{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:43:52Z","timestamp":1740123832112,"version":"3.37.3"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T00:00:00Z","timestamp":1656979200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T00:00:00Z","timestamp":1656979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072240"],"award-info":[{"award-number":["62072240"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2020YFB1804604"],"award-info":[{"award-number":["2020YFB1804604"]}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20210330"],"award-info":[{"award-number":["BK20210330"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s11276-022-03033-6","type":"journal-article","created":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T11:09:06Z","timestamp":1657019346000},"page":"4477-4494","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Conjunctive searchable encryption with efficient authorization for group sharing"],"prefix":"10.1007","volume":"30","author":[{"given":"Lin","family":"Mei","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9380-5913","authenticated-orcid":false,"given":"Chungen","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,5]]},"reference":[{"key":"3033_CR1","unstructured":"Dropbox. Retrieved March 30, 2022, from https:\/\/en.wikipedia.org\/wiki\/Dropbox."},{"key":"3033_CR2","doi-asserted-by":"crossref","unstructured":"Golle, P., Staddon, J., & Waters, B.\u00a0R. (2004). Secure conjunctive keyword search over encrypted data. In Proc. of ACNS (pp. 31\u201345).","DOI":"10.1007\/978-3-540-24852-1_3"},{"key":"3033_CR3","doi-asserted-by":"crossref","unstructured":"Park, D.\u00a0J., Kim, K., & Lee, P.\u00a0J. (2004). Public key encryption with conjunctive field keyword search. In Proc. of WISA ((pp. 73\u201386).","DOI":"10.1007\/978-3-540-31815-6_7"},{"key":"3033_CR4","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1016\/j.future.2019.02.067","volume":"97","author":"Q Xu","year":"2019","unstructured":"Xu, Q., Tan, C., Zhu, W., Xiao, Y., Fan, Z., & Cheng, F. (2019). Decentralized attribute-based conjunctive keyword search scheme with online\/offline encryption and outsource decryption for cloud computing. Future Generation Computer Systems, 97, 306\u2013326.","journal-title":"Future Generation Computer Systems"},{"issue":"11","key":"3033_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3531","volume":"30","author":"Y Mao","year":"2019","unstructured":"Mao, Y., Fu, X., Guo, C., & Wu, G. (2019). Public key encryption with conjunctive keyword search secure against keyword guessing attack from lattices. Transactions on Emerging Telecommunications Technologies, 30(11), e3531.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"3033_CR6","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.jnca.2018.12.003","volume":"128","author":"L Xu","year":"2019","unstructured":"Xu, L., Li, J., Chen, X., Li, W., Tang, S., & Wu, H. (2019). Tc-pedcks: Towards time controlled public key encryption with delegatable conjunctive keyword search for internet of things. Journal Network and Computer Applications, 128, 11\u201320.","journal-title":"Journal Network and Computer Applications"},{"key":"3033_CR7","doi-asserted-by":"crossref","unstructured":"Kaushik, K., Varadharajan, V., & Nallusamy, R. (2013). Multi-user attribute based searchable encryption. In Proc. of MDM (pp. 200\u2013205).","DOI":"10.1109\/MDM.2013.94"},{"issue":"9","key":"3033_CR8","doi-asserted-by":"publisher","first-page":"1981","DOI":"10.1109\/TIFS.2015.2442215","volume":"10","author":"K Liang","year":"2015","unstructured":"Liang, K., & Susilo, W. (2015). Searchable attribute-based mechanism with efficient data sharing for secure cloud storage. IEEE Transactions on Information Forensics and Security, 10(9), 1981\u20131992.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"3033_CR9","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1109\/TPDS.2014.2355202","volume":"27","author":"W Sun","year":"2016","unstructured":"Sun, W., Yu, S., Lou, W., Hou, Y. T., & Li, H. (2016). Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Transactions on Parallel and Distributed Systems, 27(4), 1187\u20131198.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"3033_CR10","doi-asserted-by":"crossref","unstructured":"Green,M.\u00a0D., Miers, I. (2015). Forward secure asynchronous messaging from puncturable encryption. In Proc. of S &P (pp. 305\u2013320).","DOI":"10.1109\/SP.2015.26"},{"key":"3033_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2017.03.038","volume":"403","author":"Q Huang","year":"2017","unstructured":"Huang, Q., & Li, H. (2017). An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Information Sciences, 403, 1\u201314.","journal-title":"Information Sciences"},{"key":"3033_CR12","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/j.ins.2018.12.004","volume":"479","author":"Y Lu","year":"2019","unstructured":"Lu, Y., Wang, G., & Li, J. (2019). Keyword guessing attacks on a public key encryption with keyword search scheme without random oracle and its improvement. Information Sciences, 479, 270\u2013276.","journal-title":"Information Sciences"},{"key":"3033_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.2989296","author":"Y Miao","year":"2020","unstructured":"Miao, Y., Tong, Q., Deng, R., Choo, K.-K.R., Liu, X., & Li, H. (2020). Verifiable searchable encryption framework against insider keyword-guessing attack in cloud storage. IEEE Transactions on Cloud Computing. https:\/\/doi.org\/10.1109\/TCC.2020.2989296.","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"4","key":"3033_CR14","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1109\/TIFS.2015.2510822","volume":"11","author":"R Chen","year":"2016","unstructured":"Chen, R., Mu, Y., Yang, G., Guo, F., & Wang, X. (2016). Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Transactions on Information Forensics and Security, 11(4), 789\u2013798.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"3033_CR15","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1109\/TCC.2019.2945714","volume":"10","author":"B Chen","year":"2022","unstructured":"Chen, B., Wu, L., Zeadally, S., & He, D. (2022). Dual-server public-key authenticated encryption with keyword search. IEEE Transactions on Cloud Computing, 10(1), 322\u2013333.","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"9\u201310","key":"3033_CR16","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/s12243-017-0571-x","volume":"72","author":"Z Li","year":"2017","unstructured":"Li, Z., Zhao, M., Jiang, H., & Xu, Q. (2017). Multi-user searchable encryption with a designated server. Annales des T\u00e9l\u00e9communications, 72(9\u201310), 617\u2013629.","journal-title":"Annales des T\u00e9l\u00e9communications"},{"key":"3033_CR17","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2959306","author":"Y Chen","year":"2019","unstructured":"Chen, Y., Li, W., Gao, F., Wen, Q., Zhang, H., & Wang, H. (2019). Practical attribute-based multi-keyword ranked search scheme in cloud computing. IEEE Transactions on Services Computing. https:\/\/doi.org\/10.1109\/TSC.2019.2959306.","journal-title":"IEEE Transactions on Services Computing"},{"key":"3033_CR18","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.future.2016.05.017","volume":"72","author":"Z Deng","year":"2017","unstructured":"Deng, Z., Li, K., Li, K., & Zhou, J. (2017). A multi-user searchable encryption scheme with keyword authorization in a cloud storage. Future Generation Computer Systems, 72, 208\u2013218.","journal-title":"Future Generation Computer Systems"},{"key":"3033_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2021.103603","volume":"81","author":"VB Chenam","year":"2022","unstructured":"Chenam, V. B., & Ali, S. T. (2022). A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA. Computer Standards & Interfaces, 81, 103603.","journal-title":"Computer Standards & Interfaces"},{"key":"3033_CR20","doi-asserted-by":"crossref","unstructured":"Wang, J., Chen, X., Sun, S., Liu, J.\u00a0K., Au, M.\u00a0H., & Zhan, Z. (2018). Towards efficient verifiable conjunctive keyword search for large encrypted database. In Proc. of ESORICS (pp. 83\u2013100).","DOI":"10.1007\/978-3-319-98989-1_5"},{"issue":"6","key":"3033_CR21","doi-asserted-by":"publisher","first-page":"1877","DOI":"10.1109\/TSC.2019.2903502","volume":"14","author":"P Xu","year":"2021","unstructured":"Xu, P., Tang, S., Xu, P., Wu, Q., Hu, H., & Susilo, W. (2021). Practical multi-keyword and Boolean search over encrypted e-mail in cloud server. IEEE Transactions on Services Computing, 14(6), 1877\u20131889.","journal-title":"IEEE Transactions on Services Computing"},{"key":"3033_CR22","doi-asserted-by":"crossref","unstructured":"Xu, L., Yuan, X., Wang, C., Wang, Q., Xu, C. (2019). Hardening database padding for searchable encryption. In Proc. of INFOCOM (pp. 2503\u20132511).","DOI":"10.1109\/INFOCOM.2019.8737588"},{"key":"3033_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-020-02410-3","author":"L Xu","year":"2020","unstructured":"Xu, L., Sun, Z., Li, W., & Yan, H. (2020). Delegatable searchable encryption with specified keywords for EHR systems. Wireless Networks. https:\/\/doi.org\/10.1007\/s11276-020-02410-3.","journal-title":"Wireless Networks"},{"key":"3033_CR24","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3111208","author":"L Xu","year":"2021","unstructured":"Xu, L., Yuan, X., Zhou, Z., Wang, C., & Xu, C. (2021). Towards efficient cryptographic data validation service in edge computing. IEEE Transactions on Services Computing. https:\/\/doi.org\/10.1109\/TSC.2021.3111208.","journal-title":"IEEE Transactions on Services Computing"},{"key":"3033_CR25","doi-asserted-by":"publisher","first-page":"5310","DOI":"10.1109\/TIFS.2021.3128823","volume":"16","author":"L Xu","year":"2021","unstructured":"Xu, L., Duan, H., Zhou, A., Yuan, X., & Wang, C. (2021). Interpreting and mitigating leakage-abuse attacks in searchable symmetric encryption. IEEE Transactions on Information Forensics and Security, 16, 5310\u20135325.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"3033_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102433","volume":"51","author":"P Wang","year":"2020","unstructured":"Wang, P., Xiang, T., Li, X., & Xiang, H. (2020). Public key encryption with conjunctive keyword search on lattice. Journal of Information Security and Applications, 51, 102433.","journal-title":"Journal of Information Security and Applications"},{"key":"3033_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2021.103606","volume":"82","author":"W Li","year":"2022","unstructured":"Li, W., Xu, L., Wen, Y., & Zhang, F. (2022). Conjunctive multi-key searchable encryption with attribute-based access control for EHR systems. Computer Standards & Interfaces, 82, 103606.","journal-title":"Computer Standards & Interfaces"},{"key":"3033_CR28","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J.\u00a0A., Kamara, S., & Ostrovsky, R. (2006). Searchable symmetric encryption: Improved definitions and efficient constructions. In Proc. of CCS (pp. 79\u201388).","DOI":"10.1145\/1180405.1180417"},{"key":"3033_CR29","doi-asserted-by":"crossref","unstructured":"Dong, C., Russello, G., & Dulay, N. (2008). Shared and searchable encrypted data for untrusted servers. In Proc. of DBSec (pp. 127\u2013143).","DOI":"10.1007\/978-3-540-70567-3_10"},{"issue":"1","key":"3033_CR30","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2942","volume":"30","author":"J Li","year":"2017","unstructured":"Li, J., Shi, Y., & Zhang, Y. (2017). Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage. International Journal of Communication Systems, 30(1), e2942.","journal-title":"International Journal of Communication Systems"},{"issue":"11","key":"3033_CR31","doi-asserted-by":"publisher","first-page":"1943","DOI":"10.1109\/TIFS.2014.2359389","volume":"9","author":"Q Tang","year":"2014","unstructured":"Tang, Q. (2014). Nothing is for free: Security in searching shared and encrypted data. IEEE Transactions on Information Forensics and Security, 9(11), 1943\u20131952.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"3033_CR32","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1016\/j.ins.2019.05.056","volume":"527","author":"L Xu","year":"2020","unstructured":"Xu, L., Xu, C., Liu, J. K., Zhou, Z., & Zhang, P. (2020). Building a dynamic searchable encrypted medical database for multi-client. Information Sciences, 527, 394\u2013405.","journal-title":"Information Sciences"},{"key":"3033_CR33","doi-asserted-by":"crossref","unstructured":"Bao, F., Deng, R.\u00a0H., Ding, X., & Yang, Y. (2008). Private query on encrypted data in multi-user settings. In Proc. of ISPEC (pp. 71\u201385).","DOI":"10.1007\/978-3-540-79104-1_6"},{"key":"3033_CR34","doi-asserted-by":"crossref","unstructured":"Yang, Y. (2011). Towards multi-user private keyword search for cloud computing. In Proc. of IEEE CLOUD (pp. 758\u2013759).","DOI":"10.1109\/CloudCom.2011.43"},{"key":"3033_CR35","doi-asserted-by":"crossref","unstructured":"Byun, J.\u00a0W., Rhee, H.\u00a0S., Park, H., & Lee, D.\u00a0H. (2006). Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In Proc. of SDM (pp. 75\u201383).","DOI":"10.1007\/11844662_6"},{"issue":"12","key":"3033_CR36","doi-asserted-by":"publisher","first-page":"2581","DOI":"10.1080\/00207160.2013.778985","volume":"90","author":"W Yau","year":"2013","unstructured":"Yau, W., Phan, R. C., Heng, S., & Goi, B. (2013). Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. International Journal of Computer Mathematics, 90(12), 2581\u20132587.","journal-title":"International Journal of Computer Mathematics"},{"key":"3033_CR37","doi-asserted-by":"crossref","unstructured":"Rhee, H.\u00a0S., Park, J.\u00a0H., Susilo, W., & Lee, D.\u00a0H. (2009). Improved searchable public key encryption with designated tester. In Proc. of ASIACCS (pp. 376\u2013379).","DOI":"10.1145\/1533057.1533108"},{"issue":"11","key":"3033_CR38","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1109\/TC.2012.215","volume":"62","author":"P Xu","year":"2013","unstructured":"Xu, P., Jin, H., Wu, Q., & Wang, W. (2013). Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack. IEEE Transactions on Computers, 62(11), 2266\u20132277.","journal-title":"IEEE Transactions on Computers"},{"key":"3033_CR39","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.ins.2013.03.008","volume":"238","author":"L Fang","year":"2013","unstructured":"Fang, L., Susilo, W., Ge, C., & Wang, J. (2013). Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Information Sciences, 238, 221\u2013241.","journal-title":"Information Sciences"},{"issue":"12","key":"3033_CR40","doi-asserted-by":"publisher","first-page":"2833","DOI":"10.1109\/TIFS.2016.2599293","volume":"11","author":"R Chen","year":"2016","unstructured":"Chen, R., Mu, Y., Yang, G., Guo, F., Huang, X., Wang, X., & Wang, Y. (2016). Server-aided public key encryption with keyword search. IEEE Transactions on Information Forensics and Security, 11(12), 2833\u20132842.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"23","key":"3033_CR41","doi-asserted-by":"publisher","first-page":"7685","DOI":"10.1007\/s00500-018-3224-8","volume":"22","author":"L Wu","year":"2018","unstructured":"Wu, L., Chen, B., Zeadally, S., & He, D. (2018). An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage. Soft Computing, 22(23), 7685\u20137696.","journal-title":"Soft Computing"},{"key":"3033_CR42","doi-asserted-by":"crossref","unstructured":"Bost, R., Minaud, B., & Ohrimenko, O. (2017). Forward and backward private searchable encryption from constrained cryptographic primitives. In Proc. of ACM CCS (pp. 1465\u20131482).","DOI":"10.1145\/3133956.3133980"},{"key":"3033_CR43","doi-asserted-by":"crossref","unstructured":"Sun, S., Yuan, X., Liu, J.\u00a0K., Steinfeld, R., Sakzad, A., Vo, V., & Nepal, S. (2018). Practical backward-secure searchable encryption from symmetric puncturable encryption. In Proc. of CCS (pp. 763\u2013780).","DOI":"10.1145\/3243734.3243782"},{"key":"3033_CR44","doi-asserted-by":"crossref","unstructured":"Sun, S., Steinfeld, R., Lai, S., Yuan, X., Sakzad, A., Liu, J.\u00a0K., Nepal, S., Gu, D. (2021). Practical non-interactive searchable encryption with forward and backward privacy. In Proc. of NDSS.","DOI":"10.14722\/ndss.2021.24162"},{"key":"3033_CR45","doi-asserted-by":"crossref","unstructured":"Wei, J., Chen, X., Wang, J., Hu, X., & Ma, J. (2019). Forward-secure puncturable identity-based encryption for securing cloud emails. In Proc. of ESORICS (vol. 11736, pp. 134\u2013150).","DOI":"10.1007\/978-3-030-29962-0_7"},{"key":"3033_CR46","doi-asserted-by":"crossref","unstructured":"G\u00fcnther, F., Hale, B., Jager, T., & Lauer, S. (2017). 0-RTT key exchange with full forward secrecy. In Proc. of EUROCRYPT (vol. 10212, pp. 519\u2013548).","DOI":"10.1007\/978-3-319-56617-7_18"},{"key":"3033_CR47","doi-asserted-by":"crossref","unstructured":"Derler, D., Jager, T., Slamanig, D., & Striecks, C. (2018). Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange. In Proc. of EUROCRYPT (vol. 10822, pp. 425\u2013455).","DOI":"10.1007\/978-3-319-78372-7_14"},{"key":"3033_CR48","doi-asserted-by":"crossref","unstructured":"Mei, L., Xu, C., Li, Q. (2021). Puncturable search: Enabling authorized search in cross-data federation. In Proc. of QShine (vol. 402, pp. 303\u2013322).","DOI":"10.1007\/978-3-030-91424-0_18"},{"key":"3033_CR49","doi-asserted-by":"crossref","unstructured":"Boneh,D., Franklin, M.\u00a0K. (2001). Identity-based encryption from the Weil pairing. In Proc. of CRYPTO (pp. 213\u2013229).","DOI":"10.1007\/3-540-44647-8_13"},{"key":"3033_CR50","doi-asserted-by":"crossref","unstructured":"Waters, B. (2005). Efficient identity-based encryption without random oracles. In Proc. of EUROCRYPT (pp. 114\u2013127).","DOI":"10.1007\/11426639_7"},{"issue":"5","key":"3033_CR51","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1016\/j.jss.2009.11.726","volume":"83","author":"HS Rhee","year":"2010","unstructured":"Rhee, H. S., Park, J. H., Susilo, W., & Lee, D. H. (2010). Trapdoor security in a searchable public-key encryption scheme with a designated tester. Journal of Systems and Software, 83(5), 763\u2013771.","journal-title":"Journal of Systems and Software"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-022-03033-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-022-03033-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-022-03033-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T15:59:42Z","timestamp":1720022382000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-022-03033-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,5]]},"references-count":51,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["3033"],"URL":"https:\/\/doi.org\/10.1007\/s11276-022-03033-6","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2022,7,5]]},"assertion":[{"value":"29 May 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}