{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:43:49Z","timestamp":1740123829474,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T00:00:00Z","timestamp":1650067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T00:00:00Z","timestamp":1650067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["61662046"],"award-info":[{"award-number":["61662046"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s11276-022-02969-z","type":"journal-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:02:41Z","timestamp":1650081761000},"page":"2105-2114","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cross-domain encryption scheme with equality test for wireless body area networks"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2231-3775","authenticated-orcid":false,"given":"Ming","family":"Luo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yusi","family":"Pei","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ai","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,4,16]]},"reference":[{"issue":"3","key":"2969_CR1","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1007\/s11276-018-1694-3","volume":"25","author":"R Punj","year":"2019","unstructured":"Punj, R., & Kumar, R. (2019). Technological aspects of WBANs for health monitoring: A comprehensive review. Wireless Networks, 25(3), 1125\u20131157. https:\/\/doi.org\/10.1007\/s11276-018-1694-3.","journal-title":"Wireless Networks"},{"key":"2969_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102211","author":"MS Hajar","year":"2021","unstructured":"Hajar, M. S., Al-Kadri, M. O., & Kalutarage, H. K. (2021). A survey on wireless body area networks: Architecture, security challenges and research opportunities. Computers & Security. https:\/\/doi.org\/10.1016\/j.cose.2021.102211.","journal-title":"Computers & Security"},{"issue":"2","key":"2969_CR3","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1007\/s11276-020-02462-5","volume":"27","author":"H Abdalla","year":"2021","unstructured":"Abdalla, H., Xiong, H., Wahaballa, A., Ramadan, M., & Qin, Z. (2021). Equality test with an anonymous authorization in cloud computing. Wireless Networks, 27(2), 1063\u20131076. https:\/\/doi.org\/10.1007\/s11276-020-02462-5.","journal-title":"Wireless Networks"},{"key":"2969_CR4","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3059856","author":"X Yang","year":"2021","unstructured":"Yang, X., Yi, X., Nepal, S., Khalil, I., Huang, X., & Shen, J. (2021). Efficient and anonymous authentication for healthcare service with cloud based WBANs. IEEE Transactions on Services Computing. https:\/\/doi.org\/10.1109\/TSC.2021.3059856.","journal-title":"IEEE Transactions on Services Computing"},{"issue":"1","key":"2969_CR5","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s11036-018-1195-8","volume":"25","author":"Z Fu","year":"2020","unstructured":"Fu, Z., Liu, Y., Sun, X., Liu, Y., & Tian, Z. (2020). Confusing-keyword based secure Search over encrypted cloud data. Mobile Networks and Applications, 25(1), 125\u2013132. https:\/\/doi.org\/10.1007\/s11036-018-1195-8.","journal-title":"Mobile Networks and Applications"},{"issue":"2","key":"2969_CR6","doi-asserted-by":"publisher","first-page":"2221","DOI":"10.1007\/s12652-020-02321-3","volume":"12","author":"N Eltayieb","year":"2021","unstructured":"Eltayieb, N., Elhabob, R., Hassan, A., & Li, F. (2021). Secure mobile health system supporting search function and decryption verification. Journal of Ambient Intelligence and Humanized Computing, 12(2), 2221\u20132231. https:\/\/doi.org\/10.1007\/s12652-020-02321-3.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"2969_CR7","doi-asserted-by":"publisher","unstructured":"Boneh, D., Di\u00a0Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In International conference on the theory and applications of cryptographic techniques (pp. 506\u2013522). Berlin, Heidelberg: Springer. https:\/\/doi.org\/10.1007\/978-3-540-24676-3_30.","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"2969_CR8","doi-asserted-by":"publisher","unstructured":"Yang, G., Tan, C.\u00a0H., Huang, Q., & Wong, D.\u00a0S. (2010). Probabilistic public key encryption with equality test. In Cryptographers\u2019Track at the RSA Conference (pp. 119\u2013131). Berlin, Heidelberg: Springer. https:\/\/doi.org\/10.1007\/978-3-642-11925-5_9.","DOI":"10.1007\/978-3-642-11925-5_9"},{"issue":"1","key":"2969_CR9","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s11036-019-01215-9","volume":"25","author":"M Ramadan","year":"2020","unstructured":"Ramadan, M., Liao, Y., Li, F., Zhou, S., & Abdalla, H. (2020). IBEET-RSA: Identity-based encryption with equality test over RSA for wireless body area networks. Mobile Networks and Applications, 25(1), 223\u2013233. https:\/\/doi.org\/10.1007\/s11036-019-01215-9.","journal-title":"Mobile Networks and Applications"},{"key":"2969_CR10","doi-asserted-by":"publisher","first-page":"101776","DOI":"10.1016\/j.sysarc.2020.101776","volume":"109","author":"A Hassan","year":"2020","unstructured":"Hassan, A., Wang, Y., Elhabob, R., Eltayieb, N., & Li, F. (2020). An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments. Journal of Systems Architecture, 109, 101776. https:\/\/doi.org\/10.1016\/j.sysarc.2020.101776.","journal-title":"Journal of Systems Architecture"},{"issue":"3","key":"2969_CR11","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1007\/s12652-019-01365-4","volume":"11","author":"R Elhabob","year":"2020","unstructured":"Elhabob, R., Zhao, Y., Sella, I., & Xiong, H. (2020). An efficient certificateless public key cryptography with authorized equality test in IIoT. Journal of Ambient Intelligence and Humanized Computing, 11(3), 1065\u20131083. https:\/\/doi.org\/10.1007\/s12652-019-01365-4.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"1","key":"2969_CR12","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/s11277-020-07190-9","volume":"113","author":"R Elhabob","year":"2020","unstructured":"Elhabob, R., Zhao, Y., Hassan, A., & Xiong, H. (2020). PKE-ET-HS: Public key encryption with equality test for heterogeneous systems in IoT. Wireless Personal Communications, 113(1), 313\u2013335. https:\/\/doi.org\/10.1007\/s11277-020-07190-9.","journal-title":"Wireless Personal Communications"},{"key":"2969_CR13","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.ins.2019.12.023","volume":"516","author":"HT Lee","year":"2020","unstructured":"Lee, H. T., Ling, S., Seo, J. H., Wang, H., & Youn, T.-Y. (2020). Public key encryption with equality test in the standard model. Information Sciences, 516, 89\u2013108. https:\/\/doi.org\/10.1016\/j.ins.2019.12.023.","journal-title":"Information Sciences"},{"key":"2969_CR14","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.comcom.2021.02.006","volume":"170","author":"X-J Lin","year":"2021","unstructured":"Lin, X.-J., Sun, L., Qu, H., & Zhang, X. (2021). Public key encryption supporting equality test and flexible authorization without bilinear pairings. Computer Communications, 170, 190\u2013199. https:\/\/doi.org\/10.1016\/j.comcom.2021.02.006.","journal-title":"Computer Communications"},{"key":"2969_CR15","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.ins.2018.04.035","volume":"453","author":"X-J Lin","year":"2018","unstructured":"Lin, X.-J., Sun, L., & Qu, H. (2018). Generic construction of public key encryption, identity-based encryption and signcryption with equality test. Information Sciences, 453, 111\u2013126. https:\/\/doi.org\/10.1016\/j.ins.2018.04.035.","journal-title":"Information Sciences"},{"key":"2969_CR16","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.ins.2019.05.026","volume":"500","author":"HT Lee","year":"2019","unstructured":"Lee, H. T., Ling, S., Seo, J. H., & Wang, H. (2019). Public key encryption with equality test from generic assumptions in the random oracle model. Information Sciences, 500, 15\u201333. https:\/\/doi.org\/10.1016\/j.ins.2019.05.026.","journal-title":"Information Sciences"},{"issue":"4","key":"2969_CR17","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1093\/comjnl\/bxaa120","volume":"64","author":"Y Ling","year":"2021","unstructured":"Ling, Y., Ma, S., Huang, Q., Li, X., Zhong, Y., & Ling, Y. (2021). Efficient group ID-based encryption with equality test against insider attack. The Computer Journal, 64(4), 661\u2013674. https:\/\/doi.org\/10.1093\/comjnl\/bxaa120.","journal-title":"The Computer Journal"},{"key":"2969_CR18","doi-asserted-by":"publisher","first-page":"25409","DOI":"10.1109\/ACCESS.2019.2899680","volume":"7","author":"H Li","year":"2019","unstructured":"Li, H., Huang, Q., Ma, S., Shen, J., & Susilo, W. (2019). Authorized equality test on identity-based ciphertexts for secret data sharing via cloud storage. IEEE Access, 7, 25409\u201325421. https:\/\/doi.org\/10.1109\/ACCESS.2019.2899680.","journal-title":"IEEE Access"},{"key":"2969_CR19","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.ins.2018.06.025","volume":"462","author":"H Qu","year":"2018","unstructured":"Qu, H., Yan, Z., Lin, X.-J., Zhang, Q., & Sun, L. (2018). Certificateless public key encryption with equality test. Information Sciences, 462, 76\u201392. https:\/\/doi.org\/10.1016\/j.ins.2018.06.025.","journal-title":"Information Sciences"},{"key":"2969_CR20","unstructured":"Elhabob, R., Sella, I., Zhao, Y., Zhu, G., & Xiong, H. (2018). A heterogeneous systems public key encryption with equality test in smart city. In Proceedings of the 18th international conference on electronic business. ICEB, Guilin."},{"key":"2969_CR21","doi-asserted-by":"publisher","unstructured":"Hassan, A., Elhabob, R., Ibrahim, U., & Wang, Y. (2020). Efficient public key cryptography scheme with equality test for heterogeneous systems in IIoT. In International conference on security, privacy and anonymity in computation, communication and storage, (pp. 108-121). Cham: Springer. https:\/\/doi.org\/10.1007\/978-3-030-68884-4_9.","DOI":"10.1007\/978-3-030-68884-4_9"},{"key":"2969_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2019.08.026","volume":"507","author":"J Sun","year":"2020","unstructured":"Sun, J., Xiong, H., Zhang, H., & Peng, L. (2020). Mobile access and flexible search over encrypted cloud data in heterogeneous systems. Information Sciences, 507, 1\u201315. https:\/\/doi.org\/10.1016\/j.ins.2019.08.026.","journal-title":"Information Sciences"},{"key":"2969_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3008955","author":"H Xiong","year":"2020","unstructured":"Xiong, H., Zhao, Y., Hou, Y., Huang, X., Jin, C., Wang, L., & Kumari, S. (2020). Heterogeneous signcryption with equality test for IIoT environment. IEEE Internet of Things Journal. https:\/\/doi.org\/10.1109\/JIOT.2020.3008955.","journal-title":"IEEE Internet of Things Journal"},{"issue":"7","key":"2969_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-020-01598-3","volume":"44","author":"M Luo","year":"2020","unstructured":"Luo, M., Hu, X., & Luo, Y. (2020). An efficient cross-domain data transmission scheme for wireless body area networks. Journal of Medical Systems, 44(7), 1\u201313. https:\/\/doi.org\/10.1007\/s10916-020-01598-3.","journal-title":"Journal of Medical Systems"},{"key":"2969_CR25","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.dam.2017.02.019","volume":"241","author":"X-J Lin","year":"2018","unstructured":"Lin, X.-J., Sun, L., & Qu, H. (2018). An efficient RSA-based certificateless public key encryption scheme. Discrete Applied Mathematics, 241, 39\u201347. https:\/\/doi.org\/10.1016\/j.dam.2017.02.019.","journal-title":"Discrete Applied Mathematics"},{"key":"2969_CR26","doi-asserted-by":"publisher","unstructured":"Ramanjaneyareddy, N., Reddy, P.C., & Padmavathamma, M. (2016). Study the impact of Carmichael function on RSA. In International conference on smart trends for information technology and computer communications, (pp. 119-131). Singapore: Springer. https:\/\/doi.org\/10.1007\/978-981-10-3433-6_90.","DOI":"10.1007\/978-981-10-3433-6_90"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-022-02969-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-022-02969-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-022-02969-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,4]],"date-time":"2022-06-04T06:17:09Z","timestamp":1654323429000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-022-02969-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,16]]},"references-count":26,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["2969"],"URL":"https:\/\/doi.org\/10.1007\/s11276-022-02969-z","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2022,4,16]]},"assertion":[{"value":"1 April 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}