{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:50:44Z","timestamp":1771707044093,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"23","license":[{"start":{"date-parts":[[2018,5,14]],"date-time":"2018-05-14T00:00:00Z","timestamp":1526256000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["1472287"],"award-info":[{"award-number":["1472287"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772377"],"award-info":[{"award-number":["61772377"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61501333"],"award-info":[{"award-number":["61501333"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572379"],"award-info":[{"award-number":["61572379"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s00500-018-3224-8","type":"journal-article","created":{"date-parts":[[2018,5,14]],"date-time":"2018-05-14T09:27:05Z","timestamp":1526290025000},"page":"7685-7696","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage"],"prefix":"10.1007","volume":"22","author":[{"given":"Libing","family":"Wu","sequence":"first","affiliation":[]},{"given":"Biwen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2446-7436","authenticated-orcid":false,"given":"Debiao","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,14]]},"reference":[{"key":"3224_CR1","first-page":"205","volume":"3621","author":"M Abdalla","year":"2005","unstructured":"Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H (2005) Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. Crypto, Springer 3621:205\u2013222","journal-title":"Crypto, Springer"},{"issue":"3","key":"3224_CR2","first-page":"35","volume":"5","author":"MA AlZain","year":"2015","unstructured":"AlZain MA, Li AS, Soh B, Pardede E (2015) Multi-cloud data management using shamir\u2019s secret sharing and quantum byzantine agreement schemes. Int J Cloud Appl Comput (IJCAC) 5(3):35\u201352","journal-title":"Int J Cloud Appl Comput (IJCAC)"},{"key":"3224_CR3","doi-asserted-by":"crossref","unstructured":"Arriaga A, Tang Q, Ryan P (2014) Trapdoor privacy in asymmetric searchable encryption schemes. In: International conference on cryptology in Africa, Springer, pp 31\u201350","DOI":"10.1007\/978-3-319-06734-6_3"},{"key":"3224_CR4","first-page":"506","volume":"3027","author":"D Boneh","year":"2004","unstructured":"Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. Eurocrypt, Springer 3027:506\u2013522","journal-title":"Eurocrypt, Springer"},{"key":"3224_CR5","doi-asserted-by":"crossref","unstructured":"Bost R (2016) o $$\\varphi $$ \u03c6 o $$\\varsigma $$ \u03c2 : forward secure searchable encryption. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. ACM, pp 1143\u20131154","DOI":"10.1145\/2976749.2978303"},{"key":"3224_CR6","first-page":"75","volume-title":"Lecture Notes in Computer Science","author":"Jin Wook Byun","year":"2006","unstructured":"Byun J, Rhee H, Park HA, Lee D (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Secure data management, pp 75\u201383"},{"issue":"4","key":"3224_CR7","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1109\/TIFS.2015.2510822","volume":"11","author":"R Chen","year":"2016","unstructured":"Chen R, Mu Y, Yang G, Guo F, Wang X (2016) Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Trans Inf Forensics Secur 11(4):789\u2013798","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3224_CR8","doi-asserted-by":"crossref","unstructured":"Chen R, Mu Y, Yang G, Guo F, Wang X (2015) A new general framework for secure public key encryption with keyword search. In: Australasian conference on information security and privacy, Springer, pp 59\u201376","DOI":"10.1007\/978-3-319-19962-7_4"},{"issue":"6","key":"3224_CR9","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644\u2013654","journal-title":"IEEE Trans Inf Theory"},{"issue":"12","key":"3224_CR10","doi-asserted-by":"publisher","first-page":"3655","DOI":"10.1007\/s00521-016-2317-5","volume":"28","author":"B Gupta","year":"2017","unstructured":"Gupta B, Badve OP (2017) Taxonomy of dos and ddos attacks and desirable defense mechanism in a cloud computing environment. Neural Comput Appl 28(12):3655\u20133682","journal-title":"Neural Comput Appl"},{"key":"3224_CR11","doi-asserted-by":"crossref","unstructured":"Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. In: IGI Global","DOI":"10.4018\/978-1-5225-0105-3"},{"key":"3224_CR12","first-page":"569","volume":"83","author":"MS Hossain","year":"2017","unstructured":"Hossain MS, Muhammad G, Abdul W, Song B, Gupta B (2017) Cloud-assisted secure video transmission and sharing framework for smart cities. Future Gener Comput Syst 83:569\u2013606","journal-title":"Future Gener Comput Syst"},{"key":"3224_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2017.03.038","volume":"403","author":"Q Huang","year":"2017","unstructured":"Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci 403:1\u201314","journal-title":"Inf Sci"},{"issue":"2","key":"3224_CR14","first-page":"27","volume":"7","author":"M Ibtihal","year":"2017","unstructured":"Ibtihal M, Hassan N et al (2017) Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. Int J Cloud Appl Comput (IJCAC) 7(2):27\u201340","journal-title":"Int J Cloud Appl Comput (IJCAC)"},{"issue":"2","key":"3224_CR15","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1016\/j.comcom.2008.11.018","volume":"32","author":"IR Jeong","year":"2009","unstructured":"Jeong IR, Kwon JO, Hong D, Lee DH (2009) Constructing peks schemes secure against keyword guessing attacks is possible? Comput Commun 32(2):394\u2013396","journal-title":"Comput Commun"},{"issue":"6","key":"3224_CR16","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1109\/TPDS.2013.284","volume":"25","author":"J Li","year":"2014","unstructured":"Li J, Chen X, Li M, Li J, Lee PP, Lou W (2014a) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615\u20131625","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"8","key":"3224_CR17","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1109\/TPDS.2013.271","volume":"25","author":"J Li","year":"2014","unstructured":"Li J, Huang X, Li J, Chen X, Xiang Y (2014b) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201\u20132210","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"1","key":"3224_CR18","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/TETC.2014.2371239","volume":"3","author":"H Li","year":"2015","unstructured":"Li H, Liu D, Dai Y, Luan TH, Shen XS (2015a) Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans Emerg Top Comput 3(1):127\u2013138","journal-title":"IEEE Trans Emerg Top Comput"},{"issue":"8","key":"3224_CR19","doi-asserted-by":"publisher","first-page":"1532","DOI":"10.1016\/j.jcss.2014.12.026","volume":"81","author":"J Li","year":"2015","unstructured":"Li J, Chen X, Xhafa F, Barolli L (2015b) Secure deduplication storage systems supporting keyword search. J Comput Syst Sci 81(8):1532\u20131541","journal-title":"J Comput Syst Sci"},{"issue":"2","key":"3224_CR20","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TC.2013.208","volume":"64","author":"J Li","year":"2015","unstructured":"Li J, Li J, Chen X, Jia C, Lou W (2015c) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425\u2013437","journal-title":"IEEE Trans Comput"},{"key":"3224_CR21","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.knosys.2014.04.010","volume":"79","author":"J Li","year":"2015","unstructured":"Li J, Liu Z, Chen X, Xhafa F, Tan X, Wong DS (2015d) L-encdb: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl Based Syst 79:18\u201326","journal-title":"Knowl Based Syst"},{"issue":"1","key":"3224_CR22","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/TETC.2015.2511457","volume":"6","author":"H Li","year":"2015","unstructured":"Li H, Liu D, Dai Y, Luan T, Yu S (2015e) Personalized search over encrypted data with efficient and secure update in mobile clouds. IEEE Trans Emerg Topics Comput 6(1):97\u2013109","journal-title":"IEEE Trans Emerg Topics Comput"},{"key":"3224_CR23","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.jpdc.2017.06.006","volume":"117","author":"T Li","year":"2017","unstructured":"Li T, Gupta BB, Metere R (2017a) Socially-conforming cooperative computation in cloud networks. J Parallel Distrib Comput 117:274\u2013280","journal-title":"J Parallel Distrib Comput"},{"issue":"5","key":"3224_CR24","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1109\/TSC.2016.2542813","volume":"10","author":"J Li","year":"2017","unstructured":"Li J, Lin X, Zhang Y, Han J (2017b) Ksf-oabe: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 10(5):715\u2013725","journal-title":"IEEE Trans Serv Comput"},{"key":"3224_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2017.2769645","author":"H Li","year":"2017","unstructured":"Li H, Yang Y, Dai Y, Bai J, Yu S, Xiang Y (2017c) Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Trans Cloud Comput. https:\/\/doi.org\/10.1109\/TCC.2017.2769645","journal-title":"IEEE Trans Cloud Comput"},{"issue":"1\u20131","key":"3224_CR26","first-page":"2","volume":"72","author":"J Li","year":"2018","unstructured":"Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Computers & Security 72(1\u20131):2","journal-title":"Computers & Security"},{"issue":"8","key":"3224_CR27","doi-asserted-by":"publisher","first-page":"3243","DOI":"10.1007\/s00500-015-1699-0","volume":"20","author":"Z Liu","year":"2016","unstructured":"Liu Z, Weng J, Li J, Yang J, Fu C, Jia C (2016) Cloud-based electronic health record system supporting fuzzy keyword search. Soft Comput 20(8):3243\u20133255","journal-title":"Soft Comput"},{"key":"3224_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2018.02.071","volume":"447","author":"Zheli Liu","year":"2018","unstructured":"Liu Z, Huang Y, Li J, Cheng X, Shen C (2018) Divoram: towards a practical oblivious ram with variable block size. Inf Sci. Doi: 10.1016\/j.ins.2018.02.071","journal-title":"Information Sciences"},{"issue":"2","key":"3224_CR29","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1109\/TII.2017.2703922","volume":"14","author":"M Ma","year":"2017","unstructured":"Ma M, He D, Kumar N, Choo KKR, Chen J (2017) Certificateless searchable public key encryption scheme for industrial internet of things. IEEE Trans Ind Inf 14(2):759\u2013767","journal-title":"IEEE Trans Ind Inf"},{"key":"3224_CR30","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2017.2757467","author":"Y Miao","year":"2017","unstructured":"Miao Y, Ma J, Liu X, Li X, Jiang Q, Zhang J (2017) Attribute based keyword search over hierarchical data in cloud computing. IEEE Trans serv Comput. https:\/\/doi.org\/10.1109\/TSC.2017.2757467","journal-title":"IEEE Trans serv Comput"},{"key":"3224_CR31","first-page":"175","volume":"12","author":"M Nishioka","year":"2012","unstructured":"Nishioka M (2012) Perfect keyword privacy in peks systems. ProvSec 12:175\u2013192","journal-title":"ProvSec"},{"issue":"5","key":"3224_CR32","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1016\/j.jss.2009.11.726","volume":"83","author":"HS Rhee","year":"2010","unstructured":"Rhee HS, Park JH, Susilo W, Lee DH (2010) Trapdoor security in a searchable public-key encryption scheme with a designated tester. J Syst Softw 83(5):763\u2013771","journal-title":"J Syst Softw"},{"issue":"12","key":"3224_CR33","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1016\/j.ipl.2015.07.006","volume":"115","author":"ZY Shao","year":"2015","unstructured":"Shao ZY, Yang B (2015) On security against the server in designated tester public key encryption with keyword search. Inf Process Lett 115(12):957\u2013961","journal-title":"Inf Process Lett"},{"key":"3224_CR34","doi-asserted-by":"crossref","unstructured":"Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceedings 2000 IEEE symposium on security and privacy, 2000. S&P 2000. IEEE, pp 44\u201355","DOI":"10.1109\/SECPRI.2000.848445"},{"issue":"4","key":"3224_CR35","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1109\/TPDS.2014.2355202","volume":"27","author":"W Sun","year":"2016","unstructured":"Sun W, Yu S, Lou W, Hou YT, Li H (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187\u20131198","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"5","key":"3224_CR36","first-page":"562","volume":"23","author":"K Tomida","year":"2015","unstructured":"Tomida K, Doi H, Mohri M, Shiraishi Y (2015) Ciphertext divided anonymous hibe and its transformation to identity-based encryption with keyword search. J Inf Process 23(5):562\u2013569","journal-title":"J Inf Process"},{"issue":"4","key":"3224_CR37","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/s12204-014-1522-6","volume":"19","author":"Ch Wang","year":"2014","unstructured":"Wang Ch, Ty Tu (2014) Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server. J Shanghai Jiaotong Univ (Sci) 19(4):440\u2013442","journal-title":"J Shanghai Jiaotong Univ (Sci)"},{"issue":"5","key":"3224_CR38","doi-asserted-by":"publisher","first-page":"1012","DOI":"10.1007\/s11390-016-1676-9","volume":"31","author":"XF Wang","year":"2016","unstructured":"Wang XF, Mu Y, Chen R, Zhang XS (2016) Secure channel free id-based searchable encryption for peer-to-peer group. J Comput Sci Technol 31(5):1012\u20131027","journal-title":"J Comput Sci Technol"},{"issue":"9","key":"3224_CR39","doi-asserted-by":"publisher","first-page":"1795","DOI":"10.1007\/s00500-013-1202-8","volume":"18","author":"F Xhafa","year":"2014","unstructured":"Xhafa F, Wang J, Chen X, Liu JK, Li J, Krause P (2014) An efficient phr service system supporting fuzzy keyword search and fine-grained access control. Soft Comput 18(9):1795\u20131802","journal-title":"Soft Comput"},{"issue":"11","key":"3224_CR40","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1109\/TC.2012.215","volume":"62","author":"P Xu","year":"2013","unstructured":"Xu P, Jin H, Wu Q, Wang W (2013) Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack. IEEE Trans Comput 62(11):2266\u20132277","journal-title":"IEEE Trans Comput"},{"key":"3224_CR41","doi-asserted-by":"crossref","unstructured":"Yau WC, Heng SH, Goi BM (2008) Off-line keyword guessing attacks on recent public key encryption with keyword search schemes. In: Autonomic and trusted computing, pp 100\u2013105","DOI":"10.1007\/978-3-540-69295-9_10"},{"issue":"20","key":"3224_CR42","doi-asserted-by":"publisher","first-page":"6201","DOI":"10.1007\/s00500-016-2179-x","volume":"21","author":"J Ye","year":"2017","unstructured":"Ye J, Wang J, Zhao J, Shen J, Li KC (2017) Fine-grained searchable encryption in multi-user setting. Soft Comput 21(20):6201\u20136212","journal-title":"Soft Comput"},{"key":"3224_CR43","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.ins.2016.04.015","volume":"379","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, Chen X, Li J, Wong DS, Li H, You I (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42\u201361","journal-title":"Inf Sci"},{"key":"3224_CR44","unstructured":"Zhang Y, Katz J, Papamanthou C (2016) All your queries are belong to us: the power of file-injection attacks on searchable encryption. In: IACR cryptology ePrint archive 2016, pp 172"},{"key":"3224_CR45","doi-asserted-by":"crossref","unstructured":"Zhang R, Xue R, Yu T, Liu L (2016a) Pvsae: a public verifiable searchable encryption service framework for outsourced encrypted data. In: 2016 IEEE international conference on web services (ICWS). IEEE, pp 428\u2013435","DOI":"10.1109\/ICWS.2016.62"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-018-3224-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3224-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3224-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T16:14:33Z","timestamp":1693671273000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-018-3224-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,14]]},"references-count":45,"journal-issue":{"issue":"23","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["3224"],"URL":"https:\/\/doi.org\/10.1007\/s00500-018-3224-8","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,14]]},"assertion":[{"value":"14 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"N\/A.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}