{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:45:06Z","timestamp":1773153906732,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819655656","type":"print"},{"value":"9789819655663","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-5566-3_21","type":"book-chapter","created":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T20:23:11Z","timestamp":1749846191000},"page":"423-440","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["LiST$$^+$$: An Improved Lightweight Sharable and\u00a0Traceable Secure Mobile Health System"],"prefix":"10.1007","author":[{"given":"Suryakant","family":"Prasad","sequence":"first","affiliation":[]},{"given":"Y. Sreenivasa","family":"Rao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,14]]},"reference":[{"key":"21_CR1","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s13389-013-0057-3","volume":"3","author":"JA Akinyele","year":"2013","unstructured":"Akinyele, J.A., et al.: Charm: a framework for rapidly prototyping cryptosystems. J. Cryptogr. Eng. 3, 111\u2013128 (2013)","journal-title":"J. Cryptogr. Eng."},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1249","DOI":"10.1007\/978-3-540-69839-5_96","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2008","author":"J Baek","year":"2008","unstructured":"Baek, J., Safavi-Naini, R., Susilo, W.: Public key encryption with keyword search revisited. In: Gervasi, O., Murgante, B., Lagan\u00e0, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds.) ICCSA 2008. LNCS, vol. 5072, pp. 1249\u20131259. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-69839-5_96"},{"issue":"4","key":"21_CR3","doi-asserted-by":"publisher","first-page":"2513","DOI":"10.1109\/JIOT.2021.3063846","volume":"9","author":"Y Bao","year":"2022","unstructured":"Bao, Y., Qiu, W., Cheng, X.: Secure and lightweight fine-grained searchable data sharing for IoT-oriented and cloud-assisted smart healthcare system. IEEE Internet Things J. 9(4), 2513\u20132526 (2022). https:\/\/doi.org\/10.1109\/JIOT.2021.3063846","journal-title":"IEEE Internet Things J."},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, SP 2007, pp. 321\u2013334 (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"21_CR5","unstructured":"Boneh, D., Shoup, V.: A graduate course in applied cryptography. https:\/\/toc.cryptobook.us\/book.pdf"},{"issue":"2","key":"21_CR6","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1109\/TCC.2019.2892116","volume":"9","author":"P Chaudhari","year":"2021","unstructured":"Chaudhari, P., Das, M.L.: Privacy preserving searchable encryption with fine-grained access control. IEEE Trans. Cloud Comput. 9(2), 753\u2013762 (2021). https:\/\/doi.org\/10.1109\/TCC.2019.2892116","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"2","key":"21_CR7","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1109\/TSC.2020.2973570","volume":"15","author":"P Chaudhari","year":"2022","unstructured":"Chaudhari, P., Das, M.L.: Keysea: keyword-based search with receiver anonymity in attribute-based searchable encryption. IEEE Trans. Serv. Comput. 15(2), 1036\u20131044 (2022). https:\/\/doi.org\/10.1109\/TSC.2020.2973570","journal-title":"IEEE Trans. Serv. Comput."},{"key":"21_CR8","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-319-60055-0_6","volume-title":"Information Security and Privacy","author":"H Cui","year":"2017","unstructured":"Cui, H., Deng, R.H., Liu, J.K., Li, Y.: Attribute-based encryption with expressive and authorized keyword search. In: Pieprzyk, J., Suriadi, S. (eds.) Information Security and Privacy, pp. 106\u2013126. Springer, Cham (2017)"},{"key":"21_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-014-0178-y","volume":"39","author":"L Guo","year":"2015","unstructured":"Guo, L., Yau, W.C.: Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage. J. Med. Syst. 39, 1\u201311 (2015)","journal-title":"J. Med. Syst."},{"key":"21_CR10","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-642-36362-7_11","volume-title":"Public-Key Cryptography - PKC 2013","author":"S Hohenberger","year":"2013","unstructured":"Hohenberger, S., Waters, B.: Attribute-based encryption with fast decryption. In: Kurosawa, K., Hanaoka, G. (eds.) Public-Key Cryptography - PKC 2013, pp. 162\u2013179. Springer, Heidelberg (2013)"},{"key":"21_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/978-3-642-32009-5_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"A Lewko","year":"2012","unstructured":"Lewko, A., Waters, B.: New proof methods for attribute-based encryption: achieving full security through selective techniques. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 180\u2013198. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_12"},{"key":"21_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2021.103606","volume":"82","author":"W Li","year":"2022","unstructured":"Li, W., Xu, L., Wen, Y., Zhang, F.: Conjunctive multi-key searchable encryption with attribute-based access control for EHR systems. Comput. Stand. Interfaces 82, 103606 (2022). https:\/\/doi.org\/10.1016\/j.csi.2021.103606","journal-title":"Comput. Stand. Interfaces"},{"key":"21_CR13","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/j.ins.2018.12.004","volume":"479","author":"Y Lu","year":"2019","unstructured":"Lu, Y., Wang, G., Li, J.: Keyword guessing attacks on a public key encryption with keyword search scheme without random oracle and its improvement. Inf. Sci. 479, 270\u2013276 (2019). https:\/\/doi.org\/10.1016\/j.ins.2018.12.004","journal-title":"Inf. Sci."},{"issue":"7","key":"21_CR14","doi-asserted-by":"publisher","first-page":"12649","DOI":"10.1109\/JIOT.2023.3335624","volume":"11","author":"F Meng","year":"2024","unstructured":"Meng, F., Cheng, L.: STR-ABKS: server-aided traceable and revocable attribute-based encryption with keyword search. IEEE Internet Things J. 11(7), 12649\u201312659 (2024). https:\/\/doi.org\/10.1109\/JIOT.2023.3335624","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"21_CR15","doi-asserted-by":"publisher","first-page":"1382","DOI":"10.1109\/TSC.2023.3327816","volume":"17","author":"YS Rao","year":"2024","unstructured":"Rao, Y.S., Prasad, S., Bera, S., Das, A.K., Susilo, W.: Boolean searchable attribute-based signcryption with search results self-verifiability mechanism for data storage and retrieval in clouds. IEEE Trans. Serv. Comput. 17(4), 1382\u20131399 (2024). https:\/\/doi.org\/10.1109\/TSC.2023.3327816","journal-title":"IEEE Trans. Serv. Comput."},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457\u2013473. Springer, Cham (2005)","DOI":"10.1007\/11426639_27"},{"issue":"1","key":"21_CR17","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/TCC.2019.2931896","volume":"10","author":"NH Sultan","year":"2022","unstructured":"Sultan, N.H., Kaaniche, N., Laurent, M., Barbhuiya, F.A.: Authorized keyword search over outsourced encrypted data in cloud environment. IEEE Trans. Cloud Comput. 10(1), 216\u2013233 (2022). https:\/\/doi.org\/10.1109\/TCC.2019.2931896","journal-title":"IEEE Trans. Cloud Comput."},{"key":"21_CR18","unstructured":"Varri, U.S.: Comment on \u201can efficient privacy-preserving ranked multi-keyword retrieval for multiple data owners in outsourced cloud\u201d (2024). https:\/\/arxiv.org\/abs\/2408.05218"},{"key":"21_CR19","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","volume-title":"Public Key Cryptography - PKC 2011","author":"B Waters","year":"2011","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) Public Key Cryptography - PKC 2011, pp. 53\u201370. Springer, Heidelberg (2011)"},{"issue":"1","key":"21_CR20","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/TDSC.2017.2729556","volume":"17","author":"Y Yang","year":"2020","unstructured":"Yang, Y., Liu, X., Deng, R.H., Li, Y.: Lightweight sharable and traceable secure mobile health system. IEEE Trans. Dependable Secure Comput. 17(1), 78\u201391 (2020). https:\/\/doi.org\/10.1109\/TDSC.2017.2729556","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"21_CR21","doi-asserted-by":"publisher","unstructured":"Zhang, B., Yang, W., Zhang, F., Ning, J.: Efficient attribute-based searchable encryption with policy hiding over personal health records. IEEE Trans. Dependable Secure Comput. 1\u201313 (2024). https:\/\/doi.org\/10.1109\/TDSC.2024.3432769","DOI":"10.1109\/TDSC.2024.3432769"},{"key":"21_CR22","doi-asserted-by":"publisher","first-page":"1771","DOI":"10.1109\/TIFS.2022.3172627","volume":"17","author":"K Zhang","year":"2022","unstructured":"Zhang, K., Jiang, Z., Ning, J., Huang, X.: Subversion-resistant and consistent attribute-based keyword search for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 17, 1771\u20131784 (2022). https:\/\/doi.org\/10.1109\/TIFS.2022.3172627","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"21_CR23","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/TCC.2021.3119407","volume":"11","author":"Y Zhang","year":"2023","unstructured":"Zhang, Y., Zhu, T., Guo, R., Xu, S., Cui, H., Cao, J.: Multi-keyword searchable and verifiable attribute-based encryption over cloud data. IEEE Trans. Cloud Comput. 11(1), 971\u2013983 (2023). https:\/\/doi.org\/10.1109\/TCC.2021.3119407","journal-title":"IEEE Trans. Cloud Comput."},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Zheng, Q., Xu, S., Ateniese, G.: Vabks: verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 522\u2013530. IEEE (2014)","DOI":"10.1109\/INFOCOM.2014.6847976"},{"issue":"4","key":"21_CR25","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1109\/TSC.2023.3332864","volume":"17","author":"G Zu","year":"2024","unstructured":"Zu, G., Lu, Y., Li, J.: Comment on an attribute-based searchable encryption scheme with receiver anonymity. IEEE Trans. Serv. Comput. 17(4), 1875\u20131876 (2024). https:\/\/doi.org\/10.1109\/TSC.2023.3332864","journal-title":"IEEE Trans. Serv. Comput."}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-5566-3_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T20:23:14Z","timestamp":1749846194000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-5566-3_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819655656","9789819655663"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-5566-3_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seoul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icisc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icisc.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}