{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:45:48Z","timestamp":1740123948046,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,3,20]],"date-time":"2024-03-20T00:00:00Z","timestamp":1710892800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,20]],"date-time":"2024-03-20T00:00:00Z","timestamp":1710892800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1007\/s11235-024-01121-w","type":"journal-article","created":{"date-parts":[[2024,3,20]],"date-time":"2024-03-20T11:02:09Z","timestamp":1710932529000},"page":"213-227","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A sustainable certificateless authenticated searchable encryption with multi-trapdoor indistinguishability"],"prefix":"10.1007","volume":"86","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0695-1136","authenticated-orcid":false,"given":"Mohammed Raouf","family":"Senouci","sequence":"first","affiliation":[]},{"given":"Ilyas","family":"Benkhaddra","sequence":"additional","affiliation":[]},{"given":"Abdelkader","family":"Senouci","sequence":"additional","affiliation":[]},{"given":"Fagen","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,20]]},"reference":[{"key":"1121_CR1","doi-asserted-by":"publisher","unstructured":"Boneh, D., Crescenzo, G. D., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. Lecture Notes in Computer Science (Including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3027, 506\u2013522. https:\/\/doi.org\/10.1007\/978-3-540-24676-3_30","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"1121_CR2","doi-asserted-by":"publisher","unstructured":"Baek, J., Safavi-Naini, R. & Susilo, W. Public key encryption with keyword search revisited. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 5072 LNCS, 1249\u20131259 (2008). https:\/\/doi.org\/10.1007\/978-3-540-69839-5_96 .","DOI":"10.1007\/978-3-540-69839-5_96"},{"key":"1121_CR3","doi-asserted-by":"publisher","unstructured":"Byun, J.\u00a0W., Rhee, H.\u00a0S., Park, H.\u00a0A. & Lee, D.\u00a0H. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 4165 LNCS, 75\u201383 (2006). https:\/\/doi.org\/10.1007\/11844662_6 .","DOI":"10.1007\/11844662_6"},{"key":"1121_CR4","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1016\/j.jss.2009.11.726","volume":"83","author":"HS Rhee","year":"2010","unstructured":"Rhee, H. S., Park, J. H., Susilo, W., & Lee, D. H. (2010). Trapdoor security in a searchable public-key encryption scheme with a designated tester. Journal of Systems and Software, 83, 763\u2013771. https:\/\/doi.org\/10.1016\/j.jss.2009.11.726","journal-title":"Journal of Systems and Software"},{"key":"1121_CR5","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1109\/tifs.2014.2378592","volume":"10","author":"S Ma","year":"2015","unstructured":"Ma, S., Huang, Q., Zhang, M., & Yang, B. (2015). Efficient public key encryption with equality test supporting flexible authorization. IEEE Transactions on Information Forensics and Security, 10, 458\u2013470. https:\/\/doi.org\/10.1109\/tifs.2014.2378592","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1121_CR6","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.ins.2013.03.008","volume":"238","author":"L Fang","year":"2013","unstructured":"Fang, L., Susilo, W., Ge, C., & Wang, J. (2013). Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Information Sciences, 238, 221\u2013241. https:\/\/doi.org\/10.1016\/j.ins.2013.03.008","journal-title":"Information Sciences"},{"key":"1121_CR7","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/cc.2014.7004528","volume":"11","author":"Y Peng","year":"2014","unstructured":"Peng, Y., Cui, J., Peng, C., & Ying, Z. (2014). Certificateless public key encryption with keyword search. China Communications, 11, 100\u2013113. https:\/\/doi.org\/10.1109\/cc.2014.7004528","journal-title":"China Communications"},{"key":"1121_CR8","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-319-48490-7_14","volume":"536","author":"TY Wu","year":"2016","unstructured":"Wu, T. Y., Meng, F., Chen, C. M., Liu, S., & Pan, J. S. (2016). On the security of a certificateless searchable public key encryption scheme. Advances in Intelligent Systems and Computing, 536, 113\u2013119. https:\/\/doi.org\/10.1007\/978-3-319-48490-7_14","journal-title":"Advances in Intelligent Systems and Computing"},{"key":"1121_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102271","volume":"119","author":"MR Senouci","year":"2021","unstructured":"Senouci, M. R., Benkhaddra, I., Senouci, A., & Li, F. (2021). An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks. Journal of Systems Architecture, 119, 102271. https:\/\/doi.org\/10.1016\/j.sysarc.2021.102271","journal-title":"Journal of Systems Architecture"},{"key":"1121_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2017.03.038","volume":"403\u2013404","author":"Q Huang","year":"2017","unstructured":"Huang, Q., & Li, H. (2017). An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Information Sciences, 403\u2013404, 1\u201314. https:\/\/doi.org\/10.1016\/j.ins.2017.03.038","journal-title":"Information Sciences"},{"key":"1121_CR11","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s12243-018-00701-7","volume":"74","author":"L Wu","year":"2019","unstructured":"Wu, L., Zhang, Y., Ma, M., Kumar, N., & He, D. (2019). Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical internet of things. Annales des Telecommunications\/Annals of Telecommunications, 74, 423\u2013434. https:\/\/doi.org\/10.1007\/s12243-018-00701-7","journal-title":"Annales des Telecommunications\/Annals of Telecommunications"},{"key":"1121_CR12","doi-asserted-by":"publisher","first-page":"3618","DOI":"10.1109\/tii.2017.2771382","volume":"14","author":"D He","year":"2018","unstructured":"He, D., Ma, M., Zeadally, S., Kumar, N., & Liang, K. (2018). Certificateless public key authenticated encryption with keyword search for industrial internet of things. IEEE Transactions on Industrial Informatics, 14, 3618\u20133627. https:\/\/doi.org\/10.1109\/tii.2017.2771382","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"1121_CR13","doi-asserted-by":"publisher","first-page":"27075","DOI":"10.1007\/s11042-020-09213-w","volume":"79","author":"Y Zhang","year":"2020","unstructured":"Zhang, Y., Wen, L., Zhang, Y., & Wang, C. (2020). Deniably authenticated searchable encryption scheme based on blockchain for medical image data sharing. Multimedia Tools and Applications, 79, 27075\u201327090. https:\/\/doi.org\/10.1007\/s11042-020-09213-w","journal-title":"Multimedia Tools and Applications"},{"key":"1121_CR14","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1016\/j.compeleceng.2017.05.014","volume":"65","author":"M Ma","year":"2018","unstructured":"Ma, M., He, D., Khan, M. K., & Chen, J. (2018). Certificateless searchable public key encryption scheme for mobile healthcare system. Computers and Electrical Engineering, 65, 413\u2013424. https:\/\/doi.org\/10.1016\/j.compeleceng.2017.05.014","journal-title":"Computers and Electrical Engineering"},{"key":"1121_CR15","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0230722","volume":"15","author":"B Wu","year":"2020","unstructured":"Wu, B., Wang, C., & Yao, H. (2020). Security analysis and secure channel-free certificateless searchable public key authenticated encryption for a cloud-based internet of things. PLOS ONE, 15, e0230722. https:\/\/doi.org\/10.1371\/journal.pone.0230722","journal-title":"PLOS ONE"},{"key":"1121_CR16","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1016\/j.ins.2019.12.063","volume":"516","author":"B Qin","year":"2020","unstructured":"Qin, B., Chen, Y., Huang, Q., Liu, X., & Zheng, D. (2020). Public-key authenticated encryption with keyword search revisited: Security model and constructions. Information Sciences, 516, 515\u2013528. https:\/\/doi.org\/10.1016\/j.ins.2019.12.063","journal-title":"Information Sciences"},{"key":"1121_CR17","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/s12083-021-01253-9","volume":"15","author":"G Yang","year":"2022","unstructured":"Yang, G., Guo, J., Han, L., Liu, X., & Tian, C. (2022). An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy. Peer-to-Peer Networking and Applications, 15, 503\u2013515. https:\/\/doi.org\/10.1007\/s12083-021-01253-9","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"1121_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-022-00912-3","author":"MR Senouci","year":"2022","unstructured":"Senouci, M. R., Benkhaddra, I., Senouci, A., & Li, F. (2022). A provably secure free-pairing certificateless searchable encryption scheme. Telecommunication Systems. https:\/\/doi.org\/10.1007\/s11235-022-00912-3","journal-title":"Telecommunication Systems"},{"key":"1121_CR19","doi-asserted-by":"publisher","unstructured":"Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2894, 452\u2013473. https:\/\/doi.org\/10.1007\/978-3-540-40061-5_29","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"1121_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119060","volume":"640","author":"L Cheng","year":"2023","unstructured":"Cheng, L., & Meng, F. (2023). Public key authenticated searchable encryption against frequency analysis attacks. Information Sciences, 640, 119060. https:\/\/doi.org\/10.1016\/j.ins.2023.119060","journal-title":"Information Sciences"},{"key":"1121_CR21","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.comcom.2023.09.007","volume":"211","author":"VB Chenam","year":"2023","unstructured":"Chenam, V. B., & Ali, S. T. (2023). A certificateless authenticated searchable encryption with dynamic multi-receiver for cloud storage. Computer Communications, 211, 157\u2013177. https:\/\/doi.org\/10.1016\/j.comcom.2023.09.007","journal-title":"Computer Communications"},{"key":"1121_CR22","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/s12083-022-01392-7","volume":"16","author":"M Han","year":"2022","unstructured":"Han, M., Xu, P., Xu, L., & Xu, C. (2022). TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage. Peer-to-Peer Networking and Applications, 16, 156\u2013169. https:\/\/doi.org\/10.1007\/s12083-022-01392-7","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"1121_CR23","doi-asserted-by":"publisher","first-page":"2948","DOI":"10.3390\/math11132948","volume":"11","author":"I Amorim","year":"2023","unstructured":"Amorim, I., & Costa, I. (2023). Leveraging searchable encryption through homomorphic encryption: A comprehensive analysis. Mathematics, 11, 2948. https:\/\/doi.org\/10.3390\/math11132948","journal-title":"Mathematics"},{"key":"1121_CR24","doi-asserted-by":"publisher","first-page":"13","DOI":"10.26599\/tst.2021.9010070","volume":"28","author":"R Du","year":"2023","unstructured":"Du, R., Ma, C., & Li, M. (2023). Privacy-preserving searchable encryption scheme based on public and private blockchains. Tsinghua Science and Technology, 28, 13\u201326. https:\/\/doi.org\/10.26599\/tst.2021.9010070","journal-title":"Tsinghua Science and Technology"},{"key":"1121_CR25","doi-asserted-by":"publisher","first-page":"16","DOI":"10.3390\/cryptography7020016","volume":"7","author":"B He","year":"2023","unstructured":"He, B., & Feng, T. (2023). Encryption scheme of verifiable search based on blockchain in cloud environment. Cryptography, 7, 16. https:\/\/doi.org\/10.3390\/cryptography7020016","journal-title":"Cryptography"},{"key":"1121_CR26","doi-asserted-by":"publisher","first-page":"142","DOI":"10.3390\/info14030142","volume":"14","author":"J Lu","year":"2023","unstructured":"Lu, J., Li, H., Huang, J., Ma, S., Au, M. H. A., & Huang, Q. (2023). Certificateless public key authenticated encryption with keyword search achieving stronger security. Information, 14, 142. https:\/\/doi.org\/10.3390\/info14030142","journal-title":"Information"},{"key":"1121_CR27","doi-asserted-by":"publisher","unstructured":"Silveira, M. M., Silva, D. S., Oliveira, L. Z. & Gomes, R. L. Analyzing the Performance of Searchable Symmetric Encryption over Huawei Cloud. In Anais Estendidos do XLI Simp\u00f3sio Brasileiro de Redes de Computadores e Sistemas Distribu\u00eddos (SBRC Estendido 2023). https:\/\/doi.org\/10.5753\/sbrc_estendido.2023.465","DOI":"10.5753\/sbrc_estendido.2023.465"},{"key":"1121_CR28","doi-asserted-by":"publisher","first-page":"3890","DOI":"10.3390\/electronics12183890","volume":"12","author":"RK Raghunandan","year":"2023","unstructured":"Raghunandan, R. K., Kallapu, B., Dodmane, R., Rao, N. S. K., Thota, S., & Sahu, A. K. (2023). Enhancing cloud communication security: A blockchain-powered framework with attribute-aware encryption. Electronics, 12, 3890. https:\/\/doi.org\/10.3390\/electronics12183890","journal-title":"Electronics"},{"key":"1121_CR29","doi-asserted-by":"publisher","first-page":"4236","DOI":"10.1109\/tkde.2021.3126607","volume":"35","author":"V Vo","year":"2023","unstructured":"Vo, V., Yuan, X., Sun, S.-F., Liu, J. K., Nepal, S., & Wang, C. (2023). ShieldDB: An encrypted document database with padding countermeasures. IEEE Transactions on Knowledge and Data Engineering, 35, 4236\u20134252. https:\/\/doi.org\/10.1109\/tkde.2021.3126607","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"1121_CR30","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/8351353","author":"X Zhu","year":"2023","unstructured":"Zhu, X., Fu, S., Hu, H., Wu, Q., & Liu, B. (2023). HCV: Practical multi-keyword conjunctive query with little result pattern leakage. Security and Communication Networks. https:\/\/doi.org\/10.1155\/2023\/8351353","journal-title":"Security and Communication Networks"},{"key":"1121_CR31","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1002\/ett.4734","volume":"34","author":"HS Trivedi","year":"2023","unstructured":"Trivedi, H. S., & Patel, S. J. (2023). Key-aggregate searchable encryption with multi-user authorization and keyword untraceability for distributed IoT healthcare systems. Transactions on Emerging Telecommunications Technologies, 34, 4. https:\/\/doi.org\/10.1002\/ett.4734","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"12","key":"1121_CR32","doi-asserted-by":"publisher","first-page":"2581","DOI":"10.1080\/00207160.2013.778985","volume":"90","author":"WC Yau","year":"2013","unstructured":"Yau, W. C., Phan, R. C. W., Heng, S. H., & Goi, B. M. (2013). Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. International Journal of Computer Mathematics, 90(12), 2581\u20132587. https:\/\/doi.org\/10.1080\/00207160.2013.778985","journal-title":"International Journal of Computer Mathematics"},{"key":"1121_CR33","unstructured":"PBC library - pairing-based cryptography. https:\/\/crypto.stanford.edu\/pbc\/"},{"key":"1121_CR34","unstructured":"Keylength - NIST report on cryptographic key length and cryptoperiod (2020). https:\/\/www.keylength.com\/en\/4\/"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-024-01121-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-024-01121-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-024-01121-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T11:16:13Z","timestamp":1716808573000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-024-01121-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,20]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,5]]}},"alternative-id":["1121"],"URL":"https:\/\/doi.org\/10.1007\/s11235-024-01121-w","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"type":"print","value":"1018-4864"},{"type":"electronic","value":"1572-9451"}],"subject":[],"published":{"date-parts":[[2024,3,20]]},"assertion":[{"value":"19 February 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have not disclosed any competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}