{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:35:40Z","timestamp":1771468540896,"version":"3.50.1"},"reference-count":268,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T00:00:00Z","timestamp":1750032000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T00:00:00Z","timestamp":1750032000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s10586-024-05066-2","type":"journal-article","created":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T15:04:36Z","timestamp":1750086276000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Public key-based search on encrypted data using blockchain and non-blockchain enabled cloud storage: a comprehensive survey, analysis and future research scopes"],"prefix":"10.1007","volume":"28","author":[{"given":"Debjani","family":"Mallick","sequence":"first","affiliation":[]},{"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Uma Sankararao","family":"Varri","sequence":"additional","affiliation":[]},{"given":"Youngho","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,16]]},"reference":[{"key":"5066_CR1","doi-asserted-by":"publisher","first-page":"57792","DOI":"10.1109\/ACCESS.2021.3073203","volume":"9","author":"B Alouffi","year":"2021","unstructured":"Alouffi, B., Hassnain, M., Alharbi, A., Alosaimi, W., Alyami, H., Ayaz, M.: A systematic literature review on cloud computing security: threats and mitigation strategies. IEEE Access 9, 57792\u201357807 (2021)","journal-title":"IEEE Access"},{"key":"5066_CR2","doi-asserted-by":"crossref","unstructured":"Li, M., Yu, S., Ren, K., Lou, W., Hou, Y.T.: Toward privacy-assured and searchable cloud data storage services. IEEE Netw. 27(4), 56\u201362 (2013)","DOI":"10.1109\/MNET.2013.6574666"},{"key":"5066_CR3","doi-asserted-by":"crossref","unstructured":"Syed, A., Purushotham, K., Shidaganti, G.: Cloud storage security risks, practices and measures: a review. In: 2020 IEEE International Conference for Innovation in Technology (INOCON), pp. 1\u20134 (2020)","DOI":"10.1109\/INOCON50539.2020.9298281"},{"issue":"10","key":"5066_CR4","doi-asserted-by":"publisher","first-page":"2653","DOI":"10.1109\/TIFS.2018.2825952","volume":"13","author":"N Wang","year":"2018","unstructured":"Wang, N., Junsong, F., Bhargava, B.K., Zeng, J.: Efficient retrieval over documents encrypted by attributes in cloud computing. IEEE Trans. Inf. Forensics Secur. 13(10), 2653\u20132667 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5066_CR5","doi-asserted-by":"crossref","unstructured":"Isaac, O.-A., Olasupo, A., Boladele, A., Ravin, A.: An overview of data storage in cloud computing. In: 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS), pp. 29\u201334 (2017)","DOI":"10.1109\/ICNGCIS.2017.9"},{"issue":"7","key":"5066_CR6","doi-asserted-by":"publisher","first-page":"9952","DOI":"10.1007\/s11227-022-04309-6","volume":"78","author":"N Andola","year":"2022","unstructured":"Andola, N., Gahlot, R., Yadav, V., Venkatesan, S., Verma, S.: Searchable encryption on the cloud: a survey. J. Supercomput. 78(7), 9952\u20139984 (2022)","journal-title":"J. Supercomput."},{"key":"5066_CR7","doi-asserted-by":"publisher","first-page":"122078","DOI":"10.1109\/ACCESS.2019.2937846","volume":"7","author":"Yu Zhang","year":"2019","unstructured":"Zhang, Yu., Wang, Y., Li, Y.: Searchable public key encryption supporting semantic multi-keywords search. IEEE Access 7, 122078\u2013122090 (2019)","journal-title":"IEEE Access"},{"key":"5066_CR8","doi-asserted-by":"publisher","first-page":"109687","DOI":"10.1109\/ACCESS.2020.3002264","volume":"8","author":"X Yan","year":"2020","unstructured":"Yan, X., Yuan, X., Ye, Q., Tang, Y.: Blockchain-based searchable encryption scheme with fair payment. IEEE Access 8, 109687\u2013109706 (2020)","journal-title":"IEEE Access"},{"key":"5066_CR9","doi-asserted-by":"publisher","first-page":"20968","DOI":"10.1109\/ACCESS.2021.3054557","volume":"9","author":"Y Sun","year":"2021","unstructured":"Sun, Y., Li, X., Lv, F., Bing, H.: Research on logistics information blockchain data query algorithm based on searchable encryption. IEEE Access 9, 20968\u201320976 (2021)","journal-title":"IEEE Access"},{"issue":"1","key":"5066_CR10","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/TITB.2007.906101","volume":"12","author":"W-B Lee","year":"2008","unstructured":"Lee, W.-B., Lee, C.-D.: A cryptographic key management solution for HIPAA privacy\/security regulations. IEEE Trans. Inf. Technol. 12(1), 34\u201341 (2008)","journal-title":"IEEE transactions on information technology in biomedicine:a publication of the IEEE Engineering in Medicine and Biology Society"},{"key":"5066_CR11","doi-asserted-by":"crossref","unstructured":"Pussewalage, H.S.G., Oleshchuk, V.A.: Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions. Int. J. Inf. Manag. 36(6, Part B), 1161\u20131173 (2016)","DOI":"10.1016\/j.ijinfomgt.2016.07.006"},{"issue":"6","key":"5066_CR12","doi-asserted-by":"publisher","first-page":"978","DOI":"10.1109\/TSC.2017.2762296","volume":"11","author":"R Zhang","year":"2018","unstructured":"Zhang, R., Xue, R., Liu, L.: Searchable encryption for healthcare clouds: a survey. IEEE Trans. Serv. Comput. 11(6), 978\u2013996 (2018)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"5066_CR13","doi-asserted-by":"crossref","unstructured":"Shivaramakrishnan, N., Martin, G., Reihaneh, S.-N.: Privacy preserving ehr system using attribute-based infrastructure. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop. Association for Computing Machinery, pp. 47\u201352 (2010)","DOI":"10.1145\/1866835.1866845"},{"issue":"10","key":"5066_CR14","doi-asserted-by":"publisher","first-page":"3441","DOI":"10.1007\/s11042-013-1829-6","volume":"74","author":"F Xhafa","year":"2015","unstructured":"Xhafa, F., Li, J., Zhao, G., Li, J., Chen, X., Wong, D.: Designing cloud-based electronic health record system with attribute-based encryption. Multimedia Tools Appl. 74(10), 3441\u20133458 (2015)","journal-title":"Multimedia Tools Appl."},{"issue":"1","key":"5066_CR15","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2013","unstructured":"Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131\u2013143 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"5066_CR16","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s10916-014-0178-y","volume":"39","author":"L Guo","year":"2015","unstructured":"Guo, L., Yau, W.-C.: Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage. J. Med. Syst. 39(2), 11 (2015)","journal-title":"J. Med. Syst."},{"issue":"3","key":"5066_CR17","doi-asserted-by":"publisher","first-page":"1991","DOI":"10.1109\/TII.2021.3064691","volume":"18","author":"K Wang","year":"2022","unstructured":"Wang, K., Chen, C.-M., Tie, Z., Shojafar, M., Kumar, S., Kumari, S.: Forward privacy preservation in IoT-enabled healthcare systems. IEEE Trans. Ind. Inf. 18(3), 1991\u20131999 (2022)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"5066_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102417","volume":"124","author":"X Xiang","year":"2022","unstructured":"Xiang, X., Zhao, X.: Blockchain-assisted searchable attribute-based encryption for e-health systems. J. Syst. Architect. 124, 102417 (2022)","journal-title":"J. Syst. Architect."},{"key":"5066_CR19","doi-asserted-by":"publisher","first-page":"24775","DOI":"10.1109\/ACCESS.2017.2771301","volume":"5","author":"X Peng","year":"2017","unstructured":"Peng, X., Tang, X., Wang, W., Jin, H., Yang, L.T.: Fast and parallel keyword search over public-key ciphertexts for cloud-assisted IoT. IEEE Access 5, 24775\u201324784 (2017)","journal-title":"IEEE Access"},{"key":"5066_CR20","doi-asserted-by":"crossref","unstructured":"Challa, S., Wazid, M., Das, A.K., Kumar, N., Reddy, A.G., Yoon, E.-J., Yoo, K.-Y.: Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 5, 3028\u20133043 (2017)","DOI":"10.1109\/ACCESS.2017.2676119"},{"issue":"2","key":"5066_CR21","doi-asserted-by":"publisher","first-page":"1998","DOI":"10.1109\/JIOT.2018.2871607","volume":"6","author":"M Shen","year":"2019","unstructured":"Shen, M., Ma, B., Zhu, L., Xiaojiang, D., Ke, X.: Secure phrase search for intelligent processing of encrypted data in cloud-based IoT. IEEE Internet Things J. 6(2), 1998\u20132008 (2019)","journal-title":"IEEE Internet Things J."},{"key":"5066_CR22","doi-asserted-by":"crossref","unstructured":"Wu, L., Chen, B., Choo, K.-K.R., He, D.: Efficient and secure searchable encryption protocol for cloud-based Internet of Things. J. Parallel Distrib. Comput. 111, 152\u2013161 (2018)","DOI":"10.1016\/j.jpdc.2017.08.007"},{"issue":"9","key":"5066_CR23","doi-asserted-by":"publisher","first-page":"7851","DOI":"10.1109\/JIOT.2020.2993231","volume":"7","author":"S Liu","year":"2020","unstructured":"Liu, S., Jiguo, Yu., Xiao, Y., Wan, Z., Wang, S., Yan, B.: BC-SABE: Blockchain-Aided Searchable Attribute-Based Encryption for Cloud-IoT. IEEE Internet Things J. 7(9), 7851\u20137867 (2020)","journal-title":"IEEE Internet Things J."},{"key":"5066_CR24","doi-asserted-by":"crossref","unstructured":"Andrew, J., Isravel Deva\u00a0Priya, Sagayam K.\u00a0Martin, Bhushan Bharat, Sei Yuichi, Eunice Jennifer.: Blockchain for healthcare systems: Architecture, security challenges, trends and future directions. Journal of Network and Computer Applications, 215:103633, (2023)","DOI":"10.1016\/j.jnca.2023.103633"},{"key":"5066_CR25","doi-asserted-by":"crossref","unstructured":"Popoola, O., Rodrigues, M., Marchang, J., Shenfield, A., Ikpehai A., Popoola, J.: A critical literature review of security and privacy in smart home healthcare schemes adopting iot & blockchain: problems, challenges and solutions. Blockchain Res. Appl. 5(2), 100178, (2024)","DOI":"10.1016\/j.bcra.2023.100178"},{"key":"5066_CR26","doi-asserted-by":"crossref","unstructured":"Srinivas, J., Das, A.K., Kumar, N., Rodrigues, J.J.P.C.: Cloud centric authentication for wearable healthcare monitoring system. IEEE Trans. Depend. Secure Comput. 17(5), 942\u2013956 (2020)","DOI":"10.1109\/TDSC.2018.2828306"},{"key":"5066_CR27","doi-asserted-by":"crossref","unstructured":"Al\u00a0Salami, S., Baek, J., Salah, K., Damiani, E.: Lightweight encryption for smart home. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 382\u2013388 (2016)","DOI":"10.1109\/ARES.2016.40"},{"key":"5066_CR28","unstructured":"Poh, G.S., Gope P., Ning, J.: PrivHome: privacy-preserving authenticated communication in smart home environment. IEEE Trans. Depend. Secure Comput. 18(3), 1095\u20131107 (2021)"},{"key":"5066_CR29","doi-asserted-by":"crossref","unstructured":"Li, S., Li, M., Xu, H., Zhou, X.: Searchable encryption scheme for personalized privacy in IoT-based big data. Sensors 19(5), 1059 (2019)","DOI":"10.3390\/s19051059"},{"issue":"2","key":"5066_CR30","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/s10796-020-10044-1","volume":"24","author":"E Ismagilova","year":"2022","unstructured":"Ismagilova, E., Hughes, L., Rana, N.P., Dwivedi, Y.K.: Security, privacy and risks within smart cities: literature review and development of a smart city interaction framework. Inf. Syst. Front. 24(2), 393\u2013414 (2022)","journal-title":"Inf. Syst. Front."},{"key":"5066_CR31","doi-asserted-by":"crossref","unstructured":"Miao, Y., Ma, J., Jiang, Q., Li, X., Sangaiah, A.K.: Verifiable keyword search over encrypted cloud data in smart city. Comput. Electr. Eng. 65, 90\u2013101 (2018)","DOI":"10.1016\/j.compeleceng.2017.06.021"},{"key":"5066_CR32","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1186\/s13638-020-01875-2","volume":"2021","author":"F Meng","year":"2021","unstructured":"Meng, F., Cheng, L., Wang, M.: Ciphertext-policy attribute-based encryption with hidden sensitive policy from keyword search techniques in smart city. EURASIP J. Wirel. Commun. Netw. 2021, 20 (2021)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"5066_CR33","doi-asserted-by":"crossref","unstructured":"Jawhara, B., Michala, A.L.: Searchable encryption with access control in industrial Internet of Things (IIoT). Wirel. Commun. Mob. Comput. 2021, 5555362 (2021)","DOI":"10.1155\/2021\/5555362"},{"issue":"6","key":"5066_CR34","doi-asserted-by":"publisher","first-page":"4248","DOI":"10.1109\/TII.2020.3014168","volume":"17","author":"K Zhang","year":"2021","unstructured":"Zhang, K., Long, J., Wang, X., Dai, H.-N., Liang, K., Imran, M.: Lightweight searchable encryption protocol for industrial Internet of Things. IEEE Trans. Ind. Inf. 17(6), 4248\u20134259 (2021)","journal-title":"IEEE Trans. Ind.. Inf."},{"key":"5066_CR35","volume":"53","author":"N Pakniat","year":"2020","unstructured":"Pakniat, N., Shiraly, D., Eslami, Z.: Certificateless authenticated encryption with keyword search: enhanced security model and a concrete construction for industrial IoT. J. Inf. Secur. Appl. 53, 102525 (2020)","journal-title":"J. Inf. Secur. Appl."},{"issue":"12","key":"5066_CR36","doi-asserted-by":"publisher","first-page":"11014","DOI":"10.1109\/JIOT.2023.3242964","volume":"10","author":"H Yin","year":"2023","unstructured":"Yin, H., Zhang, W., Deng, H., Qin, Z., Li, K.: An attribute-based searchable encryption scheme for cloud-assisted IIoT. IEEE Internet Things J. 10(12), 11014\u201311023 (2023)","journal-title":"IEEE Internet Things J."},{"key":"5066_CR37","doi-asserted-by":"crossref","unstructured":"Varri, U., Pasupuleti, S., Kadambari, K.V.: A scoping review of searchable encryption schemes in cloud computing: taxonomy, methods, and recent developments. J. Supercomput. 76, 3013\u20133042 (2020)","DOI":"10.1007\/s11227-019-03087-y"},{"key":"5066_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2636328","volume":"47","author":"C B\u00f6sch","year":"2014","unstructured":"B\u00f6sch, C., Hartel, P., Jonker, W., Peter, A.: A survey of provably secure searchable encryption. ACM Comput. Surv. 47, 1\u201351 (2014)","journal-title":"ACM Comput. Surv."},{"key":"5066_CR39","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.future.2016.01.007","volume":"62","author":"F Han","year":"2016","unstructured":"Han, F., Qin, J., Jiankun, H.: Secure searches in the cloud: a survey. Futur. Gener. Comput. Syst. 62, 66\u201375 (2016)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"5066_CR40","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/BF03391580","volume":"1","author":"Y Wang","year":"2016","unstructured":"Wang, Y., Wang, J., Chen, X.: Secure searchable encryption: a survey. J. Commun. Inf. Netw. 1, 52\u201365 (2016)","journal-title":"J. Commun. Inf. Netw."},{"key":"5066_CR41","doi-asserted-by":"crossref","unstructured":"Poh, G.S., Chin, J.-J., Yau, W.-C., Choo, K.-K.R., Mohamad, M.S.: Searchable symmetric encryption: designs and challenges. ACM Comput. Surv. 50(3), 1\u201337 (2017)","DOI":"10.1145\/3064005"},{"key":"5066_CR42","doi-asserted-by":"crossref","unstructured":"Pham, H., Woodworth, J., Mohsen, A.S.: Survey on secure search over encrypted data on the cloud. Concurr. Comput. Pract. Exp. 31, e5284 (2019)","DOI":"10.1002\/cpe.5284"},{"key":"5066_CR43","doi-asserted-by":"crossref","unstructured":"Sun, P.J.: Privacy protection and data security in cloud computing: a survey, challenges, and solutions. IEEE Access 7, 147420\u2013147452 (2019)","DOI":"10.1109\/ACCESS.2019.2946185"},{"key":"5066_CR44","doi-asserted-by":"publisher","first-page":"421","DOI":"10.3390\/e22040421","volume":"22","author":"Y Zhou","year":"2020","unstructured":"Zhou, Y., Li, N., Tian, Y., An, D., Wang, L.: Public key encryption with keyword search in cloud: a survey. Entropy 22, 421 (2020)","journal-title":"Entropy"},{"key":"5066_CR45","doi-asserted-by":"publisher","first-page":"3223509","DOI":"10.1155\/2022\/3223509","volume":"2022","author":"MH Noorallahzade","year":"2022","unstructured":"Noorallahzade, M.H., Alimoradi, R., Gholami, A.: A survey on public key encryption with keyword search: taxonomy and methods. Int. J. Math. Math. Sci. 2022, 3223509 (2022)","journal-title":"Int. J. Math. Math. Sci."},{"key":"5066_CR46","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1109\/JIOT.2021.3109440","volume":"9","author":"H Xiong","year":"2022","unstructured":"Xiong, H., Yao, T., Wang, H., Feng, J., Shui, Yu.: A survey of public-key encryption with search functionality for cloud-assisted IoT. IEEE Internet Things J. 9, 401\u2013418 (2022)","journal-title":"IEEE Internet Things J."},{"key":"5066_CR47","doi-asserted-by":"crossref","unstructured":"Li, F., Ma, J., Miao, Y., Liu, X., Ning, J., Deng, R.H.: A survey on searchable symmetric encryption. ACM Comput. Surv. 56(5), (2023)","DOI":"10.1145\/3617991"},{"issue":"3","key":"5066_CR48","doi-asserted-by":"publisher","first-page":"2009","DOI":"10.1109\/COMST.2020.2989392","volume":"22","author":"K Gai","year":"2020","unstructured":"Gai, K., Guo, J., Zhu, L., Yu, S.: Blockchain meets cloud computing: a survey. IEEE Commun. Surv. Tutor. 22(3), 2009\u20132030 (2020)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"5066_CR49","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103183","volume":"67","author":"H-B How","year":"2022","unstructured":"How, H.-B., Heng, S.-H.: Blockchain-enabled searchable encryption in clouds: a review. J. Inf. Secur. Appl. 67, 103183 (2022)","journal-title":"Journal of Information Security and Applications"},{"key":"5066_CR50","doi-asserted-by":"crossref","unstructured":"Menezes, A.: An introduction to pairing-based cryptography. Cryptology. Report 2005\/076, pp. 47\u201365 (2005)","DOI":"10.1090\/conm\/477\/09303"},{"key":"5066_CR51","doi-asserted-by":"crossref","unstructured":"Dan, B.: Pairing-based cryptography: past, present, and future. In: Wang, X., Sako, K. (eds.) Advances in Cryptology\u2014ASIACRYPT 2012, p. 1. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-34961-4_1"},{"key":"5066_CR52","doi-asserted-by":"crossref","unstructured":"Coron, J.-S., Lepoint, T., Tibouchi, M.: Practical multilinear maps over the integers. In: Canetti, R., Garay, J.A. (eds.) Advances in Cryptology\u2014CRYPTO 2013, pp. 476\u2013493. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-40041-4_26"},{"key":"5066_CR53","doi-asserted-by":"crossref","unstructured":"Boneh D., Di\u00a0Crescenzo, G., Ostrovsky, R., Persiano, G. Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) Advances in Cryptology\u2014EUROCRYPT 2004, pp. 506\u2013522. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"5066_CR54","doi-asserted-by":"crossref","unstructured":"Zheng, Z, Xie, S., Dai, H.-N., Chen, X, Wang, H.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14, 352\u2013375 (2018)","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"5066_CR55","doi-asserted-by":"crossref","unstructured":"Bharat, B., Sinha, P., Sagayam, K.M., Andrew, J.: Untangling blockchain technology: a survey on state of the art, security threats, privacy services, applications and future research directions. Comput. Electr. Eng. 90, 106897 (2021)","DOI":"10.1016\/j.compeleceng.2020.106897"},{"key":"5066_CR56","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2024.103858","volume":"225","author":"D Ressi","year":"2024","unstructured":"Ressi, D., Romanello, R., Piazza, C., Rossi, S.: Ai-enhanced blockchain technology: a review of advancements and opportunities. J. Netw. Comput. Appl. 225, 103858 (2024)","journal-title":"J. Netw. Comput. Appl."},{"key":"5066_CR57","doi-asserted-by":"crossref","unstructured":"Bisht, A., Das, A.K., Giri, G.: Personal health record storage and sharing using searchable encryption and blockchain: a comprehensive survey. Secur. Privacy 7(2), e351 (2024)","DOI":"10.1002\/spy2.351"},{"key":"5066_CR58","doi-asserted-by":"crossref","unstructured":"Mamta, Gupta, B.B., Li, K.-C., Leung, V.C.M., Psannis, K.E., Yamaguchi, S.: Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE\/CAA J. Autom. Sin. 8(12), 1877\u20131890 (2021)","DOI":"10.1109\/JAS.2021.1004003"},{"key":"5066_CR59","unstructured":"Li, H., Zhang, F., He, J., Tian, H.: A searchable symmetric encryption scheme using blockchain. CoRR (2017). arXiv:1711.01030"},{"issue":"6","key":"5066_CR60","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B Chor","year":"1998","unstructured":"Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM 45(6), 965\u2013981 (1998)","journal-title":"J. ACM"},{"key":"5066_CR61","doi-asserted-by":"crossref","unstructured":"Ostrovsky, R., Skeith, W.E.: Private searching on streaming data. In: Shoup, V. (ed.) Advances in Cryptology\u2014CRYPTO 2005, pp. 223\u2013240. Springer, Berlin (2005)","DOI":"10.1007\/11535218_14"},{"key":"5066_CR62","doi-asserted-by":"crossref","unstructured":"Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally-private information retrieval. In: Proceedings 38th Annual Symposium on Foundations of Computer Science, pp. 364\u2013373 (1997)","DOI":"10.1109\/SFCS.1997.646125"},{"key":"5066_CR63","unstructured":"Chor, B., Gilboa, N., Naor, M.: Private information retrieval by keywords. IACR Cryptol. ePrint Arch, p. 3 (1998)"},{"key":"5066_CR64","doi-asserted-by":"crossref","unstructured":"Di\u00a0Crescenzo, G., Malkin, T., Ostrovsky, R.: Single database private information retrieval implies oblivious transfer. In: Bart, P. (ed.) Advances in Cryptology\u2014EUROCRYPT 2000, pp. 122\u2013138. Springer, Berlin (2000)","DOI":"10.1007\/3-540-45539-6_10"},{"key":"5066_CR65","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy. S &P 2000, pp. 44\u201355 (2000)"},{"key":"5066_CR66","doi-asserted-by":"crossref","unstructured":"Goh, E.-J.: Secure indexes. IACR Cryptol. ePrint Arch. 2003, 216 (2003)","DOI":"10.1108\/09696470310476981"},{"key":"5066_CR67","doi-asserted-by":"crossref","unstructured":"Golle Philippe, Staddon Jessica, Waters Brent.: Secure Conjunctive Keyword Search over Encrypted Data. In Applied Cryptography and Network Security, pages 31\u201345. Springer Berlin Heidelberg, (2004)","DOI":"10.1007\/978-3-540-24852-1_3"},{"key":"5066_CR68","doi-asserted-by":"crossref","unstructured":"Boneh Dan, Kushilevitz Eyal, Ostrovsky Rafail\u00a0M., Skeith William\u00a0E.: Public Key Encryption That Allows PIR Queries. In Annual International Cryptology Conference, (2007)","DOI":"10.1007\/978-3-540-74143-5_4"},{"key":"5066_CR69","doi-asserted-by":"crossref","unstructured":"Wang Cong, Cao Ning, Li Jin, Ren Kui , Lou Wenjing. Secure Ranked Keyword Search over Encrypted Cloud Data. In 2010 IEEE 30th International Conference on Distributed Computing Systems, pages 253\u2013262, (2010)","DOI":"10.1109\/ICDCS.2010.34"},{"issue":"1","key":"5066_CR70","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"N Cao","year":"2014","unstructured":"Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data. IEEE Trans. Parallel Distrib. Syst. 25(1), 222\u2013233 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"5066_CR71","doi-asserted-by":"crossref","unstructured":"Wang Bing, Song Wei , Lou Wenjing, Hou Y.\u00a0Thomas.: Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee. In 2015 IEEE Conference on Computer Communications (INFOCOM), pages 2092\u20132100, (2015)","DOI":"10.1109\/INFOCOM.2015.7218594"},{"key":"5066_CR72","unstructured":"Baek Joonsang, Safavi-Naini Reihaneh , Susilo Willy. Public Key Encryption with Keyword Search Revisited. Cryptology ePrint Archive, Paper 2005\/191, (2005)"},{"key":"5066_CR73","doi-asserted-by":"crossref","unstructured":"Park Dong\u00a0Jin, Kim Kihyun, Lee Pil\u00a0Joong. Public Key Encryption with Conjunctive Field Keyword Search. In Chae\u00a0Hoon Lim and Moti Yung, editors, Information Security Applications, pages 73\u201386. Springer Berlin Heidelberg, (2005)","DOI":"10.1007\/978-3-540-31815-6_7"},{"key":"5066_CR74","doi-asserted-by":"crossref","unstructured":"Sahai Amit, Waters Brent.: Fuzzy Identity-Based Encryption. In Ronald Cramer, editor, Advances in Cryptology \u2013 EUROCRYPT 2005, pages 457\u2013473. Springer Berlin Heidelberg, (2005)","DOI":"10.1007\/11426639_27"},{"key":"5066_CR75","first-page":"309","volume":"2006","author":"V Goyal","year":"2006","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. IACR Cryptol. ePrint Arch. 2006, 309 (2006)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"5066_CR76","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP \u201907), pp. 321\u2013334 (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"5066_CR77","doi-asserted-by":"crossref","unstructured":"Hwang, Y.H., Lee, P.J.: Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing-Based Cryptography\u2014Pairing 2007, pp. 2\u201322. Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-73489-5_2"},{"key":"5066_CR78","doi-asserted-by":"crossref","unstructured":"Katz, J., Sahai, A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Smart, N. (ed.) Advances in Cryptology\u2014EUROCRYPT 2008, pp. 146\u2013162. Springer, Berlin (2008)","DOI":"10.1007\/978-3-540-78967-3_9"},{"issue":"13","key":"5066_CR79","doi-asserted-by":"publisher","first-page":"2576","DOI":"10.1016\/j.ins.2010.03.026","volume":"180","author":"J Shao","year":"2010","unstructured":"Shao, J., Cao, Z., Liang, X., Lin, H.: Proxy re-encryption with keyword search. Inf. Sci. 180(13), 2576\u20132587 (2010)","journal-title":"Inf. Sci."},{"issue":"11","key":"5066_CR80","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/CC.2014.7004528","volume":"11","author":"P Yanguo","year":"2014","unstructured":"Yanguo, P., Jiangtao, C., Changgen, P., Zuobin, Y.: Certificateless public key encryption with keyword search. China Commun. 11(11), 100\u2013113 (2014)","journal-title":"China Commun."},{"key":"5066_CR81","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.compeleceng.2018.10.015","volume":"73","author":"H Li","year":"2019","unstructured":"Li, H., Tian, H., Zhang, F., He, J.: Blockchain-based searchable symmetric encryption scheme. Comput. Electr. Eng. 73, 32\u201345 (2019)","journal-title":"Comput. Electr. Eng."},{"key":"5066_CR82","doi-asserted-by":"publisher","first-page":"158765","DOI":"10.1109\/ACCESS.2020.3020841","volume":"8","author":"X Yang","year":"2020","unstructured":"Yang, X., Chen, G., Wang, M., Li, T., Wang, C.: Multi-keyword certificateless searchable public key authenticated encryption scheme based on blockchain. IEEE Access 8, 158765\u2013158777 (2020)","journal-title":"IEEE Access"},{"key":"5066_CR83","first-page":"2015","volume":"1\u20137","author":"F Zeng","year":"2015","unstructured":"Zeng, F., Xu, F.: A novel model for lattice-based authorized searchable encryption with special keyword. Math. Probl. Eng. 1\u20137, 2015 (2015)","journal-title":"Math. Probl. Eng."},{"key":"5066_CR84","doi-asserted-by":"publisher","first-page":"43179","DOI":"10.1109\/ACCESS.2019.2908202","volume":"7","author":"X Yu","year":"2019","unstructured":"Yu, X., Xu, C., Xu, L.: Lattice-based searchable encryption with keywords revocable and bounded trapdoor exposure resistance. IEEE Access 7, 43179\u201343189 (2019)","journal-title":"IEEE Access"},{"key":"5066_CR85","doi-asserted-by":"crossref","unstructured":"Yu, X., Xu, C., Dou, B.: Conjunctive keywords searchable encryption scheme against inside keywords guessing attack from lattice. In: Sun, J., Wang, J., Bertino, B. (eds.) Artificial Intelligence and Security, pp. 107\u2013119. Springer, Cham (2020)","DOI":"10.1007\/978-3-030-57884-8_10"},{"issue":"3","key":"5066_CR86","first-page":"1019","volume":"18","author":"X Zhang","year":"2021","unstructured":"Zhang, X., Xu, C., Wang, H., Zhang, Y., Wang, S.: FS-PEKS: lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial Internet of Things. IEEE Trans. Depend. Secure Comput. 18(3), 1019\u20131032 (2021)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"issue":"1","key":"5066_CR87","first-page":"3368819","volume":"2022","author":"X Gang","year":"2022","unstructured":"Gang, X., Shiyuan, X., Cao, Y., Fan Yun, Yu., Cui, Y.Y., Xiao, K.: PPSEB: a postquantum public-key searchable encryption scheme on blockchain for E-healthcare scenarios. Secur. Commun. Netw. 2022(1), 3368819 (2022)","journal-title":"Secur. Commun. Netw."},{"key":"5066_CR88","doi-asserted-by":"crossref","unstructured":"Islam SKH, Mishra, N., Biswas, S., Keswani, B., Zeadally, S.: An efficient and forward-secure lattice-based searchable encryption scheme for the Big-data era. Comput. Electr. Eng. 96, 107533 (2021)","DOI":"10.1016\/j.compeleceng.2021.107533"},{"key":"5066_CR89","doi-asserted-by":"crossref","unstructured":"Liu, Z.-Y., Tseng, Y.-F., Tso, R., Mambo, M., Chen, Y.-C.: Public-key authenticated encryption with keyword search: cryptanalysis, enhanced security, and quantum-resistant instantiation. Cryptology ePrint Archive, Paper 2021\/1008 (2021)","DOI":"10.1093\/comjnl\/bxab119"},{"key":"5066_CR90","doi-asserted-by":"crossref","unstructured":"Xu, S., Cao, Y., Chen, X., Zhao, Y., Yiu, S.-M.: Post-quantum public-key authenticated searchable encryption with forward security: general construction, and applications. Cryptology ePrint Archive, Paper 2023\/591 (2023)","DOI":"10.1007\/978-981-97-0942-7_14"},{"issue":"5","key":"5066_CR91","doi-asserted-by":"publisher","first-page":"895","DOI":"10.3233\/JCS-2011-0426","volume":"19","author":"R Curtmola","year":"2011","unstructured":"Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: Improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895\u2013934 (2011)","journal-title":"J. Comput. Secur."},{"key":"5066_CR92","doi-asserted-by":"crossref","unstructured":"Yang, Y., Lu, H., Weng, J.: Multi-user private keyword search for cloud computing. In: 2011 IEEE 3rd Third International Conference on Cloud Computing Technology and Science, pp. 264\u2013271 (2011)","DOI":"10.1109\/CloudCom.2011.43"},{"issue":"4","key":"5066_CR93","first-page":"723","volume":"32","author":"J Li","year":"2013","unstructured":"Li, J., Chen, X.: Efficient multi-user keyword search over encrypted data in cloud computing. Comput. Inf. 32(4), 723\u2013738 (2013)","journal-title":"Comput. Inf."},{"key":"5066_CR94","doi-asserted-by":"crossref","unstructured":"Salam, M.I., Yau, W.-C., Chin, J.-J., Heng, S.-H., Ling, H.-C., Phan, R.C.-W., Poh, G.S., Tan, S.-Y., Yap, W.-S.: Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage. Hum. Centric Comput. Inf. Sci. 5, 19 (2015)","DOI":"10.1186\/s13673-015-0039-9"},{"key":"5066_CR95","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.future.2016.05.017","volume":"72","author":"Z Deng","year":"2017","unstructured":"Deng, Z., Li, K., Li, K., Zhou, J.: A multi-user searchable encryption scheme with keyword authorization in a cloud storage. Futur. Gener. Comput. Syst. 72, 208\u2013218 (2017)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"8","key":"5066_CR96","doi-asserted-by":"publisher","first-page":"1721","DOI":"10.1109\/TPDS.2018.2808283","volume":"29","author":"J Zhu","year":"2018","unstructured":"Zhu, J., Li, Q., Wang, C., Yuan, X., Wang, Q., Ren, K.: Enabling generic, verifiable, and secure data search in cloud services. IEEE Trans. Parallel Distrib. Syst. 29(8), 1721\u20131735 (2018)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"6","key":"5066_CR97","doi-asserted-by":"publisher","first-page":"1322","DOI":"10.1109\/TDSC.2018.2876831","volume":"17","author":"X Liu","year":"2020","unstructured":"Liu, X., Yang, G., Yi, M., Deng, R.H.: Multi-user verifiable searchable symmetric encryption for cloud storage. IEEE Trans. Depend. Secure Comput. 17(6), 1322\u20131332 (2020)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"5066_CR98","doi-asserted-by":"crossref","unstructured":"Chen, G., Lai, T.-H., Reiter, M.K., Zhang, Y.: Differentially private access patterns for searchable symmetric encryption. In: IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, pp. 810\u2013818 (2018)","DOI":"10.1109\/INFOCOM.2018.8486381"},{"key":"5066_CR99","doi-asserted-by":"crossref","unstructured":"Shang, Z., Oya, S., Peter, A., Kerschbaum, F.: Obfuscated access and search patterns in searchable encryption. In: 30th USENIX Security Symposium (2021)","DOI":"10.14722\/ndss.2021.23041"},{"issue":"8","key":"5066_CR100","doi-asserted-by":"publisher","first-page":"1467","DOI":"10.1109\/TPDS.2011.282","volume":"23","author":"C Wang","year":"2012","unstructured":"Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1467\u20131479 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"5066_CR101","doi-asserted-by":"crossref","unstructured":"Wang, C., Ren, K., Yu, S., Urs, K.M.R.: Achieving usable and privacy-assured similarity search over outsourced cloud data. In: 2012 Proceedings IEEE INFOCOM, pp. 451\u2013459 (2012)","DOI":"10.1109\/INFCOM.2012.6195784"},{"key":"5066_CR102","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.ins.2013.11.021","volume":"265","author":"C Liu","year":"2014","unstructured":"Liu, C., Zhu, L., Wang, M., Tan, Y.-A.: Search pattern leakage in searchable encryption: attacks and new construction. Inf. Sci. 265, 176\u2013188 (2014)","journal-title":"Inf. Sci."},{"key":"5066_CR103","doi-asserted-by":"crossref","unstructured":"Cash, D., Grubbs, P., Perry, J., Ristenpart, T.: Leakage-abuse attacks against searchable encryption. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 668-679. Association for Computing Machinery (2015)","DOI":"10.1145\/2810103.2813700"},{"key":"5066_CR104","doi-asserted-by":"crossref","unstructured":"Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) Applied Cryptography and Network Security, pp. 442\u2013455. Springer, Berlin (2005)","DOI":"10.1007\/11496137_30"},{"key":"5066_CR105","doi-asserted-by":"crossref","unstructured":"Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 965\u2013976. Association for Computing Machinery (2012)","DOI":"10.1145\/2382196.2382298"},{"key":"5066_CR106","doi-asserted-by":"crossref","unstructured":"Lucas, B., Kamara, S., Monrose, F.: Achieving efficient conjunctive keyword searches over encrypted data. In: Qing, S., Mao, W., L\u00f3pez, J., Wang, G. (eds.) Information and Communications Security, pp. 414\u2013426. Springer, Berlin (2005)","DOI":"10.1007\/11602897_35"},{"key":"5066_CR107","doi-asserted-by":"crossref","unstructured":"Wang, P., Wang, H., Pieprzyk, J.: Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) Cryptology and Network Security, pp. 178\u2013195. Springer (2008)","DOI":"10.1007\/978-3-540-89641-8_13"},{"key":"5066_CR108","doi-asserted-by":"crossref","unstructured":"Wang, P., Wang, H., Pieprzyk, J.: Common secure index for conjunctive keyword-based retrieval over encrypted data. In: Proceedings of the 4th VLDB Conference on Secure Data Management, pp. 108\u2013123. Springer, Heidelberg (2007)","DOI":"10.1007\/978-3-540-75248-6_8"},{"key":"5066_CR109","doi-asserted-by":"crossref","unstructured":"Wang, P., Wang, H., Pieprzyk, J.: An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) Information Security Applications, pp. 145\u2013159. Springer (2009)","DOI":"10.1007\/978-3-642-00306-6_11"},{"key":"5066_CR110","doi-asserted-by":"crossref","unstructured":"Ryu, E.-K., Takagi, T.: Efficient conjunctive keyword-searchable encryption. In: 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW\u201907), vol.\u00a01, pp. 409\u2013414 (2007)","DOI":"10.1109\/AINAW.2007.166"},{"key":"5066_CR111","doi-asserted-by":"crossref","unstructured":"\u00d6rencik, C., Sava\u015f, E.: Efficient and secure ranked multi-keyword search on encrypted cloud data. In: Proceedings of the 2012 Joint EDBT\/ICDT Workshops, pp. 186\u2013195, New York. Association for Computing Machinery (2012)","DOI":"10.1145\/2320765.2320820"},{"key":"5066_CR112","doi-asserted-by":"crossref","unstructured":"Sun, W., Wang, B., Cao, N., Li, M., Lou, W., Hou, Y.T., Li, H.: Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Trans. Parallel Distrib. Syst. 25(11), 3025\u20133035 (2014)","DOI":"10.1109\/TPDS.2013.282"},{"key":"5066_CR113","doi-asserted-by":"crossref","unstructured":"Sun, W., Liu, X., Lou, W., Hou, Y.T., Li, H.: Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 2110\u20132118 (2015)","DOI":"10.1109\/INFOCOM.2015.7218596"},{"issue":"2","key":"5066_CR114","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1109\/TDSC.2017.2693969","volume":"16","author":"X Ding","year":"2019","unstructured":"Ding, X., Liu, P., Jin, H.: Privacy-preserving multi-keyword top-$$k$$ k similarity search over encrypted data. IEEE Trans. Depend. Secure Comput. 16(2), 344\u2013357 (2019)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"issue":"6","key":"5066_CR115","doi-asserted-by":"publisher","first-page":"1072","DOI":"10.1109\/TSC.2017.2765323","volume":"13","author":"J Chen","year":"2020","unstructured":"Chen, J., He, K., Deng, L., Yuan, Q., Ruiying, D., Xiang, Y., Jie, W.: EliMFS: achieving efficient, leakage-resilient, and multi-keyword fuzzy search on encrypted cloud data. IEEE Trans. Serv. Comput. 13(6), 1072\u20131085 (2020)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"12","key":"5066_CR116","doi-asserted-by":"publisher","first-page":"2706","DOI":"10.1109\/TIFS.2016.2596138","volume":"11","author":"F Zhangjie","year":"2016","unstructured":"Zhangjie, F., Xinle, W., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706\u20132716 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"5066_CR117","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TPDS.2020.3027003","volume":"32","author":"X Liu","year":"2021","unstructured":"Liu, X., Yang, G., Susilo, W., Tonien, J., Liu, X., Shen, J.: Privacy-preserving multi-keyword searchable encryption for distributed systems. IEEE Trans. Parallel Distrib. Syst. 32(3), 561\u2013574 (2021)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"5066_CR118","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.110045","volume":"237","author":"M Wang","year":"2023","unstructured":"Wang, M., Rui, L., Siya, X., Gao, Z., Liu, H., Guo, S.: A multi-keyword searchable encryption sensitive data trusted sharing scheme in multi-user scenario. Comput. Netw. 237, 110045 (2023)","journal-title":"Comput. Netw."},{"key":"5066_CR119","doi-asserted-by":"crossref","unstructured":"Zhu, X., Liu, Q., Wang, G.: A novel verifiable and dynamic fuzzy keyword search scheme over encrypted data in cloud computing. In: 2016 IEEE Trustcom\/BigDataSE\/ISPA, pp. 845\u2013851 (2016)","DOI":"10.1109\/TrustCom.2016.0147"},{"issue":"1","key":"5066_CR120","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1109\/JIOT.2023.3288119","volume":"11","author":"N Gao","year":"2024","unstructured":"Gao, N., Fan, K., Wang, H., Zhang, K., Li, H., Yang, Y.: Public-key inverted-index keyword search with designated tester and multiuser key decryption in IoT. IEEE Internet Things J. 11(1), 1065\u20131079 (2024)","journal-title":"IEEE Internet Things J."},{"issue":"9","key":"5066_CR121","doi-asserted-by":"publisher","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","volume":"27","author":"F Zhangjie","year":"2016","unstructured":"Zhangjie, F., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546\u20132559 (2016)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"5066_CR122","doi-asserted-by":"crossref","unstructured":"Wang, B., Yu, S., Lou, W., Thomas, H.Y.: Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: IEEE INFOCOM 2014\u2014IEEE Conference on Computer Communications, pp. 2112\u20132120 (2014)","DOI":"10.1109\/INFOCOM.2014.6848153"},{"key":"5066_CR123","doi-asserted-by":"crossref","unstructured":"Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., Lou, W.: Fuzzy keyword search over encrypted data in cloud computing. In: 2010 Proceedings IEEE INFOCOM, pp. 1\u20135 (2010)","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"5066_CR124","doi-asserted-by":"crossref","unstructured":"Liu, C., Zhu, L., Li, L., Tan, Y.: Fuzzy keyword search on encrypted cloud storage data with small index. In: 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, pp. 269\u2013273 (2011)","DOI":"10.1109\/CCIS.2011.6045073"},{"key":"5066_CR125","doi-asserted-by":"publisher","first-page":"667","DOI":"10.2298\/CSIS121104028W","volume":"10","author":"J Wang","year":"2013","unstructured":"Wang, J., Ma, H., Tang, Q., Li, J., Zhu, H., Ma, S., Chen, X.: Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10, 667\u2013684 (2013)","journal-title":"Comput. Sci. Inf. Syst."},{"key":"5066_CR126","doi-asserted-by":"publisher","first-page":"71893","DOI":"10.1109\/ACCESS.2020.2966367","volume":"8","author":"G Liu","year":"2020","unstructured":"Liu, G., Yang, G., Bai, S., Zhou, Q., Dai, H.: FSSE: an effective fuzzy semantic searchable encryption scheme over encrypted cloud data. IEEE Access 8, 71893\u201371906 (2020)","journal-title":"IEEE Access"},{"issue":"3","key":"5066_CR127","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1109\/TSC.2017.2714669","volume":"13","author":"Y Yang","year":"2020","unstructured":"Yang, Y., Liu, X., Deng, R.H., Weng, J.: Flexible wildcard searchable encryption system. IEEE Trans. Serv. Comput. 13(3), 464\u2013477 (2020)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"2","key":"5066_CR128","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1109\/JSYST.2015.2402437","volume":"11","author":"C-M Yu","year":"2017","unstructured":"Yu, C.-H., Chen, C.-Y., Chao, H.-C.: Privacy-preserving multikeyword similarity search over outsourced cloud data. IEEE Syst. J. 11(2), 385\u2013394 (2017)","journal-title":"IEEE Syst. J."},{"key":"5066_CR129","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102469","volume":"149","author":"H Zhong","year":"2020","unstructured":"Zhong, H., Li, Z., Cui, J., Sun, Y., Liu, L.: Efficient dynamic multi-keyword fuzzy search over encrypted cloud data. J. Netw. Comput. Appl. 149, 102469 (2020)","journal-title":"J. Netw. Comput. Appl."},{"key":"5066_CR130","unstructured":"Tong, Q., Miao, Y., Weng, J, Liu, X., Choo, K.-K.R., Deng, R.H.: Verifiable fuzzy multi-keyword search over encrypted data with adaptive security. IEEE Trans. Knowl. Data Eng. 35(5), 5386\u20135399 (2023)"},{"issue":"01","key":"5066_CR131","first-page":"698","volume":"16","author":"X Li","year":"2023","unstructured":"Li, X., Tong, Q., Zhao, J., Miao, Y., Ma, S., Weng, J., Ma, J., Choo, K.: VRFMS: verifiable ranked fuzzy multi-keyword search over encrypted data. IEEE Trans. Serv. Comput. 16(01), 698\u2013710 (2023)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"5066_CR132","doi-asserted-by":"crossref","unstructured":"Liu, Q., Peng, Y., Wu, J., Wang, T., Wang, G.: Secure multi-keyword fuzzy searches with enhanced service quality in cloud computing. IEEE Trans. Netw. Serv. Manage. 18(2), 2046\u20132062 (2021)","DOI":"10.1109\/TNSM.2020.3045467"},{"issue":"1","key":"5066_CR133","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TCC.2021.3092358","volume":"11","author":"H Zhang","year":"2023","unstructured":"Zhang, H., Zhao, S., Guo, Z., Wen, Q., Li, W., Gao, F.: Scalable fuzzy keyword ranked search over encrypted data on hybrid clouds. IEEE Trans. Cloud Comput. 11(1), 308\u2013323 (2023)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"5066_CR134","doi-asserted-by":"crossref","unstructured":"Li, H., Liu, D., Dai, Y., Luan, T.H., Shen, X.S.: Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans. Emerg. Top. Comput. 3(1), 127\u2013138 (2015)","DOI":"10.1109\/TETC.2014.2371239"},{"issue":"4","key":"5066_CR135","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1109\/TPDS.2015.2425407","volume":"27","author":"C Chen","year":"2016","unstructured":"Chen, C., Zhu, X., Shen, P., Jiankun, H., Guo, S., Tari, Z., Zomaya, A.Y.: An efficient privacy-preserving ranked keyword search method. IEEE Trans. Parallel Distrib. Syst. 27(4), 951\u2013963 (2016)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"5066_CR136","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2016","unstructured":"Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340\u2013352 (2016)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"5066_CR137","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.ins.2017.03.037","volume":"403\u2013404","author":"X Jiang","year":"2017","unstructured":"Jiang, X., Jia, Yu., Yan, J., Hao, R.: Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data. Inf. Sci. 403\u2013404, 22\u201341 (2017)","journal-title":"Inf. Sci."},{"key":"5066_CR138","doi-asserted-by":"publisher","first-page":"140818","DOI":"10.1109\/ACCESS.2019.2943356","volume":"7","author":"Y Yang","year":"2019","unstructured":"Yang, Y., Lin, H., Liu, X., Guo, W., Zheng, X., Liu, Z.: Blockchain-based verifiable multi-keyword ranked search on encrypted cloud with fair payment. IEEE Access 7, 140818\u2013140832 (2019)","journal-title":"IEEE Access"},{"key":"5066_CR139","doi-asserted-by":"crossref","unstructured":"Miao, Y., Zheng, W., Jia, X., Liu, X., Choo, K.-K.R., Deng, R.H.: Ranked keyword search over encrypted cloud data through machine learning method. IEEE Trans. Serv. Comput. 16(1), 525\u2013536 (2023)","DOI":"10.1109\/TSC.2021.3140098"},{"key":"5066_CR140","doi-asserted-by":"crossref","unstructured":"Moataz, T., Shikfa, A., Cuppens-Boulahia, N., Cuppens, F.: Semantic search over encrypted data. In: ICT 2013, pp. 1\u20135 (2013)","DOI":"10.1109\/ICTEL.2013.6632121"},{"key":"5066_CR141","doi-asserted-by":"crossref","unstructured":"Fu, Z., Sun, X., Xia, Z., Zhou, L., Shu, J.: Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing. In: 2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC), pp. 1\u20138 (2013)","DOI":"10.1109\/PCCC.2013.6742783"},{"key":"5066_CR142","doi-asserted-by":"crossref","unstructured":"Fu, Z., Shu, J., Sun, X., Zhang, D.: Semantic Keyword Search Based on Trie over Encrypted Cloud Data, pp. 59\u201362. Association for Computing Machinery (2014)","DOI":"10.1145\/2600075.2600081"},{"issue":"4","key":"5066_CR143","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1109\/TCE.2014.7027353","volume":"60","author":"F Zhangjie","year":"2014","unstructured":"Fu, Z., Shu, J., Sun, X., Linge, N.: Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data. IEEE Trans. Consum. Electron. 60(4), 762\u2013770 (2014)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"9","key":"5066_CR144","doi-asserted-by":"publisher","first-page":"2359","DOI":"10.1109\/TIFS.2018.2819121","volume":"13","author":"Z Fu","year":"2018","unstructured":"Fu, Z., Xia, L., Sun, X., Liu, A.X., Xie, G.: Semantic-aware searching over encrypted data for cloud computing. IEEE Trans. Inf. Forensics Secur. 13(9), 2359\u20132371 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"5066_CR145","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1109\/TIFS.2017.2730365","volume":"12","author":"Z Fu","year":"2017","unstructured":"Fu, Z., Xinle, W., Wang, Q., Ren, K.: Enabling central keyword-based semantic extension search over encrypted outsourced data. IEEE Trans. Inf. Forensics Secur. 12(12), 2986\u20132997 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"5066_CR146","doi-asserted-by":"publisher","first-page":"1874","DOI":"10.1109\/TIFS.2017.2692728","volume":"12","author":"Z Fu","year":"2017","unstructured":"Fu, Z., Huang, F., Ren, K., Weng, J., Wang, C.: Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Inf. Forensics Secur. 12(8), 1874\u20131884 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"5066_CR147","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1109\/TSC.2016.2622697","volume":"12","author":"Z Fu","year":"2019","unstructured":"Fu, Z., Huang, F., Sun, X., Vasilakos, A.V., Yang, C.-N.: Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Serv. Comput. 12(5), 813\u2013823 (2019)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"5066_CR148","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/TIFS.2020.3001728","volume":"16","author":"W Yang","year":"2021","unstructured":"Yang, W., Zhu, Y.: A verifiable semantic searching scheme by optimal matching over encrypted data in public cloud. IEEE Trans. Inf. Forensics Secur. 16, 100\u2013115 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5066_CR149","doi-asserted-by":"crossref","unstructured":"Sun, W., Yu, S., Lou, W., Hou, Y.T., Hui, L.: Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans. Parallel Distrib. Syst. 27(4), 1187\u20131198 (2016)","DOI":"10.1109\/TPDS.2014.2355202"},{"key":"5066_CR150","doi-asserted-by":"crossref","unstructured":"Li, Y., Ma, J., Miao, Y., Liu, L., Liu, X., Choo, K.-K.R.: Secure and verifiable multikey image search in cloud-assisted edge computing. IEEE Trans. Ind. Inf. 17(8), 5348\u20135359 (2021)","DOI":"10.1109\/TII.2020.3032147"},{"issue":"1","key":"5066_CR151","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/TSC.2019.2922177","volume":"15","author":"Q Liu","year":"2022","unstructured":"Liu, Q., Tian, Y., Jie, W., Peng, T., Wang, G.: Enabling verifiable and dynamic ranked search over outsourced data. IEEE Trans. Serv. Comput. 15(1), 69\u201382 (2022)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"5066_CR152","doi-asserted-by":"crossref","unstructured":"Chai, Q., Gong, G.: Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. In: 2012 IEEE International Conference on Communications (ICC), pp. 917\u2013922 (2012)","DOI":"10.1109\/ICC.2012.6364125"},{"key":"5066_CR153","doi-asserted-by":"crossref","unstructured":"Miao, Y., Tong, Q., Deng, R.H., Choo, K.-K.R., Liu, X., Li, H.: Verifiable searchable encryption framework against insider keyword-guessing attack in cloud storage. IEEE Trans. Cloud Comput. 10(2), 835\u2013848 (2022)","DOI":"10.1109\/TCC.2020.2989296"},{"key":"5066_CR154","doi-asserted-by":"crossref","unstructured":"Zhongjun Zhang, Jianfeng Wang, Yunling Wang, Yaping Su, and Xiaofeng Chen. Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption. In Kazue Sako, Steve Schneider, and Peter Y.\u00a0A. Ryan, editors, Computer Security \u2013 ESORICS 2019, pages 304\u2013321, Cham, 2019. Springer International Publishing","DOI":"10.1007\/978-3-030-29962-0_15"},{"key":"5066_CR155","doi-asserted-by":"crossref","unstructured":"Yinbin Miao, Jian Weng, Ximeng Liu, Kim-Kwang Raymond Choo, Zhiquan Liu, and Hongwei Li. Enabling verifiable multiple keywords search over encrypted cloud data. Information Sciences, 465:21\u201337, 2018","DOI":"10.1016\/j.ins.2018.06.066"},{"key":"5066_CR156","doi-asserted-by":"crossref","unstructured":"Wang Jianfeng, Chen Xiaofeng, Sun Shi-Feng, Liu Joseph\u00a0K., Au Man\u00a0Ho , Zhan Zhi-Hui .: Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database. In Javier Lopez, Jianying Zhou, and Miguel Soriano, editors, Computer Security, pages 83\u2013100. Springer International Publishing, (2018)","DOI":"10.1007\/978-3-319-98989-1_5"},{"key":"5066_CR157","doi-asserted-by":"crossref","unstructured":"Tong Qiuyun, Miao Yinbin, Liu Ximeng, Choo Kim-Kwang\u00a0Raymond, Deng Robert\u00a0H., Li Hongwei. VPSL: Verifiable Privacy-Preserving Data Search for Cloud-Assisted Internet of Things. IEEE Transactions on Cloud Computing, 10(4):2964\u20132976, (2022)","DOI":"10.1109\/TCC.2020.3031209"},{"key":"5066_CR158","doi-asserted-by":"crossref","unstructured":"Chen Lanxiang, Lee Wai-Kong, Chang Chin-Chen, Choo Kim-Kwang\u00a0Raymond , Zhang Nan.: Blockchain based searchable encryption for electronic health record sharing. Future Generation Computer Systems, 95:420\u2013429, (2019)","DOI":"10.1016\/j.future.2019.01.018"},{"key":"5066_CR159","doi-asserted-by":"crossref","unstructured":"Mayra Samaniego, Uurtsaikh Jamsrandorj, and Ralph Deters. Blockchain as a Service for IoT. In 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pages 433\u2013436, 2016","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.102"},{"issue":"2","key":"5066_CR160","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"5066_CR161","doi-asserted-by":"crossref","unstructured":"Tang. Q.: Towards blockchain-enabled searchable encryption. In: Zhou, J., Luo, X., Shen, Q., Xu, Z. (eds.) Information and Communications Security, pp. 482\u2013500. Springer, Cham (2020)","DOI":"10.1007\/978-3-030-41579-2_28"},{"key":"5066_CR162","doi-asserted-by":"crossref","unstructured":"Peng, T., Gong, B., Tu, S., Namoun, A., Alshmrany, S., Waqas, M., Alasmary, H., Chen, S.: Forward and backward private searchable encryption for cloud-assisted industrial IoT. Sensors 24(23), 7597 (2024)","DOI":"10.3390\/s24237597"},{"key":"5066_CR163","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.ins.2013.03.008","volume":"238","author":"L Fang","year":"2013","unstructured":"Fang, L., Susilo, W., Ge, C., Wang, J.: Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Inf. Sci. 238, 221\u2013241 (2013)","journal-title":"Inf. Sci."},{"key":"5066_CR164","doi-asserted-by":"crossref","unstructured":"Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Improved searchable public key encryption with designated tester. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 376\u2013379 (2009)","DOI":"10.1145\/1533057.1533108"},{"key":"5066_CR165","doi-asserted-by":"crossref","unstructured":"Fang, L., Susilo, W., Ge, C., Wang, J.: A secure channel free public key encryption with keyword search scheme without random Oracle. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) Cryptology and Network Security, pp. 248\u2013258. Springer (2009)","DOI":"10.1007\/978-3-642-10433-6_16"},{"key":"5066_CR166","doi-asserted-by":"crossref","unstructured":"Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5), 763\u2013771 (2010)","DOI":"10.1016\/j.jss.2009.11.726"},{"issue":"12","key":"5066_CR167","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1016\/j.ipl.2015.07.006","volume":"115","author":"Z-Y Shao","year":"2015","unstructured":"Shao, Z.-Y., Yang, B.: On security against the server in designated tester public key encryption with keyword search. Inf. Process. Lett. 115(12), 957\u2013961 (2015)","journal-title":"Inf. Process. Lett."},{"key":"5066_CR168","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/j.ins.2018.12.004","volume":"479","author":"L Yang","year":"2019","unstructured":"Yang, L., Wang, G., Li, J.: Keyword guessing attacks on a public key encryption with keyword search scheme without random oracle and its improvement. Inf. Sci. 479, 270\u2013276 (2019)","journal-title":"Inf. Sci."},{"key":"5066_CR169","doi-asserted-by":"crossref","unstructured":"Lv, Z., Hong, C., Zhang, M., Feng, D.: Expressive and secure searchable encryption in the public key setting. Cryptology {ePrint} Archive, Paper 2014\/614, pp. 364\u2013376 (2014)","DOI":"10.1007\/978-3-319-13257-0_21"},{"key":"5066_CR170","doi-asserted-by":"crossref","unstructured":"Zhang, R., Xue, R., Yu, T., Liu, L.: PVSAE: a public verifiable searchable encryption service framework for outsourced encrypted data. In: 2016 IEEE International Conference on Web Services (ICWS), pp. 428\u2013435 (2016)","DOI":"10.1109\/ICWS.2016.62"},{"key":"5066_CR171","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2017.03.038","volume":"403\u2013404","author":"Q Huang","year":"2017","unstructured":"Huang, Q., Li, H.: An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf. Sci. 403\u2013404, 1\u201314 (2017)","journal-title":"Inf. Sci."},{"key":"5066_CR172","doi-asserted-by":"crossref","unstructured":"Wu, L., Chen, B., Zeadally, S., He, D.: An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage. Soft Comput. 22(23), 7685\u20137696 (2018)","DOI":"10.1007\/s00500-018-3224-8"},{"key":"5066_CR173","doi-asserted-by":"publisher","first-page":"40878","DOI":"10.1109\/ACCESS.2019.2905554","volume":"7","author":"L Yang","year":"2019","unstructured":"Yang, L., Li, J., Zhang, Y.: SCF-PEPCKS: secure channel free public key encryption with privacy-conserving keyword search. IEEE Access 7, 40878\u201340892 (2019)","journal-title":"IEEE Access"},{"key":"5066_CR174","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2021.103542","volume":"78","author":"W Zhang","year":"2021","unstructured":"Zhang, W., Qin, B., Dong, X., Tian, A.: Public-key encryption with bidirectional keyword search and its application to encrypted emails. Comput. Stand. Interfaces 78, 103542 (2021)","journal-title":"Comput. Stand. Interfaces"},{"key":"5066_CR175","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1016\/j.ins.2019.12.063","volume":"516","author":"Yu Baodong Qin","year":"2020","unstructured":"Qin, B., Chen, Y., Huang, Q., Liu, X., Zheng, D.: Public-key authenticated encryption with keyword search revisited: security model and constructions. Inf. Sci. 516, 515\u2013528 (2020)","journal-title":"Inf. Sci."},{"issue":"6","key":"5066_CR176","doi-asserted-by":"publisher","first-page":"2041","DOI":"10.1109\/TSC.2019.2910113","volume":"14","author":"L Yang","year":"2021","unstructured":"Yang, L., Li, J., Zhang, Y.: Secure channel free certificate-based searchable encryption withstanding outside and inside keyword guessing attacks. IEEE Trans. Serv. Comput. 14(6), 2041\u20132054 (2021)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"5066_CR177","doi-asserted-by":"publisher","unstructured":"Guo, J., Han, L., Yang, G., Liu, X., Tian, C.: An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability. J. Cloud Comput. (2022). https:\/\/doi.org\/10.1186\/s13677-022-00287-5","DOI":"10.1186\/s13677-022-00287-5"},{"key":"5066_CR178","doi-asserted-by":"crossref","unstructured":"Tang, Y., Chen, Y., Luo, Y., Dong, S., Li, T.: VR-PEKS: a verifiable and resistant to keyword guess attack public key encryption with keyword search scheme. Appl. Sci. 13(7), 4166 (2023)","DOI":"10.3390\/app13074166"},{"key":"5066_CR179","doi-asserted-by":"crossref","unstructured":"Jan, C., Kohlweiss, M., Rial, A., Sheedy, C.: Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data. In: Public Key Cryptography\u2014PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, 18\u201320 March 2009. Proceedings, pp. 196\u2013214. Springer (2009)","DOI":"10.1007\/978-3-642-00468-1_12"},{"key":"5066_CR180","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.ins.2012.03.020","volume":"205","author":"H Rhee","year":"2012","unstructured":"Rhee, H., Park, J., Lee, D.: Generic construction of designated tester public-key encryption with keyword search. Inf. Sci. 205, 93\u2013109 (2012)","journal-title":"Inf. Sci."},{"key":"5066_CR181","doi-asserted-by":"publisher","unstructured":"Wu, T.-Y., Tsai, T.-T., Tseng, Y.-M.: Efficient searchable ID-based encryption with a designated server. Ann. Telecommun. (2013). https:\/\/doi.org\/10.1007\/s12243-013-0398-z","DOI":"10.1007\/s12243-013-0398-z"},{"issue":"5\u20136","key":"5066_CR182","first-page":"359","volume":"72","author":"L Yang","year":"2017","unstructured":"Yang, L., Wang, G., Li, J., Shen, J.: Efficient designated server identity-based encryption with conjunctive keyword search. Ann. Telecommun. 72(5\u20136), 359\u2013370 (2017)","journal-title":"Ann. Telecommun."},{"key":"5066_CR183","doi-asserted-by":"publisher","first-page":"1012","DOI":"10.1007\/s11390-016-1676-9","volume":"31","author":"X Wang","year":"2016","unstructured":"Wang, X., Yi, M., Chen, R., Zhang, X.-S.: Secure channel free ID-based searchable encryption for peer-to-peer group. J. Comput. Sci. Technol. 31, 1012\u20131027 (2016)","journal-title":"J. Comput. Sci. Technol."},{"key":"5066_CR184","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1016\/j.ins.2019.01.004","volume":"481","author":"H Li","year":"2019","unstructured":"Li, H., Huang, Q., Shen, J., Yang, G., Susilo, W.: Designated-server identity-based authenticated encryption with keyword search for encrypted emails. Inf. Sci. 481, 330\u2013343 (2019)","journal-title":"Inf. Sci."},{"key":"5066_CR185","doi-asserted-by":"publisher","first-page":"2096","DOI":"10.1109\/TIFS.2019.2957691","volume":"15","author":"L Xu","year":"2020","unstructured":"Xu, L., Li, W., Zhang, F., Cheng, R., Tang, S.: Authorized keyword searches on public key encrypted data with time controlled keyword privacy. IEEE Trans. Inf. Forensics Secur. 15, 2096\u20132109 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5066_CR186","doi-asserted-by":"publisher","first-page":"3168","DOI":"10.1109\/TIFS.2020.2985532","volume":"15","author":"H Deng","year":"2020","unstructured":"Deng, H., Qin, Z., Qianhong, W., Guan, Z., Deng, R.H., Wang, Y., Zhou, Y.: Identity-based encryption transformation for flexible sharing of encrypted data in public cloud. IEEE Trans. Inf. Forensics Secur. 15, 3168\u20133180 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"5066_CR187","doi-asserted-by":"publisher","first-page":"4629","DOI":"10.1109\/JSYST.2021.3103909","volume":"16","author":"Z-Y Liu","year":"2022","unstructured":"Liu, Z.-Y., Tseng, Y.-F., Tso, R., Chen, Y.-C., Mambo, M.: Identity-certifying authority-aided identity-based searchable encryption framework in cloud systems. IEEE Syst. J. 16(3), 4629\u20134640 (2022)","journal-title":"IEEE Syst. J."},{"key":"5066_CR188","doi-asserted-by":"crossref","unstructured":"Chaudhari, P., Das, M.L.: KeySea: keyword-based search with receiver anonymity in attribute-based searchable encryption. IEEE Trans. Serv. Comput. 15(2), 1036\u20131044 (2022)","DOI":"10.1109\/TSC.2020.2973570"},{"key":"5066_CR189","doi-asserted-by":"crossref","unstructured":"Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) Theory of Cryptography, pp. 515\u2013534. Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"5066_CR190","doi-asserted-by":"crossref","unstructured":"Wang, C., Li, W., Li, Y., Xu, X.: A ciphertext-policy attribute-based encryption scheme supporting keyword search function. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds.) Cyberspace Safety and Security, pp. 377\u2013386. Springer (2013)","DOI":"10.1007\/978-3-319-03584-0_28"},{"key":"5066_CR191","doi-asserted-by":"crossref","unstructured":"Zheng, Q., Xu, S., Ateniese, G.: VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014\u2014IEEE Conference on Computer Communications, pp. 522\u2013530 (2014)","DOI":"10.1109\/INFOCOM.2014.6847976"},{"issue":"5","key":"5066_CR192","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1109\/TSC.2016.2542813","volume":"10","author":"J Li","year":"2017","unstructured":"Li, J., Lin, X., Zhang, Y., Han, J.: KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans. Serv. Comput. 10(5), 715\u2013725 (2017)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"5066_CR193","doi-asserted-by":"crossref","unstructured":"Sun, J., Ren, L., Wang, S., Yao, X.: Multi-keyword searchable and data verifiable attribute-based encryption scheme for cloud storage. IEEE Access 99, 1\u20131 (2019)","DOI":"10.1109\/ACCESS.2019.2917772"},{"issue":"1","key":"5066_CR194","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/TCC.2021.3119407","volume":"11","author":"Y Zhang","year":"2023","unstructured":"Zhang, Y., Zhu, T., Guo, R., Xu, S., Cui, H., Cao, J.: Multi-keyword searchable and verifiable attribute-based encryption over cloud data. IEEE Trans. Cloud Comput. 11(1), 971\u2013983 (2023)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"1","key":"5066_CR195","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1109\/TIFS.2014.2368352","volume":"10","author":"T Jung","year":"2015","unstructured":"Jung, T., Li, X.-Y., Wan, Z., Wan, M.: Control cloud data access privilege and anonymity with fully anonymous attribute-based encryption. IEEE Trans. Inf. Forensics Secur. 10(1), 190\u2013199 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9","key":"5066_CR196","doi-asserted-by":"publisher","first-page":"1772","DOI":"10.1109\/LCOMM.2016.2584614","volume":"20","author":"E Luo","year":"2016","unstructured":"Luo, E., Liu, Q., Wang, G.: Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Commun. Lett. 20(9), 1772\u20131775 (2016)","journal-title":"IEEE Commun. Lett."},{"key":"5066_CR197","doi-asserted-by":"crossref","unstructured":"Miao, Y., Liu, X., Raymond, C.K.-K., Deng, R.H., Li, J., Li, H., Ma, J.: Privacy-preserving attribute-based keyword search in shared multi-owner setting. IEEE Trans. Depend. Secure Comput. 18(3), 1080\u20131094 (2021)","DOI":"10.1109\/TDSC.2019.2897675"},{"key":"5066_CR198","doi-asserted-by":"crossref","unstructured":"Cao, L., Zhang, J., Dong, X., Xi, C., Wang, Y., Zhang, Y., Guo, X., Feng, T.: A based on blinded CP-ABE searchable encryption cloud storage service scheme. Int. J. Commun. Syst. 31(10), e3566 (2018)","DOI":"10.1002\/dac.3566"},{"key":"5066_CR199","doi-asserted-by":"publisher","first-page":"30444","DOI":"10.1109\/ACCESS.2018.2846037","volume":"6","author":"S Wang","year":"2018","unstructured":"Wang, S., Zhang, D., Zhang, Y., Liu, L.: Efficiently revocable and searchable attribute-based encryption scheme for mobile cloud storage. IEEE Access 6, 30444\u201330457 (2018)","journal-title":"IEEE Access"},{"issue":"6","key":"5066_CR200","first-page":"985","volume":"13","author":"Y Miao","year":"2020","unstructured":"Miao, Y., Ma, J., Liu, X., Li, X., Jiang, Q., Zhang, J.: Attribute-based keyword search over hierarchical data in cloud computing. IEEE Trans. Serv. Comput. 13(6), 985\u2013998 (2020)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"3","key":"5066_CR201","doi-asserted-by":"publisher","first-page":"3503","DOI":"10.1109\/JSYST.2023.3283389","volume":"17","author":"S Niu","year":"2023","unstructured":"Niu, S., Ying, H., Zhou, S., Shao, H., Wang, C.: Attribute-based searchable encryption in edge computing for lightweight devices. IEEE Syst. J. 17(3), 3503\u20133514 (2023)","journal-title":"IEEE Syst. J."},{"key":"5066_CR202","doi-asserted-by":"crossref","unstructured":"Qiu, S., Liu, J., Shi, Y., Zhang, R.: Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack. Sci. China Inf. Sci. 60, 052105 (2017)","DOI":"10.1007\/s11432-015-5449-9"},{"issue":"6","key":"5066_CR203","doi-asserted-by":"publisher","first-page":"1274","DOI":"10.1109\/TIFS.2015.2405905","volume":"10","author":"J Ning","year":"2015","unstructured":"Ning, J., Dong, X., Cao, Z., Wei, L., Lin, X.: White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans. Inf. Forensics Secur. 10(6), 1274\u20131288 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"5066_CR204","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/TCC.2021.3090519","volume":"11","author":"Y Yang","year":"2023","unstructured":"Yang, Y., Deng, R.H., Guo, W., Cheng, H., Luo, X., Zheng, X., Rong, C.: Dual traceable distributed attribute-based searchable encryption and ownership transfer. IEEE Trans. Cloud Comput. 11(1), 247\u2013262 (2023)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"5066_CR205","doi-asserted-by":"crossref","unstructured":"Varri, U.S, Mallick, D., Das, A.K., Hossain, M.S., Park, Y., Rodrigues, J.J.P.C.: TL-ABKS: traceable and lightweight attribute-based keyword search in edge-cloud assisted iot environment. Alex. Eng. J. 107, 757\u2013769 (2024)","DOI":"10.1016\/j.aej.2024.09.030"},{"key":"5066_CR206","doi-asserted-by":"crossref","unstructured":"Miao, Y., Deng, R.H., Liu, X., Choo, K.-K.R., Wu, H., Li, H.: Multi-authority attribute-based keyword search over encrypted cloud data. IEEE Trans. Depend. Secure Comput. 18(4), 1667\u20131680 (2021)","DOI":"10.1109\/TDSC.2019.2897675"},{"key":"5066_CR207","doi-asserted-by":"crossref","unstructured":"Yu, Y., Shi, J., Li, H., Li, Y., Du, X., Guizani, M.: Key-policy attribute-based encryption with keyword search in virtualized environments. IEEE J. Sel. Areas Commun. 38(6), 1242\u20131251 (2020)","DOI":"10.1109\/JSAC.2020.2986620"},{"key":"5066_CR208","doi-asserted-by":"crossref","unstructured":"Shi, E., Waters, B.: Delegating capabilities in predicate encryption systems. In: Automata. Languages and Programming, pp. 560\u2013578. Springer, Berlin (2008)","DOI":"10.1007\/978-3-540-70583-3_46"},{"key":"5066_CR209","doi-asserted-by":"crossref","unstructured":"Zhu, B., Zhu, B., Ren, K.: PEKSrand: providing predicate privacy in public-key encryption with keyword search. Cryptology ePrint Archive, Paper 2010\/466 (2010)","DOI":"10.1109\/icc.2011.5962452"},{"key":"5066_CR210","doi-asserted-by":"crossref","unstructured":"Lai, J., Zhou, X., Deng, R.H., Li, Y., Chen, K.: Expressive search on encrypted data. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS \u201913, pp. 243\u2013252. Association for Computing Machinery (2013)","DOI":"10.1145\/2484313.2484345"},{"key":"5066_CR211","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Lu, S.: POSTER: efficient method for disjunctive and conjunctive keyword search over encrypted data. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201914, pp. 1535\u20131537 (2014)","DOI":"10.1145\/2660267.2662361"},{"issue":"3","key":"5066_CR212","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1109\/TDSC.2016.2599883","volume":"15","author":"H Cui","year":"2018","unstructured":"Cui, H., Wan, Z., Deng, R.H., Wang, G., Li, Y.: Efficient and expressive keyword search over encrypted data in cloud. IEEE Trans. Depend. Secure Comput. 15(3), 409\u2013422 (2018)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"issue":"2","key":"5066_CR213","doi-asserted-by":"publisher","first-page":"1444","DOI":"10.1109\/TSC.2022.3162285","volume":"16","author":"Y Yang","year":"2023","unstructured":"Yang, Y., Rong, C., Zheng, X., Cheng, H., Chang, V., Luo, X., Li, Z.: Time controlled expressive predicate query with accountable anonymity. IEEE Trans. Serv. Comput. 16(2), 1444\u20131457 (2023)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"5066_CR214","first-page":"5280806","volume":"2019","author":"Z YU","year":"2019","unstructured":"Yu, Z., Li, Y., Wang, Y.: Secure and efficient searchable public key encryption for resource constrained environment based on pairings under prime order group. Secur. Commun. Netw. 2019, 5280806 (2019)","journal-title":"Secur. Commun. Netw."},{"key":"5066_CR215","doi-asserted-by":"crossref","unstructured":"Song, F., Qin, Z., Liang, J., Lin, X.: An efficient and privacy-preserving multi-user multi-keyword search scheme without key sharing. In: ICC 2021\u2014IEEE International Conference on Communications, pp. 1\u20136 (2021)","DOI":"10.1109\/ICC42927.2021.9500478"},{"key":"5066_CR216","doi-asserted-by":"crossref","unstructured":"Wang, X.A., Huang, X., Yang, X., Liu, L., Wu, X.: Further observation on proxy re-encryption with keyword search. J. Syst. Softw. 85(3), 643\u2013654 (2012). Novel approaches in the design and implementation of systems\/software architecture","DOI":"10.1016\/j.jss.2011.09.035"},{"key":"5066_CR217","doi-asserted-by":"crossref","unstructured":"Yau, W.-C., Phan, R.C.W., Heng, S.-H., Goi, B.-M.: Proxy re-encryption with keyword search: new definitions and algorithms. In: Security Technology, Disaster Recovery and Business Continuity, pp. 149\u2013160 (2010)","DOI":"10.1007\/978-3-642-17610-4_17"},{"key":"5066_CR218","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.tcs.2012.08.017","volume":"462","author":"L Fang","year":"2012","unstructured":"Fang, L., Susilo, W., Ge, C., Wang, J.: Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Theoret. Comput. Sci. 462, 39\u201358 (2012)","journal-title":"Theoret. Comput. Sci."},{"key":"5066_CR219","doi-asserted-by":"crossref","unstructured":"Guo, L., Bo,\u00a0L., Li, X., Xu, H.: A verifiable proxy re-encryption with keyword search without random Oracle. In: 2013 Ninth International Conference on Computational Intelligence and Security, pp. 474\u2013478 (2013)","DOI":"10.1109\/CIS.2013.106"},{"issue":"4","key":"5066_CR220","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2509912","volume":"11","author":"Y Yang","year":"2016","unstructured":"Yang, Y., Ma, M.: Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for E-health clouds. IEEE Trans. Inf. Forensics Secur. 11(4), 746\u2013759 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"5066_CR221","doi-asserted-by":"publisher","first-page":"2004","DOI":"10.1002\/cpe.3397","volume":"27","author":"K Liang","year":"2015","unstructured":"Liang, K., Fang, L., Wong, D.S., Susilo, W.: A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds. Concurr. Comput. Pract. Exp. 27(8), 2004\u20132027 (2015)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"5066_CR222","doi-asserted-by":"crossref","unstructured":"Liang, K., Au, M.H., Liu, J.K., Susilo, W., Wong, D.S., Yang, G., Yu, Y., Yang, A.: A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Future Gen. Comput. Syst. 52, 95\u2013108 (2015). Special Section: Cloud Computing: Security, Privacy and Practice","DOI":"10.1016\/j.future.2014.11.016"},{"key":"5066_CR223","doi-asserted-by":"publisher","unstructured":"Chen, Y., Hu, Y., Zhu, M., Yang, G.: Attribute-based keyword search with proxy re-encryption in the cloud. IEICE Trans. Commun. (2018). https:\/\/doi.org\/10.1587\/transcom.2017EBP3274","DOI":"10.1587\/transcom.2017EBP3274"},{"key":"5066_CR224","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.ins.2019.09.052","volume":"511","author":"H Deng","year":"2020","unstructured":"Deng, H., Qin, Z., Qianhong, W., Guan, Z., Zhou, Y.: Flexible attribute-based proxy re-encryption for efficient data sharing. Inf. Sci. 511, 94\u2013113 (2020)","journal-title":"Inf. Sci."},{"key":"5066_CR225","doi-asserted-by":"publisher","first-page":"30779","DOI":"10.1109\/ACCESS.2022.3153120","volume":"10","author":"L Xue","year":"2022","unstructured":"Xue, L.: DSAS: secure data sharing and authorized searchable framework for e-healthcare system. IEEE Access 10, 30779\u201330791 (2022)","journal-title":"IEEE Access"},{"issue":"5","key":"5066_CR226","doi-asserted-by":"publisher","first-page":"2907","DOI":"10.1109\/TDSC.2021.3076580","volume":"19","author":"C Ge","year":"2022","unstructured":"Ge, C., Susilo, W., Baek, J., Liu, Z., Xia, J., Fang, L.: A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds. IEEE Trans. Depend. Secure Comput. 19(5), 2907\u20132919 (2022)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"issue":"01","key":"5066_CR227","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1109\/TCC.2021.3120110","volume":"11","author":"Q Wang","year":"2023","unstructured":"Wang, Q., Lai, C., Lu, R., Zheng, D.: Searchable encryption with autonomous path delegation function and its application in healthcare cloud. IEEE Trans. Cloud Comput. 11(01), 879\u2013896 (2023)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"5066_CR228","doi-asserted-by":"crossref","unstructured":"Luo F.,\u00a0Wang H., Yan X.: Re-PAEKS: Public-key authenticated re-encryption with keyword search. IEEE Trans. Mobile Comput. 23(10), 10077\u201310092 (2024)","DOI":"10.1109\/TMC.2024.3373626"},{"issue":"2","key":"5066_CR229","doi-asserted-by":"publisher","first-page":"1391","DOI":"10.1109\/JIOT.2022.3207229","volume":"10","author":"L Cheng","year":"2023","unstructured":"Cheng, L., Meng, F.: Certificateless public key authenticated searchable encryption with enhanced security model in IIoT applications. IEEE Internet Things J. 10(2), 1391\u20131400 (2023)","journal-title":"IEEE Internet Things J."},{"key":"5066_CR230","doi-asserted-by":"crossref","unstructured":"Ma, M., He, D., Kumar, N., Choo, K.-K.R., Chen, J.: Certificateless searchable public key encryption scheme for industrial Internet of Things. IEEE Trans. Ind. Inf. 14(2), 759\u2013767 (2018)","DOI":"10.1109\/TII.2017.2703922"},{"key":"5066_CR231","doi-asserted-by":"publisher","first-page":"20849","DOI":"10.1109\/ACCESS.2020.2968501","volume":"8","author":"Y Zhang","year":"2020","unstructured":"Zhang, Y., Liu, X., Lang, X., Zhang, Y., Wang, C.: VCLPKES: verifiable certificateless public key searchable encryption scheme for industrial Internet of Things. IEEE Access 8, 20849\u201320861 (2020)","journal-title":"IEEE Access"},{"issue":"8","key":"5066_CR232","doi-asserted-by":"publisher","first-page":"3618","DOI":"10.1109\/TII.2017.2771382","volume":"14","author":"D He","year":"2018","unstructured":"He, D., Ma, M., Zeadally, S., Kumar, N., Liang, K.: Certificateless public key authenticated encryption with keyword search for industrial Internet of Things. IEEE Trans. Industr. Inf. 14(8), 3618\u20133627 (2018)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"8","key":"5066_CR233","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1631\/FITEE.1700534","volume":"20","author":"L Yang","year":"2019","unstructured":"Yang, L., Li, J.: Constructing pairing-free certificateless public key encryption with keyword search. Front. Inf. Technol. Electron. Eng. 20(8), 1049\u20131060 (2019)","journal-title":"Front. Inf. Technol. Electron. Eng."},{"issue":"4","key":"5066_CR234","doi-asserted-by":"publisher","first-page":"2553","DOI":"10.1109\/JIOT.2019.2943379","volume":"7","author":"L Yang","year":"2020","unstructured":"Yang, L., Li, J., Zhang, Y.: Privacy-preserving and pairing-free multirecipient certificateless encryption with keyword search for cloud-assisted IIoT. IEEE Internet Things J. 7(4), 2553\u20132562 (2020)","journal-title":"IEEE Internet Things J."},{"key":"5066_CR235","doi-asserted-by":"publisher","first-page":"58754","DOI":"10.1109\/ACCESS.2023.3285114","volume":"11","author":"X Liu","year":"2023","unstructured":"Liu, X., Dong, H., Kumari, N., Kar, J.: A pairing-free certificateless searchable public key encryption scheme for industrial Internet of Things. IEEE Access 11, 58754\u201358764 (2023)","journal-title":"IEEE Access"},{"key":"5066_CR236","doi-asserted-by":"crossref","unstructured":"Gu, X., Wang, Z., Fu, M., Ren, P.: A certificateless searchable public key encryption scheme for multiple receivers. In: 2021 IEEE International Conference on Web Services (ICWS), pp. 635\u2013641 (2021)","DOI":"10.1109\/ICWS53863.2021.00085"},{"issue":"6","key":"5066_CR237","doi-asserted-by":"publisher","first-page":"3661","DOI":"10.1109\/TII.2021.3112986","volume":"18","author":"A Karati","year":"2022","unstructured":"Karati, A., Fan, C.-I., Zhuang, E.-S.: Reliable data sharing by certificateless encryption supporting keyword search against vulnerable KGC in industrial Internet of Things. IEEE Trans. Industr. Inf. 18(6), 3661\u20133669 (2022)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"5066_CR238","doi-asserted-by":"crossref","unstructured":"Feng, T., Si, J.: Certificateless searchable encryption scheme in multi-user environment. Cryptography 6(4), 61 (2022)","DOI":"10.3390\/cryptography6040061"},{"key":"5066_CR239","doi-asserted-by":"crossref","unstructured":"Wu, T.-Y., Chen, C.-M., Wang, K.-H., Wu, J.M.-T.: Security analysis and enhancement of a certificateless searchable public key encryption scheme for iiot environments. IEEE Access 7, 49232\u201349239 (2019)","DOI":"10.1109\/ACCESS.2019.2909040"},{"key":"5066_CR240","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Xu, C., Ni, J., Li, H., Shen, X.S.: Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage. IEEE Trans. Cloud Comput. 9(4), 1335\u20131348 (2021)","DOI":"10.1109\/TCC.2019.2923222"},{"issue":"2","key":"5066_CR241","doi-asserted-by":"publisher","first-page":"1502","DOI":"10.1109\/JIOT.2019.2956322","volume":"7","author":"J Niu","year":"2020","unstructured":"Niu, J., Li, X., Gao, J., Han, Y.: Blockchain-based anti-key-leakage key aggregation searchable encryption for IoT. IEEE Internet Things J. 7(2), 1502\u20131518 (2020)","journal-title":"IEEE Internet Things J."},{"key":"5066_CR242","doi-asserted-by":"crossref","unstructured":"Liu, J., Wu, M., Sun, R., Du, X., Guizani, M.: BMDS: a blockchain-based medical data sharing scheme with attribute-based searchable encryption. In: ICC 2021 - IEEE International Conference on Communications, pp. 1\u20136 (2021)","DOI":"10.1109\/ICC42927.2021.9500966"},{"key":"5066_CR243","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102917","volume":"176","author":"A Manzoor","year":"2021","unstructured":"Manzoor, A., Braeken, A., Kanhere, S.S., Ylianttila, M., Liyanage, M.: Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain. J. Netw. Comput. Appl. 176, 102917 (2021)","journal-title":"J. Netw. Comput. Appl."},{"issue":"8","key":"5066_CR244","doi-asserted-by":"publisher","first-page":"14115","DOI":"10.1109\/JIOT.2023.3340567","volume":"11","author":"F Wang","year":"2024","unstructured":"Wang, F., Cui, J., Zhang, Q., He, D., Chengjie, G., Zhong, H.: Lightweight and secure data sharing based on proxy re-encryption for blockchain-enabled industrial internet of things. IEEE Internet Things J. 11(8), 14115\u201314126 (2024)","journal-title":"IEEE Internet Things J."},{"issue":"20","key":"5066_CR245","doi-asserted-by":"publisher","first-page":"20666","DOI":"10.1109\/JIOT.2022.3175859","volume":"9","author":"T Wang","year":"2022","unstructured":"Wang, T., Wang, J., Yang, Q., Yang, B., Li, H., Fei, X., Qiao, Z.: An efficient verifiable searchable encryption scheme with aggregating authorization for blockchain-enabled IoT. IEEE Internet Things J. 9(20), 20666\u201320680 (2022)","journal-title":"IEEE Internet Things J."},{"key":"5066_CR246","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.future.2022.01.021","volume":"132","author":"S Jian","year":"2022","unstructured":"Jian, S., Zhang, L., Yi, M.: BA-RMKABSE: blockchain-aided ranked multi-keyword attribute-based searchable encryption with hiding policy for smart health system. Futur. Gener. Comput. Syst. 132, 299\u2013309 (2022)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"5066_CR247","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102569","volume":"129","author":"W Qing","year":"2022","unstructured":"Qing, W., Lai, T., Zhang, L., Yi, M., Rezaeibagha, F.: Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud. J. Syst. Architect. 129, 102569 (2022)","journal-title":"J. Syst. Architect."},{"issue":"3","key":"5066_CR248","doi-asserted-by":"publisher","first-page":"2260","DOI":"10.1109\/TCC.2022.3196712","volume":"11","author":"S Gao","year":"2023","unstructured":"Gao, S., Chen, Y., Zhu, J., Sui, Z., Zhang, R., Ma, X.: BPMS: blockchain-based privacy-preserving multi-keyword search in multi-owner setting. IEEE Trans. Cloud Comput. 11(3), 2260\u20132272 (2023)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"24","key":"5066_CR249","doi-asserted-by":"publisher","first-page":"21377","DOI":"10.1109\/JIOT.2023.3287636","volume":"10","author":"J Liu","year":"2023","unstructured":"Liu, J., Fan, Y., Sun, R., Liu, L., Celimuge, W., Mumtaz, S.: Blockchain-aided privacy-preserving medical data sharing scheme for E-healthcare system. IEEE Internet Things J. 10(24), 21377\u201321388 (2023)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"5066_CR250","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1186\/s13677-023-00444-4","volume":"12","author":"L Yan","year":"2023","unstructured":"Yan, L., Ge, L., Wang, Z., Zhang, G., Jingya, X., Zheng, H.: Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment. J. Cloud Comput. 12(1), 61 (2023)","journal-title":"J. Cloud Comput."},{"key":"5066_CR251","doi-asserted-by":"crossref","unstructured":"Tao, F., Wang, D., Gong, R.: A blockchain-based efficient and verifiable attribute-based proxy re-encryption cloud sharing scheme. Information 14(5), 281 (2023)","DOI":"10.3390\/info14050281"},{"issue":"17","key":"5066_CR252","doi-asserted-by":"publisher","first-page":"15749","DOI":"10.1109\/JIOT.2023.3264912","volume":"10","author":"N Yang","year":"2023","unstructured":"Yang, N., Tang, C., He, D.: Blockchain-assisted secure data sharing protocol with a dynamic multiuser keyword search in IIoT. IEEE Internet Things J. 10(17), 15749\u201315760 (2023)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"5066_CR253","doi-asserted-by":"publisher","first-page":"1685","DOI":"10.1109\/JIOT.2023.3290975","volume":"11","author":"K Zhang","year":"2024","unstructured":"Zhang, K., Zhang, Y., Li, Y., Liu, X., Laifeng, L.: A blockchain-based anonymous attribute-based searchable encryption scheme for data sharing. IEEE Internet Things J. 11(1), 1685\u20131697 (2024)","journal-title":"IEEE Internet Things J."},{"issue":"20","key":"5066_CR254","doi-asserted-by":"publisher","first-page":"33247","DOI":"10.1109\/JIOT.2024.3425450","volume":"11","author":"J Feng","year":"2024","unstructured":"Feng, J., Li, Y., Wang, T., Liu, S.: A certificateless threshold proxy re-encrypted data-sharing scheme with cloud-chain collaboration in industrial internet environments. IEEE Internet Things J. 11(20), 33247\u201333268 (2024)","journal-title":"IEEE Internet Things J."},{"key":"5066_CR255","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2024.103264","volume":"155","author":"Y Han","year":"2024","unstructured":"Han, Y., Han, J., Meng, W., Lai, J., Ge, W.: Blockchain-based privacy-preserving public key searchable encryption with strong traceability. J. Syst. Architect. 155, 103264 (2024)","journal-title":"J. Syst. Architect."},{"key":"5066_CR256","doi-asserted-by":"publisher","first-page":"75067","DOI":"10.1109\/ACCESS.2019.2920897","volume":"7","author":"Y Liao","year":"2019","unstructured":"Liao, Y., Fan, Y., Liang, Y., Liu, Y., Mohammed, R.: Cryptanalysis of an identity-based encryption scheme with equality test and improvement. IEEE Access 7, 75067\u201375072 (2019)","journal-title":"IEEE Access"},{"issue":"1","key":"5066_CR257","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/s12083-022-01392-7","volume":"16","author":"M Han","year":"2023","unstructured":"Han, M., Puyi, X., Lei, X., Chungen, X.: TCA-PEKS: trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage. Peer-to-Peer Netw. Appl. 16(1), 156\u2013169 (2023)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"5066_CR258","unstructured":"MIRACL: Miracl cryptographic SDK (2024). https:\/\/github.com\/miracl\/MIRACL"},{"key":"5066_CR259","first-page":"853","volume":"2014","author":"D Cash","year":"2014","unstructured":"Cash, D., Jaeger, J., Jarecki, S., Jutla, C.S., Krawczyk, H., Rosu, M.-C., Steiner, M.: Dynamic searchable encryption in very-large databases: data structures and implementation. IACR Cryptol. , 853 (2014)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"5066_CR260","unstructured":"Shahzaib Tahir, Sushmita Ruj, Yogachandran Rahulamathavn\u00a0BSc(Hons), PhD, Muttukrishnan Rajarajan, and Cornelius Glackin. A new secure and lightweight searchable encryption scheme over encrypted cloud data. IEEE Transactions on Emerging Topics in Computing, PP, 08 2017"},{"key":"5066_CR261","doi-asserted-by":"crossref","unstructured":"Lee, J.Y., Kim, M.H., Oh, J.H., Park, Y.H., Park, K.S., Noh, S.: A secure key aggregate searchable encryption with multi delegation in cloud data sharing service. Appl. Sci. 11(19), 8841 (2021)","DOI":"10.3390\/app11198841"},{"key":"5066_CR262","volume":"78","author":"M Banik","year":"2023","unstructured":"Banik, M., Kumar, S.: Blockchain-based public key encryption with keyword search for medical data sharing in cloud environment. J. Inf. Secur. Appl. 78, 103626 (2023)","journal-title":"J. Inf. Secur. Appl."},{"key":"5066_CR263","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Islam, S.K.H., Bisht, A., Das, A.K.: Provably secure public key encryption with keyword search for data outsourcing in cloud environments. J. Syst. Architect. 139, 102876 (2023)","DOI":"10.1016\/j.sysarc.2023.102876"},{"key":"5066_CR264","doi-asserted-by":"crossref","unstructured":"Mihailescu, M.I., Nita, S.L.: A searchable encryption scheme with biometric authentication and authorization for cloud environments. Cryptography 6(1), 8 (2022)","DOI":"10.3390\/cryptography6010008"},{"issue":"1","key":"5066_CR265","first-page":"8816172","volume":"2020","author":"T Chi","year":"2020","unstructured":"Chi, T., Qin, B., Zheng, D.: An efficient searchable public-key authenticated encryption for cloud-assisted medical Internet of Things. Wirel. Commun. Mob. Comput. 2020(1), 8816172 (2020)","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"5066_CR266","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.cosrev.2017.08.001","volume":"26","author":"R Dowsley","year":"2017","unstructured":"Dowsley, R., Michalas, A., Nagel, M., Paladi, N.: A survey on design and implementation of protected searchable data in the cloud. Comput. Sci. Rev. 26, 17\u201330 (2017)","journal-title":"Comput. Sci. Rev."},{"key":"5066_CR267","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124\u2013134 (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"issue":"5","key":"5066_CR268","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"PW Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484\u20131509 (1997)","journal-title":"SIAM J. Comput."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05066-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-05066-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05066-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T22:10:06Z","timestamp":1757196606000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-05066-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,16]]},"references-count":268,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["5066"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-05066-2","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,16]]},"assertion":[{"value":"28 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"399"}}