{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T12:16:15Z","timestamp":1768911375220,"version":"3.49.0"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["FL230100033"],"award-info":[{"award-number":["FL230100033"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272174"],"award-info":[{"award-number":["62272174"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62502164"],"award-info":[{"award-number":["62502164"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872152"],"award-info":[{"award-number":["61872152"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21A20465"],"award-info":[{"award-number":["U21A20465"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302457"],"award-info":[{"award-number":["62302457"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021171","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2023A1515110618"],"award-info":[{"award-number":["2023A1515110618"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Major Program of Guangdong Basic and Applied Research","award":["2019B030302008"],"award-info":[{"award-number":["2019B030302008"]}]},{"name":"Science and Technology Program of Guangzhou","award":["2024A04J6542"],"award-info":[{"award-number":["2024A04J6542"]}]},{"name":"National Key Research and Development Program of China","award":["2023YFB2703700"],"award-info":[{"award-number":["2023YFB2703700"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1109\/tdsc.2025.3604813","type":"journal-article","created":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T17:33:00Z","timestamp":1756834380000},"page":"236-249","source":"Crossref","is-referenced-by-count":0,"title":["Proxy-Free Public-Key Authenticated Updatable and Searchable Encryption for Cloud Storage"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6990-4855","authenticated-orcid":false,"given":"Hongbo","family":"Li","sequence":"first","affiliation":[{"name":"South China Agricultural University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1562-5105","authenticated-orcid":false,"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[{"name":"University of Wollongong, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0519-9058","authenticated-orcid":false,"given":"Jian","family":"Shen","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering (School of Cyber Science and Technology), the Zhejiang Key Laboratory of Digital Fashion and Data Governance, and the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation, Zhejiang Sci-Tech University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3951-3159","authenticated-orcid":false,"given":"Chen","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering (School of Cyber Science and Technology), the Zhejiang Key Laboratory of Digital Fashion and Data Governance, and the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation, Zhejiang Sci-Tech University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7231-0636","authenticated-orcid":false,"given":"Leixiao","family":"Cheng","sequence":"additional","affiliation":[{"name":"Shandong University, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7666-8985","authenticated-orcid":false,"given":"Qiong","family":"Huang","sequence":"additional","affiliation":[{"name":"South China Agricultural University, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2022.3149007"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3050517"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/11844662_6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.03.038"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69839-5_96"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2510822"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3224308"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2599293"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.12.063"},{"issue":"10","key":"ref11","first-page":"2125","article-title":"Public-key authenticated encryption with keyword search without pairings","volume":"57","author":"Yang","year":"2020","journal-title":"J. Comput. Res. Develop."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102075"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3497760"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-022-00287-5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3336160"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3373626"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2024.3489432"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3484155"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.01.004"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3103909"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2771382"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-018-00701-7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3207229"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2867462"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3027003"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3287353"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.10.012"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3285103"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2023.3266459"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054122"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_23"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56614-6_15"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56784-2_16"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-8445-7_21"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85538-5_3"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2018.2825983"},{"key":"ref38","article-title":"Ubuntu","year":"2024"},{"key":"ref39","article-title":"Pypbc","year":"2024"},{"key":"ref40","first-page":"5953","article-title":"High recovery with fewer injections: Practical binary volumetric injection attacks against dynamic searchable encryption","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Zhang"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623085"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11354469\/11146881.pdf?arnumber=11146881","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T20:57:44Z","timestamp":1768856264000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11146881\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":41,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3604813","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]}}}