{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T18:26:09Z","timestamp":1776277569195,"version":"3.50.1"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672176"],"award-info":[{"award-number":["61672176"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangxi Science and Technology Plan Projects","award":["AD20159039"],"award-info":[{"award-number":["AD20159039"]}]},{"name":"Guangxi Talent Highland Project of Big Data Intelligence and Application"},{"name":"Guangxi Bagui Scholar Teams for Innovation and Research Project"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/tkde.2020.3025348","type":"journal-article","created":{"date-parts":[[2020,9,21]],"date-time":"2020-09-21T21:44:49Z","timestamp":1600724689000},"page":"1-1","source":"Crossref","is-referenced-by-count":26,"title":["ESVSSE: Enabling Efficient, Secure, Verifiable Searchable Symmetric Encryption"],"prefix":"10.1109","author":[{"given":"Zhenkui","family":"Shi","sequence":"first","affiliation":[]},{"given":"Xuemei","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Xianxian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","first-page":"321","article-title":"Ciphertext-policy attribute-based encryption","volume-title":"Proc. IEEE Symp. Secur. Privacy","volume":"10","author":"Waters"},{"key":"ref2","first-page":"9","article-title":"What is cloud computing","volume":"51","year":"2011","journal-title":"ACM"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2873321"},{"key":"ref4","first-page":"380","article-title":"Cloud storage as the infrastructure of cloud computing","volume-title":"Proc. IEEE Int. Conf. Intell. Comput. Cogn. Informat.","author":"Ge"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2587258"},{"key":"ref6","first-page":"380","article-title":"CS2: A searchable cryptographic cloud storage system","author":"Kamara","year":"2011"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279531"},{"key":"ref8","article-title":"Method, system, and computed program product for distributed storage of data in a heterogeneous cloud","volume":"10","author":"Gupta","year":"2019","journal-title":"Int. Bus. Machines Corporation"},{"key":"ref9","article-title":"Systems and method for facilitating access to private files using a cloud storage system","author":"Ancin","year":"2016"},{"key":"ref10","first-page":"136","article-title":"Cryptographic cloud storage","volume-title":"Proc. Int. Conf. Financial Cryptogr. Data Secur.","author":"Lauter"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_21"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02937-5_17"},{"key":"ref13","first-page":"23","article-title":"Practical dynamic searchable encryption with small leakage","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp.","author":"Papamanthou"},{"key":"ref14","first-page":"1","article-title":"Verifiable dynamic symmetric searchable encryption:optimality and forward security","volume":"2016","author":"Fouque","year":"2016","journal-title":"IACR Cryptol. ePrint Archive"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2808283"},{"key":"ref16","first-page":"917","article-title":"Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers","volume-title":"Proc. IEEE Int. Conf. Commun.","author":"Gong"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_22"},{"key":"ref18","first-page":"2110","article-title":"Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data","volume-title":"Proc. IEEE Conf. Comput. Commun.","author":"Lou"},{"key":"ref19","first-page":"353","article-title":"Highly-scalable searchable symmetric encryption with support for boolean queries","volume-title":"Proc. Annu. Cryptol. Conf.","author":"Jutla"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2011-0426"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.183"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2013.10.004"},{"key":"ref24","first-page":"229","article-title":"Iris: A scalable cloud file system with efficient integrity checks","volume-title":"Proc. 28th Annu. Comput. Secur. Appl. Conf.","author":"Juels"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848154"},{"key":"ref26","first-page":"1","article-title":"Efficient no-dictionary verifiable SSE","volume":"2016","author":"Ogata","year":"2016","journal-title":"IACR Cryptol. ePrint Archive"},{"key":"ref27","first-page":"1563","article-title":"Costing of cloud computing services: A total cost of ownership approach","volume-title":"Proc. Int. Conf. Syst. Sci.","author":"Walterbusch"},{"key":"ref28","first-page":"1","article-title":"The cost of doing science on the cloud: The montage example","volume-title":"Proc. ACM\/IEEE Conf. Supercomput.","author":"Livny"},{"key":"ref29","first-page":"1","article-title":"Dynamic searchable encryption in very-large databases: Data structures and implementation","volume-title":"Proc. ACM\/IEEE Conf. Supercomput.","author":"Jarecki"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/378995.379239"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060291"},{"key":"ref32","first-page":"44","article-title":"Practical techniques for searching on encrypted data","volume-title":"Proc. IEEE Symp. Secur. Privacy","author":"Wagner"},{"key":"ref33","first-page":"1","article-title":"Secure indexes","volume":"2003","author":"Goh","year":"2003","journal-title":"IACR Cryptol. ePrint Archive"},{"key":"ref34","first-page":"1","article-title":"Privacy-enhanced searches using encrypted bloom filters","volume":"2004","author":"Bellovin","year":"2004","journal-title":"IACR Cryptol. ePrint Archive"},{"key":"ref35","first-page":"506","article-title":"Public key encryption with keyword search","volume-title":"Proc. Int. Conf. Theory Appl. Cryptogr. Techn.","author":"Ostrovsky"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2876831"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.66"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_8"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2857471"},{"key":"ref40","first-page":"385","article-title":"Analysis of english spelling errors in a word-typing game","volume-title":"Proc. Int. Conf. Lang. Resour. Eval.","volume":"31","author":"Komachi"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1177\/1534508410380135"},{"key":"ref42","article-title":"Enron email dataset","volume-title":"Proc. ACM\/IEEE Conf. Supercomputing"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/4358933\/09201320.pdf?arnumber=9201320","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T23:42:41Z","timestamp":1704843761000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9201320\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/tkde.2020.3025348","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}