{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:06Z","timestamp":1750220886983,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,15]]},"DOI":"10.1145\/3371676.3371684","type":"proceedings-article","created":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T04:40:36Z","timestamp":1578976836000},"page":"51-57","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["An Efficient, Secure and Reliable Search Scheme for Dynamic Updates with Blockchain"],"prefix":"10.1145","author":[{"given":"Han","family":"Li","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, China"}]},{"given":"Chonglin","family":"Gu","sequence":"additional","affiliation":[{"name":"School of Science and Engineering, The Chinese University of Hong Kong, Shenzhen, China, University of Science and Technology of China, China, Shenzhen Research Institute of Big Data, China, Shenzhen, China"}]},{"given":"Yi","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Science and Engineering, The Chinese University of Hong Kong, Shenzhen, China, Shenzhen Research Institute of Big Data, China, Shenzhen, China"}]},{"given":"Wenye","family":"Li","sequence":"additional","affiliation":[{"name":"School of Science and Engineering, The Chinese University of Hong Kong, Shenzhen, China, Shenzhen Research Institute of Big Data, China, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2020,1,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"IEEE Symposium on Security and Privacy","author":"Song D. X.","year":"2000","unstructured":"Song D. X. , Wagner D. , and Perrig A . 2000. Practical techniques for Searches on Encrypted Data . In IEEE Symposium on Security and Privacy ( Oakland, California, USA , May 14-17, 2000 ). S&P '00. IEEE, New York, NY, 44--55. DOI=http:\/\/dx.doi.org\/ 10.1109\/SECPRI.2000.848445. 10.1109\/SECPRI.2000.848445 Song D. X., Wagner D., and Perrig A. 2000. Practical techniques for Searches on Encrypted Data. In IEEE Symposium on Security and Privacy (Oakland, California, USA, May 14-17, 2000). S&P '00. IEEE, New York, NY, 44--55. DOI=http:\/\/dx.doi.org\/ 10.1109\/SECPRI.2000.848445."},{"key":"e_1_3_2_1_2_1","volume-title":"IEEE Conference on Computer Communications","author":"Hu S.","year":"2019","unstructured":"Hu S. , Cai C. , Wang Q. , Wang C. , Luo X. , and Ren K . 2018. Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization. 2018 . In IEEE Conference on Computer Communications ( Georgia, USA, April 29 - May 2, 2019 ). INFOCOM '2018. IEEE, New York, NY, 1--8. DOI=http:\/\/dx.doi.org\/10.1109\/INFOCOM.2018.8485890. 10.1109\/INFOCOM.2018.8485890 Hu S., Cai C., Wang Q., Wang C., Luo X., and Ren K. 2018. Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization. 2018. In IEEE Conference on Computer Communications (Georgia, USA, April 29 - May 2, 2019). INFOCOM '2018. IEEE, New York, NY, 1--8. DOI=http:\/\/dx.doi.org\/10.1109\/INFOCOM.2018.8485890."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/ACCESS.2018.2851611"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/ACCESS.2018.2844400"},{"key":"e_1_3_2_1_5_1","volume-title":"Bitcoin: A Peer-to-peer Electronic Cash System","author":"Nakamoto S.","year":"2008","unstructured":"Nakamoto S. Bitcoin: A Peer-to-peer Electronic Cash System . 2008 . [Online: http:\/\/www.bitcoin.org] Nakamoto S. Bitcoin: A Peer-to-peer Electronic Cash System. 2008. [Online: http:\/\/www.bitcoin.org]"},{"key":"e_1_3_2_1_6_1","first-page":"1","volume":"151","author":"Wood G.","year":"2014","unstructured":"Wood G. Ethereum : A Secure Decentralised Generalised Transaction Ledger. Ethereum Project Yellow Paper. 151 ( 2014 ), 1 -- 32 . [Online: http:\/\/gavwood.com\/paper.pdf] Wood G. Ethereum: A Secure Decentralised Generalised Transaction Ledger. Ethereum Project Yellow Paper. 151 (2014), 1--32. [Online: http:\/\/gavwood.com\/paper.pdf]","journal-title":"A Secure Decentralised Generalised Transaction Ledger. Ethereum Project Yellow Paper."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/ACCESS.2018.2821705"},{"unstructured":"Blockchain for Supply Chain. [Online: https:\/\/www.ibm.com\/blockchain\/supply-chain]  Blockchain for Supply Chain. [Online: https:\/\/www.ibm.com\/blockchain\/supply-chain]","key":"e_1_3_2_1_8_1"},{"unstructured":"The Sia Project. [Online: http:\/\/www.sia.tech]  The Sia Project. [Online: http:\/\/www.sia.tech]","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","volume-title":"P2P File System. arXiv preprint arXiv:1407.3561, 1--11","author":"Benet J.","year":"2014","unstructured":"Benet J. IPFS-content Addressed , Versioned , P2P File System. arXiv preprint arXiv:1407.3561, 1--11 , 2014 . Benet J. IPFS-content Addressed, Versioned, P2P File System. arXiv preprint arXiv:1407.3561, 1--11, 2014."},{"unstructured":"The Datacoin Project. [Online: http:\/\/datacoin.info.org].  The Datacoin Project. [Online: http:\/\/datacoin.info.org].","key":"e_1_3_2_1_11_1"},{"unstructured":"The Storj Project. [Online: https:\/\/storj.io\/storj.pdf].  The Storj Project. [Online: https:\/\/storj.io\/storj.pdf].","key":"e_1_3_2_1_12_1"},{"unstructured":"The Filecoin Project. [Online: https:\/\/filecoin.io\/filecoin.pdf].  The Filecoin Project. [Online: https:\/\/filecoin.io\/filecoin.pdf].","key":"e_1_3_2_1_13_1"},{"volume-title":"Proceedings of the 2012 ACM conference on Computer and communications security. (Raleigh, NC, USA, October 16-18, 2012). CCS '12. ACM","author":"Kamara S.","unstructured":"Kamara S. , Papamanthou C. , and Roeder T . Dynamic Searchable Symmetric Encryption. 2012 . In Proceedings of the 2012 ACM conference on Computer and communications security. (Raleigh, NC, USA, October 16-18, 2012). CCS '12. ACM , New York, NY, 965--976. DOI= http:\/\/dx.doi.org\/10.1145\/2382196.2382298. 10.1145\/2382196.2382298 Kamara S., Papamanthou C., and Roeder T. Dynamic Searchable Symmetric Encryption. 2012. In Proceedings of the 2012 ACM conference on Computer and communications security. (Raleigh, NC, USA, October 16-18, 2012). CCS '12. ACM, New York, NY, 965--976. DOI= http:\/\/dx.doi.org\/10.1145\/2382196.2382298.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","volume-title":"25th Annual Network and Distributed System Security Symposium","author":"Cash D.","year":"2014","unstructured":"Cash D. , Jaeger J. , Jarecki S. , Jutla C. S. , Krawczyk H. , Rosu M.C. , and Steiner M . Dynamic Searchable Encryption in Very-large Databases: Data Structures and Implementation. 2014 . In 25th Annual Network and Distributed System Security Symposium ( San Diego, California, USA , February 23-26, 2014 ). NDSS '14. ACM, New York, NY, 23-26. DOI= http:\/\/dx.doi.org\/10.14722\/ndss.2014.23208. 10.14722\/ndss.2014.23208 Cash D., Jaeger J., Jarecki S., Jutla C. S., Krawczyk H., Rosu M.C., and Steiner M. Dynamic Searchable Encryption in Very-large Databases: Data Structures and Implementation. 2014. In 25th Annual Network and Distributed System Security Symposium (San Diego, California, USA, February 23-26, 2014). NDSS '14. ACM, New York, NY, 23-26. DOI= http:\/\/dx.doi.org\/10.14722\/ndss.2014.23208."},{"key":"e_1_3_2_1_16_1","volume-title":"Practical Dynamic Searchable Encryption with Small Leakage. In 25th Annual Network and Distributed System Security Symposium","author":"Stefanov E.","year":"2014","unstructured":"Stefanov E. , Papamanthou C. , and Shi E . 2014 . Practical Dynamic Searchable Encryption with Small Leakage. In 25th Annual Network and Distributed System Security Symposium ( San Diego, California, USA , February 23-26, 2014 ). NDSS '14. ACM, New York, NY, 72--75. DOI= http:\/\/dx.doi.org\/ 10.14722\/ndss.2014.23298. 10.14722\/ndss.2014.23298 Stefanov E., Papamanthou C., and Shi E. 2014. Practical Dynamic Searchable Encryption with Small Leakage. In 25th Annual Network and Distributed System Security Symposium (San Diego, California, USA, February 23-26, 2014). NDSS '14. ACM, New York, NY, 72--75. DOI= http:\/\/dx.doi.org\/ 10.14722\/ndss.2014.23298."},{"key":"e_1_3_2_1_17_1","volume-title":"ACM SIGSAC Conference on Computer and Communications Security","author":"Bost R.","year":"2016","unstructured":"Bost R. \u03a3o &phiv;&sigmav; : Forward secure searchable encryption. 2016 . In ACM SIGSAC Conference on Computer and Communications Security ( Toronto, ON, Canada, Vienna, Austria, October 24--28 , 2016 ). CCS'16. ACM, New York, NY, 1143--1154. DOI=http:\/\/dx.doi.org\/10.1145\/2976749. 2978303. 10.1145\/2976749 Bost R. \u03a3o&phiv;&sigmav;: Forward secure searchable encryption. 2016. In ACM SIGSAC Conference on Computer and Communications Security (Toronto, ON, Canada, Vienna, Austria, October 24--28, 2016). CCS'16. ACM, New York, NY, 1143--1154. DOI=http:\/\/dx.doi.org\/10.1145\/2976749. 2978303."},{"volume-title":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (Scottsdale, AZ, USA, November 3-7, 2014). CCS'14. ACM","author":"Hahn F.","unstructured":"Hahn F. and Kerschbaum F . Searchable Encryption with Secure and Efficient Updates. 2014 . In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (Scottsdale, AZ, USA, November 3-7, 2014). CCS'14. ACM , New York, NY, 310--320. DOI=http:\/\/dx.doi.org\/10.1145\/2976749. 2978303. 10.1145\/2976749 Hahn F. and Kerschbaum F. Searchable Encryption with Secure and Efficient Updates. 2014. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (Scottsdale, AZ, USA, November 3-7, 2014). CCS'14. ACM, New York, NY, 310--320. DOI=http:\/\/dx.doi.org\/10.1145\/2976749. 2978303.","key":"e_1_3_2_1_18_1"},{"unstructured":"testRTC. [Online: https:\/\/testrtc.com\/]  testRTC. [Online: https:\/\/testrtc.com\/]","key":"e_1_3_2_1_19_1"},{"unstructured":"Solidity. [Online: https:\/\/solidity.readthedocs.io\/en\/v0.5.6]  Solidity. [Online: https:\/\/solidity.readthedocs.io\/en\/v0.5.6]","key":"e_1_3_2_1_20_1"},{"unstructured":"Enron Email Dataset. [Online: http:\/\/www.cs.cmu.edu\/_.\/enron]  Enron Email Dataset. [Online: http:\/\/www.cs.cmu.edu\/_.\/enron]","key":"e_1_3_2_1_21_1"}],"event":{"sponsor":["University of Tokyo","Chongqing University of Posts and Telecommunications"],"acronym":"ICCNS 2019","name":"ICCNS 2019: 2019 the 9th International Conference on Communication and Network Security","location":"Chongqing China"},"container-title":["Proceedings of the 2019 9th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371684","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3371676.3371684","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:23Z","timestamp":1750203863000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371684"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":21,"alternative-id":["10.1145\/3371676.3371684","10.1145\/3371676"],"URL":"https:\/\/doi.org\/10.1145\/3371676.3371684","relation":{},"subject":[],"published":{"date-parts":[[2019,11,15]]},"assertion":[{"value":"2020-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}