{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T18:05:06Z","timestamp":1762625106326,"version":"3.28.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T00:00:00Z","timestamp":1695168000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T00:00:00Z","timestamp":1695168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s10207-023-00753-4","type":"journal-article","created":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T17:01:45Z","timestamp":1695229305000},"page":"487-503","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["BASPED: Blockchain assisted searchable public key encryption over outsourced data"],"prefix":"10.1007","volume":"23","author":[{"given":"Partha Sarathi","family":"Chakraborty","sequence":"first","affiliation":[]},{"given":"Somanath","family":"Tripathy","sequence":"additional","affiliation":[]},{"given":"Sanjeet Kumar","family":"Nayak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,20]]},"reference":[{"key":"753_CR1","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/11535218_13","volume-title":"Advances in Cryptology - CRYPTO 2005","author":"Michel Abdalla","year":"2005","unstructured":"Abdalla, Michel: Bellare, Mihir, Catalano, Dario, Kiltz, Eike, Kohno, Tadayoshi, Lange, Tanja, Malone-Lee, John, Neven, Gregory, Paillier, Pascal, Shi, Haixia: Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. In: Shoup, Victor (ed.) Advances in Cryptology - CRYPTO 2005, pp. 205\u2013222. Berlin Heidelberg, Berlin, Heidelberg, Springer (2005)"},{"issue":"2","key":"753_CR2","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s13389-013-0057-3","volume":"3","author":"Joseph A Akinyele","year":"2013","unstructured":"Akinyele, Joseph A., Garman, Christina, Miers, Ian, Pagano, Matthew W., Rushanan, Michael, Green, Matthew, Rubin, Aviel D.: Charm: a framework for rapidly prototyping cryptosystems. J. Cryptogr. Eng. 3(2), 111\u2013128 (2013)","journal-title":"J. Cryptogr. Eng."},{"doi-asserted-by":"crossref","unstructured":"Baek, Joonsang, Safavi-Naini, Reihaneh, Susilo, Willy: On the integration of public key data encryption and public key encryption with keyword search. In: International Conference on Information Security \u2013 ISC 2006, ISC\u201906, Berlin, Heidelberg, Springer-Verlag, pp. 217\u2013232 (2006)","key":"753_CR3","DOI":"10.1007\/11836810_16"},{"doi-asserted-by":"crossref","unstructured":"Baek, Joonsang, Safavi-Naini, Reihaneh, Susilo, Willy: Public key encryption with keyword search revisited. In: Computational Science and Its Applications \u2013 ICCSA 2008, Berlin, Heidelberg, Springer Berlin Heidelberg, pp. 1249\u20131259 (2008)","key":"753_CR4","DOI":"10.1007\/978-3-540-69839-5_96"},{"doi-asserted-by":"crossref","unstructured":"Blackstone, Laura, Kamara, Seny, Moataz, Tarik, Revisiting leakage abuse attacks. In: Network and Distributed Systems Security (NDSS) Symposium, pp. 1\u201318, 2020. San Diego, CA, USA (2020)","key":"753_CR5","DOI":"10.14722\/ndss.2020.23103"},{"key":"753_CR6","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Dan Boneh","year":"2004","unstructured":"Boneh, Dan, Crescenzo, Di.: Giovanni, Ostrovsky, Rafail, Persiano, Giuseppe: Public key encryption with keyword search. In: Cachin, Giuseppe, Camenisch, Jan L. (eds.) Advances in Cryptology - EUROCRYPT 2004, pp. 506\u2013522. Berlin Heidelberg, Berlin, Heidelberg, Springer (2004)"},{"key":"753_CR7","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2001","author":"Dan Boneh","year":"2001","unstructured":"Boneh, Dan: Franklin, Matt: Identity-based encryption from the weil pairing. In: Kilian, Joe (ed.) Advances in Cryptology \u2013 CRYPTO 2001, pp. 213\u2013229. Berlin Heidelberg, Berlin, Heidelberg, Springer (2001)"},{"unstructured":"Bost, Raphael: $${\\Sigma }{o}{\\phi }{o}{\\varsigma }$$: Forward secure searchable encryption. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201916, New York, NY, USA, Association for Computing Machinery, pp. 1143\u20131154 (2016)","key":"753_CR8"},{"doi-asserted-by":"crossref","unstructured":"Bost, Rapha\u00ebl, Minaud, Brice, Ohrimenko, Olga: Forward and backward private searchable encryption from constrained cryptographic primitives. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201917, New York, NY, USA, pp. 1465\u20131482 (2017). Association for Computing Machinery","key":"753_CR9","DOI":"10.1145\/3133956.3133980"},{"doi-asserted-by":"crossref","unstructured":"Cash, David, Grubbs, Paul, Perry, Jason, Ristenpart, Thomas: Leakage-abuse attacks against searchable encryption. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS \u201915, New York, NY, USA, ACM, pp. 668\u2013679 (2015)","key":"753_CR10","DOI":"10.1145\/2810103.2813700"},{"doi-asserted-by":"crossref","unstructured":"Chai, Qi, Gong, Guang: Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE International Conference on Communications (ICC). IEEE (2012)","key":"753_CR11","DOI":"10.1109\/ICC.2012.6364125"},{"doi-asserted-by":"crossref","unstructured":"Chen, Huashan, Pendleton, Marcus, Njilla, Laurent, Shouhuai, Xu.: A survey on ethereum systems security. ACM Comput. Surv. 53(3), 1\u201343 (2021)","key":"753_CR12","DOI":"10.1145\/3391195"},{"doi-asserted-by":"crossref","unstructured":"di\u00a0Angelo, Monika, Salzer, Gernot: A survey of tools for analyzing ethereum smart contracts. In: 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON). IEEE (April 2019)","key":"753_CR13","DOI":"10.1109\/DAPPCON.2019.00018"},{"doi-asserted-by":"crossref","unstructured":"Galbraith, Steven D., Paterson, Kenneth G., Smart, Nigel P.: Pairings for cryptographers. Discret. Appl. Math. 156(16), 3113\u20133121 (2008). (Applications of Algebra to Cryptography)","key":"753_CR14","DOI":"10.1016\/j.dam.2007.12.010"},{"doi-asserted-by":"crossref","unstructured":"Guo, Lifeng, Yau, Wei-Chuen.: Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage. J. Med. Syst. 39(2), 1\u201311 (2015)","key":"753_CR15","DOI":"10.1007\/s10916-014-0178-y"},{"doi-asserted-by":"crossref","unstructured":"Hu, Baishuang, Liu, Qin, Liu, Xuhui, Peng, Tao, Wang, Guojun, Wu, Jie: Dabks: Dynamic attribute-based keyword search in cloud computing. In: 2017 IEEE International Conference on Communications (ICC), pp. 1\u20136 (2017)","key":"753_CR16","DOI":"10.1109\/ICC.2017.7997108"},{"key":"753_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2017.03.038","volume":"403\u2013404","author":"Qiong Huang","year":"2017","unstructured":"Huang, Qiong: Li, Hongbo: An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf. Sci. 403\u2013404, 1\u201314 (2017)","journal-title":"Inf. Sci."},{"unstructured":"Islam, Mohammad Saiful, Kuzu, Mehmet, Kantarcioglu, Murat, Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In Network and Distributed Systems Security (NDSS) Symposium,: pp 12\u201327, p. 2012. San Diego, CA, USA (2012)","key":"753_CR18"},{"doi-asserted-by":"crossref","unstructured":"Katz, Jonathan, Lindell, Andrew\u00a0Y.: Aggregate message authentication codes. In: The Cryptopgraphers\u2019 Track at the RSA conference on Topics in Cryptology, CT-RSA\u201908, Berlin, Heidelberg, Springer-Verlag, pp. 155\u2013169 (2008)","key":"753_CR19","DOI":"10.1007\/978-3-540-79263-5_10"},{"key":"753_CR20","doi-asserted-by":"crossref","first-page":"590","DOI":"10.1016\/j.ins.2018.12.043","volume":"527","author":"Blockchain-based system for secure outsourcing of bilinear pairings","year":"2020","unstructured":"Blockchain-based system for secure outsourcing of bilinear pairings: Lin, Chao, He, Debiao, Huang, Xinyi, Xie, Xiang, Choo, Kim-Kwang Raymond. Inf. Sci. 527, 590\u2013601 (2020)","journal-title":"Inf. Sci."},{"issue":"4","key":"753_CR21","doi-asserted-by":"publisher","first-page":"2696","DOI":"10.1109\/TII.2020.3006474","volume":"17","author":"Lu Yang","year":"2021","unstructured":"Yang, Lu.: Li, Jiguo, Wang, Fen: Pairing-free certificate-based searchable encryption supporting privacy-preserving keyword search function for IIoTs. IEEE Trans. Industr. Inf. 17(4), 2696\u20132706 (2021)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"6","key":"753_CR22","doi-asserted-by":"publisher","first-page":"2041","DOI":"10.1109\/TSC.2019.2910113","volume":"14","author":"Lu Yang","year":"2021","unstructured":"Yang, Lu.: Li, Jiguo, Zhang, Yichen: Secure channel free certificate-based searchable encryption withstanding outside and inside keyword guessing attacks. IEEE Trans. Serv. Comput. 14(6), 2041\u20132054 (2021)","journal-title":"IEEE Trans. Serv. Comput."},{"doi-asserted-by":"crossref","unstructured":"Miao, Yinbin, Weng, Jian, Liu, Ximeng, Choo, Kim-Kwang Raymond., Liu, Zhiquan, Li, Hongwei: Enabling verifiable multiple keywords search over encrypted cloud data. Inf. Sci. 465, 21\u201337 (2018)","key":"753_CR23","DOI":"10.1016\/j.ins.2018.06.066"},{"doi-asserted-by":"crossref","unstructured":"Nayak, Sanjeet\u00a0Kumar, Tripathy, Somanath: Privacy preserving provable data possession for cloud based electronic health record system. In: 2016 IEEE Trustcom\/BigDataSE\/ISPA, pp. 860\u2013867 (2016)","key":"753_CR24","DOI":"10.1109\/TrustCom.2016.0149"},{"issue":"1","key":"753_CR25","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1109\/TETC.2018.2859051","volume":"9","author":"Sanjeet Kumar Nayak","year":"2021","unstructured":"Nayak, Sanjeet Kumar, Tripathy, Somanath: SEMKC: secure and efficient computation over outsourced data encrypted under multiple keys. IEEE Trans. Emerg. Top. Comput. 9(1), 414\u2013428 (2021)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"5","key":"753_CR26","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1016\/j.jss.2009.11.726","volume":"83","author":"Hyun Sook Rhee","year":"2010","unstructured":"Rhee, Hyun Sook, Park, Jong Hwan, Susilo, Willy, Lee, Dong Hoon: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5), 763\u2013771 (2010)","journal-title":"J. Syst. Softw."},{"doi-asserted-by":"crossref","unstructured":"Shu, Jiangang, Zou, Xing, Jia, Xiaohua, Zhang, Weizhe, Xie, Ruitao: Blockchain-based decentralized public auditing for cloud storage. IEEE Trans. on Cloud Comput. 10(4), 2366\u20132380 (2022)","key":"753_CR27","DOI":"10.1109\/TCC.2021.3051622"},{"doi-asserted-by":"crossref","unstructured":"Song, Dawn\u00a0Xiaoding, Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy. S P 2000, pp. 44\u201355 (2000)","key":"753_CR28","DOI":"10.1109\/SECPRI.2000.848445"},{"unstructured":"Sultan, Nazatul\u00a0Haque, Kaaniche, Nesrine, Laurent, Maryline, Barbhuiya, Ferdous\u00a0Ahmed: Authorized keyword search over outsourced encrypted data in cloud environment. IEEE Transactions on Cloud Computing, 1\u20131 (2019)","key":"753_CR29"},{"issue":"6","key":"753_CR30","doi-asserted-by":"publisher","first-page":"1083","DOI":"10.1109\/TDSC.2016.2635128","volume":"15","author":"Zhiguo Wan","year":"2018","unstructured":"Wan, Zhiguo, Deng, Robert H.: VPSearch: Achieving verifiability for privacy-preserving multi-keyword search over encrypted cloud data. IEEE Trans. Dependable Secure Comput. 15(6), 1083\u20131095 (2018)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"doi-asserted-by":"crossref","unstructured":"Wang, Zeli, Jin, Hai, Dai, Weiqi, Choo, Kim-Kwang Raymond., Zou, Deqing: Ethereum smart contract security research: survey and future research opportunities. Front. of Comput. Sci. 15(2), 1\u20138 (2020)","key":"753_CR31","DOI":"10.1007\/s11704-020-9284-9"},{"issue":"3","key":"753_CR32","doi-asserted-by":"publisher","first-page":"1211","DOI":"10.1007\/s10586-016-0584-7","volume":"19","author":"Jianhong Zhang","year":"2016","unstructured":"Zhang, Jianhong: Mao, Jian: Efficient public key encryption with revocable keyword search in cloud computing. Clust. Comput. 19(3), 1211\u20131217 (2016)","journal-title":"Clust. Comput."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00753-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00753-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00753-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T13:46:58Z","timestamp":1730123218000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00753-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,20]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["753"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00753-4","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2023,9,20]]},"assertion":[{"value":"20 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}