Conf"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"468","DOI":"10.1109\/TPDS.2013.112","article-title":"Key-aggregate cryptosystem for scalable data sharing in cloud storage","volume":"25","author":"chu","year":"2014","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"ref1","first-page":"44","article-title":"Practical techniques for searches on encrypted data","author":"song","year":"2002","journal-title":"Proc IEEE Symp Secur Privacy (S P)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/EIDWT.2013.48"},{"key":"ref22","first-page":"406","article-title":"Multi-user keyword search scheme for secure data sharing with fine-grained access control","author":"zhao","year":"2011","journal-title":"Proc Int Conf Inf Security Cryptol"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34601-9_37"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.331"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2876831"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2794442"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364125"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/08937503.pdf?arnumber=8937503","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:36:11Z","timestamp":1641987371000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8937503\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2961169","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2020]]}}}