{"id":"https://openalex.org/W4414603009","doi":"https://doi.org/10.1109/tdsc.2025.3615931","title":"Toward Efficient Multi-User Access Control Encrypted Search for Web Data Management","display_name":"Toward Efficient Multi-User Access Control Encrypted Search for Web Data Management","publication_year":2025,"publication_date":"2025-09-29","ids":{"openalex":"https://openalex.org/W4414603009","doi":"https://doi.org/10.1109/tdsc.2025.3615931"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3615931","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3615931","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102714724","display_name":"Shiyuan Xu","orcid":"https://orcid.org/0000-0001-9076-1695"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"HK","type":"education","lineage":["https://openalex.org/I177725633"]},{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Shiyuan Xu","raw_affiliation_strings":["School of Computing and Data Science, The University of Hong Kong, Hong Kong","School of Computing and Data Science, The University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"School of Computing and Data Science, The University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I889458895"]},{"raw_affiliation_string":"School of Computing and Data Science, The University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I177725633","https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100408555","display_name":"Xue Chen","orcid":"https://orcid.org/0000-0002-9456-3124"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"HK","type":"education","lineage":["https://openalex.org/I177725633"]},{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xue Chen","raw_affiliation_strings":["School of Computing and Data Science, The University of Hong Kong, Hong Kong","School of Computing and Data Science, The University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"School of Computing and Data Science, The University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I889458895"]},{"raw_affiliation_string":"School of Computing and Data Science, The University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I177725633","https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021523270","display_name":"Yu Guo","orcid":"https://orcid.org/0000-0002-9078-7462"},"institutions":[{"id":"https://openalex.org/I25254941","display_name":"Beijing Normal University","ror":"https://ror.org/022k4wk35","country_code":"CN","type":"education","lineage":["https://openalex.org/I25254941"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Guo","raw_affiliation_strings":["School of Artificial Intelligence, Beijing Normal University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Beijing Normal University, Beijing, China","institution_ids":["https://openalex.org/I25254941"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100371984","display_name":"Yue Wang","orcid":"https://orcid.org/0000-0002-0278-2347"},"institutions":[{"id":"https://openalex.org/I25254941","display_name":"Beijing Normal University","ror":"https://ror.org/022k4wk35","country_code":"CN","type":"education","lineage":["https://openalex.org/I25254941"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Wang","raw_affiliation_strings":["School of Artificial Intelligence, Beijing Normal University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Beijing Normal University, Beijing, China","institution_ids":["https://openalex.org/I25254941"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102769979","display_name":"Shang Gao","orcid":"https://orcid.org/0000-0003-0135-6116"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Shang Gao","raw_affiliation_strings":["Department of Computing and the School of Accounting and Finance, Hong Kong Polytechnic University, Hong Kong","Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computing and the School of Accounting and Finance, Hong Kong Polytechnic University, Hong Kong","institution_ids":["https://openalex.org/I14243506"]},{"raw_affiliation_string":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110500992","display_name":"Siu\u2010Ming Yiu","orcid":null},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"HK","type":"education","lineage":["https://openalex.org/I177725633"]},{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Siu-Ming Yiu","raw_affiliation_strings":["School of Computing and Data Science, The University of Hong Kong, Hong Kong","School of Computing and Data Science, The University of Hong Kong, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"School of Computing and Data Science, The University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I889458895"]},{"raw_affiliation_string":"School of Computing and Data Science, The University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I177725633","https://openalex.org/I889458895"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100365935","display_name":"Bin Xiao","orcid":"https://orcid.org/0000-0003-4223-8220"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Bin Xiao","raw_affiliation_strings":["Department of Computing, The Hong Kong Polytechnic University, Hong Kong","Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong","institution_ids":["https://openalex.org/I14243506"]},{"raw_affiliation_string":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5102714724"],"corresponding_institution_ids":["https://openalex.org/I177725633","https://openalex.org/I889458895"],"apc_list":null,"apc_paid":null,"fwci":8.4227,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.97375782,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"23","issue":"1","first_page":"1203","last_page":"1218"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6592000126838684},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.646399974822998},{"id":"https://openalex.org/keywords/computer-access-control","display_name":"Computer access control","score":0.5945000052452087},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.520799994468689},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.3714999854564667},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.3578000068664551},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.3555000126361847},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3443000018596649},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.33550000190734863}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.840399980545044},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6592000126838684},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.646399974822998},{"id":"https://openalex.org/C44415380","wikidata":"https://www.wikidata.org/wiki/Q17008721","display_name":"Computer access control","level":3,"score":0.5945000052452087},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.520799994468689},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4781999886035919},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.42719998955726624},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.3714999854564667},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.3578000068664551},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.3555000126361847},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3443000018596649},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.33550000190734863},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.3273000121116638},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.3102000057697296},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.30149999260902405},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.30140000581741333},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.3003999888896942},{"id":"https://openalex.org/C1668388","wikidata":"https://www.wikidata.org/wiki/Q1149776","display_name":"Data management","level":2,"score":0.2935999929904938},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.29249998927116394},{"id":"https://openalex.org/C2778950925","wikidata":"https://www.wikidata.org/wiki/Q4672474","display_name":"Access structure","level":4,"score":0.2888999879360199},{"id":"https://openalex.org/C2778281673","wikidata":"https://www.wikidata.org/wiki/Q4972106","display_name":"Broadcast encryption","level":4,"score":0.28130000829696655},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.2784000039100647},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2651999890804291},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.25760000944137573},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.2540999948978424},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.2538999915122986}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3615931","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3615931","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":65,"referenced_works":["https://openalex.org/W1507039798","https://openalex.org/W1601035152","https://openalex.org/W1851414966","https://openalex.org/W1998368731","https://openalex.org/W2033165262","https://openalex.org/W2053368181","https://openalex.org/W2080574324","https://openalex.org/W2094240047","https://openalex.org/W2108072891","https://openalex.org/W2138001464","https://openalex.org/W2152924492","https://openalex.org/W2159945615","https://openalex.org/W2161214567","https://openalex.org/W2162567660","https://openalex.org/W2238904460","https://openalex.org/W2264699053","https://openalex.org/W2320470009","https://openalex.org/W2343608747","https://openalex.org/W2533357737","https://openalex.org/W2554084073","https://openalex.org/W2597901792","https://openalex.org/W2759564290","https://openalex.org/W2764301848","https://openalex.org/W2784296252","https://openalex.org/W2793018217","https://openalex.org/W2909528616","https://openalex.org/W2920126279","https://openalex.org/W2920438532","https://openalex.org/W2946454816","https://openalex.org/W2958449681","https://openalex.org/W2967320897","https://openalex.org/W3002682074","https://openalex.org/W3003429431","https://openalex.org/W3005805302","https://openalex.org/W3006556966","https://openalex.org/W3015253085","https://openalex.org/W3018546377","https://openalex.org/W3041223433","https://openalex.org/W3090998361","https://openalex.org/W3140526655","https://openalex.org/W3179334483","https://openalex.org/W3210120062","https://openalex.org/W3213572057","https://openalex.org/W4226238993","https://openalex.org/W4285110229","https://openalex.org/W4310054767","https://openalex.org/W4313180742","https://openalex.org/W4321448341","https://openalex.org/W4378194868","https://openalex.org/W4381946520","https://openalex.org/W4385080249","https://openalex.org/W4385800792","https://openalex.org/W4386453587","https://openalex.org/W4386754075","https://openalex.org/W4387682089","https://openalex.org/W4388857768","https://openalex.org/W4389609651","https://openalex.org/W4392140910","https://openalex.org/W4392405738","https://openalex.org/W4396723634","https://openalex.org/W4396758751","https://openalex.org/W4399031010","https://openalex.org/W4402592908","https://openalex.org/W4403578209","https://openalex.org/W4405517714"],"related_works":[],"abstract_inverted_index":{"Web":[0,138],"data":[1,7,22,33,80,139,169],"management":[2],"has":[3],"become":[4],"crucial":[5],"to":[6,16,30,34,43,52,86,162,181,202,215,231],"sharing":[8],"among":[9],"users":[10,29],"and":[11,70,95,109,133,149,177,191,205,222,228],"servers.":[12],"One":[13],"promising":[14],"approach":[15],"guaranteeing":[17],"the":[18,35,72,87,92,124,164,174,203,220],"privacy":[19],"of":[20],"shared":[21],"is":[23,225],"searchable":[24],"encryption":[25,161],"(SE),":[26],"which":[27,38],"allows":[28],"outsource":[31],"encrypted":[32,127],"web":[36,88],"server,":[37,89],"can":[39],"then":[40],"respond":[41],"confidentially":[42],"keyword":[44],"queries.":[45],"Several":[46],"SE":[47,114],"schemes":[48,115],"support":[49],"access":[50,68,111,135,151,184],"control":[51,69,112,136,152,185],"meet":[53],"data-sharing":[54],"requirements.":[55],"However,":[56],"several":[57],"works":[58],"(e.g.,":[59,97],"Zhang":[60,62],"TSC'23,":[61],"TCC'21)":[63],"only":[64,226],"focus":[65],"on":[66],"single-user":[67],"ignore":[71],"need":[73],"for":[74,137,167,186],"multi-user":[75,134,150],"scenarios.":[76],"Besides,":[77],"a":[78,103,155,168,196],"malicious":[79,156],"owner":[81,107,131,147],"may":[82],"send":[83],"useless":[84],"ciphertexts":[85],"potentially":[90],"making":[91],"system":[93],"insecure":[94],"impractical":[96],"Wang":[98],"TPDS'22,":[99],"Xu":[100],"TDSC'20).":[101],"As":[102],"result,":[104],"research":[105],"regarding":[106],"authentication":[108,132,148,166],"multiuser":[110],"in":[113,154,195],"remains":[116],"underexplored.":[117],"In":[118],"this":[119],"work,":[120],"we":[121,172,209],"construct":[122],"SEOMA,":[123],"first":[125],"multi-keyword":[126],"search":[128],"primitive":[129],"supporting":[130],"management.":[140],"Unlike":[141],"existing":[142,216],"solutions,":[143],"our":[144],"design":[145],"achieves":[146],"simultaneously":[153],"setting.":[157],"We":[158,188],"incorporate":[159],"attribute":[160,165],"realize":[163],"owner.":[170],"Then,":[171],"leverage":[173],"policy":[175],"tree":[176],"linear":[178],"secret-sharing":[179],"techniques":[180],"achieve":[182],"hierarchical":[183],"users.":[187],"also":[189],"formalize":[190],"demonstrate":[192],"its":[193],"security":[194],"random":[197],"oracle":[198],"model":[199],"by":[200],"reducing":[201],"DBDH":[204],"CBDH":[206],"problem.":[207],"Eventually,":[208],"conduct":[210],"comprehensive":[211],"performance":[212],"evaluations":[213],"compared":[214,230],"state-of-the-art":[217],"schemes.":[218],"Specifically,":[219],"computation":[221],"communication":[223],"overhead":[224],"0.05-0.4\u00d7":[227],"0.07-0.47\u00d7":[229],"prior":[232],"arts,":[233],"respectively.":[234]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
