{"id":"https://openalex.org/W3094474718","doi":"https://doi.org/10.1109/tifs.2020.3033412","title":"Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost","display_name":"Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost","publication_year":2020,"publication_date":"2020-10-23","ids":{"openalex":"https://openalex.org/W3094474718","doi":"https://doi.org/10.1109/tifs.2020.3033412","mag":"3094474718"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2020.3033412","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004999865","display_name":"Kun He","orcid":"https://orcid.org/0000-0003-3472-419X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun He","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100394917","display_name":"Jing Chen","orcid":"https://orcid.org/0000-0002-7212-5297"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Chen","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Shenzhen Institute, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Institute, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040514197","display_name":"Qinxi Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qinxi Zhou","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100529319","display_name":"Ruiying Du","orcid":"https://orcid.org/0000-0002-3634-3385"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruiying Du","raw_affiliation_strings":["Collaborative Innovation Center of Geospatial Technology, Wuhan University, Wuhan, China","Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Collaborative Innovation Center of Geospatial Technology, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100666554","display_name":"Yang Xiang","orcid":"https://orcid.org/0000-0001-5252-0831"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yang Xiang","raw_affiliation_strings":["School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":5.79,"has_fulltext":false,"cited_by_count":71,"citation_normalized_percentile":{"value":0.884152,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"16","issue":null,"first_page":"1538","last_page":"1549"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9956,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9911,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/client-side","display_name":"Client-side","score":0.62003404},{"id":"https://openalex.org/keywords/server-side","display_name":"Server-side","score":0.433206}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.82282305},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.73541564},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.67704815},{"id":"https://openalex.org/C202477664","wikidata":"https://www.wikidata.org/wiki/Q1352449","display_name":"Client-side","level":2,"score":0.62003404},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5956634},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.56203544},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.43539765},{"id":"https://openalex.org/C14414571","wikidata":"https://www.wikidata.org/wiki/Q519081","display_name":"Server-side","level":2,"score":0.433206},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3809996},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.359694},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33226854},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3320481},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.27438098},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23474059},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.16502804},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.101649314},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2020.3033412","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61772383"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"U1836202"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61702379"},{"funder":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation","award_id":"2019T120685"}],"datasets":[],"versions":[],"referenced_works_count":31,"referenced_works":["https://openalex.org/W1502708590","https://openalex.org/W1539859404","https://openalex.org/W1572096077","https://openalex.org/W2016575873","https://openalex.org/W2033165262","https://openalex.org/W2131043660","https://openalex.org/W2146828512","https://openalex.org/W2147929033","https://openalex.org/W2152516507","https://openalex.org/W2170993700","https://openalex.org/W2184702105","https://openalex.org/W2407957622","https://openalex.org/W2414102663","https://openalex.org/W2472177816","https://openalex.org/W2481158741","https://openalex.org/W2539385377","https://openalex.org/W2649616373","https://openalex.org/W2765463836","https://openalex.org/W2766270866","https://openalex.org/W2766707306","https://openalex.org/W2790225875","https://openalex.org/W2891020614","https://openalex.org/W2891250116","https://openalex.org/W2914247668","https://openalex.org/W2950325202","https://openalex.org/W2953633872","https://openalex.org/W2963504955","https://openalex.org/W2963873050","https://openalex.org/W2964743723","https://openalex.org/W3008291567","https://openalex.org/W59915946"],"related_works":["https://openalex.org/W4387881033","https://openalex.org/W4322735059","https://openalex.org/W4319448716","https://openalex.org/W4302890120","https://openalex.org/W4301042531","https://openalex.org/W4299870243","https://openalex.org/W3005688497","https://openalex.org/W3003811204","https://openalex.org/W2993438822","https://openalex.org/W2620710085"],"abstract_inverted_index":{"Dynamic":[0],"Searchable":[1],"Symmetric":[2],"Encryption":[3],"(DSSE)":[4],"enables":[5],"users":[6],"to":[7,40],"search":[8,21],"on":[9,14,51,83,163],"the":[10,20,41,48,52,58,63,71,120,145,156,160,164],"encrypted":[11],"database":[12],"stored":[13],"a":[15,101,125,133],"semi-trusted":[16],"server":[17],"while":[18,159],"keeping":[19],"and":[22,44,113,132,135,150,172],"update":[23],"information":[24],"under":[25],"acceptable":[26],"leakage.":[27],"However,":[28],"most":[29],"existing":[30,179],"DSSE":[31,128,138],"schemes":[32],"are":[33,152,167,175],"not":[34],"efficient":[35,154],"enough":[36],"in":[37,62,169],"practice":[38],"due":[39],"complex":[42],"structures":[43],"cryptographic":[45],"primitives.":[46],"Moreover,":[47],"storage":[49,68,92,161],"cost":[50,69,147],"client":[53,91,165],"side":[54,166],"grows":[55],"linearly":[56],"with":[57,89],"number":[59],"of":[60,73,107,148],"keywords":[61],"database,":[64],"which":[65,105,174],"induces":[66],"unaffordable":[67],"when":[70],"size":[72],"keyword":[74],"set":[75],"is":[76,96],"large.":[77],"In":[78],"this":[79],"article,":[80],"we":[81,123],"focus":[82],"secure":[84,127,137],"dynamic":[85],"searchable":[86],"symmetric":[87],"encryption":[88],"constant":[90,168],"cost.":[93],"Our":[94],"framework":[95],"boosted":[97],"by":[98],"fish-bone":[99],"chain,":[100],"novel":[102],"two-level":[103],"structure":[104],"consists":[106],"Logical":[108],"Keyword":[109],"Index":[110,115],"Chain":[111,116],"(LoKIC)":[112],"Document":[114],"(DIC).":[117],"To":[118],"instantiate":[119],"proposed":[121],"framework,":[122],"propose":[124],"forward":[126,134],"scheme,":[129,139],"called":[130,140],"CLOSE-F,":[131],"backward":[136],"CLOSE-FB.":[141],"Experiments":[142],"showed":[143],"that":[144],"computation":[146],"CLOSE-F":[149,171],"CLOSE-FB":[151],"as":[153,155],"state-of-the-art":[157],"solutions,":[158],"costs":[162],"both":[170],"CLOSE-FB,":[173],"much":[176],"smaller":[177],"than":[178],"schemes.":[180]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3094474718","counts_by_year":[{"year":2024,"cited_by_count":21},{"year":2023,"cited_by_count":23},{"year":2022,"cited_by_count":15},{"year":2021,"cited_by_count":11}],"updated_date":"2025-01-19T10:24:27.066738","created_date":"2020-10-29"}