{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T01:03:51Z","timestamp":1759971831360,"version":"build-2065373602"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62441212","62441212","62441212","62441212"],"award-info":[{"award-number":["62441212","62441212","62441212","62441212"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Program for Young Talents of Science and Technology in Universities of Inner Mongolia Autonomous Region","award":["NJYT23106","NJYT23106","NJYT23106","NJYT23106","NJYT23106"],"award-info":[{"award-number":["NJYT23106","NJYT23106","NJYT23106","NJYT23106","NJYT23106"]}]},{"name":"2022 Fund Project of Central Government Guiding Local Science and Technology Development","award":["2022ZY0024"],"award-info":[{"award-number":["2022ZY0024"]}]},{"name":"2024 Inner Mongolia Archives Technology Project","award":["2024-47"],"award-info":[{"award-number":["2024-47"]}]},{"name":"Tianjin Renai College & Tianjin University Teacher Joint Development Fund Cooperation Project","award":["FZ231001"],"award-info":[{"award-number":["FZ231001"]}]},{"name":"2022 Chinese Academy of Sciences \u201cWestern Light\u201d Talent Training Program \u201cWestern Young Scholars\u201d Project","award":["22040601","22040601"],"award-info":[{"award-number":["22040601","22040601"]}]},{"name":"Open Foundation of State key Laboratory of Networking and Switching Technology","award":["SKLNST-2023-1-08","SKLNST-2023-1-08"],"award-info":[{"award-number":["SKLNST-2023-1-08","SKLNST-2023-1-08"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10586-025-05323-y","type":"journal-article","created":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T12:42:07Z","timestamp":1757594527000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-preserving computation protocol of multi-party sets intersection and union for internet of things environments"],"prefix":"10.1007","volume":"28","author":[{"given":"Xin","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xinyuan","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Ji","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shuo","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xiubo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiaohong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,11]]},"reference":[{"key":"5323_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2021.102442","volume":"62","author":"A Koohang","year":"2022","unstructured":"Koohang, A., Sargent, C.S., Nord, J.H., Paliszkiewicz, J.: Internet of Things (IoT): From awareness to continued use. Int. J. Inf. Manage. 62, 102442 (2022). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2021.102442","journal-title":"Int. J. Inf. Manage."},{"key":"5323_CR2","doi-asserted-by":"crossref","unstructured":"Rath, K.C., Khang, A., Roy, D.: The role of Internet of Things (IoT) technology in Industry 4.0 economy. In: Advanced IoT technologies and applications in the industry 4.0 digital economy, pp. 1\u201328. CRC Press (2024)","DOI":"10.1201\/9781003434269-1"},{"issue":"11","key":"5323_CR3","doi-asserted-by":"publisher","first-page":"19046","DOI":"10.1109\/JIOT.2024.3360289","volume":"11","author":"M Adil","year":"2024","unstructured":"Adil, M., Khan, M.K., Kumar, N., Attique, M., Farouk, A., Guizani, M., Jin, Z.: Healthcare Internet of Things: Security threats, challenges, and future research directions. IEEE Internet Things J. 11(11), 19046\u201319069 (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3360289","journal-title":"IEEE Internet Things J."},{"issue":"11","key":"5323_CR4","doi-asserted-by":"publisher","first-page":"19143","DOI":"10.1109\/JIOT.2024.3367692","volume":"11","author":"Y Hu","year":"2024","unstructured":"Hu, Y., Jia, Q., Yao, Y., Lee, Y., Lee, M., Wang, C., Yu, F.R.: Industrial internet of things intelligence empowering smart manufacturing: A literature review. IEEE Internet Things J. 11(11), 19143\u2013191657 (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3367692","journal-title":"IEEE Internet Things J."},{"issue":"21","key":"5323_CR5","doi-asserted-by":"publisher","first-page":"34941","DOI":"10.1109\/JIOT.2024.3449753","volume":"11","author":"EH Houssein","year":"2024","unstructured":"Houssein, E.H., Othman, M.A., Mohamed, W.M., Younan, M.: Internet of things in smart cities: comprehensive review, open issues and challenges. IEEE Internet Things J. 11(21), 34941\u201334952 (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3449753","journal-title":"IEEE Internet Things J."},{"issue":"21","key":"5323_CR6","doi-asserted-by":"publisher","first-page":"15892","DOI":"10.1109\/JIOT.2021.3067905","volume":"8","author":"F Yang","year":"2021","unstructured":"Yang, F., Wu, Q., Hu, X., Ye, J., Yang, Y., Rao, H., Hu, B.: Internet-of-Things-enabled data fusion method for sleep healthcare applications. IEEE Internet Things J. 8(21), 15892\u201315905 (2021). https:\/\/doi.org\/10.1109\/JIOT.2021.3067905","journal-title":"IEEE Internet Things J."},{"key":"5323_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2022.100367","volume":"29","author":"L Gong","year":"2022","unstructured":"Gong, L., Yan, J., Chen, Y., An, J., He, L., Zheng, L., Zou, Z.: An IoT-based intelligent irrigation system with data fusion and a self-powered wide-area network. J. Ind. Inf. Integr. 29, 100367 (2022). https:\/\/doi.org\/10.1016\/j.jii.2022.100367","journal-title":"J. Ind. Inf. Integr."},{"issue":"9","key":"5323_CR8","doi-asserted-by":"publisher","first-page":"15855","DOI":"10.1109\/JIOT.2024.3350029","volume":"11","author":"C Lai","year":"2024","unstructured":"Lai, C., Zhang, H., Lu, R., Zheng, D.: Privacy-preserving medical data sharing scheme based on two-party cloud-assisted PSI. IEEE Internet Things J. 11(9), 15855\u201315868 (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3350029","journal-title":"IEEE Internet Things J."},{"key":"5323_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-12164-7","volume-title":"Secure multi-party computation against passive adversaries","author":"A Choudhury","year":"2022","unstructured":"Choudhury, A., Patra, A.: Secure multi-party computation against passive adversaries. Springer, Cham (2022)"},{"issue":"2","key":"5323_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3154794","volume":"21","author":"B Pinkas","year":"2018","unstructured":"Pinkas, B., Schneider, T.: Zohner, M: Scalable private set intersection based on OT extension. ACM Trans Priv Secur 21(2), 1\u201335 (2018). https:\/\/doi.org\/10.1145\/3154794","journal-title":"ACM Trans Priv Secur"},{"key":"5323_CR11","doi-asserted-by":"publisher","unstructured":"Yao, A.C.: Protocols for secure computations. In: 23rd annual symposium on foundations of computer science (sfcs 1982), pp. 160\u2013164. IEEE (1982). https:\/\/doi.org\/10.1109\/SFCS.1982.38","DOI":"10.1109\/SFCS.1982.38"},{"key":"5323_CR12","doi-asserted-by":"crossref","unstructured":"Goldwasser, S.: Multi party computations: past and present. In: Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing, pp. 1\u20136 (1997)","DOI":"10.1145\/259380.259405"},{"key":"5323_CR13","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107337756","volume-title":"Secure multiparty computation","author":"R Cramer","year":"2015","unstructured":"Cramer, R., Damgard, I.B.: Secure multiparty computation. Cambridge University Press, Cambridge (2015)"},{"key":"5323_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102996","volume":"65","author":"AA Jolfaei","year":"2022","unstructured":"Jolfaei, A.A., Mala, H., Zarezadeh, M.: EO-PSI-CA: Efficient outsourced private set intersection cardinality. J Inform Secur Appl 65, 102996 (2022). https:\/\/doi.org\/10.1016\/j.jisa.2021.102996","journal-title":"J Inform Secur Appl"},{"issue":"11","key":"5323_CR15","first-page":"5408","volume":"34","author":"S Li","year":"2023","unstructured":"Li, S., Jia, Z., Zhao, X.: Secure computation of range and sum of extremums on distributed datasets. J Soft 34(11), 5408\u20135423 (2023)","journal-title":"J Soft"},{"key":"5323_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103438","volume":"73","author":"J Sun","year":"2023","unstructured":"Sun, J., Zhou, F., Wang, Q., Jiao, Z., Zhang, Y.: Flexible revocation and verifiability for outsourced Private Set Intersection computation. J Inform Secur Appl 73, 103438 (2023). https:\/\/doi.org\/10.1016\/j.jisa.2023.103438","journal-title":"J Inform Secur Appl"},{"issue":"4","key":"5323_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.13868\/j.cnki.jcr.000724","volume":"11","author":"X Ma","year":"2024","unstructured":"Ma, X., Duan, Y., Li, S.: A secure computing protocol for set similarity problems. J Cryptol Res 11(4), 1\u201315 (2024). https:\/\/doi.org\/10.13868\/j.cnki.jcr.000724","journal-title":"J Cryptol Res"},{"issue":"08","key":"5323_CR18","doi-asserted-by":"publisher","first-page":"1844","DOI":"10.11897\/SP.J.1016.2018.01844","volume":"41","author":"J Dou","year":"2018","unstructured":"Dou, J., Liu, X., Zhou, S., Li, S.: Efficient secure set operations protocols and their application. Chin J Comput 41(08), 1844\u20131860 (2018). https:\/\/doi.org\/10.11897\/SP.J.1016.2018.01844","journal-title":"Chin J Comput"},{"key":"5323_CR19","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/978-3-030-26954-8_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2019","author":"B Pinkas","year":"2019","unstructured":"Pinkas, B., Rosulek, M., Trieu, N., Yanai, A.: SpOT-Light: lightweight private set intersection from sparse OT extension. In: Boldyreva, A., Micciancio, D. (eds.) Advances in Cryptology \u2013 CRYPTO 2019, pp. 401\u2013431. Springer, Cham (2019)"},{"key":"5323_CR20","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.ins.2020.03.049","volume":"525","author":"W Wang","year":"2020","unstructured":"Wang, W., Li, S., Dou, J., Du: R.: Privacy-preserving mixed set operations. Inform Sci 525, 67\u201381 (2020). https:\/\/doi.org\/10.1016\/j.ins.2020.03.049","journal-title":"Inform Sci"},{"issue":"1","key":"5323_CR21","first-page":"9","volume":"20","author":"C Tang","year":"2020","unstructured":"Tang, C., Lin, X.: Protocol of privacy-preserving set intersection computation. Netinfo Secur 20(1), 9\u201315 (2020)","journal-title":"Netinfo Secur"},{"issue":"2","key":"5323_CR22","doi-asserted-by":"publisher","first-page":"294","DOI":"10.13868\/j.cnki.jcr.000520","volume":"9","author":"X Zhao","year":"2022","unstructured":"Zhao, X., Jia, Z., Li, S.: A secure multiparty intersection computation. J Cryptol Res 9(2), 294\u2013307 (2022). https:\/\/doi.org\/10.13868\/j.cnki.jcr.000520","journal-title":"J Cryptol Res"},{"key":"5323_CR23","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-031-18283-9_6","volume-title":"Financial Cryptography and Data Security","author":"A Abadi","year":"2022","unstructured":"Abadi, A., Dong, C., Murdoch, S.J., Terzis, S.: Multi-party updatable delegated private set intersection. In: Eyal, I., Garay, J. (eds.) Financial Cryptography and Data Security, pp. 100\u2013119. Springer, Cham (2022)"},{"key":"5323_CR24","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-3-031-15802-5_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2022","author":"G Garimella","year":"2022","unstructured":"Garimella, G., Rosulek, M., Singh, J.: Structure-aware private set intersection, with applications to fuzzy matching. In: Dodis, Y., Shrimpton, T. (eds.) Advances in Cryptology \u2013 CRYPTO 2022, pp. 323\u2013352. Springer, Cham (2022)"},{"issue":"1","key":"5323_CR25","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1186\/s13677-022-00375-6","volume":"11","author":"Q Zhou","year":"2022","unstructured":"Zhou, Q., Lai, C., Guo, Q., Ma, H., Zheng, D.: A novel privacy protection scheme for internet of things based on blockchain and privacy set intersection technique. J Cloud Computing 11(1), 93 (2022). https:\/\/doi.org\/10.1186\/s13677-022-00375-6","journal-title":"J Cloud Computing"},{"issue":"9","key":"5323_CR26","first-page":"2806","volume":"43","author":"J Zhang","year":"2023","unstructured":"Zhang, J., Tian, H., Xiong, K., Tang, Y.L., Yang, L.: Fair multi-party private set intersection protocol based on cloud server. J Comput Appl 43(9), 2806\u20132811 (2023)","journal-title":"J Comput Appl"},{"key":"5323_CR27","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1007\/978-3-030-45724-2_25","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2020","author":"B Pinkas","year":"2020","unstructured":"Pinkas, B., Rosulek, M., Trieu, N., Yanai, A.: PSI from PaXoS: Fast, malicious private set intersection. In: Canteaut, A., Ishai, Y. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2020, pp. 739\u2013767. Springer, Cham (2020)"},{"key":"5323_CR28","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/978-3-031-38557-5_19","volume-title":"Advances in Cryptology \u2013 CRYPTO 2023","author":"G Garimella","year":"2023","unstructured":"Garimella, G., Rosulek, M., Singh, J.: Malicious secure, structure-aware private set intersection. In: Handschuh, H., Lysyanskaya, A. (eds.) Advances in Cryptology \u2013 CRYPTO 2023, pp. 577\u2013610. Springer, Cham (2023)"},{"issue":"4","key":"5323_CR29","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469\u2013472 (1985). https:\/\/doi.org\/10.1109\/TIT.1985.1057074","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"5323_CR30","doi-asserted-by":"publisher","first-page":"186","DOI":"10.15961\/j.jsuese.201901197","volume":"52","author":"X Che","year":"2020","unstructured":"Che, X., Zhou, T., Li, N., Zhou, H., Liu, L., Yang, X.: Optimization of NTRU-type multi-key fully homomorphic encryption scheme. Adv. Eng. Sci. 52(5), 186\u2013193 (2020). https:\/\/doi.org\/10.15961\/j.jsuese.201901197","journal-title":"Adv. Eng. Sci."},{"key":"5323_CR31","volume-title":"Foundations of cryptography volume 2, basic applications","author":"O Goldreich","year":"2009","unstructured":"Goldreich, O.: Foundations of cryptography volume 2, basic applications. Cambridge University Press, Cambridge (2009)"},{"key":"5323_CR32","doi-asserted-by":"publisher","unstructured":"Fiege, U., Fiat, A., Shamir, A.: Zero knowledge proofs of identity. In: Proceedings of the nineteenth annual ACM symposium on Theory of computing, pp. 210\u2013217. Association for Computing Machinery, New York (1987). https:\/\/doi.org\/10.1145\/28395.28419","DOI":"10.1145\/28395.28419"},{"key":"5323_CR33","doi-asserted-by":"publisher","unstructured":"Ames, S., Hazay, C., Ishai, Y., Venkitasubramaniam, M.: Ligero: Lightweight sublinear arguments without a trusted setup. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS '17), pp. 2087\u20132104. Association for Computing Machinery, New York, NY, USA (2017). https:\/\/doi.org\/10.1145\/3133956.3134104","DOI":"10.1145\/3133956.3134104"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05323-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05323-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05323-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T17:32:24Z","timestamp":1759944744000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05323-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,11]]},"references-count":33,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["5323"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05323-y","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,9,11]]},"assertion":[{"value":"13 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 March 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"726"}}