{"id":"https://openalex.org/W2972851249","doi":"https://doi.org/10.1007/978-3-030-29962-0_15","title":"Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption","display_name":"Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2972851249","doi":"https://doi.org/10.1007/978-3-030-29962-0_15","mag":"2972851249"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-29962-0_15","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-29962-0_15","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101424490","display_name":"Zhongjun Zhang","orcid":"https://orcid.org/0000-0001-8577-4221"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhongjun Zhang","raw_affiliation_strings":["State Key Laboratory of Cryptology, P. O. Box 5159, Beijing, 100878, China","State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi\u2019an, 710071, China","State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, 710071, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cryptology, P. O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi\u2019an, 710071, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, 710071, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100358500","display_name":"Jianfeng Wang","orcid":"https://orcid.org/0000-0001-5297-0293"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianfeng Wang","raw_affiliation_strings":["State Key Laboratory of Cryptology, P. O. Box 5159, Beijing, 100878, China","State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi\u2019an, 710071, China","State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, 710071, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cryptology, P. O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi\u2019an, 710071, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, 710071, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037694066","display_name":"Yunling Wang","orcid":"https://orcid.org/0000-0001-6561-2540"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunling Wang","raw_affiliation_strings":["State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi\u2019an, 710071, China","State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, 710071, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi\u2019an, 710071, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, 710071, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038139590","display_name":"Yaping Su","orcid":"https://orcid.org/0000-0002-6653-2398"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yaping Su","raw_affiliation_strings":["State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi\u2019an, 710071, China","State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, 710071, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi\u2019an, 710071, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, 710071, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047378133","display_name":"Xiaofeng Chen","orcid":"https://orcid.org/0000-0001-5858-5070"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofeng Chen","raw_affiliation_strings":["State Key Laboratory of Cryptology, P. O. Box 5159, Beijing, 100878, China","State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi\u2019an, 710071, China","State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, 710071, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cryptology, P. O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi\u2019an, 710071, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, 710071, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101424490"],"corresponding_institution_ids":["https://openalex.org/I149594827","https://openalex.org/I4210132990"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":9.6592,"has_fulltext":false,"cited_by_count":76,"citation_normalized_percentile":{"value":0.98658926,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"304","last_page":"321"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.9028419256210327},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8522646427154541},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6137941479682922},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6137281656265259},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5840177536010742},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.5053675770759583},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.46357467770576477},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4438855051994324},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36813902854919434},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.24733585119247437},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1010696291923523},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09056919813156128}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.9028419256210327},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8522646427154541},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6137941479682922},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6137281656265259},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5840177536010742},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.5053675770759583},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.46357467770576477},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4438855051994324},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36813902854919434},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.24733585119247437},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1010696291923523},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09056919813156128},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-29962-0_15","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-29962-0_15","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W98478173","https://openalex.org/W1502708590","https://openalex.org/W1509788133","https://openalex.org/W1593940884","https://openalex.org/W1891568375","https://openalex.org/W2016575873","https://openalex.org/W2017126829","https://openalex.org/W2145426052","https://openalex.org/W2147929033","https://openalex.org/W2152516507","https://openalex.org/W2404098708","https://openalex.org/W2472177816","https://openalex.org/W2498753511","https://openalex.org/W2515423035","https://openalex.org/W2740838595","https://openalex.org/W2765463836","https://openalex.org/W2780643700","https://openalex.org/W2885251908","https://openalex.org/W2891250116","https://openalex.org/W2963504955"],"related_works":["https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W2365629437","https://openalex.org/W2023935927","https://openalex.org/W2348330439","https://openalex.org/W2350372928","https://openalex.org/W2072918937","https://openalex.org/W1967663693","https://openalex.org/W3001342270","https://openalex.org/W4312535394"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":18},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":16},{"year":2021,"cited_by_count":14},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2025-10-10T00:00:00"}
