{"id":"https://openalex.org/W3007130173","doi":"https://doi.org/10.1145/3377644.3377666","title":"Forward Secure Dynamic Searchable Symmetric Encryption with Lighter Storage","display_name":"Forward Secure Dynamic Searchable Symmetric Encryption with Lighter Storage","publication_year":2020,"publication_date":"2020-01-10","ids":{"openalex":"https://openalex.org/W3007130173","doi":"https://doi.org/10.1145/3377644.3377666","mag":"3007130173"},"language":"en","primary_location":{"id":"doi:10.1145/3377644.3377666","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3377644.3377666","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100394917","display_name":"Jing Chen","orcid":"https://orcid.org/0000-0002-7212-5297"},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]},{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jing Chen","raw_affiliation_strings":["Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023159259","display_name":"Zhenfu Cao","orcid":"https://orcid.org/0000-0002-5250-5030"},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]},{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenfu Cao","raw_affiliation_strings":["Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China and Cyberspace Security Research Center, Pen Cheng Laboratory, Shenzhen, China, Shanghai Institute of Intelligent Science and Technology, Tongji University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China and Cyberspace Security Research Center, Pen Cheng Laboratory, Shenzhen, China, Shanghai Institute of Intelligent Science and Technology, Tongji University, Shanghai, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I116953780","https://openalex.org/I66867065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032750969","display_name":"Jiachen Shen","orcid":"https://orcid.org/0000-0003-2376-5068"},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]},{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiachen Shen","raw_affiliation_strings":["Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077456653","display_name":"Xiaolei Dong","orcid":"https://orcid.org/0000-0002-5844-0223"},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]},{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaolei Dong","raw_affiliation_strings":["Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046852822","display_name":"Xingkai Wang","orcid":"https://orcid.org/0000-0001-6943-9968"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingkai Wang","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100394917"],"corresponding_institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"],"apc_list":null,"apc_paid":null,"fwci":0.2651,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.60966323,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"24","last_page":"30"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7086985111236572},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6751160621643066},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5617374777793884},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.5318260788917542},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3989775776863098},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.25629669427871704}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7086985111236572},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6751160621643066},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5617374777793884},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.5318260788917542},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3989775776863098},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.25629669427871704}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3377644.3377666","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3377644.3377666","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2117362057","https://openalex.org/W2146828512","https://openalex.org/W2152516507","https://openalex.org/W2472177816","https://openalex.org/W2539385377","https://openalex.org/W2765463836","https://openalex.org/W2766707306","https://openalex.org/W2914247668","https://openalex.org/W6720239471","https://openalex.org/W6758458765"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2322947709","https://openalex.org/W4385192994","https://openalex.org/W4255237014","https://openalex.org/W4242847202","https://openalex.org/W2768869846","https://openalex.org/W2951531469","https://openalex.org/W2384237980","https://openalex.org/W3144186108"],"abstract_inverted_index":{"Users":[0],"with":[1],"limited":[2],"computing":[3],"and":[4,52,80,128],"storage":[5,112],"capabilities":[6],"can":[7],"access":[8],"large":[9],"amounts":[10],"of":[11,45,59,108],"data":[12,37],"easily":[13],"by":[14,100],"uploading":[15],"the":[16,43,50,60],"database":[17],"to":[18,24,103,118],"cloud":[19],"server.":[20],"But":[21],"this":[22,76],"leads":[23],"security":[25,106],"issues.":[26],"Dynamic":[27],"searchable":[28,64,88],"encryption":[29,65,89],"scheme":[30],"is":[31,114],"a":[32,82,95],"solution,":[33],"providing":[34],"not":[35,68],"only":[36],"privacy":[38],"for":[39,47],"users,":[40],"but":[41],"also":[42,93],"ability":[44],"searching":[46],"keywords":[48],"on":[49],"ciphertext":[51],"inserting":[53],"or":[54],"deleting":[55],"documents.":[56],"However,":[57],"most":[58],"existing":[61],"efficient":[62],"dynamic":[63,86],"schemes":[66],"do":[67],"satisfy":[69],"forward":[70,84,105],"security,":[71],"considering":[72],"file-injection":[73],"attack.":[74],"In":[75],"paper,":[77],"we":[78,125],"design":[79],"implement":[81],"new":[83,96],"secure":[85],"symmetric":[87],"(DSSE)":[90],"scheme.":[91,131],"We":[92],"use":[94],"index":[97],"structure":[98],"inspired":[99],"linked":[101],"list":[102],"achieve":[104],"instead":[107],"using":[109],"ORAM.":[110],"Our":[111],"overhead":[113],"greatly":[115],"reduced":[116],"compared":[117],"previous":[119],"works,":[120],"without":[121],"losing":[122],"efficiency.":[123],"Finally,":[124],"implement,":[126],"evaluate":[127],"analyze":[129],"our":[130]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
