{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:15:08Z","timestamp":1740122108275,"version":"3.37.3"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2016,10,8]],"date-time":"2016-10-08T00:00:00Z","timestamp":1475884800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"NationalNatural Science Foundation of China (CN)","award":["61572294"],"award-info":[{"award-number":["61572294"]}]},{"name":"Fundamental Research Funds of Shandong University","award":["2016JC029"],"award-info":[{"award-number":["2016JC029"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s10916-016-0610-6","type":"journal-article","created":{"date-parts":[[2016,10,8]],"date-time":"2016-10-08T06:57:18Z","timestamp":1475909838000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Improvement to a Multi-Client Searchable Encryption Scheme for Boolean Queries"],"prefix":"10.1007","volume":"40","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4909-367X","authenticated-orcid":false,"given":"Han","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Xue","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qiuliang","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,8]]},"reference":[{"key":"610_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., and Xu, Y., Order preserving encryption for numeric data. In: Proceedings of the ACM SIGMOD international conference on Management of data, p. 2004 (2004)","DOI":"10.1145\/1007568.1007632"},{"key":"610_CR2","doi-asserted-by":"crossref","unstructured":"Ballard, L., Kamara, S., and Monrose, F., Achieving efficient conjunctive keyword searches over encrypted data. In: International Conference on Information and Communications Security, pages 414\u2013426. Springer (2005)","DOI":"10.1007\/11602897_35"},{"key":"610_CR3","doi-asserted-by":"crossref","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., and Persiano, G., Public key encryption with keyword search. In: International Conference on the Theory and Applications of Cryptographic Techniques, pages 506\u2013522. Springer (2004)","DOI":"10.1007\/978-3-540-24676-3_30"},{"issue":"2","key":"610_CR4","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/2636328","volume":"47","author":"C B\u00f6sch","year":"2015","unstructured":"B\u00f6sch, C., Hartel, P., Jonker, W., and Peter, A., A survey of provably secure searchable encryption. ACM Comput. Surv. (CSUR) 47(2):18, 2015.","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"610_CR5","doi-asserted-by":"crossref","unstructured":"Byun, J.W., Lee, D.H., and Lim, J., Efficient conjunctive keyword search on encrypted data storage system. In: European Public Key Infrastructure Workshop, pages 184\u2013196. Springer (2006)","DOI":"10.1007\/11774716_15"},{"key":"610_CR6","doi-asserted-by":"crossref","unstructured":"Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Ro\u015fu, M. -C., and Steiner, M., Highly-scalable searchable symmetric encryption with support for boolean queries. In: Advances in Cryptology\u2013CRYPTO 2013, pages 353\u2013373. Springer (2013)","DOI":"10.1007\/978-3-642-40041-4_20"},{"issue":"6","key":"610_CR7","doi-asserted-by":"crossref","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B Chor","year":"1998","unstructured":"Chor, B., Kushilevitz, E., Goldreich, O., and Sudan, M., Private information retrieval. J. the ACM (JACM) 45(6):965\u2013981, 1998.","journal-title":"J. the ACM (JACM)"},{"key":"610_CR8","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J., Kamara, S., and Ostrovsky, R., Searchable symmetric encryption: Improved definitions and efficient constructions (2006)","DOI":"10.1145\/1180405.1180417"},{"key":"610_CR9","doi-asserted-by":"crossref","unstructured":"Fu, Z., Ren, K., Shu, J., Sun, X., and Huang, F., Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9):2546\u20132559, Sept 2016.","DOI":"10.1109\/TPDS.2015.2506573"},{"key":"610_CR10","doi-asserted-by":"crossref","unstructured":"Gentry, C., A fully homomorphic encryption scheme. Phd thesis Stanford University (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"610_CR11","doi-asserted-by":"crossref","unstructured":"Golle, P., Staddon, J., and Waters, B., Secure conjunctive keyword search over encrypted data. In: International Conference on Applied Cryptography and Network Security, pages 31\u201345. Springer (2004)","DOI":"10.1007\/978-3-540-24852-1_3"},{"key":"610_CR12","doi-asserted-by":"publisher","unstructured":"He, D., Kumar, N., Wang, H., Wang, L., Choo, K. K. R., and Vinel, A., A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network IEEE Transactions on Dependable and Secure Computing, PP(99), 1\u20131 2016. doi: 10.1109\/TDSC.2016.2596286 .","DOI":"10.1109\/TDSC.2016.2596286"},{"key":"610_CR13","doi-asserted-by":"publisher","unstructured":"He, D., Zeadally, S., Kumar, N., and Lee, J. H., Anonymous authentication for wireless body area networks with provable security IEEE Systems Journal, PP(99), 1\u201312, 2016. doi: 10.1109\/JSYST.2016.2544805 .","DOI":"10.1109\/JSYST.2016.2544805"},{"key":"610_CR14","doi-asserted-by":"publisher","unstructured":"He, D., Zeadally, S., and Wu, L., Certificateless public auditing scheme for cloud-assisted wireless body area networks IEEE Systems Journal, PP(99), 1\u201310, 2015. doi: 10.1109\/JSYST.2015.2428620 .","DOI":"10.1109\/JSYST.2015.2428620"},{"key":"610_CR15","doi-asserted-by":"crossref","unstructured":"Jarecki, S., Jutla, C., Krawczyk, H., Rosu, M., and Steiner, M., Outsourced symmetric private information retrieval. In: Proceedings of the ACM SIGSAC conference on Computer & communications security, pages 875\u2013888, p. 2013 (2013)","DOI":"10.1145\/2508859.2516730"},{"key":"610_CR16","doi-asserted-by":"crossref","unstructured":"Liu, Z., Huang, X., Hu, Z., Khan, M.K., Seo, H., and Zhou, L., On emerging family of elliptic curves to secure internet of things: Ecc comes of age. IEEE Transactions on Dependable and Secure Computing, 99 (2016)","DOI":"10.1109\/TDSC.2016.2577022"},{"issue":"7","key":"610_CR17","doi-asserted-by":"crossref","first-page":"1385","DOI":"10.1109\/TIFS.2015.2491261","volume":"11","author":"Z Liu","year":"2016","unstructured":"Liu, Z., Seo, H., Gro\u00dfsch\u00e4l, J., and Kim, H., Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit avr-based sensor nodes. IEEE Trans. Inf. Forensics Secur. 11(7):1385\u20131397, 2016.","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"610_CR18","doi-asserted-by":"crossref","unstructured":"Naveed, M., Kamara, S., and Wright, C. V., Inference attacks on property-preserving encrypted database. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 644\u2013655 ACM (2015)","DOI":"10.1145\/2810103.2813651"},{"key":"610_CR19","doi-asserted-by":"crossref","unstructured":"Ostrovsky, R., Efficient computation on oblivious rams. In: Proceedings of the twenty-second annual ACM symposium on Theory of computing, pages 514\u2013523 ACM (1990)","DOI":"10.1145\/100216.100289"},{"key":"610_CR20","doi-asserted-by":"crossref","unstructured":"Popa, R. A., Redfield, C., Zeldovich, N., and Balakrishnan, H., Cryptdb: protecting confidentiality with encrypted query processing. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pages 85\u2013100 ACM (2011)","DOI":"10.1145\/2043556.2043566"},{"key":"610_CR21","unstructured":"Song, D. X., Wagner, D., and Perrig, A., Practical techniques for searches on encrypted data. In: Security and Privacy, 2000. S&P 2000. Proceedings IEEE Symposium on, pages 44\u201355, IEEE, p. 2000 (2000)"},{"issue":"2","key":"610_CR22","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2016","unstructured":"Xia, Z., Wang, X., Sun, X., and Wang, Q., A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2):340\u2013352 , 2016.","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"610_CR23","first-page":"190","volume":"98","author":"F Zhangjie","year":"2015","unstructured":"Zhangjie, F., Xingming, S., Qi, L., Lu, Z., and Jiangang, S., Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98(1):190\u2013200, 2015.","journal-title":"IEICE Trans. Commun."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0610-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0610-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0610-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,26]],"date-time":"2020-09-26T13:52:57Z","timestamp":1601128377000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0610-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,8]]},"references-count":23,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["610"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0610-6","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"type":"print","value":"0148-5598"},{"type":"electronic","value":"1573-689X"}],"subject":[],"published":{"date-parts":[[2016,10,8]]},"article-number":"255"}}