{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:03:50Z","timestamp":1725728630572},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T00:00:00Z","timestamp":1679443200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T00:00:00Z","timestamp":1679443200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,3,22]]},"DOI":"10.1109\/ciss56502.2023.10089760","type":"proceedings-article","created":{"date-parts":[[2023,4,10]],"date-time":"2023-04-10T14:58:36Z","timestamp":1681138716000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Forward and Backward Private Dynamic Searchable Encryption with Better Space Efficiency"],"prefix":"10.1109","author":[{"given":"Yexuan","family":"Liu","sequence":"first","affiliation":[{"name":"Graduate School of Environment and Information Sciences, Yokohama National University,Yokohama,Japan,240-8501"}]},{"given":"Yohei","family":"Watanabe","sequence":"additional","affiliation":[{"name":"Graduate School of Informatics and Engineering, The University of Electro-Communications,Tokyo,Japan,182-8585"}]},{"given":"Junji","family":"Shikata","sequence":"additional","affiliation":[{"name":"Graduate School of Environment and Information Sciences, Yokohama National University,Yokohama,Japan,240-8501"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23264"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24423"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24162"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"ref1","first-page":"44","article-title":"Practical techniques for searches on encrypted data","author":"song","year":"2000","journal-title":"IEEE S&P 2000"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"ref7","first-page":"1038","article-title":"New constructions for forward and backward private symmetric searchable encryption","author":"chamani","year":"2018","journal-title":"ACM CCS 2018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243782"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23298"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133980"},{"key":"ref5","first-page":"1143","article-title":"?o