{"id":"https://openalex.org/W4401990904","doi":"https://doi.org/10.1109/tbdata.2024.3442540","title":"Efficient Forward and Backward Private Conjunctive Searchable Encryption With Comprehensive Verification","display_name":"Efficient Forward and Backward Private Conjunctive Searchable Encryption With Comprehensive Verification","publication_year":2024,"publication_date":"2024-08-29","ids":{"openalex":"https://openalex.org/W4401990904","doi":"https://doi.org/10.1109/tbdata.2024.3442540"},"language":"en","primary_location":{"id":"doi:10.1109/tbdata.2024.3442540","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tbdata.2024.3442540","pdf_url":null,"source":{"id":"https://openalex.org/S2491400915","display_name":"IEEE Transactions on Big Data","issn_l":"2332-7790","issn":["2332-7790","2372-2096"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Big Data","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011401757","display_name":"Yue Ge","orcid":"https://orcid.org/0009-0007-7351-4554"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yue Ge","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077847200","display_name":"Ying Gao","orcid":"https://orcid.org/0000-0001-8992-651X"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ying Gao","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090065976","display_name":"Lin Qi","orcid":"https://orcid.org/0009-0003-0489-9412"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Qi","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102663486","display_name":"Jiankai Qiu","orcid":"https://orcid.org/0009-0001-4276-0070"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiankai Qiu","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5011401757"],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":0.683,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.75064542,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"11","issue":"3","first_page":"1259","last_page":"1272"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9805999994277954,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8245432376861572},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7098895907402039},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.44242992997169495},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3772085905075073}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8245432376861572},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7098895907402039},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.44242992997169495},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3772085905075073}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tbdata.2024.3442540","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tbdata.2024.3442540","pdf_url":null,"source":{"id":"https://openalex.org/S2491400915","display_name":"IEEE Transactions on Big Data","issn_l":"2332-7790","issn":["2332-7790","2372-2096"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Big Data","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2581897125","display_name":null,"funder_award_id":"M21033","funder_id":"https://openalex.org/F4320322919","funder_display_name":"Natural Science Foundation of Beijing Municipality"},{"id":"https://openalex.org/G7630368258","display_name":null,"funder_award_id":"M22038","funder_id":"https://openalex.org/F4320322919","funder_display_name":"Natural Science Foundation of Beijing Municipality"}],"funders":[{"id":"https://openalex.org/F4320322919","display_name":"Natural Science Foundation of Beijing Municipality","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W98478173","https://openalex.org/W1485801301","https://openalex.org/W1502708590","https://openalex.org/W1512194687","https://openalex.org/W1590405063","https://openalex.org/W1593940884","https://openalex.org/W1891568375","https://openalex.org/W2016575873","https://openalex.org/W2017126829","https://openalex.org/W2086763678","https://openalex.org/W2098162425","https://openalex.org/W2102881299","https://openalex.org/W2131043660","https://openalex.org/W2147929033","https://openalex.org/W2152516507","https://openalex.org/W2184702105","https://openalex.org/W2518462489","https://openalex.org/W2520286728","https://openalex.org/W2592956480","https://openalex.org/W2616721641","https://openalex.org/W2765463836","https://openalex.org/W2766707306","https://openalex.org/W2782900518","https://openalex.org/W2804851055","https://openalex.org/W2885155096","https://openalex.org/W2885251908","https://openalex.org/W2891020614","https://openalex.org/W2891250116","https://openalex.org/W2891871515","https://openalex.org/W2953213487","https://openalex.org/W2963504955","https://openalex.org/W2963873050","https://openalex.org/W2972851249","https://openalex.org/W3007218738","https://openalex.org/W3128530640","https://openalex.org/W3179996071","https://openalex.org/W3202301328","https://openalex.org/W4221147176","https://openalex.org/W4226286700","https://openalex.org/W4284686167","https://openalex.org/W4360993064","https://openalex.org/W4376456651","https://openalex.org/W6679645395","https://openalex.org/W6712647500","https://openalex.org/W6720239471","https://openalex.org/W6874220218"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"Dynamic":[0],"searchable":[1],"symmetric":[2],"encryption":[3],"(DSSE)":[4],"enables":[5],"the":[6,58,78,98,120,140,150,169,185],"retrieval":[7],"and":[8,14,45,53,66,84,101,155,165,180,194],"update":[9,195],"of":[10,80,122,153],"massive":[11],"encrypted":[12],"data":[13,29],"is":[15,130,163],"thus":[16],"widely":[17],"applied":[18],"in":[19],"cloud":[20,23],"storage.":[21],"Malicious":[22],"servers":[24],"may":[25],"tamper":[26],"with":[27,43,71,93],"outsourced":[28],"or":[30],"return":[31],"incorrect":[32],"search":[33,52,92,99,123],"results,":[34],"making":[35],"verification":[36,73,111],"indispensable.":[37],"However,":[38],"current":[39],"verifiable":[40,187],"conjunctive":[41,69,91,182,188],"DSSE":[42,70,189],"forward":[44,65,107,164],"backward":[46,67,166],"privacy":[47],"cannot":[48],"simultaneously":[49],"achieve":[50,89],"accurate":[51,90,181],"empty":[54,128],"result":[55,129],"verification.":[56],"Given":[57],"above":[59],"problems,":[60],"we":[61],"propose":[62],"a":[63,134],"novel":[64],"private":[68,167],"comprehensive":[72],"called":[74],"VCFB.":[75],"VCFB":[76,154,162,177],"introduces":[77],"notion":[79],"random":[81],"blinding":[82],"factors":[83],"secure":[85],"dynamic":[86,116,142],"cross-tags":[87],"to":[88,105,138],"sublinear":[94],"overhead.":[95],"We":[96,132,147],"design":[97],"state":[100],"construct":[102],"chain":[103],"structures":[104],"ensure":[106],"security.":[108],"The":[109],"new":[110,141],"algorithm":[112],"based":[113],"on":[114],"bilinear-map":[115],"accumulators":[117],"can":[118],"guarantee":[119],"verifiability":[121],"results":[124,174],"even":[125],"if":[126],"an":[127],"returned.":[131],"use":[133],"sample":[135],"check":[136],"method":[137],"verify":[139],"cross-tags,":[143],"reducing":[144],"computation":[145],"costs.":[146],"precisely":[148],"define":[149],"leakage":[151],"function":[152],"give":[156],"detailed":[157],"security":[158],"proof,":[159],"demonstrating":[160],"that":[161,176],"under":[168],"malicious":[170],"server":[171],"model.":[172],"Experimental":[173],"show":[175],"ensures":[178],"efficient":[179],"search,":[183],"outperforming":[184],"similar":[186],"scheme":[190],"regarding":[191],"indexing":[192],"storage":[193],"performance.":[196]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
