{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:18:12Z","timestamp":1761401892581,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,9,26]],"date-time":"2017-09-26T00:00:00Z","timestamp":1506384000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["61272091","61772311"],"award-info":[{"award-number":["61272091","61772311"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1007\/s00500-017-2849-3","type":"journal-article","created":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T20:59:02Z","timestamp":1506373142000},"page":"527-536","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Fuzzy matching: multi-authority attribute searchable encryption without central authority"],"prefix":"10.1007","volume":"23","author":[{"given":"Binrui","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Jiameng","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Jixin","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,26]]},"reference":[{"issue":"3","key":"2849_CR1","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/s00145-007-9006-6","volume":"21","author":"M Abdalla","year":"2008","unstructured":"Abdalla M, Bellare M, Catalano D et al (2008) Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. J Cryptol 21(3):350\u2013391","journal-title":"J Cryptol"},{"key":"2849_CR2","doi-asserted-by":"crossref","unstructured":"Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In: International conference on computational science and its applications. Lecture notes in computer science, vol\u00a05072, pp\u00a01249\u20131259","DOI":"10.1007\/978-3-540-69839-5_96"},{"key":"2849_CR3","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy, pp 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"key":"2849_CR4","doi-asserted-by":"crossref","unstructured":"Boneh D, Crescenzo GD, Ostrovsky R et al (2004) Public key encryption with keyword search. In: Advances in cryptology-EUROCRYPT 2004. Springer, Berlin, pp 506\u2013522","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"2849_CR5","first-page":"442","volume-title":"Privacy preserving keyword searches on remote encrypted data. Applied cryptography and network security","author":"YC Chang","year":"2005","unstructured":"Chang YC, Mitzenmacher M (2005) Privacy preserving keyword searches on remote encrypted data. Applied cryptography and network security. Springer, Berlin, pp 442\u2013455"},{"key":"2849_CR6","doi-asserted-by":"crossref","unstructured":"Chase M, Chow SSM (2009) Improving privacy and security in multi-authority attribute-based encryption. In: ACM conference on computer and communications security. ACM, pp 121\u2013130","DOI":"10.1145\/1653662.1653678"},{"key":"2849_CR7","unstructured":"Chow SM (2010) New privacy-preserving architectures for identity-attribute-based encryption. Dissertation, New York University"},{"key":"2849_CR8","doi-asserted-by":"crossref","unstructured":"Curtmola R, Garay J, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definition and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 79\u201388","DOI":"10.1145\/1180405.1180417"},{"key":"2849_CR9","unstructured":"Goh E (2003) Secure indexes. Technical Report, 2003\/216, IACR ePrint Cryptography Archive. \n                    http:\/\/eprint.iacr.org\/2003\/216"},{"key":"2849_CR10","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-24852-1_3","volume":"3089","author":"P Golle","year":"2004","unstructured":"Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. Lect Notes Comput Sci 3089:31\u201345","journal-title":"Lect Notes Comput Sci"},{"key":"2849_CR11","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A et al (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: ACM conference on computer and communications security. ACM, pp 89\u201398","DOI":"10.1145\/1180405.1180418"},{"issue":"C","key":"2849_CR12","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.future.2013.09.013","volume":"30","author":"F Han","year":"2014","unstructured":"Han F, Qin J, Zhao H et al (2014) A general transformation from KP-ABE to searchable encryption. Future Gener Comput Syst 30(C):107\u2013115","journal-title":"Future Gener Comput Syst"},{"issue":"1","key":"2849_CR13","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.compeleceng.2012.11.002","volume":"39","author":"D Koo","year":"2013","unstructured":"Koo D, Hur J, Yoon H (2013) Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comput Electr Eng 39(1):34\u201346","journal-title":"Comput Electr Eng"},{"key":"2849_CR14","doi-asserted-by":"crossref","unstructured":"Li J, Zhang L (2014) Attribute-based keyword search and data access control in cloud. In: Tenth international conference on computational intelligence and security. IEEE, pp 382\u2013386","DOI":"10.1109\/CIS.2014.113"},{"key":"2849_CR15","doi-asserted-by":"publisher","unstructured":"Li J, Li X, Wang L et al (2017) Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption. Soft Comput. doi:\n                    10.1007\/s00500-017-2482-1","DOI":"10.1007\/s00500-017-2482-1"},{"key":"2849_CR16","doi-asserted-by":"crossref","unstructured":"Lin H, Cao Z, Liang X et al (2008) Secure threshold multi authority attribute based encryption without a central authority. In: International conference on cryptology in India: progress in cryptology. Springer, pp 426\u2013436","DOI":"10.1007\/978-3-540-89754-5_33"},{"key":"2849_CR17","doi-asserted-by":"crossref","unstructured":"Liu P, Wang J, Ma H et al (2014) Efficient verifiable public key encryption with keyword search based on KP-ABE. In: 2014 ninth international conference on broadband and wireless computing, communication and applications (BWCCA), pp 584\u2013589","DOI":"10.1109\/BWCCA.2014.119"},{"issue":"8","key":"2849_CR18","doi-asserted-by":"publisher","first-page":"3243","DOI":"10.1007\/s00500-015-1699-0","volume":"20","author":"Z Liu","year":"2016","unstructured":"Liu Z, Weng J, Li J et al (2016) Cloud-based electronic health record system supporting fuzzy keyword search. Soft Comput 20(8):3243\u20133255","journal-title":"Soft Comput"},{"key":"2849_CR19","doi-asserted-by":"publisher","unstructured":"Ma S, Lai J, Deng RH et al (2016) Adaptable key-policy attribute-based encryption with time interval. Soft Comput. doi:\n                    10.1007\/s00500-016-2177-z","DOI":"10.1007\/s00500-016-2177-z"},{"key":"2849_CR20","unstructured":"Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: International conference on information security applications. Springer, pp 73\u201386"},{"issue":"5","key":"2849_CR21","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1016\/j.jss.2009.11.726","volume":"83","author":"HS Rhee","year":"2010","unstructured":"Rhee HS, Park JH, Susilo W et al (2010) Trapdoor security in a searchable public-key encryption scheme with a designated tester. J Syst Softw 83(5):763\u2013771","journal-title":"J Syst Softw"},{"key":"2849_CR22","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume":"3494","author":"A Sahai","year":"2005","unstructured":"Sahai A, Waters B (2005) Fuzzy identity-based encryption. Lect Notes Comput Sci 3494:457\u2013473","journal-title":"Lect Notes Comput Sci"},{"issue":"12","key":"2849_CR23","doi-asserted-by":"publisher","first-page":"e116325","DOI":"10.1371\/journal.pone.0116325","volume":"9","author":"Y Shi","year":"2014","unstructured":"Shi Y, Liu J, Zhen H et al (2014) Attribute-based proxy re-encryption with keyword search. Plos One 9(12):e116325","journal-title":"Plos One"},{"key":"2849_CR24","unstructured":"Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: IEEE symposium on security and privacy. IEEE Computer Society, pp 44\u201355"},{"key":"2849_CR25","doi-asserted-by":"crossref","unstructured":"Wang C, Li W, Li Y et al (2013) A ciphertext-policy attribute-based encryption scheme supporting keyword search function. In: Cyberspace safety and security. Lecture notes in computer science, vol\u00a08300, pp\u00a0377\u2013386","DOI":"10.1007\/978-3-319-03584-0_28"},{"key":"2849_CR26","doi-asserted-by":"publisher","unstructured":"Wang H, He D, Shen J et al (2016) Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing. Soft Comput. doi:\n                    10.1007\/s00500-016-2271-2","DOI":"10.1007\/s00500-016-2271-2"},{"key":"2849_CR27","doi-asserted-by":"publisher","unstructured":"Wang H, He D, Shen J et al (2017) Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps. Soft Comput. doi:\n                    10.1007\/s00500-017-2488-8","DOI":"10.1007\/s00500-017-2488-8"},{"issue":"9","key":"2849_CR28","doi-asserted-by":"publisher","first-page":"1795","DOI":"10.1007\/s00500-013-1202-8","volume":"18","author":"F Xhafa","year":"2014","unstructured":"Xhafa F, Wang J, Chen X et al (2014) An efficient PHR service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795\u20131802","journal-title":"Soft Comput"},{"issue":"18","key":"2849_CR29","doi-asserted-by":"publisher","first-page":"5265","DOI":"10.1007\/s00500-016-2244-5","volume":"21","author":"J Xu","year":"2016","unstructured":"Xu J, Wen Q, Li W et al (2016) Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing. Soft Comput 21(18):5265\u20135279","journal-title":"Soft Comput"},{"key":"2849_CR30","doi-asserted-by":"crossref","unstructured":"Zheng Q, Xu S, Ateniese G (2014) VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014\u2014IEEE conference on computer communications. IEEE, pp 522\u2013530","DOI":"10.1109\/INFOCOM.2014.6847976"},{"key":"2849_CR31","doi-asserted-by":"publisher","unstructured":"Zhong H, Zhu W, Xu Y et al (2016) Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput. doi:\n                    10.1007\/s00500-016-2330-8","DOI":"10.1007\/s00500-016-2330-8"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-017-2849-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2849-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2849-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,21]],"date-time":"2019-01-21T03:22:06Z","timestamp":1548040926000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-017-2849-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,26]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["2849"],"URL":"https:\/\/doi.org\/10.1007\/s00500-017-2849-3","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2017,9,26]]},"assertion":[{"value":"26 September 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}