{"id":"https://openalex.org/W4414968959","doi":"https://doi.org/10.1186/s42400-025-00370-9","title":"SEAC: dynamic searchable symmetric encryption with lightweight update-search permission control","display_name":"SEAC: dynamic searchable symmetric encryption with lightweight update-search permission control","publication_year":2025,"publication_date":"2025-10-09","ids":{"openalex":"https://openalex.org/W4414968959","doi":"https://doi.org/10.1186/s42400-025-00370-9"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00370-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00370-9","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00370-9","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00370-9","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Zhuobin Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhuobin Hu","raw_affiliation_strings":["School of Cyber Science and Engineering, Nanjing University of Science and Technology, No. 200 Xiaolingwei Street, Xuanwu District, Nanjing, Jiangsu Province, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, No. 200 Xiaolingwei Street, Xuanwu District, Nanjing, Jiangsu Province, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101507773","display_name":"Jiabei Wang","orcid":"https://orcid.org/0000-0001-7248-4380"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiabei Wang","raw_affiliation_strings":["School of Cyber Science and Engineering, Nanjing University of Science and Technology, No. 200 Xiaolingwei Street, Xuanwu District, Nanjing, Jiangsu Province, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, No. 200 Xiaolingwei Street, Xuanwu District, Nanjing, Jiangsu Province, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023757704","display_name":"Zhicong Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengkai Chen","raw_affiliation_strings":["School of Cyber Science and Engineering, Nanjing University of Science and Technology, No. 200 Xiaolingwei Street, Xuanwu District, Nanjing, Jiangsu Province, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, No. 200 Xiaolingwei Street, Xuanwu District, Nanjing, Jiangsu Province, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021316042","display_name":"Zeng\u2010Yue Ge","orcid":null},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhaoxuan Ge","raw_affiliation_strings":["School of Cyber Science and Engineering, Nanjing University of Science and Technology, No. 200 Xiaolingwei Street, Xuanwu District, Nanjing, Jiangsu Province, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, No. 200 Xiaolingwei Street, Xuanwu District, Nanjing, Jiangsu Province, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119909980","display_name":"Mingyu Bian","orcid":null},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingyu Bian","raw_affiliation_strings":["School of Cyber Science and Engineering, Nanjing University of Science and Technology, No. 200 Xiaolingwei Street, Xuanwu District, Nanjing, Jiangsu Province, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, No. 200 Xiaolingwei Street, Xuanwu District, Nanjing, Jiangsu Province, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100333434","display_name":"Lei Chen","orcid":"https://orcid.org/0000-0002-0293-7855"},"institutions":[{"id":"https://openalex.org/I2799321762","display_name":"WuXi AppTec (China)","ror":"https://ror.org/04eh3ca90","country_code":"CN","type":"company","lineage":["https://openalex.org/I2799321762"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Chen","raw_affiliation_strings":["Shanghai Yunxi Technology Co., Ltd, Inspur Group Co., Ltd, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Yunxi Technology Co., Ltd, Inspur Group Co., Ltd, Shanghai, China","institution_ids":["https://openalex.org/I2799321762"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063991302","display_name":"Yongbin Zhou","orcid":"https://orcid.org/0000-0002-1337-0655"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongbin Zhou","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","School of Cyber Science and Engineering, Nanjing University of Science and Technology, No. 200 Xiaolingwei Street, Xuanwu District, Nanjing, Jiangsu Province, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Nanjing University of Science and Technology, No. 200 Xiaolingwei Street, Xuanwu District, Nanjing, Jiangsu Province, China","institution_ids":["https://openalex.org/I36399199"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I36399199"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14372571,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.8069000244140625},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6963000297546387},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6008999943733215},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.548799991607666},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5144000053405762},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.48069998621940613},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4700999855995178},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.4453999996185303},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4244000017642975}],"concepts":[{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.8069000244140625},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8047000169754028},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6963000297546387},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6008999943733215},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.548799991607666},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5144000053405762},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.48069998621940613},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47920000553131104},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4700999855995178},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.4453999996185303},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4244000017642975},{"id":"https://openalex.org/C2778281673","wikidata":"https://www.wikidata.org/wiki/Q4972106","display_name":"Broadcast encryption","level":4,"score":0.4066999852657318},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4009000062942505},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40059998631477356},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.39820000529289246},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.38089999556541443},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.3513999879360199},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.33799999952316284},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.311599999666214},{"id":"https://openalex.org/C11045955","wikidata":"https://www.wikidata.org/wiki/Q1162410","display_name":"ElGamal encryption","level":4,"score":0.30799999833106995},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.3018999993801117},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.29840001463890076},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2768999934196472},{"id":"https://openalex.org/C75165309","wikidata":"https://www.wikidata.org/wiki/Q2258979","display_name":"Search engine indexing","level":2,"score":0.271699994802475},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.26759999990463257},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.25920000672340393},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2587999999523163}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00370-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00370-9","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00370-9","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a30b24d6e6b0458caaea6a552a7a2e64","is_oa":true,"landing_page_url":"https://doaj.org/article/a30b24d6e6b0458caaea6a552a7a2e64","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-21 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00370-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00370-9","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00370-9","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G201311321","display_name":null,"funder_award_id":"ZTZB-23-990-024","funder_id":"https://openalex.org/F4320323970","funder_display_name":"Ministry of Industry and Information Technology of the People's Republic of China"},{"id":"https://openalex.org/G5558098249","display_name":null,"funder_award_id":"NO.ZTZB-23-990-024","funder_id":"https://openalex.org/F4320323970","funder_display_name":"Ministry of Industry and Information Technology of the People's Republic of China"}],"funders":[{"id":"https://openalex.org/F4320323970","display_name":"Ministry of Industry and Information Technology of the People's Republic of China","ror":"https://ror.org/0385nmy68"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4414968959.pdf","grobid_xml":"https://content.openalex.org/works/W4414968959.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W1502708590","https://openalex.org/W1607188293","https://openalex.org/W1988374166","https://openalex.org/W2016575873","https://openalex.org/W2031533839","https://openalex.org/W2108072891","https://openalex.org/W2146828512","https://openalex.org/W2152516507","https://openalex.org/W2161214567","https://openalex.org/W2238608490","https://openalex.org/W2539385377","https://openalex.org/W2545189819","https://openalex.org/W2607264166","https://openalex.org/W2765463836","https://openalex.org/W2891020614","https://openalex.org/W2891250116","https://openalex.org/W2954588143","https://openalex.org/W2972997072","https://openalex.org/W2984363960","https://openalex.org/W3092778131","https://openalex.org/W3109366984","https://openalex.org/W3128530640","https://openalex.org/W3138969459","https://openalex.org/W3191719240","https://openalex.org/W4214848001","https://openalex.org/W4313577296","https://openalex.org/W4324007090","https://openalex.org/W4376456651","https://openalex.org/W4379184389"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Sharing":[1],"electronic":[2],"protected":[3],"health":[4],"information":[5],"(ePHI)":[6],"is":[7,36,109],"highly":[8],"beneficial":[9],"in":[10,60,189],"public":[11],"affairs.":[12],"Constructing":[13],"a":[14,20,30,50,90,112,178,181],"cloud-assisted":[15,104],"ePHI":[16],"retrieval":[17,59],"service":[18],"represents":[19],"modern":[21],"strategy":[22],"that":[23,150,163],"enhances":[24],"cost-effectiveness":[25],"and":[26,57,73,81,153,157,173,180,187],"efficiency,":[27],"making":[28],"it":[29],"promising":[31],"solution.":[32],"However,":[33],"widespread":[34],"implementation":[35],"hindered":[37],"by":[38],"concerns":[39],"over":[40],"privacy":[41,56],"violations.":[42],"Symmetric":[43,96],"Searchable":[44,95],"Encryption":[45,97],"(SSE)":[46],"has":[47],"emerged":[48],"as":[49,99],"practical":[51,190],"approach":[52],"for":[53,102,138],"ensuring":[54],"data":[55,75],"efficient":[58,74,135],"the":[61],"cloud":[62],"without":[63],"decryption.":[64],"Nonetheless,":[65],"existing":[66],"SSE":[67],"schemes":[68],"encounter":[69],"challenges,":[70],"including":[71],"secure":[72],"updates,":[76],"effective":[77],"search-update":[78],"permission":[79,161],"control,":[80],"cross-platform":[82],"adaptability.":[83],"To":[84],"address":[85],"these":[86],"limitations,":[87],"we":[88],"propose":[89],"novel":[91],"variant":[92],"of":[93,106],"Dynamic":[94],"known":[98],"SEAC,":[100],"tailored":[101],"secure,":[103],"sharing":[105],"ePHI.":[107],"SEAC":[108],"formalized":[110],"within":[111],"multi-client/single-server":[113],"model,":[114],"enabling":[115],"authorized":[116],"clients":[117],"to":[118],"perform":[119],"search":[120,149],"or":[121],"update":[122],"on":[123],"encrypted":[124],"data.":[125],"The":[126],"concrete":[127],"construction":[128],"integrates":[129],"dynamic":[130],"cryptographic":[131],"accumulators":[132],"with":[133],"an":[134],"binding":[136],"mechanism":[137],"index":[139],"structures,":[140],"offering":[141],"two":[142],"key":[143],"features:":[144],"(1)":[145],"sublinear":[146],"conjunctive":[147],"keyword":[148],"ensures":[151],"forward":[152],"Type-II":[154],"backward":[155],"privacy,":[156],"(2)":[158],"lightweight,":[159],"updatable":[160],"control":[162],"effectively":[164],"mitigates":[165],"read-write":[166],"confusion":[167],"while":[168],"supporting":[169],"scalable":[170],"user":[171],"revocation":[172],"re-authorization.":[174],"We":[175],"developed":[176],"both":[177],"localized":[179],"web-based":[182],"implementation,":[183],"demonstrating":[184],"its":[185],"efficiency":[186],"scalability":[188],"applications.":[191]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
