{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T06:17:12Z","timestamp":1768544232656,"version":"3.49.0"},"reference-count":37,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772311"],"award-info":[{"award-number":["61772311"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072276"],"award-info":[{"award-number":["62072276"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,10,20]]},"abstract":"<jats:p>Dynamic Searchable Symmetric Encryption for Multiuser (M-DSSE) is an advanced form of symmetric encryption. It extends the traditional symmetric encryption to support the operations of adding and deleting the encrypted data and allow an authenticated group of data users to retrieve their respective desired encrypted data in the dynamic database. However, M-DSSE would suffer from the privacy concerns regarding forward and backward security. The former allows an attacker to identify the keywords contained in the added data by lunching file-injection attacks, while the latter allows to utilize the search results and the deleted data to learn the content. To our knowledge, these privacy concerns for M-DSSE have not been fully considered in the existing literatures. Taking account of this fact, we focus on the dynamic searchable symmetric encryption for multiuser meeting the needs of forward and backward security. In order to propose a concrete scheme, the primitives of Pseudorandom Functions (PRF) and the Homomorphic Message Authenticator (HMAC) are employed to construct the inverted index and update the search token. The proposed scheme is proven secure in the random model. And the performance analysis shows that the proposed scheme achieves the enhanced security guarantees at the reasonable price of efficiency.<\/jats:p>","DOI":"10.1155\/2020\/8893016","type":"journal-article","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T01:35:09Z","timestamp":1603244109000},"page":"1-13","source":"Crossref","is-referenced-by-count":10,"title":["A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security"],"prefix":"10.1155","volume":"2020","author":[{"given":"Xi","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Mathematics, Shandong University, Jinan 250100, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4912-3197","authenticated-orcid":true,"given":"Ye","family":"Su","sequence":"additional","affiliation":[{"name":"School of Mathematics, Shandong University, Jinan 250100, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2380-0396","authenticated-orcid":true,"given":"Jing","family":"Qin","sequence":"additional","affiliation":[{"name":"School of Mathematics, Shandong University, Jinan 250100, China"},{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.12691\/jcsa-3-3-3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"3","article-title":"Secure indexes","volume":"216","author":"E. Goh","year":"2003","journal-title":"IACR Cryptology ePrint Archive"},{"key":"4","first-page":"1249","article-title":"Public key encryption with keyword search revisited","author":"J. Baek"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/4268731"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2018.2850312"},{"key":"7","first-page":"965","article-title":"Dynamic searchable symmetric encryption","author":"S. Kamara"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_22"},{"issue":"5","key":"9","first-page":"639","article-title":"Dynamic searchable encryption via blind storage","volume":"2","author":"M. Naveed","year":"2014","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2015.2401003"},{"key":"11","first-page":"1","article-title":"Dynamic multi-phrase ranked search over encrypted data with symmetric searchable encryption","volume":"99","author":"C. Guo","year":"2017","journal-title":"IEEE Transations on Services Computing"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2019.2940573"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.06.006"},{"key":"14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TDSC.2019.2897675","article-title":"Privacy-preserving attribute-based keyword search in shared multi-owner setting","volume":"19","author":"Y. B. Miao","year":"2019","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"99","key":"15","first-page":"1","article-title":"Multi-user multi-keyword rank search over encrypted data in arbitrary language","volume":"2","author":"Y. Yang","year":"2017","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"16","first-page":"227","article-title":"Multi-user cloud-based secure keyword search","volume":"1","author":"J. K. Liu","year":"2017","journal-title":"ACISP"},{"key":"17","article-title":"All your queries are belong to us: the power of file-injection attacks on searchable encryption","volume":"172","author":"Y. P. Zhang","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2014.23298","volume-title":"Practical Dynamic Searchable Encryption with Small Leakage","author":"E. Stefanov","year":"2014"},{"key":"19","article-title":"\u2211o\u03d5o\u03c2\u2009:\u2009forward secure searchable encryption","author":"R. Bost"},{"key":"20","article-title":"Multi-user forward secure dynamic searchable symmetric encryption","volume":"125","author":"Q. Wang","year":"2018","journal-title":"NSS"},{"key":"21","first-page":"763","article-title":"Practical backward-secure searchable encryption from symmetric puncturable encryption","author":"S. F. Sun"},{"key":"22","first-page":"1449","article-title":"Forward secure dynamic searchable symmetric encryption with efficient updates","author":"K. S. Kim"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2019.2894411"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-016-9249-1"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.3390\/info9100242"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29962-0_14"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-019-00774-x"},{"key":"28","first-page":"593","article-title":"Enabling efficient fuzzy keyword search over encrypted data in cloud computing","volume":"2019","author":"J. Li","year":"2009","journal-title":"IACR Cryptology ePrint Archive"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1376"},{"key":"30","first-page":"745","article-title":"Result pattern hiding searchable encryption for conjunctive queries","author":"S. Q. Lai"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.3233\/jcs-2011-0426"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_7"},{"key":"33","first-page":"697","article-title":"Adaptively secure conjunctive query processing over encrypted data for cloud computing","author":"R. Li"},{"key":"34","first-page":"185","article-title":"Practical private range search revisited","author":"I. Demertzis"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133980"},{"key":"36","article-title":"Multi-key searchable encryption","volume":"508","author":"R. A. Popa","year":"2013","journal-title":"IACR Cryptology ePrint Archive"},{"key":"37","first-page":"875","article-title":"Outsourced symmetric private information retrieval","author":"S. Jarecki"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8893016.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8893016.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8893016.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T01:35:14Z","timestamp":1603244114000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8893016\/"}},"subtitle":[],"editor":[{"given":"A.","family":"Peinado","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,10,20]]},"references-count":37,"alternative-id":["8893016","8893016"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8893016","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2020,10,20]]}}}