{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:04:18Z","timestamp":1750309458868,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T00:00:00Z","timestamp":1735948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,1,4]]},"DOI":"10.1145\/3700838.3703669","type":"proceedings-article","created":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T12:58:12Z","timestamp":1735822692000},"page":"390-395","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure and Expressive Authorized Keyword Search in Cloud-Assisted Cyber-Physical Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-4473-7390","authenticated-orcid":false,"given":"Kasturi","family":"Routray","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Bhubaneswar, Bhubaneswar, Odisha, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0044-7051","authenticated-orcid":false,"given":"Padmalochan","family":"Bera","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Bhubaneswar, Bhubaneswar, Odisha, India"}]}],"member":"320","published-online":{"date-parts":[[2025,1,4]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"R Alguliyev Y Imamverdiyev and L Sukhostat. 2018. Cyber-physical systems and their security issues. Computers in Industry 100 (2018) 212\u2013223.","DOI":"10.1016\/j.compind.2018.04.017"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Yosef Ashibani and Qusay\u00a0H Mahmoud. 2017. Cyber physical systems security: Analysis challenges and solutions. Computers & Security 68 (2017) 81\u201397.","DOI":"10.1016\/j.cose.2017.04.005"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.5"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Rihab Cha\u00e2ri Fatma Ellouze Anis Koub\u00e2a Basit Qureshi Nuno Pereira Habib Youssef and Eduardo Tovar. 2016. Cyber-physical systems clouds: A survey. Computer Networks 108 (2016) 260\u2013278.","DOI":"10.1016\/j.comnet.2016.08.017"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Payal Chaudhari and Manik\u00a0Lal Das. 2020. Keysea: Keyword-based search with receiver anonymity in attribute-based searchable encryption. IEEE Transactions on Services Computing 15 2 (2020) 1036\u20131044.","DOI":"10.1109\/TSC.2020.2973570"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Qian He Ning Zhang Yongzhuang Wei and Yan Zhang. 2018. Lightweight attribute based encryption scheme for mobile cloud assisted cyber-physical systems. Computer Networks 140 (2018) 163\u2013173.","DOI":"10.1016\/j.comnet.2018.01.038"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Qinlong Huang Guanyu Yan and Qinglin Wei. 2022. Attribute-based expressive and ranked keyword search over encrypted documents in cloud computing. IEEE Transactions on Services Computing 16 2 (2022) 957\u2013968.","DOI":"10.1109\/TSC.2022.3149761"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"A Kate G\u00a0M Zaverucha and I Goldberg. 2010. Pairing-based onion routing with improved forward secrecy. ACM Transactions on Information and System Security 13 4 (2010) 1\u201332.","DOI":"10.1145\/1880022.1880023"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Dongyoung Koo Junbeom Hur and Hyunsoo Yoon. 2013. Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Computers & Electrical Engineering 39 1 (2013) 34\u201346.","DOI":"10.1016\/j.compeleceng.2012.11.002"},{"key":"e_1_3_3_1_14_2","unstructured":"Z Liu Z Cao and D\u00a0S Wong. 2010. Efficient generation of linear secret sharing scheme matrices from threshold access trees. Cryptology ePrint Archive (2010)."},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Yinbin Miao Ximeng Liu Kim-Kwang\u00a0Raymond Choo Robert\u00a0H. Deng Jiguo Li Hongwei Li and Jianfeng Ma. 2021. Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting. IEEE Transactions on Dependable and Secure Computing 18 3 (2021) 1080\u20131094.","DOI":"10.1109\/TDSC.2019.2897675"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSN.2014.50"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11203-9_24"},{"key":"e_1_3_3_1_18_2","unstructured":"J Sun H Xiong X Nie Y Zhang and P Wu. 2019. On the security of privacy-preserving attribute-based keyword search in shared multi-owner setting. IEEE Transactions on Dependable and Secure Computing 18 5 (2019) 2518\u20132519."},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Wenhai Sun Shucheng Yu Wenjing Lou Y.\u00a0Thomas Hou and Hui Li. 2016. Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud. IEEE Transactions on Parallel and Distributed Systems 27 4 (2016) 1187\u20131198.","DOI":"10.1109\/TPDS.2014.2355202"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid49817.2020.00-48"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Haijiang Wang Xiaolei Dong and Zhenfu Cao. 2020. Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search. IEEE Transactions on Services Computing 13 6 (2020) 1142\u20131151.","DOI":"10.1109\/TSC.2017.2753231"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Hui Yin Jixin Zhang Yinqiao Xiong Lu Ou Fangmin Li Shaolin Liao and Keqin Li. 2019. CP-ABSE: A ciphertext-policy attribute-based searchable encryption scheme. IEEE Access 7 (2019) 5682\u20135694.","DOI":"10.1109\/ACCESS.2018.2889754"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Hui Yin Wei Zhang Hua Deng Zheng Qin and Keqin Li. 2023. An attribute-based searchable encryption scheme for cloud-assisted IIoT. IEEE Internet of Things Journal 10 12 (2023) 11014\u201311023.","DOI":"10.1109\/JIOT.2023.3242964"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Rui Zhang Rui Xue and Ling Liu. 2017. Searchable encryption for healthcare clouds: A survey. IEEE Transactions on Services Computing 11 6 (2017) 978\u2013996.","DOI":"10.1109\/TSC.2017.2762296"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847976"}],"event":{"name":"ICDCN 2025: 26th International Conference on Distributed Computing and Networking","acronym":"ICDCN 2025","location":"Hyderabad India"},"container-title":["Proceedings of the 26th International Conference on Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700838.3703669","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3700838.3703669","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:10:22Z","timestamp":1750295422000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700838.3703669"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,4]]},"references-count":24,"alternative-id":["10.1145\/3700838.3703669","10.1145\/3700838"],"URL":"https:\/\/doi.org\/10.1145\/3700838.3703669","relation":{},"subject":[],"published":{"date-parts":[[2025,1,4]]},"assertion":[{"value":"2025-01-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}