{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:10:21Z","timestamp":1772907021604,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Shenzhen- Hong Kong-Macao Science and Technology Plan Project","award":["Category C Project: SGDX20210823103537030"],"award-info":[{"award-number":["Category C Project: SGDX20210823103537030"]}]},{"name":"Theme-based Research Scheme","award":["T35-710\/20-R"],"award-info":[{"award-number":["T35-710\/20-R"]}]},{"name":"HKU-SCF FinTech Academy"},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2102035, 62302485"],"award-info":[{"award-number":["2102035, 62302485"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CAS Special Re- search Assistant Program"},{"name":"China Post-doctoral Science Foundation","award":["2022M713206"],"award-info":[{"award-number":["2022M713206"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,21]]},"DOI":"10.1145\/3627673.3679522","type":"proceedings-article","created":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T19:34:21Z","timestamp":1729452861000},"page":"2702-2711","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Post-Quantum Searchable Encryption Supporting User-Authorization for Outsourced Data Management"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9076-1695","authenticated-orcid":false,"given":"Shiyuan","family":"Xu","sequence":"first","affiliation":[{"name":"Department of Computer Science, The University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0826-1164","authenticated-orcid":false,"given":"Yibo","family":"Cao","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9456-3124","authenticated-orcid":false,"given":"Xue","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The University of Hong Kong &amp; The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9078-7462","authenticated-orcid":false,"given":"Yu","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, Beijing Normal University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6489-286X","authenticated-orcid":false,"given":"Yuer","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2401-6499","authenticated-orcid":false,"given":"Fangda","family":"Guo","sequence":"additional","affiliation":[{"name":"CAS Key Laboratory of AI Safety, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3975-8500","authenticated-orcid":false,"given":"Siu-Ming","family":"Yiu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The University of Hong Kong, Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2015-0016"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2867462"},{"key":"e_1_3_2_1_3_1","volume-title":"Rafail Ostrovsky, and Giuseppe Persiano.","author":"Boneh Dan","year":"2004","unstructured":"Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. 2004. Public key encryption with keyword search. In Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2--6, 2004. Proceedings 23. Springer, 506--522."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3583780.3614864"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109149"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2945714"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109595"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC51071.2022.9771830"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17140-6_15"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60055-0_6"},{"key":"e_1_3_2_1_11_1","volume-title":"Electronic and Automation Control Conference (ITNEC). IEEE, 857--860","author":"Dong Xiaolei","year":"2019","unstructured":"Xiaolei Dong, Zhenfu Cao, Jiachen Shen, et al. 2019. Revocable Public Key Encryption with Authorized Keyword Search. In 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). IEEE, 857--860."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-021-0601-8"},{"key":"e_1_3_2_1_13_1","volume-title":"FedEDB: Building a Federated and Encrypted Data Store Via Consortium Blockchains","author":"Guo Yu","year":"2023","unstructured":"Yu Guo, Yuxin Xi, Haodi Wang, Mingyue Wang, Cong Wang, and Xiaohua Jia. 2023. FedEDB: Building a Federated and Encrypted Data Store Via Consortium Blockchains. IEEE Transactions on Knowledge and Data Engineering (2023)."},{"key":"e_1_3_2_1_14_1","volume-title":"Verifying in the dark: Verifiable machine unlearning by using invisible backdoor triggers","author":"Guo Yu","year":"2023","unstructured":"Yu Guo, Yu Zhao, Saihui Hou, Cong Wang, and Xiaohua Jia. 2023. Verifying in the dark: Verifiable machine unlearning by using invisible backdoor triggers. IEEE Transactions on Information Forensics and Security (2023)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2906726"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.03.038"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40367-0_11"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.11.015"},{"key":"e_1_3_2_1_19_1","first-page":"3268","article-title":"Extending on-chain trust to off-chain--trustworthy blockchain data collection using trusted execution environment (tee)","volume":"71","author":"Liu Chunchi","year":"2022","unstructured":"Chunchi Liu, Hechuan Guo, Minghui Xu, Shengling Wang, Dongxiao Yu, Jiguo Yu, and Xiuzhen Cheng. 2022. Extending on-chain trust to off-chain--trustworthy blockchain data collection using trusted execution environment (tee). IEEE Trans. Comput., Vol. 71, 12 (2022), 3268--3280.","journal-title":"IEEE Trans. Comput."},{"key":"e_1_3_2_1_20_1","volume-title":"Public Key Encryption with Hierarchical Authorized Keyword Search. In International Conference on Information Security and Cryptology. Springer, 147--170","author":"Liu Zi-Yuan","year":"2022","unstructured":"Zi-Yuan Liu, Chu-Chieh Chien, Yi-Fan Tseng, Raylin Tso, and Masahiro Mambo. 2022. Public Key Encryption with Hierarchical Authorized Keyword Search. In International Conference on Information Security and Cryptology. Springer, 147--170."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3497760"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_43"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-020-9472-7"},{"key":"e_1_3_2_1_24_1","volume-title":"Various techniques used in connection with random digits. Notes by GE Forsythe","author":"Neumann Von","year":"1951","unstructured":"Von Neumann. 1951. Various techniques used in connection with random digits. Notes by GE Forsythe (1951), 36--38."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3654958"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3163886"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3216320"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_7"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-024-01676-0"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/3368819"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2957691"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329814"},{"key":"e_1_3_2_1_33_1","volume-title":"FileDES: A Secure Scalable and Succinct Decentralized Encrypted Storage Network. arXiv preprint arXiv:2403.14985","author":"Xu Minghui","year":"2024","unstructured":"Minghui Xu, Jiahao Zhang, Hechuan Guo, Xiuzhen Cheng, Dongxiao Yu, Qin Hu, Yijun Li, and Yipu Wu. 2024. FileDES: A Secure Scalable and Succinct Decentralized Encrypted Storage Network. arXiv preprint arXiv:2403.14985 (2024)."},{"key":"e_1_3_2_1_34_1","volume-title":"International Conference on Information Security and Cryptology. Springer, 274--298","author":"Xu Shiyuan","year":"2023","unstructured":"Shiyuan Xu, Yibo Cao, Xue Chen, Yanmin Zhao, and Siu-Ming Yiu. 2023. Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications. In International Conference on Information Security and Cryptology. Springer, 274--298."},{"key":"e_1_3_2_1_35_1","volume-title":"Efficient and Secure Post-Quantum Certificateless Signcryption for Internet of Medical Things. Cryptology ePrint Archive","author":"Xu Shiyuan","year":"2024","unstructured":"Shiyuan Xu, Xue Chen, Yu Guo, Siu-Ming Yiu, Shang Gao, and Bin Xiao. 2024. Efficient and Secure Post-Quantum Certificateless Signcryption for Internet of Medical Things. Cryptology ePrint Archive (2024)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2020.9010043"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS52092.2021.9521265"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-023-3128-3"},{"key":"e_1_3_2_1_39_1","first-page":"1019","article-title":"FS-PEKS: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial Internet of Things","volume":"18","author":"Zhang Xiaojun","year":"2021","unstructured":"Xiaojun Zhang, Chunxiang Xu, Huaxiong Wang, Yuan Zhang, and Shixiong Wang. 2021. FS-PEKS: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial Internet of Things. IEEE Transactions on dependable and secure computing, Vol. 18, 3 (2021), 1019--1032.","journal-title":"IEEE Transactions on dependable and secure computing"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3583780.3615090"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3626764","article-title":"VeriTxn: Verifiable transactions for cloud-native databases with storage disaggregation","volume":"1","author":"Zhao Zhanhao","year":"2023","unstructured":"Zhanhao Zhao, Hexiang Pan, Gang Chen, Xiaoyong Du, Wei Lu, and Beng Chin Ooi. 2023. VeriTxn: Verifiable transactions for cloud-native databases with storage disaggregation. Proceedings of the ACM on Management of Data, Vol. 1, 4 (2023), 1--27.","journal-title":"Proceedings of the ACM on Management of Data"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102553"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2808283"}],"event":{"name":"CIKM '24: The 33rd ACM International Conference on Information and Knowledge Management","location":"Boise ID USA","acronym":"CIKM '24","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 33rd ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3679522","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627673.3679522","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:29Z","timestamp":1750291409000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3679522"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,21]]},"references-count":43,"alternative-id":["10.1145\/3627673.3679522","10.1145\/3627673"],"URL":"https:\/\/doi.org\/10.1145\/3627673.3679522","relation":{},"subject":[],"published":{"date-parts":[[2024,10,21]]},"assertion":[{"value":"2024-10-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}