{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T16:36:18Z","timestamp":1778258178124,"version":"3.51.4"},"reference-count":182,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T00:00:00Z","timestamp":1701043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2021YFB3101100"],"award-info":[{"award-number":["2021YFB3101100"]}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61902290 , 62072352, 62202364"],"award-info":[{"award-number":["61902290 , 62072352, 62202364"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100015401","name":"Key Research and Development Program of Shaanxi","doi-asserted-by":"crossref","award":["2020ZDLGY09-06"],"award-info":[{"award-number":["2020ZDLGY09-06"]}],"id":[{"id":"10.13039\/501100015401","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2024,5,31]]},"abstract":"<jats:p>Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption (SSE), one of the methods for protecting outsourced data, has arisen widespread interest. Moreover, many novel technologies and theories have emerged, especially for the attacks on SSE and privacy-preserving. But most surveys related to SSE concentrate on one aspect (e.g., single keyword search, fuzzy keyword search) or lack in-depth analysis. Therefore, we revisit the existing work and conduct a comprehensive analysis and summary. We provide an overview of state-of-the-art in SSE and focus on the privacy it can protect. Generally, (1) we study the work of the past few decades and classify SSE based on query expressiveness. Meanwhile, we summarize the existing schemes and analyze their performance on efficiency, storage space, index structures, and so on.; (2) we complement the gap in the privacy of SSE and introduce in detail the attacks and the related defenses; (3)\u00a0we discuss the open issues and challenges in existing schemes and future research directions. We desire that our work will help novices to grasp and understand SSE comprehensively. We expect it can inspire the SSE community to discover more crucial leakages and design more efficient and secure constructions.<\/jats:p>","DOI":"10.1145\/3617991","type":"journal-article","created":{"date-parts":[[2023,10,17]],"date-time":"2023-10-17T21:30:05Z","timestamp":1697578205000},"page":"1-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["A Survey on Searchable Symmetric Encryption"],"prefix":"10.1145","volume":"56","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8294-7606","authenticated-orcid":false,"given":"Feng","family":"Li","sequence":"first","affiliation":[{"name":"School of Cyber Engineering, Xidian University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4251-1143","authenticated-orcid":false,"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5437-3572","authenticated-orcid":false,"given":"Yinbin","family":"Miao","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4238-3295","authenticated-orcid":false,"given":"Ximeng","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Mathematics and Computer Science, Fuzhou University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7165-398X","authenticated-orcid":false,"given":"Jianting","family":"Ning","sequence":"additional","affiliation":[{"name":"Fujian Provincial Key Laboratory of Network Security and Cryptology, School of Mathematics and Informatics, Fujian Normal University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3491-8146","authenticated-orcid":false,"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[{"name":"School of Information Systems, Singapore Management University, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2023,11,27]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/2996429.2996436"},{"key":"e_1_3_2_3_2","first-page":"1","volume-title":"Proceedings of the 2017 International Conference on Research and Innovation in Information Systems","author":"Ahsan MA Manazir","year":"2017","unstructured":"MA Manazir Ahsan, Fahad Zaman Chowdhury, Musarat Sabilah, Ainuddin Wahid Bin Abdul Wahab, and Mohd Yamani Idna Bin Idris. 2017. An efficient fuzzy keyword matching technique for searching through encrypted cloud data. In Proceedings of the 2017 International Conference on Research and Innovation in Information Systems. IEEE, 1\u20135."},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73538-0_2"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/2897518.2897562"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/11602897_35"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2014.19"},{"key":"e_1_3_2_8_2","first-page":"613","volume-title":"Proceedings of the 21st International Workshop on Fast Software Encryption","author":"Boldyreva Alexandra","year":"2014","unstructured":"Alexandra Boldyreva and Nathan Chenette. 2014. Efficient fuzzy search on encrypted data. In Proceedings of the 21st International Workshop on Fast Software Encryption. Springer, 613\u2013633."},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42045-0_15"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(76)80045-1"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/2636328"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978303"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133980"},{"key":"e_1_3_2_15_2","volume-title":"Proceedings of the Digital SRC Research Report","author":"Burrows Michael","year":"1994","unstructured":"Michael Burrows and David Wheeler. 1994. A block-sorting lossless data compression algorithm. In Proceedings of the Digital SRC Research Report. Citeseer."},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/11774716_15"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.45"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23264"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_20"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_20"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364125"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243833"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_30"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0014"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2425407"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00020"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486381"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2017.2765323"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88428-4_1"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2011.11"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"e_1_3_2_33_2","first-page":"143","volume-title":"Proceedings of the 30th USENIX Security Symposium","author":"Damie Marc","year":"2021","unstructured":"Marc Damie, Florian Hahn, and Andreas Peter. 2021. A highly accurate query-recovery attack against searchable encryption using non-indexed documents. In Proceedings of the 30th USENIX Security Symposium. USENIX Association, 143\u2013160."},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24423"},{"key":"e_1_3_2_35_2","first-page":"2433","volume-title":"Proceedings of the 29th USENIX Security Symposium","author":"Demertzis Ioannis","year":"2020","unstructured":"Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, and Saurabh Shintre. 2020. SEAL: Attack mitigation for encrypted databases via adjustable leakage. In Proceedings of the 29th USENIX Security Symposium. USENIX Association, 2433\u20132450."},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882911"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064057"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.14778\/3236187.3236218"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2693969"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jda.2010.12.001"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_7"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2551203"},{"issue":"2","key":"e_1_3_2_43_2","first-page":"1307","article-title":"Boolean searchable symmetric encryption with filters on trusted hardware","volume":"19","author":"Ferreira Bernardo","year":"2022","unstructured":"Bernardo Ferreira, Bernardo Portela, Tiago Oliveira, Guilherme Borges, Henrique Domingos, and Jo\u00e3o Leit\u00e3o. 2022. Boolean searchable symmetric encryption with filters on trusted hardware. IEEE Transactions on Dependable and Secure Computing 19, 2 (2022), 1307\u20131319.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2692728"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2622697"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/2600075.2600081"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2014.6780939"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2596138"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2730365"},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2819121"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53015-3_20"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2896258"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-022-3585-9"},{"key":"e_1_3_2_54_2","first-page":"216","article-title":"Secure indexes","author":"Goh Eu-Jin","year":"2003","unstructured":"Eu-Jin Goh. 2003. Secure indexes. IACR Cryptol. ePrint Arch. (2003), 216. Retrieved from http:\/\/eprint.iacr.org\/2003\/216","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28416"},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24852-1_3"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243864"},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00030"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363210"},{"key":"e_1_3_2_60_2","first-page":"216","volume-title":"Proceedings of the 2002 International Conference on Management of Data","author":"Hacig\u00fcm\u00fcs Hakan","year":"2002","unstructured":"Hakan Hacig\u00fcm\u00fcs, Balakrishna R. Iyer, Chen Li, and Sharad Mehrotra. 2002. Executing SQL over encrypted data in the database-service-provider model. In Proceedings of the 2002 International Conference on Management of Data. ACM, 216\u2013227."},{"key":"e_1_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3183754"},{"key":"e_1_3_2_62_2","first-page":"1158","article-title":"Oblivious dynamic searchable encryption via distributed PIR and ORAM","author":"Hoang Thang","year":"2017","unstructured":"Thang Hoang, Attila A. Yavuz, F. Bet\u00fcl Durak, and Jorge Guajardo. 2017. Oblivious dynamic searchable encryption via distributed PIR and ORAM. IACR Cryptol. ePrint Arch. (2017), 1158. Retrieved 9, August, 2022 from http:\/\/eprint.iacr.org\/2017\/1158","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48797-6_4"},{"key":"e_1_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-011-0245-7"},{"key":"e_1_3_2_65_2","volume-title":"Proceedings of the 19th Annual Network and Distributed System Security Symposium","author":"Islam Mohammad Saiful","year":"2012","unstructured":"Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. 2012. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In Proceedings of the 19th Annual Network and Distributed System Security Symposium. The Internet Society."},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","unstructured":"Xiuxiu Jiang Jia Yu Jingbo Yan and Rong Hao. 2017. Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data. Inf. Sci. 403 (2017) 22\u201341. DOI:10.1016\/J.INS.2017.03.037","DOI":"10.1016\/J.INS.2017.03.037"},{"key":"e_1_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56617-7_4"},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_12"},{"key":"e_1_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_22"},{"key":"e_1_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"e_1_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978386"},{"key":"e_1_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813629"},{"key":"e_1_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660277"},{"key":"e_1_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516668"},{"key":"e_1_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133970"},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133970"},{"key":"e_1_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00015"},{"key":"e_1_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00029"},{"key":"e_1_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02937-5_17"},{"key":"e_1_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.23"},{"key":"e_1_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557570"},{"key":"e_1_3_2_82_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00002"},{"key":"e_1_3_2_83_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243753"},{"key":"e_1_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.1145\/3201595.3201598"},{"key":"e_1_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2021.3093304"},{"key":"e_1_3_2_86_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2021.3118692"},{"key":"e_1_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2371239"},{"key":"e_1_3_2_88_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2406704"},{"key":"e_1_3_2_89_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"e_1_3_2_90_2","doi-asserted-by":"publisher","DOI":"10.14778\/2733085.2733100"},{"issue":"1","key":"e_1_3_2_91_2","first-page":"698","article-title":"VRFMS: Verifiable ranked fuzzy multi-keyword search over encrypted data","volume":"16","author":"Li Xinghua","year":"2022","unstructured":"Xinghua Li, Qiuyun Tong, Jinwei Zhao, Yinbin Miao, Siqi Ma, Jian Weng, Jianfeng Ma, and Kim-Kwang Raymond Choo. 2022. VRFMS: Verifiable ranked fuzzy multi-keyword search over encrypted data. IEEE Transactions on Services Computing 16, 1 (2022), 698\u2013710.","journal-title":"IEEE Transactions on Services Computing"},{"key":"e_1_3_2_92_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3032147"},{"key":"e_1_3_2_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.3034232"},{"key":"e_1_3_2_94_2","doi-asserted-by":"publisher","DOI":"10.1007\/11556992_23"},{"key":"e_1_3_2_95_2","doi-asserted-by":"publisher","DOI":"10.1145\/1400751.1400766"},{"key":"e_1_3_2_96_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCIS.2011.6045073"},{"key":"e_1_3_2_97_2","doi-asserted-by":"publisher","unstructured":"Chang Liu Liehuang Zhu Mingzhong Wang and Yu-an Tan. 2014. Search pattern leakage in searchable encryption: Attacks and new construction. Inf. Sci. 265 (2014) 176\u2013188. DOI:10.1016\/J.INS.2013.11.021","DOI":"10.1016\/J.INS.2013.11.021"},{"key":"e_1_3_2_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.3020688"},{"key":"e_1_3_2_99_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3045467"},{"key":"e_1_3_2_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3043754"},{"key":"e_1_3_2_101_2","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359842"},{"key":"e_1_3_2_102_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30215-3_2"},{"key":"e_1_3_2_103_2","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2749455"},{"key":"e_1_3_2_104_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2897675"},{"key":"e_1_3_2_105_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2823309"},{"key":"e_1_3_2_106_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.06.066"},{"issue":"1","key":"e_1_3_2_107_2","first-page":"525","article-title":"Ranked keyword search over encrypted cloud data through machine learning method","volume":"16","author":"Miao Yinbin","year":"2022","unstructured":"Yinbin Miao, Wei Zheng, Xiaohua Jia, Ximeng Liu, Kim-Kwang Raymond Choo, and Robert Deng. 2022. Ranked keyword search over encrypted cloud data through machine learning method. IEEE Transactions on Services Computing 16, 1 (2022), 525\u2013536.","journal-title":"IEEE Transactions on Services Computing"},{"key":"e_1_3_2_108_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00045"},{"key":"e_1_3_2_109_2","first-page":"722","article-title":"Oblivious substring search with updates","author":"Moataz Tarik","year":"2015","unstructured":"Tarik Moataz and Erik-Oliver Blass. 2015. Oblivious substring search with updates. IACR Cryptol. ePrint Arch. (2015), 722. Retrieved 17, August, 2022 from http:\/\/eprint.iacr.org\/2015\/722","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_110_2","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-14652"},{"key":"e_1_3_2_111_2","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484347"},{"key":"e_1_3_2_112_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICTEL.2013.6632121"},{"key":"e_1_3_2_113_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2014.6903711"},{"key":"e_1_3_2_114_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813651"},{"key":"e_1_3_2_115_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72598-7_4"},{"key":"e_1_3_2_116_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484540"},{"key":"e_1_3_2_117_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866321"},{"key":"e_1_3_2_118_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41383-4_10"},{"key":"e_1_3_2_119_2","doi-asserted-by":"publisher","DOI":"10.1145\/2320765.2320820"},{"key":"e_1_3_2_120_2","first-page":"127","volume-title":"Proceedings of the 30th USENIX Security Symposium","author":"Oya Simon","year":"2021","unstructured":"Simon Oya and Florian Kerschbaum. 2021. Hiding the access pattern is not enough: Exploiting search pattern leakage in searchable encryption. In Proceedings of the 30th USENIX Security Symposium. USENIX Association, 127\u2013142."},{"key":"e_1_3_2_121_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.30"},{"key":"e_1_3_2_122_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92078-4_20"},{"key":"e_1_3_2_123_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354213"},{"key":"e_1_3_2_124_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23116"},{"key":"e_1_3_2_125_2","doi-asserted-by":"publisher","DOI":"10.1145\/3064005"},{"key":"e_1_3_2_126_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978401"},{"key":"e_1_3_2_127_2","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655025"},{"key":"e_1_3_2_128_2","doi-asserted-by":"publisher","DOI":"10.1109\/AINAW.2007.166"},{"key":"e_1_3_2_129_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.23041"},{"key":"e_1_3_2_130_2","first-page":"44","volume-title":"Proceedings of the 2000 IEEE Symposium on Security and Privacy, Berkeley","author":"Song Dawn Xiaodong","year":"2000","unstructured":"Dawn Xiaodong Song, David A. Wagner, and Adrian Perrig. 2000. Practical techniques for searches on encrypted data. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, Berkeley. IEEE Computer Society, 44\u201355."},{"key":"e_1_3_2_131_2","doi-asserted-by":"publisher","unstructured":"Qiyang Song Zhuotao Liu Jiahao Cao Kun Sun Qi Li and Cong Wang. 2021. SAP-SSE: protecting search patterns and access patterns in searchable symmetric encryption. IEEE Trans. Inf. Forensics Secur. 16 (2021) 1795\u20131809. DOI:10.1109\/TIFS.2020.3042058","DOI":"10.1109\/TIFS.2020.3042058"},{"key":"e_1_3_2_132_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2822294"},{"key":"e_1_3_2_133_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23298"},{"key":"e_1_3_2_134_2","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_3_2_135_2","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2015.33"},{"key":"e_1_3_2_136_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24162"},{"key":"e_1_3_2_137_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243782"},{"key":"e_1_3_2_138_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218596"},{"key":"e_1_3_2_139_2","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484322"},{"key":"e_1_3_2_140_2","doi-asserted-by":"publisher","DOI":"10.1145\/1314313.1314316"},{"issue":"5","key":"e_1_3_2_141_2","first-page":"5386","article-title":"Verifiable fuzzy multi-keyword search over encrypted data with adaptive security","volume":"35","author":"Tong Qiuyun","year":"2022","unstructured":"Qiuyun Tong, Yinbin Miao, Jian Weng, Ximeng Liu, Kim-Kwang Raymond Choo, and Robert Deng. 2022. Verifiable fuzzy multi-keyword search over encrypted data with adaptive security. IEEE Transactions on Knowledge and Data Engineering 35, 5 (2022), 5386\u20135399.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_2_142_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218594"},{"key":"e_1_3_2_143_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848153"},{"key":"e_1_3_2_144_2","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3457306"},{"key":"e_1_3_2_145_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.34"},{"key":"e_1_3_2_146_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.282"},{"key":"e_1_3_2_147_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195784"},{"key":"e_1_3_2_148_2","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2013.94"},{"key":"e_1_3_2_149_2","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxaa161"},{"key":"e_1_3_2_150_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98989-1_5"},{"key":"e_1_3_2_151_2","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0003"},{"key":"e_1_3_2_152_2","doi-asserted-by":"publisher","DOI":"10.2298\/CSIS121104028W"},{"key":"e_1_3_2_153_2","first-page":"145","volume-title":"Proceedings of the 9th International Workshop on Information Security Applications","author":"Wang Peishun","year":"2008","unstructured":"Peishun Wang, Huaxiong Wang, and Josef Pieprzyk. 2008. An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data. In Proceedings of the 9th International Workshop on Information Security Applications. Springer, 145\u2013159."},{"key":"e_1_3_2_154_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89641-8_13"},{"key":"e_1_3_2_155_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155505"},{"key":"e_1_3_2_156_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3205670"},{"key":"e_1_3_2_157_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98989-1_6"},{"key":"e_1_3_2_158_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660365"},{"key":"e_1_3_2_159_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660314"},{"key":"e_1_3_2_160_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2973139"},{"key":"e_1_3_2_161_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24423"},{"key":"e_1_3_2_162_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2401003"},{"key":"e_1_3_2_163_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737588"},{"key":"e_1_3_2_164_2","doi-asserted-by":"publisher","unstructured":"Peng Xu Willy Susilo Wei Wang Tianyang Chen Qianhong Wu Kaitai Liang and Hai Jin. 2022. ROSE: robust searchable encryption with forward and backward security. IEEE Trans. Inf. Forensics Secur. 17 (2022) 1115\u20131130. DOI:10.1109\/TIFS.2022.3155977","DOI":"10.1109\/TIFS.2022.3155977"},{"key":"e_1_3_2_165_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44524-3_7"},{"key":"e_1_3_2_166_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31919-9_8"},{"key":"e_1_3_2_167_2","doi-asserted-by":"publisher","unstructured":"Wenyuan Yang and Yuesheng Zhu. 2021. A verifiable semantic searching scheme by optimal matching over encrypted data in public cloud. IEEE Trans. Inf. Forensics Secur. 16 (2021) 100\u2013115. DOI:10.1109\/TIFS.2020.3001728","DOI":"10.1109\/TIFS.2020.3001728"},{"key":"e_1_3_2_168_2","doi-asserted-by":"publisher","DOI":"10.1007\/11863908_29"},{"key":"e_1_3_2_169_2","doi-asserted-by":"publisher","unstructured":"Fan Yin Rongxing Lu Yandong Zheng Jun Shao Xue Yang and Xiaohu Tang. 2021. Achieve efficient position-heap-based privacy-preserving substring-of-keyword query over cloud. Comput. Secur. 110 (2021) 102432. DOI:10.1016\/J.COSE.2021.102432","DOI":"10.1016\/J.COSE.2021.102432"},{"key":"e_1_3_2_170_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.9"},{"key":"e_1_3_2_171_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2021.3092358"},{"key":"e_1_3_2_172_2","unstructured":"Xianglong Zhang Wei Wang Peng Xu Laurence T. Yang and Kaitai Liang. 2023. High recovery with fewer injections: practical binary volumetric injection attacks against dynamic searchable encryption. In 32nd USENIX Security Symposium (USENIX Security 23) USENIX Association Anaheim CA 5953\u20135970. Retrieved from https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/zhang-xianglong"},{"key":"e_1_3_2_173_2","first-page":"707","volume-title":"Proceedings of the 25th USENIX Security Symposium","author":"Zhang Yupeng","year":"2016","unstructured":"Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou. 2016. All your queries are belong to us: The power of file-injection attacks on searchable encryption. In Proceedings of the 25th USENIX Security Symposium. USENIX Association, 707\u2013720."},{"key":"e_1_3_2_174_2","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807266"},{"key":"e_1_3_2_175_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29962-0_15"},{"key":"e_1_3_2_176_2","doi-asserted-by":"publisher","unstructured":"Hong Zhong Zhanfei Li Jie Cui Yue Sun and Lu Liu. 2020. Efficient dynamic multi-keyword fuzzy search over encrypted cloud data. J. Netw. Comput. Appl. 149 (2020). DOI:10.1016\/J.JNCA.2019.102469","DOI":"10.1016\/J.JNCA.2019.102469"},{"key":"e_1_3_2_177_2","doi-asserted-by":"publisher","unstructured":"W. Zhou L. Liu H. Jing C. Zhang S. Yao and S. Wang. 2013. K-Gram based fuzzy keyword search over encrypted cloud computing. Journal of Software Engineering and Applications 6 1 (2013) 29\u201332. DOI:10.4236\/jsea.2013.61004","DOI":"10.4236\/jsea.2013.61004"},{"key":"e_1_3_2_178_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2808283"},{"key":"e_1_3_2_179_2","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0147"},{"key":"e_1_3_2_180_2","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0053"},{"key":"e_1_3_2_181_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98989-1_12"},{"key":"e_1_3_2_182_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2994377"},{"key":"e_1_3_2_183_2","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2021.01.005"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617991","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3617991","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:58Z","timestamp":1750178278000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617991"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,27]]},"references-count":182,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,5,31]]}},"alternative-id":["10.1145\/3617991"],"URL":"https:\/\/doi.org\/10.1145\/3617991","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,27]]},"assertion":[{"value":"2022-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-08-22","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}