{"id":"https://openalex.org/W4323519519","doi":"https://doi.org/10.1109/tdsc.2023.3253786","title":"Multi-Client Secure and Efficient DPF-Based Keyword Search for Cloud Storage","display_name":"Multi-Client Secure and Efficient DPF-Based Keyword Search for Cloud Storage","publication_year":2023,"publication_date":"2023-03-07","ids":{"openalex":"https://openalex.org/W4323519519","doi":"https://doi.org/10.1109/tdsc.2023.3253786"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2023.3253786","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3253786","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038498019","display_name":"Cheng Huang","orcid":"https://orcid.org/0000-0003-3769-7211"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Cheng Huang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017433297","display_name":"Dongxiao Liu","orcid":"https://orcid.org/0000-0003-2595-6757"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Dongxiao Liu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025910280","display_name":"Anjia Yang","orcid":"https://orcid.org/0000-0002-7958-6571"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anjia Yang","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, Guangdong Province, China","Pazhou Lab, Guangzhou, Guangdong Province, China"],"affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, Guangdong Province, China","institution_ids":["https://openalex.org/I159948400"]},{"raw_affiliation_string":"Pazhou Lab, Guangzhou, Guangdong Province, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070447777","display_name":"Rongxing Lu","orcid":"https://orcid.org/0000-0001-5720-0941"},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Rongxing Lu","raw_affiliation_strings":["Faculty of Computer Science, University of New Brunswick, Saint John, NB, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, University of New Brunswick, Saint John, NB, Canada","institution_ids":["https://openalex.org/I106938459"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100773343","display_name":"Xuemin Shen","orcid":"https://orcid.org/0000-0002-4140-287X"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xuemin Shen","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5038498019"],"corresponding_institution_ids":["https://openalex.org/I151746483"],"apc_list":null,"apc_paid":null,"fwci":6.7846,"has_fulltext":false,"cited_by_count":39,"citation_normalized_percentile":{"value":0.97534137,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"21","issue":"1","first_page":"353","last_page":"371"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9527999758720398,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8791849613189697},{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.7528883218765259},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6575686931610107},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5942167043685913},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5289086103439331},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5065289735794067},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.4696929454803467},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.46429142355918884},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3809363842010498},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21878916025161743}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8791849613189697},{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.7528883218765259},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6575686931610107},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5942167043685913},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5289086103439331},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5065289735794067},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.4696929454803467},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.46429142355918884},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3809363842010498},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21878916025161743},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2023.3253786","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3253786","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5199999809265137}],"awards":[{"id":"https://openalex.org/G4940029293","display_name":null,"funder_award_id":"62072215","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W139740867","https://openalex.org/W1479727008","https://openalex.org/W1516444320","https://openalex.org/W1521680667","https://openalex.org/W2004957971","https://openalex.org/W2073346043","https://openalex.org/W2117362057","https://openalex.org/W2170618460","https://openalex.org/W2222747815","https://openalex.org/W2293223894","https://openalex.org/W2481158741","https://openalex.org/W2493847351","https://openalex.org/W2533357737","https://openalex.org/W2592956480","https://openalex.org/W2796933658","https://openalex.org/W2891020614","https://openalex.org/W2891591987","https://openalex.org/W2949495942","https://openalex.org/W2958449681","https://openalex.org/W2967320897","https://openalex.org/W2972997072","https://openalex.org/W2985116192","https://openalex.org/W2987992784","https://openalex.org/W3005805302","https://openalex.org/W3013595713","https://openalex.org/W3015963927","https://openalex.org/W3024098564","https://openalex.org/W3112250879","https://openalex.org/W3131030483","https://openalex.org/W3138969459","https://openalex.org/W3139404512","https://openalex.org/W3171021568","https://openalex.org/W3211997223","https://openalex.org/W3213307661","https://openalex.org/W4205524415","https://openalex.org/W4285154500","https://openalex.org/W4288057784","https://openalex.org/W4295308246","https://openalex.org/W4315606062","https://openalex.org/W4320013865","https://openalex.org/W4385080249","https://openalex.org/W6720239471","https://openalex.org/W6784374016","https://openalex.org/W6784918314"],"related_works":["https://openalex.org/W2227807207","https://openalex.org/W2370014100","https://openalex.org/W4287264924","https://openalex.org/W3137108924","https://openalex.org/W1852009617","https://openalex.org/W1979110442","https://openalex.org/W2042819006","https://openalex.org/W2170165007","https://openalex.org/W2156660460","https://openalex.org/W2362866566"],"abstract_inverted_index":{"In":[0,50],"this":[1,51],"paper,":[2],"we":[3,122,186,198],"propose":[4,123],"a":[5,62,124,188,200],"multi-client":[6],"secure":[7],"and":[8,35,60,73,116,132,151,164,175,203,212,219],"efficient":[9],"keyword":[10,26,71],"search":[11],"scheme":[12,99,169],"for":[13,70,108,119],"cloud":[14,68],"storage,":[15],"which":[16,104,144],"is":[17,105,170],"built":[18],"upon":[19],"distributed":[20],"point":[21],"function":[22],"(DPF).":[23],"Specifically,":[24],"outsourced":[25,130],"indexes":[27,131],"are":[28,156],"encoded":[29],"by":[30,43,143,158],"using":[31],"garbled":[32],"bloom":[33,40],"filter":[34,41],"cuckoo":[36,56],"filter,":[37],"instead":[38],"of":[39,45,216],"adopted":[42],"most":[44],"the":[46,83,86,97],"state-of-the-art":[47],"DPF-based":[48],"schemes.":[49],"way,":[52],"clients":[53,155],"can":[54,75,92,148],"apply":[55],"hashing":[57],"into":[58],"DPF":[59,78],"utilize":[61],"segmentation":[63],"method":[64,127],"to":[65,81,128,191,207],"interact":[66],"with":[67],"servers":[69,74,180],"search,":[72],"obliviously":[76],"aggregate":[77],"evaluation":[79],"results":[80],"perform":[82,204],"search.":[84,111],"Accordingly,":[85],"computational":[87],"complexity":[88],"at":[89],"server":[90],"side":[91],"be":[93,149],"significantly":[94],"reduced.":[95],"Furthermore,":[96],"proposed":[98],"preserves":[100],"constant":[101],"downlink":[102],"overheads,":[103],"more":[106],"communication-efficient":[107],"multi-keyword":[109],"conjunctive":[110],"To":[112],"achieve":[113],"privacy":[114],"preservation":[115],"access":[117],"control":[118],"multiple":[120],"clients,":[121],"double":[125],"encryption":[126],"encrypt":[129],"correspondingly":[133],"put":[134],"forward":[135],"an":[136],"authorization":[137],"algorithm":[138],"from":[139],"set-constrained":[140],"pseudorandom":[141],"functions":[142],"fine-grained":[145],"search-authorized":[146],"keys":[147],"generated,":[150],"collusion":[152],"attacks":[153],"among":[154],"addressed":[157],"integrating":[159],"Wegman-Carter":[160],"message":[161],"authentication":[162],"codes":[163],"cover-free":[165],"systems.":[166],"Since":[167],"our":[168,209],"designed":[171],"under":[172],"both":[173],"semi-honest":[174],"malicious":[176,179],"models":[177],"(i.e.,":[178],"may":[181],"return":[182],"incorrect":[183],"query":[184],"results),":[185],"use":[187],"simulation-based":[189],"proof":[190],"formally":[192],"demonstrate":[193],"its":[194],"security":[195],"properties.":[196],"Finally,":[197],"develop":[199],"proof-of-concept":[201],"prototype":[202],"extensive":[205],"experiments":[206],"show":[208],"scheme's":[210],"practicality":[211],"efficiency":[213],"in":[214],"terms":[215],"computation,":[217],"communication,":[218],"storage":[220],"overheads.":[221]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":17},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":10}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
