{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:32:58Z","timestamp":1772641978272,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3133970","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"1449-1463","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":135,"title":["Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates"],"prefix":"10.1145","author":[{"given":"Kee Sung","family":"Kim","sequence":"first","affiliation":[{"name":"National Security Research Institute, Daejeon, Republic of Korea"}]},{"given":"Minkyu","family":"Kim","sequence":"additional","affiliation":[{"name":"National Security Research Institute, Daejeon, Republic of Korea"}]},{"given":"Dongsoo","family":"Lee","sequence":"additional","affiliation":[{"name":"National Security Research Institute, Daejeon, Republic of Korea"}]},{"given":"Je Hong","family":"Park","sequence":"additional","affiliation":[{"name":"National Security Research Institute, Daejeon, Republic of Korea"}]},{"given":"Woo-Hwan","family":"Kim","sequence":"additional","affiliation":[{"name":"National Security Research Institute, Daejeon, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897518.2897562"},{"key":"e_1_3_2_2_2_1","unstructured":"Giuseppe Attardi. 2016. Wikipedia Extractor. (2016). http:\/\/medialab.di.unipi.it\/ wiki\/Wikipedia Extractor"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2636328"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978303"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23264"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11496137"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373--8"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"e_1_3_2_2_14_1","volume-title":"https:\/\/www.cryptopp.com","author":"Dai Wei","year":"2016","unstructured":"Wei Dai. 2016. Crypto++ Library 5.6.5. (2016). https:\/\/www.cryptopp.com"},{"key":"e_1_3_2_2_15_1","volume-title":"https:\/\/www.cs.cmu.edu\/~.\/enron","author":"Dataset Enron Email","year":"2015","unstructured":"Enron Email Dataset. 2015. (2015). https:\/\/www.cs.cmu.edu\/~.\/enron"},{"key":"e_1_3_2_2_16_1","unstructured":"Samsung Electronics. 2013. Samsung Solid State Drive White Paper. (2013). http:\/\/www.samsung.com\/semiconductor\/minisite\/ssd\/product\/ consumer\/850pro.html"},{"key":"e_1_3_2_2_17_1","unstructured":"Facebook. 2016. RocksDB: A persistent key-value store for fast storage environ- ment. (2016). http:\/\/rocksdb.org"},{"key":"e_1_3_2_2_18_1","volume-title":"Retrieved","author":"Foundation Wikimedia","year":"2016","unstructured":"Wikimedia Foundation. 2016. Wikimedia Downloads. (2016). Retrieved February 4, 2016 from https:\/\/dumps.wikimedia.org"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53015-3"},{"key":"e_1_3_2_2_20_1","unstructured":"Shafi Goldwasser and Mihir Bellare. 2008. Lecture Notes on Cryptography. https:\/\/cseweb.ucsd.edu\/~mihir\/papers\/gb.html"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660297"},{"key":"e_1_3_2_2_22_1","volume-title":"Pro- ceedings of the 2012 Network and Distributed System Security (NDSS) Symposium","author":"Islam Mohammad","unstructured":"Mohammad Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In Pro- ceedings of the 2012 Network and Distributed System Security (NDSS) Symposium . Internet Society, Reston, VA, U.S.A."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"e_1_3_2_2_25_1","volume-title":"LSH: A new fast secure hash function family. In Information Security and Cryptology - ICISC 2014: 17th International Conference","author":"Kim Dong-Chan","year":"2015","unstructured":"Dong-Chan Kim, Deukjo Hong, Jung-Keun Lee, Woo-Hwan Kim, and Daesung Kwon. 2015. LSH: A new fast secure hash function family. In Information Security and Cryptology - ICISC 2014: 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers, Jooyoung Lee and Jongsung Kim (Eds.). Springer International Publishing, Cham, 286--313. https:\/\/doi.org\/10. 1007\/978-3-319-15943-0 18"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.47"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.30"},{"key":"e_1_3_2_2_29_1","unstructured":"NLTK Project. 2016. Natural Language Toolkit. (2016). http:\/\/www.nltk.org"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23298"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31301-6"},{"key":"e_1_3_2_2_33_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Zhang Yupeng","year":"2016","unstructured":"Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou. 2016. All your queries are belong to us: the power of file-injection attacks on searchable encryp- tion. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Associa- tion, Austin, TX, 707--720. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/ technical-sessions\/presentation\/zhang"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133970","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3133970","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:26Z","timestamp":1750212806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133970"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":31,"alternative-id":["10.1145\/3133956.3133970","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3133970","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}