{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:46:26Z","timestamp":1729658786530,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/ivsw.2017.8031542","type":"proceedings-article","created":{"date-parts":[[2017,9,14]],"date-time":"2017-09-14T16:47:18Z","timestamp":1505407638000},"page":"39-44","source":"Crossref","is-referenced-by-count":3,"title":["Provable secure dual-server public key encryption with keyword search"],"prefix":"10.1109","author":[{"given":"Kaibin","family":"Huang","sequence":"first","affiliation":[]},{"given":"Raylin","family":"Tso","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19962-7_4"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1109\/TIFS.2016.2599293","article-title":"Dual-server public-key encryption with keyword search for secure cloud storage","volume":"11","author":"chen","year":"2016","journal-title":"IEEE Trans Information Forensics and Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539702403773"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.03.038"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIC.2012.6449730"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/AINAW.2007.166"},{"key":"ref16","first-page":"178","article-title":"Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups","volume":"5339","author":"wang","year":"2008","journal-title":"CANS'08 ser LNCS"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2636328"},{"key":"ref3","first-page":"360","article-title":"De-terministic encryption: Definitional equivalences and constructions without random oracles","volume":"5157","author":"bellare","year":"2008","journal-title":"CRYPTO ' ‘08 ser"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/11844662_6","article-title":"Off-line keyword guessing attacks on recent keyword search schemes over encrypted data","volume":"4165","author":"byun","year":"2006","journal-title":"Secure Data Management SDM'06 ser LNCS"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"ref7","first-page":"1249","article-title":"Public key encryption with keyword search revisited","volume":"5072","author":"baek","year":"2008","journal-title":"Computational Science and Its Applications - ICCSA'08 ser LNCS"},{"key":"ref2","first-page":"506","article-title":"Public key encryption with keyword search","volume":"3027","author":"boneh","year":"2004","journal-title":"EURO-CRYPT'04 ser"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9006-6"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1008731.1008734"}],"event":{"name":"2017 IEEE 2nd International Verification and Security Workshop (IVSW)","start":{"date-parts":[[2017,7,3]]},"location":"Thessaloniki, Greece","end":{"date-parts":[[2017,7,5]]}},"container-title":["2017 IEEE 2nd International Verification and Security Workshop (IVSW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8024489\/8031534\/08031542.pdf?arnumber=8031542","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T09:55:13Z","timestamp":1570096513000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8031542\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ivsw.2017.8031542","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}