{"id":"https://openalex.org/W2804072773","doi":"https://doi.org/10.3233/jhs-180591","title":"Verifiable memory leakage-resilient dynamic searchable encryption","display_name":"Verifiable memory leakage-resilient dynamic searchable encryption","publication_year":2018,"publication_date":"2018-05-25","ids":{"openalex":"https://openalex.org/W2804072773","doi":"https://doi.org/10.3233/jhs-180591","mag":"2804072773"},"language":"en","primary_location":{"id":"doi:10.3233/jhs-180591","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jhs-180591","pdf_url":null,"source":{"id":"https://openalex.org/S133922704","display_name":"Journal of High Speed Networks","issn_l":"0926-6801","issn":["0926-6801","1875-8940"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of High Speed Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112366821","display_name":"Wenhao Guan","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenhao Guan","raw_affiliation_strings":["State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi\u2019an, China. E-mails:\u00a0guanwh92@163.com,\u00a0ylwang0304@163.com,\u00a0jfwang@xidian.edu.cn"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi\u2019an, China. E-mails:\u00a0guanwh92@163.com,\u00a0ylwang0304@163.com,\u00a0jfwang@xidian.edu.cn","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037694066","display_name":"Yunling Wang","orcid":"https://orcid.org/0000-0001-6561-2540"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]},{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunling Wang","raw_affiliation_strings":["Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems, Guilin University of Electronic Technology, Guilin, China","State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi\u2019an, China. E-mails:\u00a0guanwh92@163.com,\u00a0ylwang0304@163.com,\u00a0jfwang@xidian.edu.cn"],"affiliations":[{"raw_affiliation_string":"Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi\u2019an, China. E-mails:\u00a0guanwh92@163.com,\u00a0ylwang0304@163.com,\u00a0jfwang@xidian.edu.cn","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100358500","display_name":"Jianfeng Wang","orcid":"https://orcid.org/0000-0001-5297-0293"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianfeng Wang","raw_affiliation_strings":["Guangxi Cooperative Innovation Center of Cloud Computing and Big Data, Guilin University of Electronic Technology, Guilin, China","Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, China","State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi\u2019an, China. E-mails:\u00a0guanwh92@163.com,\u00a0ylwang0304@163.com,\u00a0jfwang@xidian.edu.cn"],"affiliations":[{"raw_affiliation_string":"Guangxi Cooperative Innovation Center of Cloud Computing and Big Data, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi\u2019an, China. E-mails:\u00a0guanwh92@163.com,\u00a0ylwang0304@163.com,\u00a0jfwang@xidian.edu.cn","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066298501","display_name":"Xiaotong Fu","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaotong Fu","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi\u2019an, China. E-mail:\u00a0xtfu@mail.xidian.edu.cn"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi\u2019an, China. E-mail:\u00a0xtfu@mail.xidian.edu.cn","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100358500"],"corresponding_institution_ids":["https://openalex.org/I149594827","https://openalex.org/I5343935"],"apc_list":null,"apc_paid":null,"fwci":0.1629,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.56805322,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"24","issue":"3","first_page":"201","last_page":"217"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.836611807346344},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.815447986125946},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6241074204444885},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.5210415720939636},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5039841532707214},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4798450171947479},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.47228389978408813},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.44368234276771545},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.42647111415863037},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4222661554813385},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.41515934467315674},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3731759786605835},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14204812049865723}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.836611807346344},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.815447986125946},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6241074204444885},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.5210415720939636},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5039841532707214},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4798450171947479},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.47228389978408813},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.44368234276771545},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.42647111415863037},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4222661554813385},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.41515934467315674},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3731759786605835},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14204812049865723},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jhs-180591","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jhs-180591","pdf_url":null,"source":{"id":"https://openalex.org/S133922704","display_name":"Journal of High Speed Networks","issn_l":"0926-6801","issn":["0926-6801","1875-8940"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of High Speed Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.47999998927116394,"display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W98478173","https://openalex.org/W207790704","https://openalex.org/W1502708590","https://openalex.org/W1512194687","https://openalex.org/W1539859404","https://openalex.org/W1593940884","https://openalex.org/W1606729219","https://openalex.org/W1610688607","https://openalex.org/W2016575873","https://openalex.org/W2017126829","https://openalex.org/W2031338211","https://openalex.org/W2123845384","https://openalex.org/W2131043660","https://openalex.org/W2141420453","https://openalex.org/W2145426052","https://openalex.org/W2146813141","https://openalex.org/W2147929033","https://openalex.org/W2156030242","https://openalex.org/W2169212403","https://openalex.org/W2175377689","https://openalex.org/W2178241506","https://openalex.org/W2380238046","https://openalex.org/W2398431181","https://openalex.org/W2408171098","https://openalex.org/W2427517674","https://openalex.org/W2494420979","https://openalex.org/W2498753511","https://openalex.org/W2517605205","https://openalex.org/W2592956480","https://openalex.org/W2604129931","https://openalex.org/W2604387743","https://openalex.org/W2738705840","https://openalex.org/W2765463836","https://openalex.org/W2766544523","https://openalex.org/W2766707306","https://openalex.org/W2768869846","https://openalex.org/W3151293064","https://openalex.org/W6712396740"],"related_works":["https://openalex.org/W1557783852","https://openalex.org/W1474916271","https://openalex.org/W2363629235","https://openalex.org/W2998215210","https://openalex.org/W3088939963","https://openalex.org/W2375034746","https://openalex.org/W2963202145","https://openalex.org/W1504170878","https://openalex.org/W3199385136","https://openalex.org/W3001342270"],"abstract_inverted_index":{"Searchable":[0],"symmetric":[1],"encryption":[2],"(SSE)":[3],"allows":[4],"a":[5,14,75,117,125],"data":[6,12,44],"owner":[7],"to":[8,13,21,42,85,146],"outsource":[9],"his":[10],"encrypted":[11,26],"cloud":[15,109],"server":[16],"while":[17],"retaining":[18],"the":[19,37,43,56,100,106,147,150,170],"ability":[20],"perform":[22],"keyword":[23],"search":[24,140],"over":[25],"data.":[27],"The":[28,129,184],"security":[29,171],"guarantees":[30],"of":[31,55,102,108,149],"existing":[32,67],"SSE":[33,68,79],"schemes":[34,69],"require":[35],"that":[36,174,189],"adversary":[38],"has":[39,82],"no":[40,71],"access":[41],"owner\u2019s":[45],"secret":[46,57,151,161],"keys.":[47],"Unfortunately,":[48],"adversaries":[49],"may":[50],"get":[51],"some":[52,165],"or":[53],"all":[54],"keys":[58,162],"through":[59],"memory":[60,64,76,87,134,182],"attacks.":[61,183],"Facing":[62],"such":[63],"attacks,":[65],"most":[66],"are":[70,167],"longer":[72],"secure.":[73],"Recently,":[74],"leakage-resilient":[77],"dynamic":[78,142],"(MLR-DSSE)":[80],"scheme":[81,96,120,158,177,191],"been":[83],"proposed":[84,157,176],"resist":[86],"attacks":[88,135],"from":[89],"physically":[90],"unclonable":[91],"functions":[92],"(PUFs).":[93],"However,":[94],"this":[95,112],"does":[97],"not":[98,131],"consider":[99],"possibility":[101],"dishonest":[103],"behaviors":[104],"on":[105,122],"part":[107],"servers.":[110],"In":[111],"paper,":[113],"we":[114],"first":[115],"propose":[116],"verifiable":[118,126,139],"MLR-DSSE":[119],"based":[121],"PUFs":[123,166],"and":[124,141],"hash":[127],"table.":[128],"construction":[130],"only":[132],"resists":[133],"but":[136],"also":[137],"supports":[138],"updates.":[143],"Besides,":[144],"due":[145],"combination":[148],"sharing":[152],"technique":[153],"with":[154],"PUFs,":[155],"our":[156,175,190],"can":[159],"recover":[160],"even":[163],"if":[164],"broken.":[168],"Furthermore,":[169],"analysis":[172],"demonstrates":[173],"is":[178,192],"non-adaptively":[179],"secure":[180],"against":[181],"evaluation":[185],"experiment":[186],"results":[187],"show":[188],"efficient.":[193]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
