{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T22:21:01Z","timestamp":1767219661014,"version":"build-2065373602"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T00:00:00Z","timestamp":1757548800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB3103500"],"award-info":[{"award-number":["2022YFB3103500"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302072"],"award-info":[{"award-number":["62302072"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005230","name":"Natural Science Foundation of Chongqing","doi-asserted-by":"crossref","award":["CSTB2023NSCQ-LZX0149"],"award-info":[{"award-number":["CSTB2023NSCQ-LZX0149"]}],"id":[{"id":"10.13039\/501100005230","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2023CDJKYJH019"],"award-info":[{"award-number":["2023CDJKYJH019"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10586-025-05407-9","type":"journal-article","created":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T12:42:09Z","timestamp":1757594529000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A novel search approach for secure and flexible sharing of hierarchical EHR based on blockchain"],"prefix":"10.1007","volume":"28","author":[{"given":"Lu","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Di","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Liao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,11]]},"reference":[{"key":"5407_CR1","doi-asserted-by":"crossref","unstructured":"Wu, R., Ahn, G.-J., Hu, H.: Secure sharing of electronic health records in clouds. In: 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 711\u2013718 (2012). IEEE","DOI":"10.4108\/icst.collaboratecom.2012.250497"},{"key":"5407_CR2","doi-asserted-by":"crossref","unstructured":"Samantray, B.S., Reddy, K.: Blockchain enabled secured, smart healthcare system for smart cities: a systematic review on architecture, technology, and service management. Clust. Comput. 1\u201329 (2024)","DOI":"10.1007\/s10586-024-04661-7"},{"key":"5407_CR3","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP\u201907), pp. 321\u2013334 (2007). IEEE","DOI":"10.1109\/SP.2007.11"},{"issue":"1","key":"5407_CR4","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1186\/s13677-023-00444-4","volume":"12","author":"L Yan","year":"2023","unstructured":"Yan, L., Ge, L., Wang, Z., Zhang, G., Xu, J., Hu, Z.: Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment. J. Cloud Comput. 12(1), 61 (2023)","journal-title":"J. Cloud Comput."},{"issue":"6","key":"5407_CR5","doi-asserted-by":"publisher","first-page":"4168","DOI":"10.1109\/TSC.2023.3311877","volume":"16","author":"D Zhang","year":"2023","unstructured":"Zhang, D., Wang, S., Zhang, Q., Zhang, Y.: Attribute based conjunctive keywords search with verifiability and fair payment using blockchain. IEEE Trans. Serv. Comput. 16(6), 4168\u20134182 (2023)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"5407_CR6","doi-asserted-by":"crossref","unstructured":"Li, Y., Zhang, G., Feng, B., Yang, S.: A medical data sharing scheme based on blockchain attribute-based searchable encryption. In: 2024 4th International Conference on Computer Science and Blockchain (CCSB), pp. 539\u2013542 (2024). IEEE","DOI":"10.1109\/CCSB63463.2024.10735678"},{"issue":"1","key":"5407_CR7","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s10586-020-03106-1","volume":"24","author":"T Kanwal","year":"2021","unstructured":"Kanwal, T., Anjum, A., Khan, A.: Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities. Clust. Comput. 24(1), 293\u2013317 (2021)","journal-title":"Clust. Comput."},{"key":"5407_CR8","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/j.ins.2014.01.035","volume":"275","author":"H Deng","year":"2014","unstructured":"Deng, H., Wu, Q., Qin, B., Domingo-Ferrer, J., Zhang, L., Liu, J., Shi, W.: Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inform. Sci. 275, 370\u2013384 (2014)","journal-title":"Inform. Sci."},{"issue":"2","key":"5407_CR9","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1109\/TETC.2019.2904637","volume":"9","author":"J Li","year":"2019","unstructured":"Li, J., Chen, N., Zhang, Y.: Extended file hierarchy access control scheme with attribute-based encryption in cloud computing. IEEE Trans. Emerg. Top. Comput. 9(2), 983\u2013993 (2019)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"2","key":"5407_CR10","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1109\/TIFS.2011.2172209","volume":"7","author":"Z Wan","year":"2011","unstructured":"Wan, Z., Deng, R.H., et al.: Hasbe: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inform. Forens. Secur. 7(2), 743\u2013754 (2011)","journal-title":"IEEE Trans. Inform. Forens. Secur."},{"issue":"1","key":"5407_CR11","first-page":"8685273","volume":"2022","author":"F Sammy","year":"2022","unstructured":"Sammy, F., Vigila, S.M.C.: An efficient blockchain based data access with modified hierarchical attribute access structure with CP-ABE using ECC scheme for patient health record. Secur. Commun. Netw. 2022(1), 8685273 (2022)","journal-title":"Secur. Commun. Netw."},{"issue":"5","key":"5407_CR12","doi-asserted-by":"publisher","first-page":"6669","DOI":"10.1109\/TII.2022.3215192","volume":"19","author":"Z Zhou","year":"2022","unstructured":"Zhou, Z., Tian, Y., Xiong, J., Ma, J., Peng, C.: Blockchain-enabled secure and trusted federated data sharing in IIoT. IEEE Trans. Ind. Inform. 19(5), 6669\u20136681 (2022)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"1","key":"5407_CR13","doi-asserted-by":"publisher","first-page":"63","DOI":"10.3390\/app11010063","volume":"11","author":"H-Y Lin","year":"2020","unstructured":"Lin, H.-Y., Jiang, Y.-R.: A multi-user ciphertext policy attribute-based encryption scheme with keyword search for medical cloud system. Appl. Sci. 11(1), 63 (2020)","journal-title":"Appl. Sci."},{"issue":"6","key":"5407_CR14","doi-asserted-by":"publisher","first-page":"1142","DOI":"10.1109\/TSC.2017.2753231","volume":"13","author":"H Wang","year":"2017","unstructured":"Wang, H., Dong, X., Cao, Z.: Multi-value-independent ciphertext-policy attribute based encryption with fast keyword search. IEEE Trans. Serv. Comput. 13(6), 1142\u20131151 (2017)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"5407_CR15","doi-asserted-by":"publisher","first-page":"1388","DOI":"10.1109\/TIFS.2023.3336160","volume":"19","author":"L Cheng","year":"2023","unstructured":"Cheng, L., Meng, F.: Server-aided public key authenticated searchable encryption with constant ciphertext and constant trapdoor. IEEE Trans. Inform. Forens. Secur. 19, 1388\u20131400 (2023)","journal-title":"IEEE Trans. Inform. Forens. Secur."},{"key":"5407_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2022.103635","volume":"82","author":"H Wang","year":"2022","unstructured":"Wang, H., Li, Y., Susilo, W., Duong, D.H., Luo, F.: A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing. Comput. Stand. Interf. 82, 103635 (2022)","journal-title":"Comput. Stand. Interf."},{"issue":"6","key":"5407_CR17","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1109\/TIFS.2016.2523941","volume":"11","author":"S Wang","year":"2016","unstructured":"Wang, S., Zhou, J., Liu, J.K., Yu, J., Chen, J., Xie, W.: An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans. Inform. Forens. Secur. 11(6), 1265\u20131277 (2016)","journal-title":"IEEE Trans. Inform. Forens. Secur."},{"issue":"4","key":"5407_CR18","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1109\/TBDATA.2019.2907133","volume":"6","author":"E Zaghloul","year":"2019","unstructured":"Zaghloul, E., Zhou, K., Ren, J.: P-mod: Secure privilege-based multilevel organizational data-sharing in cloud computing. IEEE Trans. Big Data 6(4), 804\u2013815 (2019)","journal-title":"IEEE Trans. Big Data"},{"key":"5407_CR19","doi-asserted-by":"crossref","unstructured":"Wang, G., Liu, Q., Wu, J.: Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 735\u2013737 (2010)","DOI":"10.1145\/1866307.1866414"},{"issue":"6","key":"5407_CR20","first-page":"985","volume":"13","author":"Y Miao","year":"2017","unstructured":"Miao, Y., Ma, J., Liu, X., Li, X., Jiang, Q., Zhang, J.: Attribute-based keyword search over hierarchical data in cloud computing. IEEE Trans. Serv. Comput. 13(6), 985\u2013998 (2017)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"5407_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2024.103081","volume":"148","author":"H Yin","year":"2024","unstructured":"Yin, H., Zhao, Y., Zhang, L., Qiao, B., Chen, W., Wang, H.: Attribute-based searchable encryption with decentralized key management for healthcare data sharing. J. Syst. Arch. 148, 103081 (2024)","journal-title":"J. Syst. Arch."},{"issue":"3","key":"5407_CR22","first-page":"2754","volume":"10","author":"J Yu","year":"2022","unstructured":"Yu, J., Liu, S., Xu, M., Guo, H., Zhong, F., Cheng, W.: An efficient revocable and searchable MA-ABE scheme with blockchain assistance for C-IoT. IEEE Int. Things J. 10(3), 2754\u20132766 (2022)","journal-title":"IEEE Int. Things J."},{"issue":"12","key":"5407_CR23","doi-asserted-by":"publisher","first-page":"1877","DOI":"10.1109\/JAS.2021.1004003","volume":"8","author":"BB Gupta","year":"2021","unstructured":"Gupta, B.B., Li, K.-C., Leung, V.C., Psannis, K.E., Yamaguchi, S., et al.: Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE\/CAA J. Automat. Sin. 8(12), 1877\u20131890 (2021)","journal-title":"IEEE\/CAA J. Automat. Sin."},{"key":"5407_CR24","doi-asserted-by":"publisher","first-page":"68948","DOI":"10.1109\/ACCESS.2018.2878268","volume":"6","author":"T Peng","year":"2018","unstructured":"Peng, T., Liu, Q., Hu, B., Liu, J., Zhu, J.: Dynamic keyword search with hierarchical attributes in cloud computing. IEEE Access 6, 68948\u201368960 (2018)","journal-title":"IEEE Access"},{"issue":"1","key":"5407_CR25","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/TCC.2021.3071304","volume":"11","author":"NH Sultan","year":"2021","unstructured":"Sultan, N.H., Laurent, M., Varadharajan, V.: Securing organization\u2019s data: a role-based authorized keyword search scheme with efficient decryption. IEEE Trans. Cloud Comput. 11(1), 25\u201343 (2021)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"3","key":"5407_CR26","first-page":"1307","volume":"18","author":"H Wang","year":"2019","unstructured":"Wang, H., Ning, J., Huang, X., Wei, G., Poh, G.S., Liu, X.: Secure fine-grained encrypted keyword search for e-healthcare cloud. IEEE Trans. Depend. Sec. Comput. 18(3), 1307\u20131319 (2019)","journal-title":"IEEE Trans. Depend. Sec. Comput."},{"issue":"6","key":"5407_CR27","doi-asserted-by":"publisher","first-page":"4248","DOI":"10.1109\/TII.2020.3014168","volume":"17","author":"K Zhang","year":"2020","unstructured":"Zhang, K., Long, J., Wang, X., Dai, H.-N., Liang, K., Imran, M.: Lightweight searchable encryption protocol for industrial internet of things. IEEE Trans. Ind. Inform. 17(6), 4248\u20134259 (2020)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"3","key":"5407_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2633600","volume":"6","author":"Z Brakerski","year":"2014","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (leveled) fully homomorphic encryption without bootstrapping. ACM Trans. Comput. Theory (TOCT) 6(3), 1\u201336 (2014)","journal-title":"ACM Trans. Comput. Theory (TOCT)"},{"key":"5407_CR29","doi-asserted-by":"crossref","unstructured":"Zheng, Q., Xu, S., Ateniese, G.: Vabks: Verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 522\u2013530 (2014). IEEE","DOI":"10.1109\/INFOCOM.2014.6847976"},{"key":"5407_CR30","doi-asserted-by":"crossref","unstructured":"Bodur, H., Al\u00a0Yaseen, I.F.T.: An improved blockchain-based secure medical record sharing scheme. Clust. Comput. 1\u201320 (2024)","DOI":"10.1007\/s10586-024-04414-6"},{"issue":"2","key":"5407_CR31","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1109\/TDSC.2023.3261343","volume":"21","author":"D Zhang","year":"2023","unstructured":"Zhang, D., Le, J., Lei, X., Xiang, T., Liao, X.: Secure redactable blockchain with dynamic support. IEEE Trans. Depend. Sec. Comput. 21(2), 717\u2013731 (2023)","journal-title":"IEEE Trans. Depend. Sec. Comput."},{"key":"5407_CR32","doi-asserted-by":"crossref","unstructured":"Nizamuddin, N., Hasan, H.R., Salah, K.: Ipfs-blockchain-based authenticity of online publications. In: Blockchain\u2013ICBC 2018: First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings 1, pp. 199\u2013212 (2018). Springer","DOI":"10.1007\/978-3-319-94478-4_14"},{"issue":"12","key":"5407_CR33","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1109\/TIFS.2013.2286456","volume":"8","author":"L Zhou","year":"2013","unstructured":"Zhou, L., Varadharajan, V., Hitchens, M.: Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans. Inform. Forens. Secur. 8(12), 1947\u20131960 (2013)","journal-title":"IEEE Trans. Inform. Forens. Secur."},{"key":"5407_CR34","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s00500-016-2330-8","volume":"22","author":"H Zhong","year":"2018","unstructured":"Zhong, H., Zhu, W., Xu, Y., Cui, J.: Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput. 22, 243\u2013251 (2018)","journal-title":"Soft Comput."},{"issue":"4","key":"5407_CR35","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1109\/TPDS.2014.2355202","volume":"27","author":"W Sun","year":"2014","unstructured":"Sun, W., Yu, S., Lou, W., Hou, Y.T., Li, H.: Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans. Parall. Distrib. Syst. 27(4), 1187\u20131198 (2014)","journal-title":"IEEE Trans. Parall. Distrib. Syst."},{"key":"5407_CR36","unstructured":"Python, F.S.: Fabric SDK Python Documentation. https:\/\/fabric-sdk-py.readthedocs.io\/en\/latest\/index.html. Accessed: Mar. 9, 2025"},{"key":"5407_CR37","doi-asserted-by":"crossref","unstructured":"Boneh, D., Di\u00a0Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23, pp. 506\u2013522 (2004). Springer","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"5407_CR38","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.ins.2013.03.008","volume":"238","author":"L Fang","year":"2013","unstructured":"Fang, L., Susilo, W., Ge, C., Wang, J.: Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Inform. Sci. 238, 221\u2013241 (2013)","journal-title":"Inform. Sci."},{"key":"5407_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2017.03.038","volume":"403","author":"Q Huang","year":"2017","unstructured":"Huang, Q., Li, H.: An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inform. Sci. 403, 1\u201314 (2017)","journal-title":"Inform. Sci."},{"key":"5407_CR40","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1016\/j.ins.2019.12.063","volume":"516","author":"B Qin","year":"2020","unstructured":"Qin, B., Chen, Y., Huang, Q., Liu, X., Zheng, D.: Public-key authenticated encryption with keyword search revisited: security model and constructions. Inform. Sci. 516, 515\u2013528 (2020)","journal-title":"Inform. Sci."},{"key":"5407_CR41","doi-asserted-by":"crossref","unstructured":"Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: International Conference on Applied Cryptography and Network Security, pp. 442\u2013455 (2005). Springer","DOI":"10.1007\/11496137_30"},{"key":"5407_CR42","doi-asserted-by":"crossref","unstructured":"Wang, B., Song, W., Lou, W., Hou, Y.T.: Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 2092\u20132100 (2015). IEEE","DOI":"10.1109\/INFOCOM.2015.7218594"},{"key":"5407_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102255","volume":"119","author":"Y Liang","year":"2021","unstructured":"Liang, Y., Li, Y., Zhang, K., Ma, L.: Dmse: dynamic multi-keyword search encryption based on inverted index. J. Syst. Arch. 119, 102255 (2021)","journal-title":"J. Syst. Arch."},{"issue":"19","key":"5407_CR44","first-page":"18650","volume":"9","author":"J Liu","year":"2022","unstructured":"Liu, J., Li, Y., Sun, R., Pei, Q., Zhang, N., Dong, M., Leung, V.C.: Emk-abse: Efficient multikeyword attribute-based searchable encryption scheme through cloud-edge coordination. IEEE Int. Things J. 9(19), 18650\u201318662 (2022)","journal-title":"IEEE Int. Things J."},{"key":"5407_CR45","doi-asserted-by":"crossref","unstructured":"Liu, J., Wu, M., Sun, R., Du, X., Guizani, M.: Bmds: a blockchain-based medical data sharing scheme with attribute-based searchable encryption. In: ICC 2021-IEEE International Conference on Communications, pp. 1\u20136 (2021). IEEE","DOI":"10.1109\/ICC42927.2021.9500966"},{"key":"5407_CR46","doi-asserted-by":"crossref","unstructured":"Li, M., Guo, S., Li, W., Xiong, A., Wang, D., Li, D., Qi, F.: Blockchain-based searchable encryption access control mechanism for the internet of things. In: International Conference on Computer Engineering and Networks, pp. 258\u2013268 (2023). Springer","DOI":"10.1007\/978-981-99-9247-8_26"},{"issue":"4","key":"5407_CR47","doi-asserted-by":"publisher","first-page":"2298","DOI":"10.1007\/s12083-024-01687-x","volume":"17","author":"A Arabnouri","year":"2024","unstructured":"Arabnouri, A., Shafieinejad, A.: Bacase-sh: Blockchain-based authenticated certificate-less asymmetric searchable encryption for smart healthcare. Peer Peer Network. Appl. 17(4), 2298\u20132314 (2024)","journal-title":"Peer Peer Network. Appl."},{"key":"5407_CR48","doi-asserted-by":"crossref","unstructured":"Xu, S., Dong, S., Wang, L., Mihaljevi\u00e9, M.J., Zhang, S., Shao, W., Wang, Q.: Blockchain-based secure data sharing with overlapping clustering and searchable encryption. Comput. Stand. Interf. 103979 (2025)","DOI":"10.1016\/j.csi.2025.103979"},{"key":"5407_CR49","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2024.103887","volume":"91","author":"J Li","year":"2025","unstructured":"Li, J., Han, D., Weng, T.-H., Wu, H., Li, K.-C., Castiglione, A.: A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption. Comput. Stand. Interf. 91, 103887 (2025)","journal-title":"Comput. Stand. Interf."},{"issue":"5","key":"5407_CR50","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1016\/j.jss.2009.11.726","volume":"83","author":"HS Rhee","year":"2010","unstructured":"Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Trapdoor security in a searchable public-key encryption scheme with a designated tester. J. Syst. Softw. 83(5), 763\u2013771 (2010)","journal-title":"J. Syst. Softw."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05407-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05407-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05407-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T17:32:12Z","timestamp":1759944732000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05407-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,11]]},"references-count":50,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["5407"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05407-9","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,9,11]]},"assertion":[{"value":"27 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors confirm that they have no financial interests or personal relationships that may have influenced the research presented in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"703"}}