{"id":"https://openalex.org/W4406858640","doi":"https://doi.org/10.1109/tifs.2025.3530692","title":"Query Correlation Attack Against Searchable Symmetric Encryption With Supporting for Conjunctive Queries","display_name":"Query Correlation Attack Against Searchable Symmetric Encryption With Supporting for Conjunctive Queries","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4406858640","doi":"https://doi.org/10.1109/tifs.2025.3530692"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3530692","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3530692","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008444517","display_name":"H. Liu","orcid":"https://orcid.org/0009-0006-9968-5733"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hanyong Liu","raw_affiliation_strings":["School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100781026","display_name":"Lei Xu","orcid":"https://orcid.org/0000-0001-9178-6640"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Xu","raw_affiliation_strings":["School of Mathematics and Statistics, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Statistics, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100778754","display_name":"Xiaoning Liu","orcid":"https://orcid.org/0000-0002-9874-8839"},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Xiaoning Liu","raw_affiliation_strings":["School of Computing Technologies, RMIT University, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing Technologies, RMIT University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I82951845"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101941484","display_name":"Lin Mei","orcid":"https://orcid.org/0000-0003-1585-2903"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Mei","raw_affiliation_strings":["School of Mathematics and Statistics, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Statistics, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028945912","display_name":"Chungen Xu","orcid":"https://orcid.org/0000-0001-9380-5913"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chungen Xu","raw_affiliation_strings":["School of Mathematics and Statistics, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Statistics, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5008444517"],"corresponding_institution_ids":["https://openalex.org/I36399199"],"apc_list":null,"apc_paid":null,"fwci":7.4546,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.96135356,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"20","issue":null,"first_page":"1924","last_page":"1936"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9753000140190125,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8460687398910522},{"id":"https://openalex.org/keywords/conjunctive-query","display_name":"Conjunctive query","score":0.6871163845062256},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6864258646965027},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.542737603187561},{"id":"https://openalex.org/keywords/boolean-conjunctive-query","display_name":"Boolean conjunctive query","score":0.4517565965652466},{"id":"https://openalex.org/keywords/query-optimization","display_name":"Query optimization","score":0.4296415448188782},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3867132365703583},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.35222160816192627},{"id":"https://openalex.org/keywords/web-search-query","display_name":"Web search query","score":0.34405529499053955},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3276633024215698},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.281158447265625},{"id":"https://openalex.org/keywords/relational-database","display_name":"Relational database","score":0.28049761056900024},{"id":"https://openalex.org/keywords/sargable","display_name":"Sargable","score":0.2694924771785736},{"id":"https://openalex.org/keywords/search-engine","display_name":"Search engine","score":0.140559583902359}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8460687398910522},{"id":"https://openalex.org/C65647387","wikidata":"https://www.wikidata.org/wiki/Q1781706","display_name":"Conjunctive query","level":3,"score":0.6871163845062256},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6864258646965027},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.542737603187561},{"id":"https://openalex.org/C24755975","wikidata":"https://www.wikidata.org/wiki/Q4943354","display_name":"Boolean conjunctive query","level":5,"score":0.4517565965652466},{"id":"https://openalex.org/C157692150","wikidata":"https://www.wikidata.org/wiki/Q2919848","display_name":"Query optimization","level":2,"score":0.4296415448188782},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3867132365703583},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.35222160816192627},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.34405529499053955},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3276633024215698},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.281158447265625},{"id":"https://openalex.org/C5655090","wikidata":"https://www.wikidata.org/wiki/Q192588","display_name":"Relational database","level":2,"score":0.28049761056900024},{"id":"https://openalex.org/C192939062","wikidata":"https://www.wikidata.org/wiki/Q104840822","display_name":"Sargable","level":4,"score":0.2694924771785736},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.140559583902359}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3530692","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3530692","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1910971796","display_name":null,"funder_award_id":"62072240","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2697875972","display_name":null,"funder_award_id":"62202228","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3725969316","display_name":null,"funder_award_id":"BK20210330","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322769","display_name":"Natural Science Foundation of Jiangsu Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W1502708590","https://openalex.org/W1539859404","https://openalex.org/W1593940884","https://openalex.org/W2033165262","https://openalex.org/W2039244047","https://openalex.org/W2108182844","https://openalex.org/W2131043660","https://openalex.org/W2146828512","https://openalex.org/W2147929033","https://openalex.org/W2161444532","https://openalex.org/W2166524953","https://openalex.org/W2535294034","https://openalex.org/W2765463836","https://openalex.org/W2792158747","https://openalex.org/W2885155096","https://openalex.org/W2885251908","https://openalex.org/W2891250116","https://openalex.org/W2891871515","https://openalex.org/W2946109000","https://openalex.org/W2982401473","https://openalex.org/W2986992030","https://openalex.org/W2990722039","https://openalex.org/W3006791962","https://openalex.org/W3045646070","https://openalex.org/W3138969459","https://openalex.org/W3139404512","https://openalex.org/W3151309405","https://openalex.org/W3186962476","https://openalex.org/W3213572057","https://openalex.org/W3214305154","https://openalex.org/W4205662536","https://openalex.org/W4285306948","https://openalex.org/W4321021982","https://openalex.org/W4323349099","https://openalex.org/W4360993064","https://openalex.org/W4376456651","https://openalex.org/W4384519212","https://openalex.org/W4385080249","https://openalex.org/W4386754075","https://openalex.org/W4387857582","https://openalex.org/W4389857676","https://openalex.org/W4390604269","https://openalex.org/W4390741765","https://openalex.org/W6686193429","https://openalex.org/W6713547331","https://openalex.org/W6720239471","https://openalex.org/W6754229632","https://openalex.org/W6767244752","https://openalex.org/W6782091288","https://openalex.org/W6784374016","https://openalex.org/W6800747130","https://openalex.org/W6803567633","https://openalex.org/W6850193174","https://openalex.org/W6854020401"],"related_works":["https://openalex.org/W1483388050","https://openalex.org/W2137382312","https://openalex.org/W2004485491","https://openalex.org/W3125756434","https://openalex.org/W2170741935","https://openalex.org/W2032524361","https://openalex.org/W2103713061","https://openalex.org/W4394751528","https://openalex.org/W32512226","https://openalex.org/W2387635197"],"abstract_inverted_index":{"Searchable":[0],"symmetric":[1],"encryption":[2],"(SSE)":[3],"supporting":[4],"conjunctive":[5,118,141,159,237],"queries":[6],"has":[7,25],"garnered":[8],"significant":[9,230],"attention":[10],"over":[11],"the":[12,31,57,115,132,138,144,151,174,184,193,229,241],"past":[13],"decade":[14],"due":[15],"to":[16,38,49,59,92,114,182,215],"its":[17],"practicality":[18],"and":[19,34,86,90,177,188,217,224,239],"wide":[20],"applicability.":[21],"While":[22],"extensive":[23],"research":[24],"addressed":[26],"common":[27],"leakages,":[28],"such":[29],"as":[30],"access":[32],"pattern":[33,176,181],"search":[35,175],"pattern,":[36],"efforts":[37],"mitigate":[39],"these":[40],"vulnerabilities":[41],"have":[42],"primarily":[43],"focused":[44],"on":[45,192],"structural":[46],"issues":[47],"inherent":[48,69],"scheme":[50],"construction.":[51],"In":[52],"this":[53,122],"work,":[54],"we":[55,124,130,162],"shift":[56],"focus":[58],"a":[60,94,105,111,158,164,200,208],"less":[61],"explored":[62],"yet":[63],"critical":[64],"leakage":[65],"stemming":[66],"from":[67,213],"users\u2019":[68],"querying":[70],"behaviors:":[71],"query":[72,96,102,135,146,167,179,201,220,234],"correlation.":[73],"Originally":[74],"introduced":[75],"by":[76,84,233],"Grubbs":[77],"et":[78],"al.":[79],"[USENIX":[80,88],"SEC\u201920],":[81],"formally":[82],"defined":[83],"Oya":[85],"Kerschbaum":[87],"SEC\u201922],":[89],"leveraged":[91],"mount":[93],"high-success":[95],"recovery":[97,168,202],"attack":[98],"against":[99],"single-keyword":[100],"SSE,":[101,142],"correlation":[103,136,147,180,235],"raises":[104],"crucial":[106],"question:":[107],"does":[108],"it":[109],"pose":[110],"similar":[112],"threat":[113,231],"security":[116],"of":[117,134,140,204],"SSE?":[119],"To":[120],"tackle":[121],"issue,":[123],"undertake":[125],"two":[126],"key":[127],"efforts.":[128],"First,":[129],"generalize":[131],"notion":[133],"in":[137,236],"context":[139],"introducing":[143],"\u201cgeneralized":[145],"pattern\u201d,":[148],"which":[149,171],"captures":[150],"co-occurrence":[152],"relationships":[153],"among":[154],"queried":[155],"tokens":[156,187],"within":[157],"query.":[160],"Second,":[161],"develop":[163],"new":[165],"passive":[166],"attack,":[169],"QCCK,":[170],"exploits":[172],"both":[173],"generalized":[178],"infer":[183],"mapping":[185],"between":[186,222],"keywords.":[189],"Comprehensive":[190],"evaluations":[191],"Enron":[194],"dataset":[195],"confirm":[196],"QCCK\u2019s":[197],"efficacy,":[198],"achieving":[199],"rate":[203],"approximately":[205],"80%":[206],"with":[207],"keyword":[209],"universe":[210],"size":[211,221],"ranging":[212],"200":[214],"1000":[216],"an":[218],"observed":[219],"5000":[223],"50,000.":[225],"These":[226],"findings":[227],"highlight":[228],"posed":[232],"SSE":[238],"underscore":[240],"urgent":[242],"need":[243],"for":[244],"robust":[245],"countermeasures.":[246]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
