{"id":"https://openalex.org/W4411950013","doi":"https://doi.org/10.1109/tc.2025.3585349","title":"RO(SE)2: Search-Efficient Robust Searchable Encryption With Forward and Backward Security","display_name":"RO(SE)2: Search-Efficient Robust Searchable Encryption With Forward and Backward Security","publication_year":2025,"publication_date":"2025-07-02","ids":{"openalex":"https://openalex.org/W4411950013","doi":"https://doi.org/10.1109/tc.2025.3585349"},"language":"en","primary_location":{"id":"doi:10.1109/tc.2025.3585349","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2025.3585349","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039917724","display_name":"Xu Yang","orcid":"https://orcid.org/0000-0003-0094-6245"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xu Yang","raw_affiliation_strings":["School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040472442","display_name":"Qiuhao Wang","orcid":"https://orcid.org/0000-0002-4929-6899"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiuhao Wang","raw_affiliation_strings":["School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021497508","display_name":"Saiyu Qi","orcid":"https://orcid.org/0000-0002-0394-4432"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Saiyu Qi","raw_affiliation_strings":["School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107953615","display_name":"Ke Li","orcid":"https://orcid.org/0009-0003-4668-5367"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Li","raw_affiliation_strings":["School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101556374","display_name":"Yong Qi","orcid":"https://orcid.org/0000-0003-2386-4154"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Qi","raw_affiliation_strings":["School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5039917724"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08556418,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"74","issue":"9","first_page":"3114","last_page":"3128"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12288","display_name":"Optimization and Search Problems","score":0.9660999774932861,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9513999819755554,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6961275935173035},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6510526537895203},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32678502798080444}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6961275935173035},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6510526537895203},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32678502798080444}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tc.2025.3585349","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2025.3585349","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W59915946","https://openalex.org/W1509788133","https://openalex.org/W2016575873","https://openalex.org/W2086763678","https://openalex.org/W2111446139","https://openalex.org/W2131043660","https://openalex.org/W2146828512","https://openalex.org/W2147929033","https://openalex.org/W2152516507","https://openalex.org/W2156186849","https://openalex.org/W2422800230","https://openalex.org/W2559781312","https://openalex.org/W2765463836","https://openalex.org/W2766707306","https://openalex.org/W2891020614","https://openalex.org/W2963504955","https://openalex.org/W2972851249","https://openalex.org/W2972997072","https://openalex.org/W3008291567","https://openalex.org/W3094474718","https://openalex.org/W3122645212","https://openalex.org/W3174344191","https://openalex.org/W3202301328","https://openalex.org/W4214848001","https://openalex.org/W4283329176","https://openalex.org/W4379033734","https://openalex.org/W4379033843","https://openalex.org/W4388714490","https://openalex.org/W4394995001","https://openalex.org/W4399119818","https://openalex.org/W4401726202","https://openalex.org/W4402628191","https://openalex.org/W4403675639","https://openalex.org/W4406094226","https://openalex.org/W4410027466","https://openalex.org/W6720239471","https://openalex.org/W7048074363"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Dynamic":[0],"searchable":[1],"symmetric":[2],"encryption":[3,154],"(DSSE)":[4],"enables":[5],"clients":[6],"to":[7,18,32,122,156],"store":[8],"encrypted":[9],"data":[10,23],"on":[11],"untrusted":[12],"servers":[13],"while":[14,224],"retaining":[15],"the":[16,22,127,131,233],"ability":[17],"search":[19,66,101,136,141,163,200,222],"and":[20,48,99,138,160,195],"update":[21,34,128],"efficiently.":[24],"However,":[25],"most":[26],"existing":[27,51,216],"DSSE":[28,91],"schemes":[29,53,218,237],"are":[30],"vulnerable":[31],"incorrect":[33,124],"queries,":[35],"such":[36],"as":[37,202],"duplicated":[38],"insertions":[39],"or":[40],"invalid":[41],"deletions,":[42],"which":[43],"can":[44,189],"compromise":[45],"both":[46],"security":[47,159,178,197],"availability.":[49],"Although":[50],"robust":[52,90,217,236],"have":[54],"made":[55],"progress":[56],"in":[57,219,238],"addressing":[58],"these":[59,77],"issues,":[60],"they":[61],"still":[62],"suffer":[63],"from":[64],"significant":[65],"inefficiencies,":[67],"particularly":[68],"when":[69],"handling":[70],"large":[71],"numbers":[72],"of":[73,221],"updates.":[74],"To":[75],"overcome":[76],"limitations,":[78],"we":[79],"propose":[80],"<monospace":[81,103,144,170,182,208,225],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[82,84,86,104,106,108,145,147,149,171,173,175,183,185,187,209,211,213,226,228,230],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">RO</monospace>(<monospace":[83,105,146,172,184,210,227],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">SE</monospace>)<sup":[85,107,148,174,186,212,229],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup>,":[87],"a":[88,111,152],"novel":[89],"scheme":[92],"that":[93,181,207],"simultaneously":[94],"achieves":[95],"robustness,":[96,193],"forward-and-Type-III-backward":[97],"security,":[98],"optimal":[100,199],"performance.":[102,240],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup>":[109,150,188,214],"introduces":[110],"hierarchical":[112],"binary":[113],"tree":[114],"structure":[115],"combined":[116],"with":[117],"an":[118],"oblivious":[119],"map":[120],"(OMAP)":[121],"handle":[123],"updates":[125],"during":[126,135],"phase,":[129],"eliminating":[130],"need":[132],"for":[133],"filtering":[134],"queries":[137],"significantly":[139],"improving":[140],"efficiency.":[142],"Additionally,":[143],"employs":[151],"two-layer":[153],"mechanism":[155],"ensure":[157],"forward":[158,194],"supports":[161],"efficient":[162],"result":[164],"verification":[165,239],"through":[166],"its":[167],"verifiable":[168,235],"extension,":[169],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup>-v.":[176],"Rigorous":[177],"analysis":[179,205],"proves":[180],"achieve":[190],"not":[191],"only":[192],"backward":[196],"but":[198],"efficiency":[201],"well.":[203],"Comparative":[204],"reveals":[206],"outperforms":[215,232],"terms":[220],"performance,":[223],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup>-v":[231],"state-of-the-art":[234]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-07-03T00:00:00"}
