{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T07:10:01Z","timestamp":1750057801815,"version":"3.41.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T00:00:00Z","timestamp":1745452800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T00:00:00Z","timestamp":1745452800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["62332018"],"award-info":[{"award-number":["62332018"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s11235-025-01288-w","type":"journal-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T12:57:18Z","timestamp":1745499438000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Verifiable location range query in multi-source outsourced database"],"prefix":"10.1007","volume":"88","author":[{"given":"Ruyu","family":"Yan","sequence":"first","affiliation":[]},{"given":"Ruirui","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Haolin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xiong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,24]]},"reference":[{"issue":"10","key":"1288_CR1","doi-asserted-by":"publisher","first-page":"9458","DOI":"10.1109\/TVT.2017.2703631","volume":"66","author":"M Ghaffari","year":"2017","unstructured":"Ghaffari, M., Ghadiri, N., Manshaei, M. H., & Lahijani, M. S. (2017). $$ p^{4}qs $$: A peer-to-peer privacy preserving query service for location-based mobile applications. IEEE Transactions on Vehicular Technology, 66(10), 9458\u20139469.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"1","key":"1288_CR2","first-page":"1","volume":"54","author":"H Jiang","year":"2021","unstructured":"Jiang, H., Li, J., Zhao, P., Zeng, F., Xiao, Z., & Iyengar, A. (2021). Location privacy-preserving mechanisms in location-based services: A comprehensive survey. ACM Computing Surveys (CSUR), 54(1), 1\u201336.","journal-title":"ACM Computing Surveys (CSUR)"},{"doi-asserted-by":"crossref","unstructured":"Liu L, & Liu ZG (2020) A novel fast dimension-reducing ranked query method with high security for encrypted cloud data liu lianggui and liu zhengjin (school of information science and technology, zhejiang sci-tech university, Hangzhou 310018, china). Chinese Journal of Electronics 29:344\u2013350, https:\/\/api.semanticscholar.org\/CorpusID:216350567","key":"1288_CR3","DOI":"10.1049\/cje.2020.01.013"},{"issue":"1","key":"1288_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2767005","volume":"48","author":"CA Ardagna","year":"2015","unstructured":"Ardagna, C. A., Asal, R., Damiani, E., & Vu, Q. H. (2015). From security to assurance in the cloud: A survey. ACM Computing Surveys (CSUR), 48(1), 1\u201350.","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"2","key":"1288_CR5","doi-asserted-by":"publisher","first-page":"297","DOI":"10.23919\/CJE.2014.10851880","volume":"23","author":"Z Ren","year":"2014","unstructured":"Ren, Z., Wang, L., Wu, Q., & Deng, R. (2014). Data dynamics enabled privacy-preserving public batch auditing in cloud storage. Chinese Journal of Electronics, 23(2), 297\u2013301. https:\/\/doi.org\/10.23919\/CJE.2014.10851880","journal-title":"Chinese Journal of Electronics"},{"issue":"3","key":"1288_CR6","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.giq.2010.01.002","volume":"27","author":"S Paquette","year":"2010","unstructured":"Paquette, S., Jaeger, P. T., & Wilson, S. C. (2010). Identifying the security risks associated with governmental use of cloud computing. Government Information Quarterly, 27(3), 245\u2013253.","journal-title":"Government Information Quarterly"},{"issue":"6","key":"1288_CR7","first-page":"5042","volume":"67","author":"Z Li","year":"2018","unstructured":"Li, Z., Pei, Q., Markwood, I., Liu, Y., Pan, M., & Li, H. (2018). Location privacy violation via gps-agnostic smart phone car tracking. IEEE Transactions on Vehicular Technology, 67(6), 5042\u20135053.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"201","key":"1288_CR8","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/s11432-021-3393-x","volume":"65","author":"S Lu","year":"2022","unstructured":"Lu, S., Zheng, J., Cao, Z., Wang, Y., & Gu, C. (2022). A survey on cryptographic techniques for protecting big data security: Present and forthcoming. Science China Information Sciences, 65(201), 301. https:\/\/doi.org\/10.1007\/s11432-021-3393-x","journal-title":"Science China Information Sciences"},{"key":"1288_CR9","first-page":"763","volume":"6","author":"MF Mokbel","year":"2006","unstructured":"Mokbel, M. F., Chow, C. Y., & Aref, W. G. (2006). The new casper: Query processing for location services without compromising privacy. VLDB, 6, 763\u2013774.","journal-title":"VLDB"},{"issue":"2","key":"1288_CR10","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/TSUSC.2017.2733018","volume":"4","author":"F Fei","year":"2017","unstructured":"Fei, F., Li, S., Dai, H., Hu, C., Dou, W., & Ni, Q. (2017). A k-anonymity based schema for location privacy preservation. IEEE Transactions on Sustainable Computing, 4(2), 156\u2013167.","journal-title":"IEEE Transactions on Sustainable Computing"},{"doi-asserted-by":"crossref","unstructured":"Wang L, Yang D, Han X, Wang T, Zhang D, & Ma X (2017) Location privacy-preserving task allocation for mobile crowdsensing with differential geo-obfuscation. In: Proceedings of the 26th International Conference on World Wide Web, pp 627\u2013636","key":"1288_CR11","DOI":"10.1145\/3038912.3052696"},{"key":"1288_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3162869","author":"S Lu","year":"2022","unstructured":"Lu, S., Li, Z., Miao, X., Han, Q., & Zheng, J. (2022). Piws: Private intersection weighted sum protocol for privacy-preserving score-based voting with perfect ballot secrecy. IEEE Transactions on Computational Social Systems. https:\/\/doi.org\/10.1109\/TCSS.2022.3162869","journal-title":"IEEE Transactions on Computational Social Systems"},{"doi-asserted-by":"crossref","unstructured":"Zhou Z, Wang N, Liu J, Fu J, & Deng L (2024) The blockchain-based privacy-preserving searchable attribute-based encryption scheme for federated learning model in iomt. Concurr Comput Pract Exp 36, https:\/\/api.semanticscholar.org\/CorpusID:271982303","key":"1288_CR13","DOI":"10.1002\/cpe.8257"},{"issue":"1","key":"1288_CR14","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1109\/TSC.2022.3144430","volume":"16","author":"S Li","year":"2023","unstructured":"Li, S., Xu, C., Zhang, Y., Du, Y., & Chen, K. (2023). Blockchain-based transparent integrity auditing and encrypted deduplication for cloud storage. IEEE Transactions on Services Computing, 16(1), 134\u2013146. https:\/\/doi.org\/10.1109\/TSC.2022.3144430","journal-title":"IEEE Transactions on Services Computing"},{"doi-asserted-by":"crossref","unstructured":"Boneh D, & Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings 4, Springer, pp 535\u2013554","key":"1288_CR15","DOI":"10.1007\/978-3-540-70936-7_29"},{"issue":"5","key":"1288_CR16","doi-asserted-by":"publisher","first-page":"5244","DOI":"10.1109\/TVT.2020.2981633","volume":"69","author":"Z Wu","year":"2020","unstructured":"Wu, Z., Wang, R., Li, Q., Lian, X., Xu, G., Chen, E., & Liu, X. (2020). A location privacy-preserving system based on query range cover-up or location-based services. IEEE Transactions on Vehicular Technology, 69(5), 5244\u20135254.","journal-title":"IEEE Transactions on Vehicular Technology"},{"unstructured":"Lu Y, et\u00a0al (2012) Privacy-preserving logarithmic-time search on encrypted data in cloud. In: NDSS","key":"1288_CR17"},{"doi-asserted-by":"crossref","unstructured":"Wang B, Hou Y, Li M, Wang H, Li H, & Li F (2015) Tree-based multi-dimensional range search on encrypted data with enhanced privacy. In: International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I 10, Springer, pp 374\u2013394","key":"1288_CR18","DOI":"10.1007\/978-3-319-23829-6_26"},{"doi-asserted-by":"crossref","unstructured":"Damiani E, Vimercati SDC, Jajodia S, Paraboschi S, & Samarati P (2003) Balancing confidentiality and efficiency in untrusted relational dbmss. In: Proceedings of the 10th ACM conference on Computer and communications security, pp 93\u2013102","key":"1288_CR19","DOI":"10.1145\/948109.948124"},{"key":"1288_CR20","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s00778-011-0245-7","volume":"21","author":"B Hore","year":"2012","unstructured":"Hore, B., Mehrotra, S., Canim, M., & Kantarcioglu, M. (2012). Secure multidimensional range queries over outsourced data. The VLDB Journal, 21, 333\u2013358.","journal-title":"The VLDB Journal"},{"unstructured":"Lu Y, et\u00a0al (2012) Privacy-preserving logarithmic-time search on encrypted data in cloud. In: NDSS","key":"1288_CR21"},{"issue":"4","key":"1288_CR22","doi-asserted-by":"publisher","first-page":"2305","DOI":"10.1109\/TNET.2015.2457493","volume":"24","author":"R Li","year":"2015","unstructured":"Li, R., Liu, A. X., Wang, A. L., & Bruhadeshwar, B. (2015). Fast and scalable range query processing with strong privacy protection for cloud computing. IEEE\/ACM Transactions on Networking, 24(4), 2305\u20132318.","journal-title":"IEEE\/ACM Transactions on Networking"},{"doi-asserted-by":"crossref","unstructured":"Chi J, Hong C, Zhang M, & Zhang Z (2017) Fast multi-dimensional range queries on encrypted cloud databases. In: Database Systems for Advanced Applications: 22nd International Conference, DASFAA 2017, Suzhou, China, March 27-30, 2017, Proceedings, Part I 22, Springer, pp 559\u2013575","key":"1288_CR23","DOI":"10.1007\/978-3-319-55753-3_35"},{"doi-asserted-by":"crossref","unstructured":"Popa RA, & Redfield CM, Zeldovich N, Balakrishnan H (2011) Cryptdb: Protecting confidentiality with encrypted query processing. In: Proceedings of the twenty-third ACM symposium on operating systems principles, pp 85\u2013100","key":"1288_CR24","DOI":"10.1145\/2043556.2043566"},{"issue":"6","key":"1288_CR25","first-page":"1702","volume":"8","author":"S Zhang","year":"2021","unstructured":"Zhang, S., Ray, S., & Lu, R. (2021). Sorel: Efficient and secure ore-based range query over outsourced data. IEEE Transactions on Big Data, 8(6), 1702\u20131715.","journal-title":"IEEE Transactions on Big Data"},{"doi-asserted-by":"crossref","unstructured":"Papadopoulos D, Papadopoulos S, & Triandopoulos N (2014) Taking authenticated range queries to arbitrary dimensions. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp 819\u2013830","key":"1288_CR26","DOI":"10.1145\/2660267.2660373"},{"doi-asserted-by":"crossref","unstructured":"Li Y, Lai J, Wang C, Zhang J, & Xiong J (2017) Verifiable range query processing for cloud computing. In: Information Security Practice and Experience: 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13\u201315, 2017, Proceedings 13, Springer, pp 333\u2013349","key":"1288_CR27","DOI":"10.1007\/978-3-319-72359-4_19"},{"doi-asserted-by":"crossref","unstructured":"Wu S, Li Q, Li G, Yuan D, Yuan X, & Wang C (2019) Servedb: Secure, verifiable, and efficient range queries on outsourced database. In: 2019 IEEE 35th International Conference on Data Engineering (ICDE), IEEE, pp 626\u2013637","key":"1288_CR28","DOI":"10.1109\/ICDE.2019.00062"},{"doi-asserted-by":"crossref","unstructured":"Liu Q, Peng Y, Xu Q, Jiang H, Wu J, Wang T, Peng T, Wang G, & Zhang S (2023) Mars: Enabling verifiable range-aggregate queries in multi-source environments. IEEE Transactions on Dependable and Secure Computing","key":"1288_CR29","DOI":"10.1109\/TDSC.2023.3299337"},{"doi-asserted-by":"crossref","unstructured":"Merkle RC (1987) A digital signature based on a conventional encryption function. In: Conference on the theory and application of cryptographic techniques, Springer, pp 369\u2013378","key":"1288_CR30","DOI":"10.1007\/3-540-48184-2_32"},{"doi-asserted-by":"crossref","unstructured":"Chenette N, Lewi K, Weis SA, & Wu DJ (2016) Practical order-revealing encryption with limited leakage. In: Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers 23, Springer, pp 474\u2013493","key":"1288_CR31","DOI":"10.1007\/978-3-662-52993-5_24"},{"issue":"12","key":"1288_CR32","doi-asserted-by":"publisher","first-page":"8148","DOI":"10.1109\/TKDE.2024.3419930","volume":"36","author":"N Cui","year":"2024","unstructured":"Cui, N., Wang, D., Zhu, H., Li, J., Xu, J., & Yang, X. (2024). Enabling verifiable and secure range query in multi-user setting under cloud environments. IEEE Transactions on Knowledge and Data Engineering, 36(12), 8148\u20138163. https:\/\/doi.org\/10.1109\/TKDE.2024.3419930","journal-title":"IEEE Transactions on Knowledge and Data Engineering"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-025-01288-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-025-01288-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-025-01288-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T06:31:00Z","timestamp":1750055460000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-025-01288-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,24]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1288"],"URL":"https:\/\/doi.org\/10.1007\/s11235-025-01288-w","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"type":"print","value":"1018-4864"},{"type":"electronic","value":"1572-9451"}],"subject":[],"published":{"date-parts":[[2025,4,24]]},"assertion":[{"value":"24 March 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"56"}}