{"id":"https://openalex.org/W4402978440","doi":"https://doi.org/10.1109/jiot.2024.3470772","title":"Efficient Verifiable Dynamic Searchable Symmetric Encryption With Forward and Backward Security","display_name":"Efficient Verifiable Dynamic Searchable Symmetric Encryption With Forward and Backward Security","publication_year":2024,"publication_date":"2024-09-30","ids":{"openalex":"https://openalex.org/W4402978440","doi":"https://doi.org/10.1109/jiot.2024.3470772"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3470772","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3470772","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054435331","display_name":"Chenbin Zhao","orcid":"https://orcid.org/0000-0002-2390-7153"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chenbin Zhao","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Ministry of Education, School of Cyber Science and Engineering, Key Laboratory of Aerospace Information Security and Trusted Computing, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Ministry of Education, School of Cyber Science and Engineering, Key Laboratory of Aerospace Information Security and Trusted Computing, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100529319","display_name":"Ruiying Du","orcid":"https://orcid.org/0000-0002-3634-3385"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruiying Du","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Ministry of Education, School of Cyber Science and Engineering, Key Laboratory of Aerospace Information Security and Trusted Computing, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Ministry of Education, School of Cyber Science and Engineering, Key Laboratory of Aerospace Information Security and Trusted Computing, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004999865","display_name":"Kun He","orcid":"https://orcid.org/0000-0003-3472-419X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun He","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Ministry of Education, School of Cyber Science and Engineering, Key Laboratory of Aerospace Information Security and Trusted Computing, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Ministry of Education, School of Cyber Science and Engineering, Key Laboratory of Aerospace Information Security and Trusted Computing, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100394917","display_name":"Jing Chen","orcid":"https://orcid.org/0000-0002-7212-5297"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Chen","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","Ministry of Education, School of Cyber Science and Engineering, Key Laboratory of Aerospace Information Security and Trusted Computing, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Ministry of Education, School of Cyber Science and Engineering, Key Laboratory of Aerospace Information Security and Trusted Computing, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074149291","display_name":"Jiguo Li","orcid":"https://orcid.org/0000-0002-6532-2081"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiguo Li","raw_affiliation_strings":["College of Computer and Cyber Security and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058120371","display_name":"Ximeng Liu","orcid":"https://orcid.org/0000-0002-4238-3295"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ximeng Liu","raw_affiliation_strings":["College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian, China","College of Mathematics and Computer Science, Fuzhou University, Fujian, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Computer Science, Fuzhou University, Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I80947539"]},{"raw_affiliation_string":"College of Mathematics and Computer Science, Fuzhou University, Fujian, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081596329","display_name":"Jianting Ning","orcid":"https://orcid.org/0000-0001-7165-398X"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianting Ning","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China","College of Computer and Cyber Security, Key Laboratory of Analytical Mathematics and Applications (Ministry of Education) and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"College of Computer and Cyber Security, Key Laboratory of Analytical Mathematics and Applications (Ministry of Education) and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5054435331"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":3.467,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.93517121,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"12","issue":"3","first_page":"2633","last_page":"2645"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8333235383033752},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.7545758485794067},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.681632399559021},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.6167230606079102},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5171734690666199},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4687265157699585},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37791794538497925},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36521410942077637},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2949337363243103},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.10331171751022339}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8333235383033752},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.7545758485794067},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.681632399559021},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.6167230606079102},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5171734690666199},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4687265157699585},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37791794538497925},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36521410942077637},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2949337363243103},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10331171751022339},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3470772","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3470772","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2780597473","display_name":null,"funder_award_id":"2042022kf0046","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G5215447159","display_name":null,"funder_award_id":"2021YFB2700200","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G7322606774","display_name":null,"funder_award_id":"2042022kf1195","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G782110378","display_name":null,"funder_award_id":"62172303","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7960939272","display_name":null,"funder_award_id":"62076187","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G801100328","display_name":null,"funder_award_id":"2022CXPT055","funder_id":"https://openalex.org/F4320333596","funder_display_name":"Key Technology Research and Development Program of Shandong"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320333596","display_name":"Key Technology Research and Development Program of Shandong","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W207790704","https://openalex.org/W1502708590","https://openalex.org/W1593940884","https://openalex.org/W1607188293","https://openalex.org/W1891568375","https://openalex.org/W2005955075","https://openalex.org/W2017126829","https://openalex.org/W2146828512","https://openalex.org/W2147929033","https://openalex.org/W2152516507","https://openalex.org/W2539385377","https://openalex.org/W2765463836","https://openalex.org/W2780643700","https://openalex.org/W2791603174","https://openalex.org/W2885251908","https://openalex.org/W2891020614","https://openalex.org/W2891871515","https://openalex.org/W2898077502","https://openalex.org/W2914539352","https://openalex.org/W2963504955","https://openalex.org/W2972851249","https://openalex.org/W3021559596","https://openalex.org/W3087777761","https://openalex.org/W3094474718","https://openalex.org/W3138969459","https://openalex.org/W4283329176","https://openalex.org/W4296437242","https://openalex.org/W4320009812","https://openalex.org/W4324007090","https://openalex.org/W4324007139","https://openalex.org/W4382658098","https://openalex.org/W4388692705","https://openalex.org/W4389370921","https://openalex.org/W6720239471"],"related_works":["https://openalex.org/W2322947709","https://openalex.org/W4385192994","https://openalex.org/W4255237014","https://openalex.org/W4242847202","https://openalex.org/W3100390169","https://openalex.org/W2072918937","https://openalex.org/W2768869846","https://openalex.org/W2951531469","https://openalex.org/W181049489","https://openalex.org/W1967663693"],"abstract_inverted_index":{"In":[0,71],"the":[1,27,31,43,48,68,111,126,134,138,141,146,152,171,175],"realm":[2],"of":[3,34,45,50,56,137,177],"secure":[4,120],"data":[5,28],"outsourcing,":[6],"verifiable":[7],"dynamic":[8,69],"searchable":[9],"symmetric":[10],"encryption":[11],"(VDSSE)":[12],"enables":[13],"a":[14,53,100,105,116,130],"client":[15],"to":[16,185],"verify":[17],"search":[18,147],"results":[19],"obtained":[20],"from":[21],"an":[22,77,91],"untrusted":[23],"server":[24,127],"while":[25],"protecting":[26],"privacy.":[29],"Nevertheless,":[30],"storage":[32,107],"cost":[33,143],"verification":[35,95,102],"structure":[36,96],"in":[37,67,188],"some":[38,60],"schemes":[39,61,187],"escalates":[40],"linearly":[41],"with":[42,104,145],"number":[44,55],"keywords,":[46],"and":[47,64,85,118,155,168],"generation":[49],"proofs":[51],"demands":[52],"substantial":[54],"exponentiation":[57],"operations.":[58],"Moreover,":[59],"overlook":[62],"forward":[63,84,117,164],"backward":[65,86,119,166],"security":[66,153],"database.":[70],"this":[72,124],"article,":[73],"we":[74,89,113,150],"introduce":[75,90],"FB-VDSSE,":[76],"advanced":[78],"VDSSE":[79,121],"scheme":[80,161],"that":[81,98,159],"ensures":[82,163],"both":[83],"security.":[87],"Specifically,":[88],"efficient":[92],"accumulation":[93],"commitment":[94,101],"(AC-VS)":[97],"attains":[99],"value":[103],"constant-size":[106],"cost.":[108],"Based":[109],"on":[110],"AC-VS,":[112],"further":[114],"propose":[115],"scheme.":[122],"Within":[123],"scheme,":[125,179],"exclusively":[128],"generates":[129],"membership":[131],"proof":[132,154],"at":[133],"corresponding":[135],"index":[136],"vector,":[139],"reducing":[140],"computation":[142],"associated":[144],"operation.":[148],"Finally,":[149],"provide":[151],"functional":[156],"comparison,":[157],"demonstrating":[158],"our":[160,178],"effectively":[162],"security,":[165,167],"verifiability.":[169],"Additionally,":[170],"experimental":[172],"evaluations":[173],"underscore":[174],"efficiency":[176],"showcasing":[180],"its":[181],"superior":[182],"performance":[183],"compared":[184],"relevant":[186],"practical":[189],"scenarios.":[190]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2025-10-10T00:00:00"}
