{"id":"https://openalex.org/W4415747855","doi":"https://doi.org/10.1109/tdsc.2025.3627926","title":"Multi-Writer/Reader Forward and Backward Private DSSE With Bilateral Selection","display_name":"Multi-Writer/Reader Forward and Backward Private DSSE With Bilateral Selection","publication_year":2025,"publication_date":"2025-10-31","ids":{"openalex":"https://openalex.org/W4415747855","doi":"https://doi.org/10.1109/tdsc.2025.3627926"},"language":null,"primary_location":{"id":"doi:10.1109/tdsc.2025.3627926","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3627926","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029376715","display_name":"Jiawen Wu","orcid":"https://orcid.org/0009-0001-1334-1141"},"institutions":[{"id":"https://openalex.org/I23632641","display_name":"Shanghai University of Electric Power","ror":"https://ror.org/02w4tny03","country_code":"CN","type":"education","lineage":["https://openalex.org/I23632641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiawen Wu","raw_affiliation_strings":["College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai, China","institution_ids":["https://openalex.org/I23632641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056376119","display_name":"Kai Zhang","orcid":"https://orcid.org/0000-0001-9728-4051"},"institutions":[{"id":"https://openalex.org/I23632641","display_name":"Shanghai University of Electric Power","ror":"https://ror.org/02w4tny03","country_code":"CN","type":"education","lineage":["https://openalex.org/I23632641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai, China","institution_ids":["https://openalex.org/I23632641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081596329","display_name":"Jianting Ning","orcid":"https://orcid.org/0000-0001-7165-398X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianting Ning","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051864819","display_name":"Hao Chen","orcid":"https://orcid.org/0000-0001-9445-035X"},"institutions":[{"id":"https://openalex.org/I6469544","display_name":"City University of Macau","ror":"https://ror.org/04gpd4q15","country_code":"MO","type":"education","lineage":["https://openalex.org/I6469544"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Hao Chen","raw_affiliation_strings":["Faculty of Data Science, City University of Macau, Macau, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Data Science, City University of Macau, Macau, China","institution_ids":["https://openalex.org/I6469544"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090039254","display_name":"Lefeng Zhang","orcid":"https://orcid.org/0000-0002-7608-7910"},"institutions":[{"id":"https://openalex.org/I6469544","display_name":"City University of Macau","ror":"https://ror.org/04gpd4q15","country_code":"MO","type":"education","lineage":["https://openalex.org/I6469544"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Lefeng Zhang","raw_affiliation_strings":["Faculty of Data Science, City University of Macau, Macau, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Data Science, City University of Macau, Macau, China","institution_ids":["https://openalex.org/I6469544"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010732720","display_name":"Zuobin Ying","orcid":"https://orcid.org/0000-0002-1658-4931"},"institutions":[{"id":"https://openalex.org/I6469544","display_name":"City University of Macau","ror":"https://ror.org/04gpd4q15","country_code":"MO","type":"education","lineage":["https://openalex.org/I6469544"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Zuobin Ying","raw_affiliation_strings":["Faculty of Data Science, City University of Macau, Macau, China"],"affiliations":[{"raw_affiliation_string":"Faculty of Data Science, City University of Macau, Macau, China","institution_ids":["https://openalex.org/I6469544"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5029376715"],"corresponding_institution_ids":["https://openalex.org/I23632641"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17293805,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"2","first_page":"2444","last_page":"2457"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.005799999926239252,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.002099999925121665,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7235000133514404},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7045999765396118},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.6014999747276306},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.5932999849319458},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5370000004768372},{"id":"https://openalex.org/keywords/conjunctive-query","display_name":"Conjunctive query","score":0.5189999938011169},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.5108000040054321},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4456999897956848},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.44369998574256897}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.873199999332428},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7235000133514404},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7045999765396118},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.6014999747276306},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.5932999849319458},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5370000004768372},{"id":"https://openalex.org/C65647387","wikidata":"https://www.wikidata.org/wiki/Q1781706","display_name":"Conjunctive query","level":3,"score":0.5189999938011169},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.5108000040054321},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4632999897003174},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4456999897956848},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.44369998574256897},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.4422000050544739},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38429999351501465},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3781999945640564},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.37380000948905945},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.34130001068115234},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2996000051498413},{"id":"https://openalex.org/C2987335383","wikidata":"https://www.wikidata.org/wiki/Q878048","display_name":"Cloud server","level":3,"score":0.2996000051498413},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.2994000017642975},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.2994000017642975},{"id":"https://openalex.org/C2988412617","wikidata":"https://www.wikidata.org/wiki/Q7441656","display_name":"Keyword search","level":2,"score":0.29100000858306885},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.28380000591278076},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28279998898506165},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.26350000500679016},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.2615000009536743},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.25519999861717224},{"id":"https://openalex.org/C2989070954","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database query","level":2,"score":0.25060001015663147}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3627926","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3627926","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1502708590","https://openalex.org/W1826672334","https://openalex.org/W1905774212","https://openalex.org/W2092335398","https://openalex.org/W2146828512","https://openalex.org/W2152516507","https://openalex.org/W2162538292","https://openalex.org/W2313589991","https://openalex.org/W2520286728","https://openalex.org/W2539385377","https://openalex.org/W2742219060","https://openalex.org/W2765463836","https://openalex.org/W2898077502","https://openalex.org/W2911497226","https://openalex.org/W2972997072","https://openalex.org/W2987992784","https://openalex.org/W3002682074","https://openalex.org/W3005805302","https://openalex.org/W3024098564","https://openalex.org/W3128530640","https://openalex.org/W3199353118","https://openalex.org/W3210866085","https://openalex.org/W4312617070","https://openalex.org/W4313254005","https://openalex.org/W4321021982","https://openalex.org/W4323519519","https://openalex.org/W4366503934","https://openalex.org/W4381946520","https://openalex.org/W4387662607","https://openalex.org/W4391725264","https://openalex.org/W4400121239","https://openalex.org/W4402272899","https://openalex.org/W4404213242"],"related_works":[],"abstract_inverted_index":{"Dynamic":[0],"searchable":[1],"symmetric":[2],"encryption":[3,137],"(DSSE)":[4],"allows":[5],"a":[6,17,57,60,78,98,131,211],"client":[7],"to":[8,26,50,64,175,190],"update":[9,178],"and":[10,43,87,109,121,123,150,169,184,232],"retrieve":[11],"its":[12,85],"encrypted":[13],"database":[14,22,67],"stored":[15],"on":[16,157,210],"server.":[18],"To":[19],"enable":[20],"the":[21,31,66,74,181,187],"contributed":[23],"by":[24,29,146],"multi-writers":[25],"be":[27],"searched":[28],"multi-readers,":[30],"multi-writer/multi-reader":[32],"model":[33],"is":[34],"explored":[35],"for":[36,54,118,180,200,225,236],"DSSE":[37],"(M/M-DSSE).":[38],"Recently,":[39],"FP-HSE":[40],"(USENIX":[41],"Security'22)":[42],"FP-MSE":[44],"(TDSC'24)":[45],"employed":[46],"key":[47,63,144],"aggregation":[48],"methodology":[49],"introduce":[51,130,172],"writer-selection":[52,108,251],"property":[53,76],"M/M-DSSE,":[55],"where":[56,77],"reader":[58],"uses":[59],"single":[61],"aggregate":[62],"search":[65,84,182],"containing":[68],"selective":[69],"writers.":[70],"However,":[71],"they":[72],"neglected":[73],"reader-selection":[75,110],"writer":[79],"selects":[80],"which":[81,147,246],"readers":[82,151],"can":[83,152],"data,":[86],"only":[88],"supported":[89],"single-keyword":[90],"search.":[91],"In":[92],"this":[93],"paper,":[94],"we":[95,129,171,202],"present":[96],"BiMM,":[97,201],"conjunctive":[99,162,237],"M/M-DSSE":[100],"scheme":[101],"with":[102,167,193],"bilateral":[103,135],"selection":[104],"that":[105,139,160,220],"simultaneously":[106],"supports":[107],"properties.":[111,227],"Additionally,":[112],"BiMM":[113,221,239],"achieves":[114,222],"forward":[115],"privacy":[116,126],"(FP)":[117],"both":[119,148],"server":[120,168,214],"client,":[122],"Type-O":[124],"backward":[125],"(BP).":[127],"Technically,":[128],"new":[132],"primitive":[133],"called":[134],"key-aggregate":[136],"(Bi-KAE)":[138],"refines":[140],"KAE":[141],"via":[142],"distributed":[143],"generation,":[145],"writers":[149],"specify":[153],"their":[154],"selections.":[155],"Based":[156],"ODXT":[158],"(NDSS'21)":[159],"provides":[161],"queries":[163],"while":[164],"achieving":[165],"FP":[166,192],"BP,":[170],"double-blinded":[173],"values":[174],"match":[176],"all":[177],"records":[179],"keywords":[183],"additionally":[185],"use":[186],"0/1-Encoding":[188],"technique":[189],"consider":[191,249],"client.":[194],"Besides":[195],"presenting":[196],"formal":[197],"security":[198],"analysis":[199],"also":[203],"conduct":[204],"extensive":[205],"experiments":[206],"over":[207],"public":[208],"datasets":[209],"real":[212],"cloud":[213],"environment.":[215],"The":[216],"experiment":[217],"results":[218],"demonstrate":[219],"practical":[223],"performance":[224],"desired":[226],"With":[228],"#keyword":[229],"=":[230,234],"50":[231],"#s-term":[233],"10":[235],"queries,":[238],"runs":[240],"6.34\u00d7":[241],"faster":[242],"than":[243],"Nomos":[244],"(AsiaCCS'24)":[245],"does":[247],"not":[248],"either":[250],"or":[252],"reader-selection.":[253]},"counts_by_year":[],"updated_date":"2026-03-17T06:59:57.516163","created_date":"2025-10-31T00:00:00"}
