{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T19:48:42Z","timestamp":1771876122758,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T00:00:00Z","timestamp":1771804800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T00:00:00Z","timestamp":1771804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s10586-026-06012-0","type":"journal-article","created":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T18:43:00Z","timestamp":1771872180000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-preserving attribute-based multi-keyword search in e-health system"],"prefix":"10.1007","volume":"29","author":[{"given":"Xiaohui","family":"Yang","sequence":"first","affiliation":[]},{"given":"Shouhui","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Bingzhi","family":"Tong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,23]]},"reference":[{"issue":"3","key":"6012_CR1","doi-asserted-by":"publisher","first-page":"1848","DOI":"10.1109\/JIOT.2021.3088296","volume":"9","author":"C Guo","year":"2021","unstructured":"Guo, C., Su, S., Choo, K.-K., Tian, P., Tang, X.: A provably secure and efficient range query scheme for outsourced encrypted uncertain data from cloud-based internet of things systems. IEEE Internet Things J. 9(3), 1848\u20131860 (2021)","journal-title":"IEEE Internet Things J."},{"key":"6012_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.110108","volume":"237","author":"X Yang","year":"2023","unstructured":"Yang, X., Yu, J., Qi, S., Wang, Q., Wang, J., Qiao, Y., Qi, Y.: Less payment and higher efficiency: a verifiable, fair and forward-secure range query scheme using blockchain. Comput. Netw. 237, 110108 (2023)","journal-title":"Comput. Netw."},{"key":"6012_CR3","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology\u2013EUROCRYPT 2005: 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings 24, 457\u2013473 (2005). Springer"},{"key":"6012_CR4","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 44\u201355 (2000). IEEE"},{"issue":"6","key":"6012_CR5","doi-asserted-by":"publisher","first-page":"3443","DOI":"10.1109\/TSC.2021.3088131","volume":"15","author":"Q Huang","year":"2021","unstructured":"Huang, Q., Du, J., Yan, G., Yang, Y., Wei, Q.: Privacy-preserving spatio-temporal keyword search for outsourced location-based services. IEEE Trans. Serv. Comput. 15(6), 3443\u20133456 (2021)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"5","key":"6012_CR6","doi-asserted-by":"publisher","first-page":"4181","DOI":"10.1109\/TMC.2023.3288160","volume":"23","author":"Q Liu","year":"2023","unstructured":"Liu, Q., Peng, Y., Jiang, H., Wu, J., Wang, T., Peng, T., Wang, G.: Authorized keyword search on mobile devices in secure data outsourcing. IEEE Trans. Mob. Comput. 23(5), 4181\u20134195 (2023)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"4","key":"6012_CR7","first-page":"1667","volume":"18","author":"Y Miao","year":"2019","unstructured":"Miao, Y., Deng, R.H., Liu, X., Choo, K.-K., Wu, H., Li, H.: Multi-authority attribute-based keyword search over encrypted cloud data. IEEE Trans. Dependable Secure Comput. 18(4), 1667\u20131680 (2019)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"6012_CR8","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1109\/TSC.2022.3149761","volume":"16","author":"Q Huang","year":"2022","unstructured":"Huang, Q., Yan, G., Wei, Q.: Attribute-based expressive and ranked keyword search over encrypted documents in cloud computing. IEEE Trans. Serv. Comput. 16(2), 957\u2013968 (2022)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"1","key":"6012_CR9","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1109\/TCC.2021.3118692","volume":"11","author":"F Li","year":"2021","unstructured":"Li, F., Ma, J., Miao, Y., Liu, Z., Choo, K.-K., Liu, X., Deng, R.H.: Towards efficient verifiable boolean search over encrypted cloud data. IEEE Transactions on Cloud Computing 11(1), 839\u2013853 (2021)","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"6012_CR10","doi-asserted-by":"crossref","unstructured":"Prasad, S., Rao, Y.S.: Finedream: A boolean query searchable kp-abe-based fine-grained authorized encrypted-data retrieval mechanism. In: International conference on information security and cryptology, 73\u201395 (2024). Springer","DOI":"10.1007\/978-981-96-5566-3_5"},{"issue":"1","key":"6012_CR11","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/TCC.2021.3119407","volume":"11","author":"Y Zhang","year":"2021","unstructured":"Zhang, Y., Zhu, T., Guo, R., Xu, S., Cui, H., Cao, J.: Multi-keyword searchable and verifiable attribute-based encryption over cloud data. IEEE Transactions on Cloud Computing 11(1), 971\u2013983 (2021)","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"4","key":"6012_CR12","doi-asserted-by":"publisher","first-page":"2964","DOI":"10.1109\/TCC.2020.3031209","volume":"10","author":"Q Tong","year":"2020","unstructured":"Tong, Q., Miao, Y., Liu, X., Choo, K.-K., Deng, R.H., Li, H.: Vpsl: verifiable privacy-preserving data search for cloud-assisted internet of things. IEEE Transactions on Cloud Computing 10(4), 2964\u20132976 (2020)","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"7","key":"6012_CR13","first-page":"3241","volume":"34","author":"Z Shi","year":"2020","unstructured":"Shi, Z., Fu, X., Li, X., Zhu, K.: Esvsse: enabling efficient, secure, verifiable searchable symmetric encryption. IEEE Trans. Knowl. Data Eng. 34(7), 3241\u20133254 (2020)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"6012_CR14","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/TDSC.2023.3245638","volume":"21","author":"L Mei","year":"2023","unstructured":"Mei, L., Xu, C., Xu, L., Yuan, X., Liu, J.K.: Practical multi-source multi-client searchable encryption with forward privacy: refined security notion and new constructions. IEEE Trans. Dependable Secure Comput. 21(1), 63\u201377 (2023)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"6012_CR15","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/s12083-019-00736-0","volume":"13","author":"M Zarezadeh","year":"2020","unstructured":"Zarezadeh, M., Mala, H., Ashouri-Talouki, M.: Multi-keyword ranked searchable encryption scheme with access control for cloud storage. Peer-to-Peer Networking and Applications 13(1), 207\u2013218 (2020)","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"6012_CR16","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.comcom.2023.07.008","volume":"209","author":"S Lv","year":"2023","unstructured":"Lv, S., Tan, H., Zheng, W., Zhang, T., Wang, M.: A dynamic conjunctive keywords searchable symmetric encryption scheme for multiple users in cloud computing. Comput. Commun. 209, 239\u2013248 (2023)","journal-title":"Comput. Commun."},{"key":"6012_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.110045","volume":"237","author":"M Wang","year":"2023","unstructured":"Wang, M., Rui, L., Xu, S., Gao, Z., Liu, H., Guo, S.: A multi-keyword searchable encryption sensitive data trusted sharing scheme in multi-user scenario. Comput. Netw. 237, 110045 (2023)","journal-title":"Comput. Netw."},{"key":"6012_CR18","doi-asserted-by":"crossref","unstructured":"Li, D., Wu, J., Le, J., L\u00fc, Q., Liao, X., Xiang, T.: An efficient privacy-preserving ranked multi-keyword retrieval for multiple data owners in outsourced cloud. IEEE transactions on services computing (2023)","DOI":"10.1109\/TSC.2023.3341799"},{"issue":"1","key":"6012_CR19","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1109\/TSC.2019.2924372","volume":"15","author":"J Shao","year":"2019","unstructured":"Shao, J., Lu, R., Guan, Y., Wei, G.: Achieve efficient and verifiable conjunctive and fuzzy queries over encrypted data in cloud. IEEE Trans. Serv. Comput. 15(1), 124\u2013137 (2019)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"6012_CR20","doi-asserted-by":"crossref","unstructured":"Zheng, Q., Xu, S., Ateniese, G.: Vabks: Verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014-IEEE conference on computer communications, 522\u2013530 (2014). IEEE","DOI":"10.1109\/INFOCOM.2014.6847976"},{"issue":"1","key":"6012_CR21","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s12083-022-01387-4","volume":"16","author":"X Yang","year":"2023","unstructured":"Yang, X., Li, W., Fan, K.: A revocable attribute-based encryption ehr sharing scheme with multiple authorities in blockchain. Peer-to-peer Networking and Applications 16(1), 107\u2013125 (2023)","journal-title":"Peer-to-peer Networking and Applications"},{"issue":"3","key":"6012_CR22","first-page":"1307","volume":"18","author":"H Wang","year":"2019","unstructured":"Wang, H., Ning, J., Huang, X., Wei, G., Poh, G.S., Liu, X.: Secure fine-grained encrypted keyword search for e-healthcare cloud. IEEE Trans. Dependable Secure Comput. 18(3), 1307\u20131319 (2019)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"6012_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3311877","author":"D Zhang","year":"2023","unstructured":"Zhang, D., Wang, S., Zhang, Q., Zhang, Y.: Attribute based conjunctive keywords search with verifiability and fair payment using blockchain. IEEE Transactions on Services Computing (2023). https:\/\/doi.org\/10.1109\/TSC.2023.3311877","journal-title":"IEEE Transactions on Services Computing"},{"key":"6012_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.102998","volume":"144","author":"S Zhang","year":"2023","unstructured":"Zhang, S., Yang, Y., Liang, W., Sandor, V.K.A., Xie, G., Raymond, K.-K.: Mkss: an effective multi-authority keyword search scheme for edge-cloud collaboration. J. Syst. Architect. 144, 102998 (2023)","journal-title":"J. Syst. Architect."},{"issue":"1","key":"6012_CR25","volume":"2021","author":"Z Chen","year":"2021","unstructured":"Chen, Z., Wu, A., Li, Y., Xing, Q., Geng, S.: Blockchain-enabled public key encryption with multi-keyword search in cloud computing. Security and Communication Networks 2021(1), 6619689 (2021)","journal-title":"Security and Communication Networks"},{"issue":"6","key":"6012_CR26","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.1109\/TDSC.2018.2864186","volume":"17","author":"K He","year":"2018","unstructured":"He, K., Guo, J., Weng, J., Weng, J., Liu, J.K., Yi, X.: Attribute-based hybrid boolean keyword search over outsourced encrypted data. IEEE Trans. Dependable Secure Comput. 17(6), 1207\u20131217 (2018)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"6012_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2025.103366","volume":"161","author":"J Xue","year":"2025","unstructured":"Xue, J., Deng, Q., Zhang, W., Liu, K., Zhang, X., Zhou, Y.: A dual-index boolean retrieval scheme with dynamic and revocable attribute-based policies. J. Syst. Architect. 161, 103366 (2025)","journal-title":"J. Syst. Architect."},{"issue":"4","key":"6012_CR28","first-page":"1804","volume":"18","author":"Y Miao","year":"2019","unstructured":"Miao, Y., Deng, R.H., Choo, K.-K., Liu, X., Ning, J., Li, H.: Optimized verifiable fine-grained keyword search in dynamic multi-owner settings. IEEE Trans. Dependable Secure Comput. 18(4), 1804\u20131820 (2019)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"6012_CR29","doi-asserted-by":"crossref","unstructured":"Cui, H., Deng, R.H., Liu, J.K., Li, Y.: Attribute-based encryption with expressive and authorized keyword search. In: Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3\u20135, 2017, Proceedings, Part I 22, 106\u2013126 (2017). Springer","DOI":"10.1007\/978-3-319-60055-0_6"},{"key":"6012_CR30","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1109\/TIFS.2024.3523765","volume":"20","author":"C Wang","year":"2025","unstructured":"Wang, C., Ming, Y., Liu, H., Deng, Y., Zhao, Y., Zhang, S.: Security-enhanced data transmission with fine-grained and flexible revocation for dtwns. IEEE Transactions on Information Forensics and Security 20, 1237\u20131250 (2025)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"5","key":"6012_CR31","doi-asserted-by":"publisher","first-page":"3650","DOI":"10.1109\/TMC.2023.3277702","volume":"23","author":"Y Miao","year":"2023","unstructured":"Miao, Y., Li, F., Li, X., Liu, Z., Ning, J., Li, H., Choo, K.-K., Deng, R.H.: Time-controllable keyword search scheme with efficient revocation in mobile e-health cloud. IEEE Trans. Mob. Comput. 23(5), 3650\u20133665 (2023)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"6012_CR32","doi-asserted-by":"crossref","unstructured":"Meng, F., Cheng, L.: Str-abks: Server-aided traceable and revocable attribute-based encryption with keyword search. IEEE Internet of Things Journal (2023)","DOI":"10.1109\/JIOT.2023.3335624"},{"issue":"6","key":"6012_CR33","first-page":"2941","volume":"18","author":"L Xu","year":"2020","unstructured":"Xu, L., Chen, X., Zhang, F., Li, W., Wu, H.-T., Tang, S., Xiang, Y.: Asbks: towards attribute set based keyword search over encrypted personal health records. IEEE Trans. Dependable Secure Comput. 18(6), 2941\u20132952 (2020)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"6012_CR34","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1109\/TSC.2019.2959306","volume":"15","author":"Y Chen","year":"2019","unstructured":"Chen, Y., Li, W., Gao, F., Wen, Q., Zhang, H., Wang, H.: Practical attribute-based multi-keyword ranked search scheme in cloud computing. IEEE Trans. Serv. Comput. 15(2), 724\u2013735 (2019)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"6","key":"6012_CR35","doi-asserted-by":"publisher","first-page":"2875","DOI":"10.1109\/TDSC.2020.2968425","volume":"18","author":"K Zhang","year":"2020","unstructured":"Zhang, K., Wen, M., Lu, R., Chen, K.: Multi-client sub-linear boolean keyword searching for encrypted cloud storage with owner-enforced authorization. IEEE Trans. Dependable Secure Comput. 18(6), 2875\u20132887 (2020)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"6012_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00145-021-09374-3","volume":"34","author":"D Derler","year":"2021","unstructured":"Derler, D., Gellert, K., Jager, T., Slamanig, D., Striecks, C.: Bloom filter encryption and applications to efficient forward-secret 0-rtt key exchange. J. Cryptol. 34, 1\u201359 (2021)","journal-title":"J. Cryptol."},{"key":"6012_CR37","doi-asserted-by":"crossref","unstructured":"Wong, W.K., Cheung, D.W.-l., Kao, B., Mamoulis, N.: Secure knn computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, 139\u2013152 (2009)","DOI":"10.1145\/1559845.1559862"},{"key":"6012_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.102984","volume":"144","author":"Y Zou","year":"2023","unstructured":"Zou, Y., Peng, T., Wang, G., Luo, E., Xiong, J.: Blockchain-assisted multi-keyword fuzzy search encryption for secure data sharing. J. Syst. Architect. 144, 102984 (2023)","journal-title":"J. Syst. Architect."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-06012-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-026-06012-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-026-06012-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T18:43:05Z","timestamp":1771872185000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-026-06012-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,23]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["6012"],"URL":"https:\/\/doi.org\/10.1007\/s10586-026-06012-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,23]]},"assertion":[{"value":"17 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2026","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2026","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"The authors affirm that human research participants provided informed consent for publication of the images and tables.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}],"article-number":"191"}}