{"id":"https://openalex.org/W2091359829","doi":"https://doi.org/10.1109/cse.2013.26","title":"Using All-or-Nothing Encryption to Enhance the Security of Searchable Encryption","display_name":"Using All-or-Nothing Encryption to Enhance the Security of Searchable Encryption","publication_year":2013,"publication_date":"2013-12-01","ids":{"openalex":"https://openalex.org/W2091359829","doi":"https://doi.org/10.1109/cse.2013.26","mag":"2091359829"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/cse.2013.26","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055607277","display_name":"Wenqi Ma","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenqi Ma","raw_affiliation_strings":["College of Computer National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075737786","display_name":"Qingbo Wu","orcid":"https://orcid.org/0000-0003-2936-6340"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingbo Wu","raw_affiliation_strings":["College of Computer National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034435564","display_name":"Yusong Tan","orcid":"https://orcid.org/0000-0003-1233-5679"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yusong Tan","raw_affiliation_strings":["College of Computer National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100773601","display_name":"Chunguang Wang","orcid":"https://orcid.org/0000-0001-6709-3422"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunguang Wang","raw_affiliation_strings":["College of Computer National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051335238","display_name":"Quanyuan Wu","orcid":"https://orcid.org/0000-0002-6553-9299"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Quanyuan Wu","raw_affiliation_strings":["College of Computer National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054424212","display_name":"Huaping Hu","orcid":"https://orcid.org/0000-0002-1651-0385"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaping Hu","raw_affiliation_strings":["College of Computer National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":1,"citation_normalized_percentile":{"value":0.202179,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":65,"max":72},"biblio":{"volume":null,"issue":null,"first_page":"104","last_page":"108"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9881,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9861,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.9214343},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.73203003},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.6864399},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.642017},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.64049244},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.634152},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.6252352},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.5809214},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.57028717},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.50845325},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5048045},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.4788518},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3317292},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09702},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.074527174},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/cse.2013.26","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":6,"referenced_works":["https://openalex.org/W1502927489","https://openalex.org/W1575126375","https://openalex.org/W2141420453","https://openalex.org/W2147929033","https://openalex.org/W2156030242","https://openalex.org/W2161214567"],"related_works":["https://openalex.org/W3009047128","https://openalex.org/W2950719931","https://openalex.org/W2946447747","https://openalex.org/W2945017935","https://openalex.org/W2900495477","https://openalex.org/W2896217228","https://openalex.org/W2894568935","https://openalex.org/W2786142914","https://openalex.org/W2785926503","https://openalex.org/W2785422613","https://openalex.org/W2778171349","https://openalex.org/W2736239266","https://openalex.org/W2624091145","https://openalex.org/W2572630090","https://openalex.org/W2523372216","https://openalex.org/W2437860832","https://openalex.org/W2121125304","https://openalex.org/W2081633547","https://openalex.org/W14984817","https://openalex.org/W1484220609"],"abstract_inverted_index":{"Outsourcing":[0],"data":[1,16,45],"to":[2,40,79,100,157,185],"cloud":[3,29],"servers":[4],"is":[5,24,70,195],"a":[6,71,93],"trend":[7],"in":[8,65],"the":[9,12,15,19,34,48,51,56,80,87,110,113,121,124,127,149,165,179,186,192,200],"development":[10],"of":[11,22,50,138],"computer.":[13],"Encrypting":[14,175],"while":[17],"maintain":[18],"search":[20,42,187],"ability":[21],"it":[23],"an":[25,141],"important":[26],"technology":[27],"for":[28,151],"storage.":[30],"Many":[31],"works":[32],"on":[33,38],"searchable":[35,54,67],"encryption":[36,63,68,143],"focus":[37],"how":[39],"securely":[41],"over":[43],"encrypted":[44,60,166],"but":[46],"ignore":[47],"security":[49,77],"encryption.":[52,81],"In":[53,82],"encryption,":[55],"words":[57],"must":[58,163],"be":[59],"separately.":[61],"The":[62,145],"function":[64],"many":[66],"schemes":[69],"deterministic":[72],"algorithm.":[73],"These":[74],"characteristics":[75],"bring":[76,182],"defects":[78],"this":[83,131],"paper,":[84],"we":[85,133,198],"encrypt":[86,134,161],"documents":[88],"into":[89],"n":[90],"pieces":[91,118,139,177],"with":[92,140,178],"secret":[94],"sharing":[95],"algorithm":[96],"and":[97,126],"disperse":[98],"them":[99],"different":[101],"clouds.":[102],"Each":[103],"piece":[104,167],"will":[105,181,190],"reveal":[106],"no":[107],"information":[108],"about":[109],"document.":[111],"But":[112],"attacker":[114],"can":[115,147],"get":[116],"all":[117],"through":[119],"intercept":[120],"communication":[122],"between":[123],"client":[125],"cloud.":[128],"For":[129],"solving":[130],"problem,":[132],"one":[135,160],"or":[136],"more":[137],"all-or-nothing":[142],"(AONE).":[144],"AONE":[146,180],"increases":[148],"time":[150],"brute":[152],"force.":[153],"Attacker":[154],"who":[155],"wants":[156],"crack":[158,164],"any":[159],"word":[162],"firstly.":[168],"Our":[169],"scheme":[170],"also":[171],"has":[172],"some":[173,176,183],"problems.":[174],"errors":[184],"result.":[188],"We":[189],"prove":[191],"error":[193],"probability":[194],"low":[196],"when":[197],"choose":[199],"reasonable":[201],"parameters.":[202]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2091359829","counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2025-01-21T09:10:10.162035","created_date":"2016-06-24"}