{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:30Z","timestamp":1750220250901,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Bangladesh University of Engineering and Technology (BUET)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3508398.3519362","type":"proceedings-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:13:31Z","timestamp":1650082411000},"page":"376-378","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["MK-RS-PKE: Multi-Keyword Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms"],"prefix":"10.1145","author":[{"given":"Israt Jahan","family":"Mouri","sequence":"first","affiliation":[{"name":"Bangladesh University of Engineering and Technology (BUET), Dhaka, Bangladesh"}]},{"given":"Muhammad","family":"Ridowan","sequence":"additional","affiliation":[{"name":"Bangladesh University of Engineering and Technology (BUET), Dhaka, Bangladesh"}]},{"given":"Muhammad Abdullah","family":"Adnan","sequence":"additional","affiliation":[{"name":"Bangladesh University of Engineering and Technology (BUET), Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"e_1_3_2_2_2_1","volume-title":"Kim-Kwang Raymond Choo, and Debiao He","author":"Chen Biwen","year":"2019","unstructured":"Biwen Chen , Libing Wu , Neeraj Kumar , Kim-Kwang Raymond Choo, and Debiao He . 2019 . Lightweight Searchable Public-key Encryption with Forward Privacy over IIoT Outsourced Data. IEEE Transactions on Emerging Topics in Computing ( 2019). Biwen Chen, Libing Wu, Neeraj Kumar, Kim-Kwang Raymond Choo, and Debiao He. 2019. Lightweight Searchable Public-key Encryption with Forward Privacy over IIoT Outsourced Data. IEEE Transactions on Emerging Topics in Computing (2019)."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2959383"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2823309"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3508398.3511518"},{"key":"e_1_3_2_2_6_1","volume-title":"et almbox","author":"Rivest Ronald L","year":"1978","unstructured":"Ronald L Rivest , Len Adleman , Michael L Dertouzos , et almbox . 1978 . On data banks and privacy homomorphisms. Foundations of secure computation , Vol. 4 , 11 (1978), 169--180. Ronald L Rivest, Len Adleman, Michael L Dertouzos, et almbox. 1978. On data banks and privacy homomorphisms. Foundations of secure computation , Vol. 4, 11 (1978), 169--180."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23298"},{"key":"e_1_3_2_2_8_1","volume-title":"2019 b. FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things","author":"Zhang Xiaojun","year":"2019","unstructured":"Xiaojun Zhang , Chunxiang Xu , Huaxiong Wang , Yuan Zhang , and Shixiong Wang . 2019 b. FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things . IEEE Transactions on Dependable and Secure Computing ( 2019 ). Xiaojun Zhang, Chunxiang Xu, Huaxiong Wang, Yuan Zhang, and Shixiong Wang. 2019 b. FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things. IEEE Transactions on Dependable and Secure Computing (2019)."},{"key":"e_1_3_2_2_9_1","volume-title":"2019 a. Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage","author":"Zhang Yuan","year":"2019","unstructured":"Yuan Zhang , Chunxiang Xu , Jianbing Ni , Hongwei Li , and Xuemin Sherman Shen . 2019 a. Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage . IEEE Transactions on Cloud Computing ( 2019 ). Yuan Zhang, Chunxiang Xu, Jianbing Ni, Hongwei Li, and Xuemin Sherman Shen. 2019 a. Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage. IEEE Transactions on Cloud Computing (2019)."}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Baltimore MD USA","acronym":"CODASPY '22"},"container-title":["Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3519362","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3519362","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:40Z","timestamp":1750188640000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3519362"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":9,"alternative-id":["10.1145\/3508398.3519362","10.1145\/3508398"],"URL":"https:\/\/doi.org\/10.1145\/3508398.3519362","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]},"assertion":[{"value":"2022-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}