{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:41:30Z","timestamp":1761324090415,"version":"3.37.3"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472001"],"award-info":[{"award-number":["61472001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BE2015136"],"award-info":[{"award-number":["BE2015136"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSFC-Guangdong Union Foundation","award":["U1401251"],"award-info":[{"award-number":["U1401251"]}]},{"name":"industrial research project of Shaanxi Province","award":["2015GY008"],"award-info":[{"award-number":["2015GY008"]}]},{"name":"China 111 Project","award":["B08038"],"award-info":[{"award-number":["B08038"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2019,7,1]]},"DOI":"10.1109\/tcc.2017.2684811","type":"journal-article","created":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T18:12:00Z","timestamp":1490033520000},"page":"799-813","source":"Crossref","is-referenced-by-count":15,"title":["Publicly Verifiable Boolean Query Over Outsourced Encrypted Data"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2823-1794","authenticated-orcid":false,"given":"Shunrong","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Xiaoyan","family":"Zhu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3658-7435","authenticated-orcid":false,"given":"Linke","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Jianqing","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"577","article-title":"Structured encryption and controlled disclosure","author":"chase","year":"2010","journal-title":"Advances in Cryptology"},{"key":"ref32","first-page":"44","article-title":"Practical techniques for searches on encrypted data","author":"song","year":"2000","journal-title":"Proc IEEE Symp Secur Privacy"},{"year":"2014","key":"ref31"},{"year":"2016","key":"ref30"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_21"},{"year":"2009","key":"ref10"},{"year":"2011","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28914-9_24"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687718"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142488"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544852"},{"key":"ref16","first-page":"147","article-title":"Proof-infused streams: Enabling authentication of sliding window queries on streams","author":"li","year":"2007","journal-title":"Proc Int Conf On Very Large Data Bases"},{"key":"ref17","first-page":"135","article-title":"CADS: Continuous authentication on data streams","author":"papadopoulos","year":"2007","journal-title":"Proc Int Conf On Very Large Data Bases"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1567274.1567277"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847976"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660373"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_20"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2307\/2006007"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"ref6","article-title":"Practical dynamic searchable encryption with small leakage","volume":"2013","author":"stefanov","year":"2013","journal-title":"IACR Cryptology ePrint Archive"},{"year":"0","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.47"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23264"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516730"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346876"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417807"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455826"},{"key":"ref22","first-page":"213","article-title":"Identity-based encryption from the weil pairing","author":"boneh","year":"2001","journal-title":"Advances in Cryptology"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"ref24","first-page":"113","article-title":"Verifiable set operations over outsourced databases","author":"canetti","year":"2014","journal-title":"Public-key Cryptography"},{"key":"ref23","first-page":"91","article-title":"Optimal verification of operations on dynamic sets","author":"papamanthou","year":"2011","journal-title":"Advances in Cryptology"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382250"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-008-0108-z"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245519\/8824148\/07882614.pdf?arnumber=7882614","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:07:27Z","timestamp":1657746447000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7882614\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,1]]},"references-count":34,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2017.2684811","relation":{},"ISSN":["2168-7161","2372-0018"],"issn-type":[{"type":"electronic","value":"2168-7161"},{"type":"electronic","value":"2372-0018"}],"subject":[],"published":{"date-parts":[[2019,7,1]]}}}