{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T20:32:05Z","timestamp":1754598725355,"version":"3.40.4"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T00:00:00Z","timestamp":1658707200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T00:00:00Z","timestamp":1658707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772022"],"award-info":[{"award-number":["61772022"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s00500-022-07292-5","type":"journal-article","created":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T08:05:06Z","timestamp":1658736306000},"page":"8949-8960","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Specified keywords search scheme for EHR sharing"],"prefix":"10.1007","volume":"26","author":[{"given":"Shufen","family":"Niu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0695-4123","authenticated-orcid":false,"given":"Fei","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Mi","family":"Song","sequence":"additional","affiliation":[]},{"given":"Song","family":"Han","sequence":"additional","affiliation":[]},{"given":"Caifen","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,25]]},"reference":[{"key":"7292_CR1","doi-asserted-by":"publisher","first-page":"1249","DOI":"10.1007\/978-3-540-69839-5_96","volume-title":"Computational science and its applications - ICCSA 2008","author":"J Baek","year":"2008","unstructured":"Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. Computational science and its applications - ICCSA 2008. Perugia, Italy, pp 1249\u20131259"},{"key":"7292_CR2","doi-asserted-by":"crossref","unstructured":"Bao F, Deng R, Zhu H (2003) Variations of Diffie-Hellman problem. In: information and communications security. ICICS 2003, Huhehaote, China, pp 301-312","DOI":"10.1007\/978-3-540-39927-8_28"},{"key":"7292_CR3","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. 2007 IEEE symposium on security and privacy (SP \u201907). CA, USA, Berkeley, pp 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"key":"7292_CR4","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BFb0054122","volume-title":"Advances in cryptology - EUROCRYPT 98","author":"M Blaze","year":"1998","unstructured":"Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. Advances in cryptology - EUROCRYPT 98. Espoo, Finland, pp 127\u2013144"},{"key":"7292_CR5","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh D, Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. Advances in cryptology - EUROCRYPT 2004. Interlaken, Switzerland, pp 506\u2013522"},{"key":"7292_CR6","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1016\/j.future.2019.01.018","volume":"95","author":"L Chen","year":"2019","unstructured":"Chen L, Lee W, Chang C, Choo K, Zhang N (2019) Blockchain based searchable encryption for electronic health record sharing. Future Gener Comput Syst 95:420\u2013429. https:\/\/doi.org\/10.1016\/j.future.2019.01.018","journal-title":"Future Gener Comput Syst"},{"issue":"2","key":"7292_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/6619689","volume":"2021","author":"Z Chen","year":"2021","unstructured":"Chen Z, Wu A, Li Y, Geng S (2021) Blockchain-enabled public key encryption with multi-keyword search in cloud computing. Secur Commun Netw 2021(2):1\u201311. https:\/\/doi.org\/10.1155\/2021\/6619689","journal-title":"Secur Commun Netw"},{"key":"7292_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/8816172","volume":"2020","author":"T Chi","year":"2019","unstructured":"Chi T, Qin B, Zheng D (2019) An efficient searchable public-key authenticated encryption for cloud-assisted medical internet of things. Wirel Commun Mob Comput 2020:1\u201311. https:\/\/doi.org\/10.1155\/2020\/8816172","journal-title":"Wirel Commun Mob Comput"},{"key":"7292_CR9","doi-asserted-by":"publisher","first-page":"S22106707173106","DOI":"10.1016\/j.scs.2018.02.014","volume":"2018","author":"G Dagher","year":"2018","unstructured":"Dagher G, Mohler J, Milojkovic M, Marella P (2018) Ancile: privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustain Cities Soc 2018:S2210670717310685. https:\/\/doi.org\/10.1016\/j.scs.2018.02.014","journal-title":"Sustain Cities Soc"},{"key":"7292_CR10","doi-asserted-by":"publisher","unstructured":"Fang L, Susilo W, Ge C, Wang J (2009) A secure channel free public key encryption with keyword search scheme without random oracle. In: cryptology and network security. CANS 2009, Kanazawa, Japan, pp 248\u2013258. https:\/\/doi.org\/10.1007\/978-3-642-10433-6_16","DOI":"10.1007\/978-3-642-10433-6_16"},{"issue":"1","key":"7292_CR11","doi-asserted-by":"publisher","first-page":"59","DOI":"10.4018\/IJISP.2019010105","volume":"13","author":"P Gautam","year":"2019","unstructured":"Gautam P, Ansari M, Sharma SK (2019) Enhanced security for electronic health care information using obfuscation and RSA algorithm in cloud computing. Int J Inf Secur Priv 13(1):59\u201369. https:\/\/doi.org\/10.4018\/IJISP.2019010105","journal-title":"Int J Inf Secur Priv"},{"key":"7292_CR12","doi-asserted-by":"publisher","first-page":"146322","DOI":"10.1109\/ACCESS.2019.2946202","volume":"7","author":"A Hassan","year":"2019","unstructured":"Hassan A, Hamza R, Yan H, Li P (2019) An efficient outsourced privacy preserving machine learning scheme with public verifiability. IEEE Access 7:146322\u2013146330. https:\/\/doi.org\/10.1109\/ACCESS.2019.2946202","journal-title":"IEEE Access"},{"issue":"1","key":"7292_CR13","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.hlpt.2016.08.002","volume":"6","author":"T Heart","year":"2017","unstructured":"Heart T, Ben-Assuli O, Shabtai I (2017) A review of PHR, EMR, and EHR integration: a more personalized healthcare and public health policy. Health Policy Technol 6(1):20\u201325. https:\/\/doi.org\/10.1016\/j.hlpt.2016.08.002","journal-title":"Health Policy Technol"},{"key":"7292_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/6809796","volume":"2018","author":"L Jiang","year":"2018","unstructured":"Jiang L, Li T, Li X, Atiquzzaman M, Ahmad H, Wang X (2018) Anonymous communication via anonymous identity-based encryption and its application in IoT. Wirel Commun Mob Comput 2018:1\u201311. https:\/\/doi.org\/10.1155\/2018\/6809796","journal-title":"Wirel Commun Mob Comput"},{"key":"7292_CR15","doi-asserted-by":"publisher","DOI":"10.3390\/s20102913","author":"M Kim","year":"2020","unstructured":"Kim M, Yu S, Lee J, Park Y, Park Y (2020) Design of secure protocol for cloud-assisted electronic health record system using blockchain. Sensors. https:\/\/doi.org\/10.3390\/s20102913","journal-title":"Sensors"},{"key":"7292_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JIOT.2021.3056116","volume":"2021","author":"X Liu","year":"2021","unstructured":"Liu X, Yang X, Luo Y, Zhang Q (2021) Verifiable multi-keyword search encryption scheme with anonymous key generation for medical internet of things. IEEE Internet Things J 2021:1. https:\/\/doi.org\/10.1109\/JIOT.2021.3056116","journal-title":"IEEE Internet Things J"},{"key":"7292_CR17","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decentralized Business Review, 21260"},{"key":"7292_CR18","doi-asserted-by":"publisher","first-page":"7195","DOI":"10.1109\/ACCESS.2019.2959044","volume":"8","author":"S Niu","year":"2020","unstructured":"Niu S, Chen L, Wang J, Yu F (2020) Electronic health hecord sharing scheme with searchable attribute-based encryption on Blockchain. IEEE Access 8:7195\u20137204. https:\/\/doi.org\/10.1109\/ACCESS.2019.2959044","journal-title":"IEEE Access"},{"key":"7292_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/6676171","volume":"5","author":"Q Qin","year":"2021","unstructured":"Qin Q, Jin B, Liu Y (2021) A secure storage and sharing scheme of stroke electronic medical records based on consortium blockchain. BioMed Res Int 5:1\u201314. https:\/\/doi.org\/10.1155\/2021\/6676171","journal-title":"BioMed Res Int"},{"key":"7292_CR20","doi-asserted-by":"publisher","first-page":"86384","DOI":"10.1109\/ACCESS.2019.2926354","volume":"7","author":"K Riad","year":"2019","unstructured":"Riad K, Hamza R, Yan H (2019) Sensitive and energetic IoT access control for managing cloud electronic health records. IEEE Access 7:86384\u201386393. https:\/\/doi.org\/10.1109\/ACCESS.2019.2926354","journal-title":"IEEE Access"},{"issue":"13","key":"7292_CR21","doi-asserted-by":"publisher","first-page":"2576","DOI":"10.1016\/j.ins.2010.03.026","volume":"180","author":"J Shao","year":"2010","unstructured":"Shao J, Cao Z, Liang X, Lin H (2010) Proxy re-encryption with keyword search. Inf Sci 180(13):2576\u20132587. https:\/\/doi.org\/10.1016\/j.ins.2010.03.026","journal-title":"Inf Sci"},{"key":"7292_CR22","doi-asserted-by":"crossref","unstructured":"Song D, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: proceeding 2000 IEEE symposium on security and privacy. S &P 2000, Berkeley, CA, USA, pp 44-45","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"7292_CR23","unstructured":"The pairing-based cryptography library (2013) http:\/\/crypto.stanford.edu\/pbc\/address"},{"issue":"8","key":"7292_CR24","doi-asserted-by":"publisher","first-page":"e3925.1","DOI":"10.1002\/dac.3925","volume":"32","author":"X Wang","year":"2019","unstructured":"Wang X, Zhang A, Xie X, Ye X (2019) Secure-aware and privacy-preserving electronic health record searching in cloud environment. Int J Commun Syst 32(8):e3925.1-e3925.11. https:\/\/doi.org\/10.1002\/dac.3925","journal-title":"Int J Commun Syst"},{"key":"7292_CR25","doi-asserted-by":"publisher","first-page":"136704","DOI":"10.1109\/ACCESS.2019.2943153","volume":"7","author":"Y Wang","year":"2019","unstructured":"Wang Y, Zhang A, Zhang P, Wang H (2019) Cloud-assisted EHR sharing with security and privacy preservation via consortium blockchain. IEEE Access 7:136704\u2013136719. https:\/\/doi.org\/10.1109\/ACCESS.2019.2943153","journal-title":"IEEE Access"},{"key":"7292_CR26","doi-asserted-by":"publisher","unstructured":"Wu Y, Lu X, Su J, Chen P (2016) An efficient searchable encryption against keyword guessing attacks for sharable electronic medical records in cloud-based system. J Med Syst 40(12):258. https:\/\/doi.org\/10.1007\/s10916-016-0609-z","DOI":"10.1007\/s10916-016-0609-z"},{"issue":"4","key":"7292_CR27","doi-asserted-by":"publisher","first-page":"2622","DOI":"10.1109\/JIOT.2019.2944007","volume":"7","author":"X Xu","year":"2020","unstructured":"Xu X, He C, Xu Z, Qi L, Wan S, Bhuiyan M (2020) Joint optimization of offloading utility and privacy for edge computing enabled IoT. IEEE Internet of Things J 7(4):2622\u20132629. https:\/\/doi.org\/10.1109\/JIOT.2019.2944007","journal-title":"IEEE Internet of Things J"},{"key":"7292_CR28","doi-asserted-by":"publisher","first-page":"30779","DOI":"10.1109\/ACCESS.2022.3153120","volume":"10","author":"L Xue","year":"2022","unstructured":"Xue L (2022) DSAS: a secure data sharing and authorized searchable framework for e-healthcare system. IEEE Access 10:30779\u201330791. https:\/\/doi.org\/10.1109\/ACCESS.2022.3153120","journal-title":"IEEE Access"},{"key":"7292_CR29","doi-asserted-by":"publisher","first-page":"53698","DOI":"10.1109\/ACCESS.2018.2871170","volume":"6","author":"Z Ying","year":"2018","unstructured":"Ying Z, Wei L, Li Q, Liu X, Cui J (2018) A lightweight policy preserving EHR sharing scheme in the cloud. IEEE Access 6:53698\u201353708. https:\/\/doi.org\/10.1109\/ACCESS.2018.2871170","journal-title":"IEEE Access"},{"issue":"8","key":"7292_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-020-09753-1","volume":"80","author":"X Yu","year":"2021","unstructured":"Yu X, Xu C, Dou B, Wang Y (2021) Multi-user search on the encrypted multimedia database: lattice-based searchable encryption scheme with time-controlled proxy re-encryption. Multimed Tools Appl 80(8):1\u201319. https:\/\/doi.org\/10.1007\/s11042-020-09753-1","journal-title":"Multimed Tools Appl"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-022-07292-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-022-07292-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-022-07292-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T12:23:10Z","timestamp":1744201390000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-022-07292-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,25]]},"references-count":30,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["7292"],"URL":"https:\/\/doi.org\/10.1007\/s00500-022-07292-5","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2022,7,25]]},"assertion":[{"value":"1 June 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 July 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have not disclosed any competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}