{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T13:31:02Z","timestamp":1772199062168,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":40,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819529605","type":"print"},{"value":"9789819529612","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-2961-2_18","type":"book-chapter","created":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T14:02:10Z","timestamp":1760364130000},"page":"350-367","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Lattice-Based Certificateless Encryption with\u00a0Keyword Search"],"prefix":"10.1007","author":[{"given":"Minghui","family":"He","sequence":"first","affiliation":[]},{"given":"Zesheng","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Hongbo","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xinjian","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Qiong","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,10]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","unstructured":"Agrawal, S., Boneh, D., Boyen, X.: Efficient lattice (H)IBE in the standard model. In: Gilbert, H. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2010. EUROCRYPT 2010. LNCS, vol.\u00a06110, pp. 553\u2013572. Springer, Berlin, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13190-5_28","DOI":"10.1007\/978-3-642-13190-5_28"},{"key":"18_CR2","doi-asserted-by":"publisher","unstructured":"Agrawal, S., Boneh, D., Boyen, X.: Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 98\u2013115. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14623-7_6","DOI":"10.1007\/978-3-642-14623-7_6"},{"key":"18_CR3","doi-asserted-by":"publisher","unstructured":"Ajtai, M.: Generating hard instances of the short basis problem. In: Wiedermann, J., van Emde Boas, P., Nielsen, M. (eds.) ICALP 1999. LNCS, vol. 1644, pp. 1\u20139. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48523-6_1","DOI":"10.1007\/3-540-48523-6_1"},{"key":"18_CR4","doi-asserted-by":"publisher","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.S. (eds.) Advances in Cryptology - ASIACRYPT 2003. ASIACRYPT 2003. LNCS, vol. 2894, pp. 452\u2013473. Springer, Berlin, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-40061-5_29","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/s00224-010-9278-3","volume":"48","author":"J Alwen","year":"2011","unstructured":"Alwen, J., Peikert, C.: Generating shorter bases for hard random lattices. Theory Comput. Syst. 48, 535\u2013553 (2011)","journal-title":"Theory Comput. Syst."},{"issue":"6","key":"18_CR6","doi-asserted-by":"publisher","first-page":"1269","DOI":"10.1109\/TDSC.2018.2867462","volume":"17","author":"R Behnia","year":"2018","unstructured":"Behnia, R., Ozmen, M.O., Yavuz, A.A.: Lattice-based public key searchable encryption from experimental perspectives. IEEE Trans. Dependable Secure Comput. 17(6), 1269\u20131282 (2018)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"18_CR7","doi-asserted-by":"publisher","unstructured":"Behnia, R., Yavuz, A.A., Ozmen, M.O.: High-speed high-security public key encryption with keyword Search. In: Livraga, G., Zhu, S. (eds.) Data and Applications Security and Privacy XXXI. DBSec 2017. LNCS, vol. 10359, pp. 365\u2013385 Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-61176-1_21","DOI":"10.1007\/978-3-319-61176-1_21"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506\u2013522. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24676-3_30"},{"issue":"2","key":"18_CR9","doi-asserted-by":"publisher","first-page":"1391","DOI":"10.1109\/JIOT.2022.3207229","volume":"10","author":"L Cheng","year":"2022","unstructured":"Cheng, L., Meng, F.: Certificateless public key authenticated searchable encryption with enhanced security model in iiot applications. IEEE Internet Things J. 10(2), 1391\u20131400 (2022)","journal-title":"IEEE Internet Things J."},{"key":"18_CR10","first-page":"1","volume":"400","author":"KKR Choo","year":"2010","unstructured":"Choo, K.K.R.: Cloud computing: challenges and future directions. Trends Issues Crime Crim. Justice 400, 1\u20136 (2010)","journal-title":"Trends Issues Crime Crim. Justice"},{"issue":"4","key":"18_CR11","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MCC.2016.79","volume":"3","author":"C Esposito","year":"2016","unstructured":"Esposito, C., Castiglione, A., Martini, B., Choo, K.K.R.: Cloud manufacturing: security, privacy, and forensic concerns. IEEE Cloud Comput. 3(4), 16\u201322 (2016)","journal-title":"IEEE Cloud Comput."},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the fortieth annual ACM Symposium on Theory of Computing, pp. 197\u2013206 (2008)","DOI":"10.1145\/1374376.1374407"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Gu, X., Wang, Z., Fu, M., Ren, P.: A certificateless searchable public key encryption scheme for multiple receivers. In: 2021 IEEE International Conference on Web Services (ICWS), pp. 635\u2013641. IEEE (2021)","DOI":"10.1109\/ICWS53863.2021.00085"},{"issue":"1","key":"18_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-021-02006-1","volume":"2021","author":"Y Guo","year":"2021","unstructured":"Guo, Y., Meng, F., Cheng, L., Dong, X., Cao, Z.: Designated server-aided revocable identity-based keyword search on lattice. EURASIP J. Wirel. Commun. Netw. 2021(1), 1\u201322 (2021). https:\/\/doi.org\/10.1186\/s13638-021-02006-1","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"8","key":"18_CR15","doi-asserted-by":"publisher","first-page":"3618","DOI":"10.1109\/TII.2017.2771382","volume":"14","author":"D He","year":"2017","unstructured":"He, D., Ma, M., Zeadally, S., Kumar, N., Liang, K.: Certificateless public key authenticated encryption with keyword search for industrial internet of things. IEEE Trans. Ind. Inf. 14(8), 3618\u20133627 (2017)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"18_CR16","volume":"50","author":"M Ma","year":"2020","unstructured":"Ma, M., He, D., Fan, S., Feng, D.: Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare. J. Inf. Secur. Appl. 50, 102429 (2020)","journal-title":"J. Inf. Secur. Appl."},{"key":"18_CR17","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1016\/j.compeleceng.2017.05.014","volume":"65","author":"M Ma","year":"2018","unstructured":"Ma, M., He, D., Khan, M.K., Chen, J.: Certificateless searchable public key encryption scheme for mobile healthcare system. Comput. Electr. Eng. 65, 413\u2013424 (2018)","journal-title":"Comput. Electr. Eng."},{"issue":"2","key":"18_CR18","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1109\/TII.2017.2703922","volume":"14","author":"M Ma","year":"2017","unstructured":"Ma, M., He, D., Kumar, N., Choo, K.K.R., Chen, J.: Certificateless searchable public key encryption scheme for industrial internet of things. IEEE Trans. Ind. Inf. 14(2), 759\u2013767 (2017)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"18_CR19","first-page":"1","volume":"2020","author":"M Ma","year":"2020","unstructured":"Ma, M., Luo, M., Fan, S., Feng, D.: An efficient pairing-free certificateless searchable public key encryption for cloud-based iiot. Wirel. Commun. Mob. Comput. 2020, 1\u201311 (2020)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"4","key":"18_CR20","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4257","volume":"33","author":"OO Olakanmi","year":"2022","unstructured":"Olakanmi, O.O., Odeyemi, K.O.: A certificateless keyword searchable encryption scheme in multi-user setting for fog-enhanced industrial internet of things. Trans. Emerg. Telecommun. Technol. 33(4), e4257 (2022)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"6","key":"18_CR21","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1145\/1039488.1039490","volume":"51","author":"O Regev","year":"2004","unstructured":"Regev, O.: New lattice-based cryptographic constructions. J. ACM (JACM) 51(6), 899\u2013942 (2004)","journal-title":"J. ACM (JACM)"},{"issue":"6","key":"18_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1568318.1568324","volume":"56","author":"O Regev","year":"2009","unstructured":"Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM (JACM) 56(6), 1\u201340 (2009)","journal-title":"J. ACM (JACM)"},{"issue":"2","key":"18_CR23","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303\u2013332 (1999)","journal-title":"SIAM Rev."},{"key":"18_CR24","unstructured":"Shoup, V., et\u00a0al.: Ntl: a library for doing number theory (2001)"},{"key":"18_CR25","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy. S &P 2000, pp. 44\u201355. IEEE (2000)"},{"issue":"4","key":"18_CR26","doi-asserted-by":"publisher","first-page":"2305","DOI":"10.1007\/s10586-021-03488-w","volume":"25","author":"Y Tang","year":"2022","unstructured":"Tang, Y., Ba, Y., Li, L., Wang, X., Yan, X.: Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for iiot. Clust. Comput. 25(4), 2305\u20132316 (2022)","journal-title":"Clust. Comput."},{"key":"18_CR27","volume":"51","author":"P Wang","year":"2020","unstructured":"Wang, P., Xiang, T., Li, X., Xiang, H.: Public key encryption with conjunctive keyword search on lattice. J. Inf. Secur. Appl. 51, 102433 (2020)","journal-title":"J. Inf. Secur. Appl."},{"key":"18_CR28","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s12243-018-00701-7","volume":"74","author":"L Wu","year":"2019","unstructured":"Wu, L., Zhang, Y., Ma, M., Kumar, N., He, D.: Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical internet of things. Ann. Telecommun. 74, 423\u2013434 (2019)","journal-title":"Ann. Telecommun."},{"key":"18_CR29","doi-asserted-by":"publisher","first-page":"49232","DOI":"10.1109\/ACCESS.2019.2909040","volume":"7","author":"TY Wu","year":"2019","unstructured":"Wu, T.Y., Chen, C.M., Wang, K.H., Wu, J.M.T.: Security analysis and enhancement of a certificateless searchable public key encryption scheme for iiot environments. IEEE Access 7, 49232\u201349239 (2019)","journal-title":"IEEE Access"},{"key":"18_CR30","doi-asserted-by":"crossref","unstructured":"Yang, G., Guo, J., Han, L., Liu, X., Tian, C.: An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy. Peer-to-Peer Netw. Appl. 1\u201313 (2022)","DOI":"10.1007\/s12083-021-01253-9"},{"key":"18_CR31","doi-asserted-by":"publisher","first-page":"158765","DOI":"10.1109\/ACCESS.2020.3020841","volume":"8","author":"X Yang","year":"2020","unstructured":"Yang, X., Chen, G., Wang, M., Li, T., Wang, C.: Multi-keyword certificateless searchable public key authenticated encryption scheme based on blockchain. IEEE Access 8, 158765\u2013158777 (2020)","journal-title":"IEEE Access"},{"key":"18_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2023.103732","volume":"86","author":"X Yang","year":"2023","unstructured":"Yang, X., Chen, X., Huang, J., Li, H., Huang, Q.: Fs-ibeks: forward secure identity-based encryption with keyword search from lattice. Comput. Stand. Interfaces 86, 103732 (2023)","journal-title":"Comput. Stand. Interfaces"},{"issue":"11","key":"18_CR33","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/CC.2014.7004528","volume":"11","author":"P Yanguo","year":"2014","unstructured":"Yanguo, P., Jiangtao, C., Changgen, P., Zuobin, Y.: Certificateless public key encryption with keyword search. China Commun. 11(11), 100\u2013113 (2014)","journal-title":"China Commun."},{"issue":"21","key":"18_CR34","doi-asserted-by":"publisher","first-page":"11139","DOI":"10.1007\/s00500-022-07469-y","volume":"26","author":"X Yu","year":"2022","unstructured":"Yu, X., Xu, C., Xu, L., Mei, L.: Hardening secure search in encrypted database: a kga-resistance conjunctive searchable encryption scheme from lattice. Soft. Comput. 26(21), 11139\u201311151 (2022)","journal-title":"Soft. Comput."},{"key":"18_CR35","first-page":"473","volume":"29","author":"J Zhang","year":"2012","unstructured":"Zhang, J., Deng, B., Li, X.: Learning with error based searchable encryption scheme. J. Electron. 29, 473\u2013476 (2012)","journal-title":"J. Electron."},{"key":"18_CR36","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.ins.2019.04.051","volume":"494","author":"X Zhang","year":"2019","unstructured":"Zhang, X., Tang, Y., Wang, H., Xu, C., Miao, Y., Cheng, H.: Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage. Inf. Sci. 494, 193\u2013207 (2019)","journal-title":"Inf. Sci."},{"issue":"4","key":"18_CR37","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1109\/CC.2018.8357694","volume":"15","author":"X Zhang","year":"2018","unstructured":"Zhang, X., Xu, C., Mu, L., Zhao, J.: Identity-based encryption with keyword search from lattice assumption. China Commun. 15(4), 164\u2013178 (2018)","journal-title":"China Commun."},{"key":"18_CR38","doi-asserted-by":"publisher","first-page":"20849","DOI":"10.1109\/ACCESS.2020.2968501","volume":"8","author":"Y Zhang","year":"2020","unstructured":"Zhang, Y., Liu, X., Lang, X., Zhang, Y., Wang, C.: Vclpkes: verifiable certificateless public key searchable encryption scheme for industrial internet of things. IEEE Access 8, 20849\u201320861 (2020)","journal-title":"IEEE Access"},{"issue":"5","key":"18_CR39","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3812","volume":"33","author":"Y Zhao","year":"2022","unstructured":"Zhao, Y., Hou, Y., Chen, Y., Kumar, S., Deng, F.: An efficient certificateless public key encryption with equality test toward internet of vehicles. Trans. Emerg. Telecommun. Technol. 33(5), e3812 (2022)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"4","key":"18_CR40","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4960","volume":"35","author":"Y Zhou","year":"2024","unstructured":"Zhou, Y., Tang, B., Yang, Y.: A lattice-based searchable encryption scheme with multi-user authorization for the certificateless cloud computing environment. Trans. Emerg. Telecommun. Technol. 35(4), e4960 (2024)","journal-title":"Trans. Emerg. Telecommun. Technol."}],"container-title":["Lecture Notes in Computer Science","Provable and Practical Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-2961-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T12:47:56Z","timestamp":1772196476000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-2961-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,10]]},"ISBN":["9789819529605","9789819529612"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-2961-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,10]]},"assertion":[{"value":"10 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Yokohama","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sulab-sever.u-aizu.ac.jp\/provsec2025\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}