{"id":"https://openalex.org/W4213052215","doi":"https://doi.org/10.1109/tkde.2022.3152033","title":"Verifiable Fuzzy Multi-keyword Search over Encrypted Data with Adaptive Security","display_name":"Verifiable Fuzzy Multi-keyword Search over Encrypted Data with Adaptive Security","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4213052215","doi":"https://doi.org/10.1109/tkde.2022.3152033"},"language":"en","primary_location":{"id":"doi:10.1109/tkde.2022.3152033","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tkde.2022.3152033","pdf_url":null,"source":{"id":"https://openalex.org/S30698027","display_name":"IEEE Transactions on Knowledge and Data Engineering","issn_l":"1041-4347","issn":["1041-4347","1558-2191","2326-3865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Knowledge and Data Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027913118","display_name":"Qiuyun Tong","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qiuyun Tong","raw_affiliation_strings":["Department of Cyber Engineering, Xidian University, 47905 Xian, Shaanxi, China, 710126"],"affiliations":[{"raw_affiliation_string":"Department of Cyber Engineering, Xidian University, 47905 Xian, Shaanxi, China, 710126","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102885964","display_name":"Yinbin Miao","orcid":"https://orcid.org/0000-0001-5437-3572"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinbin Miao","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, 47905 Xian, Shaanxi, China, 710071"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, 47905 Xian, Shaanxi, China, 710071","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082041657","display_name":"Jian Weng","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Weng","raw_affiliation_strings":["Department of Computer Science, Jinan University, Tianhe, GuangZhou, China, 510632"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Jinan University, Tianhe, GuangZhou, China, 510632","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058120371","display_name":"Ximeng Liu","orcid":"https://orcid.org/0000-0002-4238-3295"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ximeng Liu","raw_affiliation_strings":["SCHOOL OF INFORMATION SYSTEMS, Fuzhou University, 12423 Fuzhou, Fujian, China, 350108"],"affiliations":[{"raw_affiliation_string":"SCHOOL OF INFORMATION SYSTEMS, Fuzhou University, 12423 Fuzhou, Fujian, China, 350108","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, University of Texas at San Antonio, 12346 San Antonio, Texas, United States, 78249-1644"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, 12346 San Antonio, Texas, United States, 78249-1644","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001712801","display_name":"Robert H. Deng","orcid":"https://orcid.org/0000-0003-3491-8146"},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Robert Deng","raw_affiliation_strings":["School of Information Systems, Singapore Management University, Singapore, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Information Systems, Singapore Management University, Singapore, Singapore, Singapore","institution_ids":["https://openalex.org/I79891267"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5027913118"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":6.8965,"has_fulltext":false,"cited_by_count":51,"citation_normalized_percentile":{"value":0.97300979,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.972599983215332,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9609000086784363,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8720136880874634},{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.6603345274925232},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6082971096038818},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5941743850708008},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.5719895958900452},{"id":"https://openalex.org/keywords/merkle-tree","display_name":"Merkle tree","score":0.517804741859436},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4697606563568115},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.45048120617866516},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4224557876586914},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3953284025192261},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.33445125818252563},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.206935852766037},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.18469354510307312},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15407449007034302}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8720136880874634},{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.6603345274925232},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6082971096038818},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5941743850708008},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.5719895958900452},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.517804741859436},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4697606563568115},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.45048120617866516},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4224557876586914},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3953284025192261},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.33445125818252563},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.206935852766037},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.18469354510307312},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15407449007034302},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tkde.2022.3152033","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tkde.2022.3152033","pdf_url":null,"source":{"id":"https://openalex.org/S30698027","display_name":"IEEE Transactions on Knowledge and Data Engineering","issn_l":"1041-4347","issn":["1041-4347","1558-2191","2326-3865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Knowledge and Data Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1819083007","display_name":null,"funder_award_id":"62125205","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G564380355","display_name":null,"funder_award_id":"62072361","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6506919367","display_name":null,"funder_award_id":"JB211505","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1566345534","https://openalex.org/W1593940884","https://openalex.org/W1988169383","https://openalex.org/W2041480327","https://openalex.org/W2086763678","https://openalex.org/W2093175219","https://openalex.org/W2106011067","https://openalex.org/W2117740674","https://openalex.org/W2122590785","https://openalex.org/W2144754501","https://openalex.org/W2145426052","https://openalex.org/W2162006472","https://openalex.org/W2169691038","https://openalex.org/W2172174332","https://openalex.org/W2184702105","https://openalex.org/W2481158741","https://openalex.org/W2490265015","https://openalex.org/W2558415231","https://openalex.org/W2616721641","https://openalex.org/W2764301848","https://openalex.org/W2766270866","https://openalex.org/W2774471028","https://openalex.org/W2883042185","https://openalex.org/W2891871515","https://openalex.org/W2898077502","https://openalex.org/W2903368601","https://openalex.org/W2930871722","https://openalex.org/W2949495942","https://openalex.org/W2951457746","https://openalex.org/W2953213487","https://openalex.org/W2955869759","https://openalex.org/W2972535651","https://openalex.org/W2983840326","https://openalex.org/W3018546377","https://openalex.org/W3081951349","https://openalex.org/W3094509012","https://openalex.org/W3154781724","https://openalex.org/W3168139176","https://openalex.org/W3174463538","https://openalex.org/W4231557791"],"related_works":["https://openalex.org/W2227807207","https://openalex.org/W2370014100","https://openalex.org/W4287264924","https://openalex.org/W3137108924","https://openalex.org/W1852009617","https://openalex.org/W1979110442","https://openalex.org/W2042819006","https://openalex.org/W2170165007","https://openalex.org/W2156660460","https://openalex.org/W2362866566"],"abstract_inverted_index":{"To":[0,56],"ensure":[1],"the":[2,33,50,58,80,86,92,112,121,133,139,145,162,173,177],"security":[3,75,154],"of":[4,48,149,179],"outsourced":[5],"data":[6,9],"without":[7],"affecting":[8],"availability,":[10],"one":[11],"can":[12],"use":[13],"Symmetric":[14],"Searchable":[15],"Encryption":[16],"(SSE)":[17],"to":[18,84,91,104,126,143],"achieve":[19,127],"search":[20,29,35,44,150],"over":[21],"encrypted":[22],"data.":[23],"Considering":[24],"that":[25,157],"query":[26,167],"users":[27],"may":[28],"with":[30,73,138],"misspelled":[31,87],"words,":[32],"fuzzy":[34,42],"should":[36],"be":[37],"supported.":[38],"However,":[39],"conventional":[40],"privacy-preserving":[41],"multi-keyword":[43,70],"schemes":[45],"are":[46],"incapable":[47],"achieving":[49],"result":[51],"verification":[52],"and":[53,88,106,147,165],"adaptive":[54,128],"security.":[55],"solve":[57],"above":[59],"challenging":[60],"issues,":[61],"in":[62,111],"this":[63],"paper":[64],"we":[65],"propose":[66],"a":[67,97],"Verifiable":[68],"Fuzzy":[69],"Search":[71],"scheme":[72],"Adaptive":[74],"(VFSA).":[76],"VFSA":[77,158],"first":[78],"employs":[79],"locality":[81],"sensitive":[82],"hashing":[83],"hash":[85,135],"correct":[89],"keywords":[90,109],"same":[93],"positions,":[94],"then":[95],"designs":[96],"twin":[98],"Bloom":[99],"filter":[100],"for":[101],"each":[102],"document":[103],"store":[105],"mask":[107],"all":[108],"contained":[110],"document,":[113],"next":[114],"constructs":[115],"an":[116],"index":[117],"tree":[118,136],"based":[119],"on":[120],"graph-based":[122],"keyword":[123],"partition":[124],"algorithm":[125],"sublinear":[129],"retrieval,":[130],"finally":[131],"combines":[132],"Merkle":[134],"structure":[137],"adapted":[140],"multiset":[141],"accumulator":[142],"check":[144],"correctness":[146],"completeness":[148],"results.":[151],"Our":[152,169],"formal":[153],"analysis":[155],"shows":[156],"is":[159],"secure":[160],"under":[161],"IND-CKA2":[163],"model":[164],"achieves":[166],"authentication.":[168],"empirical":[170],"experiments":[171],"using":[172],"real-world":[174],"dataset":[175],"demonstrate":[176],"practicality":[178],"VFSA.":[180]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":20},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":14},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
