{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T18:26:10Z","timestamp":1776277570521,"version":"3.50.1"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2020YFA0712300"],"award-info":[{"award-number":["2020YFA0712300"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62132005"],"award-info":[{"award-number":["62132005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172162"],"award-info":[{"award-number":["62172162"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1109\/tsc.2024.3356728","type":"journal-article","created":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T18:42:33Z","timestamp":1705948953000},"page":"563-574","source":"Crossref","is-referenced-by-count":21,"title":["LSE: Efficient Symmetric Searchable Encryption Based on Labeled PSI"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2381-9257","authenticated-orcid":false,"given":"Yunbo","family":"Yang","sequence":"first","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8544-3667","authenticated-orcid":false,"given":"Yiwei","family":"Hu","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4064-2764","authenticated-orcid":false,"given":"Ruofan","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5844-0223","authenticated-orcid":false,"given":"Xiaolei","family":"Dong","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5250-5030","authenticated-orcid":false,"given":"Zhenfu","family":"Cao","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2376-5068","authenticated-orcid":false,"given":"Jiachen","family":"Shen","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1843-4301","authenticated-orcid":false,"given":"Shangmin","family":"Dou","sequence":"additional","affiliation":[{"name":"Shanghai Yunzhou Information and Technology Ltd., Shanghai, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2973139"},{"issue":"2","key":"ref2","first-page":"1","article-title":"An efficient symmetric searchable encryption scheme for cloud storage","volume":"7","author":"Jiang","year":"2017","journal-title":"J. Internet Serv. Inf. Secur."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15546-8_7"},{"key":"ref4","article-title":"Verifiable dynamic symmetric searchable encryption: Optimality and forward security","author":"Bost","year":"2016","journal-title":"Cryptol. ePrint Arch."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364125"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660297"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243833"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243782"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2992303"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56877-1_2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134044"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26954-8_13"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978381"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_13"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337012"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45724-2_25"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26951-7_1"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3154794"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243836"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243753"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-018-1309-4"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866321"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53015-3_20"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-022-2236-9"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15317-4_26"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.002"},{"key":"ref29","volume-title":"Apache lucene"},{"key":"ref30","article-title":"Problems with proposed IP cryptography","volume-title":"Internet Eng. Task Force Internet-Draft Draft-Rogaway-Ipsec-Comments-00","author":"Rogaway","year":"1995"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75248-4_21"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4629386\/10495295\/10411049.pdf?arnumber=10411049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T18:38:30Z","timestamp":1731609510000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10411049\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":31,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2024.3356728","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"value":"1939-1374","type":"electronic"},{"value":"2372-0204","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3]]}}}