{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:30:48Z","timestamp":1761611448079,"version":"3.37.3"},"reference-count":10,"publisher":"Wiley","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402393","61601396","AGK201607"],"award-info":[{"award-number":["61402393","61601396","AGK201607"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402393","61601396","AGK201607"],"award-info":[{"award-number":["61402393","61601396","AGK201607"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shanghai Key Laboratory of Integrated Administration Technologies for Information Security","award":["61402393","61601396","AGK201607"],"award-info":[{"award-number":["61402393","61601396","AGK201607"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2018]]},"abstract":"<jats:p>The searchable encryption scheme can perform keywords search operation directly over encrypted data without decryption, which is crucial to cloud storage, and has attracted a lot of attention in these years. However, it is still an open problem to develop an efficient public key encryption scheme supporting conjunctive and a disjunctive keyword search simultaneously. To achieve this goal, we introduce a keyword conversion method that can transform the query and index keywords into a vector space model. Through applying a vector space model to a predicate encryption scheme supporting inner product, we propose a novel public key encryption scheme with conjunctive and disjunctive keyword search. The experiment result demonstrates that our scheme is more efficient in both time and space as well as more suitable for the mobile cloud compared with the state-of-art schemes.<\/jats:p>","DOI":"10.1155\/2018\/3839254","type":"journal-article","created":{"date-parts":[[2018,5,2]],"date-time":"2018-05-02T19:35:43Z","timestamp":1525289743000},"page":"1-11","source":"Crossref","is-referenced-by-count":9,"title":["Conjunctive and Disjunctive Keyword Search over Encrypted Mobile Cloud Data in Public Key System"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8261-0627","authenticated-orcid":true,"given":"Yu","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer and Information Technology, Xinyang Normal University, Xinyang 464000, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9529-8481","authenticated-orcid":true,"given":"Yin","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer and Information Technology, Xinyang Normal University, Xinyang 464000, China"}]},{"given":"Yifan","family":"Wang","sequence":"additional","affiliation":[{"name":"Wayne State University, 42 W. Warren Ave., Detroit, MI 48202, USA"}]}],"member":"311","reference":[{"key":"2","first-page":"216","volume":"2003","year":"2003","journal-title":"IACR Cryptology ePrint Archive"},{"issue":"12","key":"3","first-page":"2706","volume":"11","year":"2017","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2015.2506573"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.007"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2011.282"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.e98.b.190"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2015.2401003"},{"year":"2001","key":"21"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0131-1"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2015.2506145"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2018\/3839254.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2018\/3839254.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2018\/3839254.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,2]],"date-time":"2018-05-02T19:36:15Z","timestamp":1525289775000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/misy\/2018\/3839254\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":10,"alternative-id":["3839254","3839254"],"URL":"https:\/\/doi.org\/10.1155\/2018\/3839254","relation":{},"ISSN":["1574-017X","1875-905X"],"issn-type":[{"type":"print","value":"1574-017X"},{"type":"electronic","value":"1875-905X"}],"subject":[],"published":{"date-parts":[[2018]]}}}