{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:46:14Z","timestamp":1771703174498,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2015,12,9]],"date-time":"2015-12-09T00:00:00Z","timestamp":1449619200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s00500-015-1960-6","type":"journal-article","created":{"date-parts":[[2015,12,9]],"date-time":"2015-12-09T17:11:28Z","timestamp":1449681088000},"page":"2599-2607","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Dual trapdoor identity-based encryption with keyword search"],"prefix":"10.1007","volume":"21","author":[{"given":"Jia\u2019nan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Junzuo","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Xinyi","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,9]]},"reference":[{"key":"1960_CR1","doi-asserted-by":"publisher","unstructured":"Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H(2005) Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. In: Shoup V (ed) Proceedings of advances in cryptology\u2014CRYPTO 2005: 25th annual international cryptology conference, Santa Barbara, California, USA, August 14\u201318, 2005. Lecture notes in computer science, vol 3621. Springer, New York, pp 205\u2013222. doi:\n                        10.1007\/11535218_13","DOI":"10.1007\/11535218_13"},{"key":"1960_CR2","doi-asserted-by":"publisher","unstructured":"Boneh D, Boyen X, Goh E (2005) Hierarchical identity based encryption with constant size ciphertext. In: Cramer R (ed) Advances in cryptology\u2014EUROCRYPT 2005, Proceedings of 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22\u201326, 2005. Lecture notes in computer science, vol 3494. Springer, New York, pp 440\u2013456. doi:\n                        10.1007\/11426639_26","DOI":"10.1007\/11426639_26"},{"key":"1960_CR3","doi-asserted-by":"publisher","unstructured":"Boneh D, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Cachin C, Camenisch J (eds) Advances in cryptology\u2014EUROCRYPT 2004, Proceedings of international conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2\u20136, 2004. Lecture notes in computer science, vol 3027. Springer, New York, pp 506\u2013522. doi:\n                        10.1007\/978-3-540-24676-3_30","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"1960_CR4","doi-asserted-by":"publisher","unstructured":"Boneh D, Franklin MK (2001) Identity-based encryption from the weil pairing. In: Kilian J (ed) Advances in cryptology\u2014CRYPTO 2001, Proceedings of 21st annual international cryptology conference, Santa Barbara, California, USA, August 19\u201323, 2001. Lecture notes in computer science, vol 2139. Springer, New York, pp 213\u2013229. doi:\n                        10.1007\/3-540-44647-8_13","DOI":"10.1007\/3-540-44647-8_13"},{"key":"1960_CR5","doi-asserted-by":"publisher","unstructured":"Boneh D, Goh E, Nissim K (2005) Evaluating 2-dnf formulas on ciphertexts. In: Kilian J (ed) Proceedings of theory of cryptography, second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10\u201312, 2005. Lecture notes in computer science, vol 3378. Springer, New York, pp 325\u2013341. doi:\n                        10.1007\/978-3-540-30576-7_18","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"1960_CR6","doi-asserted-by":"publisher","unstructured":"Boyen X, Waters B (2006) Anonymous hierarchical identity-based encryption (without random oracles). In: Dwork C (ed) Advances in cryptology\u2014CRYPTO 2006, Proceedings of 26th annual international cryptology conference, Santa Barbara, California, USA, August 20\u201324, 2006. Lecture notes in computer science, vol 4117. Springer, New York, pp 290\u2013307. doi:\n                        10.1007\/11818175_17","DOI":"10.1007\/11818175_17"},{"key":"1960_CR7","doi-asserted-by":"publisher","unstructured":"Camenisch J, Kohlweiss M, Rial A, Sheedy C (2009) Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data. In: Jarecki and Tsudik [15], pp 196\u2013214. doi:\n                        10.1007\/978-3-642-00468-1_12","DOI":"10.1007\/978-3-642-00468-1_12"},{"key":"1960_CR8","unstructured":"Caro AD, Iovino V, Persiano G (2010) Fully secure anonymous HIBE and secret-key anonymous IBE with short ciphertexts. In: Pairing-based cryptography\u2014pairing 2010\u2014Proceedings of 4th international conference, Yamanaka Hot Spring, Japan, December 2010, pp 347\u2013366"},{"key":"1960_CR9","doi-asserted-by":"publisher","unstructured":"Gentry C, Halevi S (2009) Hierarchical identity based encryption with polynomially many levels. In: Reingold [21], pp 437\u2013456. doi:\n                        10.1007\/978-3-642-00457-5_26","DOI":"10.1007\/978-3-642-00457-5_26"},{"key":"1960_CR10","doi-asserted-by":"publisher","unstructured":"Gentry C, Silverberg A (2002) Hierarchical id-based cryptography. In: Zheng Y (ed) Advances in cryptology\u2014ASIACRYPT 2002, Proceedings of 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1\u20135, 2002. Lecture notes in computer science, vol 2501. Springer, New York, pp 548\u2013566. doi:\n                        10.1007\/3-540-36178-2_34","DOI":"10.1007\/3-540-36178-2_34"},{"key":"1960_CR11","doi-asserted-by":"publisher","unstructured":"Golle P, Staddon J, Waters BR (2004) Secure conjunctive keyword search over encrypted data. In: Jakobsson M, Yung M, Zhou J (eds) Proceedings of applied cryptography and network security, second international conference, ACNS 2004, Yellow Mountain, China, June 8\u201311, 2004. Lecture notes in computer science, vol 3089. Springer, New York, pp 31\u201345. doi:\n                        10.1007\/978-3-540-24852-1_3","DOI":"10.1007\/978-3-540-24852-1_3"},{"key":"1960_CR12","doi-asserted-by":"publisher","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Juels A, Wright RN, di\u00a0Vimercati SDC (eds) Proceedings of the 13th ACM conference on computer and communications security, CCS 2006, Alexandria, VA, USA, october 30\u2013November 3, 2006. ACM, pp 89\u201398. doi:\n                        10.1145\/1180405.1180418","DOI":"10.1145\/1180405.1180418"},{"key":"1960_CR13","doi-asserted-by":"publisher","unstructured":"Horwitz J, Lynn B (2002) Toward hierarchical identity-based encryption. In: Knudsen LR (ed) Proceedings of advances in cryptology\u2014EUROCRYPT 2002, international conference on the theory and applications of cryptographic techniques, Amsterdam, The Netherlands, April 28\u2013May 2, 2002. Lecture notes in computer science, vol 2332. Springer, New York, pp 466\u2013481. doi:\n                        10.1007\/3-540-46035-7_31","DOI":"10.1007\/3-540-46035-7_31"},{"key":"1960_CR14","doi-asserted-by":"publisher","unstructured":"Hwang YH, Lee PJ (2007) Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: Takagi T, Okamoto T, Okamoto E, Okamoto T (eds) Proceedings of pairing-based cryptography\u2014pairing 2007, first international conference, Tokyo, Japan, July 2\u20134, 2007. Lecture notes in computer science, vol 4575. Springer, New York, pp 2\u201322. doi:\n                        10.1007\/978-3-540-73489-5_2","DOI":"10.1007\/978-3-540-73489-5_2"},{"key":"1960_CR15","doi-asserted-by":"publisher","unstructured":"Jarecki S, Tsudik G (eds) Public key cryptography\u2014PKC 2009, Proceedings of 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18\u201320, 2009. Lecture notes in computer science, vol 5443. Springer, New York. doi:\n                        10.1007\/978-3-642-00468-1","DOI":"10.1007\/978-3-642-00468-1"},{"key":"1960_CR16","doi-asserted-by":"publisher","unstructured":"Katz J, Sahai A, Waters B (2008) Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Smart NP (ed) Advances in cryptology\u2014EUROCRYPT 2008, Proceedings of 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13\u201317, 2008. Lecture notes in computer science, vol 4965. Springer, New York, pp 146\u2013162. doi:\n                        10.1007\/978-3-540-78967-3_9","DOI":"10.1007\/978-3-540-78967-3_9"},{"key":"1960_CR17","doi-asserted-by":"publisher","unstructured":"Lai J, Zhou X, Deng RH, Li Y, Chen K (2013) Expressive search on encrypted data. In: Chen K, Xie Q, Qiu W, Li N, Tzeng W (eds) 8th ACM symposium on information, computer and communications security, ASIA CCS \u201913, Hangzhou, China, May 08\u201310, 2013. ACM, pp 243\u2013252. doi:\n                        10.1145\/2484313.2484345","DOI":"10.1145\/2484313.2484345"},{"key":"1960_CR18","doi-asserted-by":"publisher","unstructured":"Lewko AB, Waters B (2010) New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Micciancio D (ed) Proceedings of 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9\u201311, 2010. Lecture notes in computer science, vol 5978. Springer, New York, pp 455\u2013479. doi:\n                        10.1007\/978-3-642-11799-2_27","DOI":"10.1007\/978-3-642-11799-2_27"},{"key":"1960_CR19","doi-asserted-by":"publisher","unstructured":"Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: 29th IEEE international conference on computer communications, joint conference of the IEEE computer and communications societies, 15\u201319 March 2010, San Diego, CA, USA. IEEE, pp 441\u2013445. doi:\n                        10.1109\/INFCOM.2010.5462196","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"1960_CR20","doi-asserted-by":"publisher","unstructured":"Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: Lim CH, Yung M (eds) Information security applications, 5th international workshop, WISA 2004, Jeju Island, Korea, August 23\u201325, 2004, revised selected papers. Lecture notes in computer science, vol 3325. Springer, New York, pp 73\u201386. doi:\n                        10.1007\/978-3-540-31815-6_7","DOI":"10.1007\/978-3-540-31815-6_7"},{"key":"1960_CR21","doi-asserted-by":"publisher","unstructured":"Reingold O (ed) (2009) Proceedings of 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15\u201317, 2009. Lecture notes in computer science, vol 5444. Springer, New York. doi:\n                        10.1007\/978-3-642-00457-5","DOI":"10.1007\/978-3-642-00457-5"},{"key":"1960_CR22","doi-asserted-by":"publisher","unstructured":"Seo JH, Kobayashi T, Ohkubo M, Suzuki K (2009) Anonymous hierarchical identity-based encryption with constant size ciphertexts. In: Jarecki and Tsudik [15], pp 215\u2013234. doi:\n                        10.1007\/978-3-642-00468-1_13","DOI":"10.1007\/978-3-642-00468-1_13"},{"key":"1960_CR23","doi-asserted-by":"publisher","unstructured":"Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Blakley GR, Chaum D (eds) Advances in cryptology, proceedings of CRYPTO \u201984, Santa Barbara, California, USA, August 19\u201322, 1984. Lecture notes in computer science, vol 196. Springer, New York, pp 47\u201353. doi:\n                        10.1007\/3-540-39568-7_5","DOI":"10.1007\/3-540-39568-7_5"},{"key":"1960_CR24","doi-asserted-by":"publisher","unstructured":"Shen E, Shi E, Waters B (2015) Predicate privacy in encryption systems. In: Reingold [21], pp 457\u2013473. doi:\n                        10.1007\/978-3-642-00457-5_27","DOI":"10.1007\/978-3-642-00457-5_27"},{"key":"1960_CR25","doi-asserted-by":"publisher","unstructured":"Waters B (2009) Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Halevi S (ed) Advances in cryptology\u2014CRYPTO 2009, Proceedings of 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16\u201320, 2009. Lecture notes in computer science, vol 5677. Springer, New York, pp 619\u2013636. doi:\n                        10.1007\/978-3-642-03356-8_36","DOI":"10.1007\/978-3-642-03356-8_36"},{"issue":"1","key":"1960_CR26","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.jnca.2010.07.007","volume":"34","author":"B Zhang","year":"2011","unstructured":"Zhang B, Zhang F (2011) An efficient public key encryption with conjunctive-subset keywords search. J Netw Computer Appl 34(1):262\u2013267","journal-title":"J Netw Computer Appl"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1960-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-015-1960-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1960-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1960-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T01:43:54Z","timestamp":1559094234000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-015-1960-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,9]]},"references-count":26,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["1960"],"URL":"https:\/\/doi.org\/10.1007\/s00500-015-1960-6","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,9]]}}}