{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T08:22:46Z","timestamp":1768551766670,"version":"3.49.0"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,9,6]],"date-time":"2022-09-06T00:00:00Z","timestamp":1662422400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,6]],"date-time":"2022-09-06T00:00:00Z","timestamp":1662422400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072240"],"award-info":[{"award-number":["62072240"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the National Key Research and Development Program of China","award":["2020YFB1804604"],"award-info":[{"award-number":["2020YFB1804604"]}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20210330"],"award-info":[{"award-number":["BK20210330"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s11276-022-03109-3","type":"journal-article","created":{"date-parts":[[2022,9,6]],"date-time":"2022-09-06T13:02:41Z","timestamp":1662469361000},"page":"4735-4748","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Ranked searchable encryption based on differential privacy and blockchain"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9380-5913","authenticated-orcid":false,"given":"Chungen","family":"Xu","sequence":"first","affiliation":[]},{"given":"Pan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Mei","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,6]]},"reference":[{"issue":"6","key":"3109_CR1","first-page":"2787","volume":"18","author":"C Ge","year":"2020","unstructured":"Ge, C., Susilo, W., Liu, Z., Xia, J., Szalachowski, P., & Fang, L. (2020). Secure keyword search and data sharing mechanism for cloud computing. IEEE Transactions on Dependable and Secure Computing, 18(6), 2787\u20132800.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"3109_CR2","doi-asserted-by":"crossref","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with keyword search. In Proceedings of of CRYPTO (pp. 506\u2013522). Springer.","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"3109_CR3","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2007). Public key encryption with conjunctive keyword search and its extension to a multi-user system. In Proceedings of Pairing (pp. 2\u201322). Springer."},{"key":"3109_CR4","doi-asserted-by":"crossref","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with conjunctive field keyword search. In Proceedings of WISA (pp. 73\u201386). Springer.","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"3109_CR5","first-page":"1","volume":"1","author":"Lei Xu","year":"2021","unstructured":"Xu, Lei, Yuan, Xingliang, Zhou, Zhengxiang, Wang, Cong, & Xu, Chungen. (2021). Towards efficient cryptographic data validation service in edge computing. IEEE Transactions on Services Computing, 1, 1.","journal-title":"IEEE Transactions on Services Computing"},{"key":"3109_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TSC.2021.3140098","volume":"1","author":"Y Miao","year":"2022","unstructured":"Miao, Y., Zheng, W., Jia, X., Liu, X., Choo, K.-K.R., & Deng, R. (2022). Ranked keyword search over encrypted cloud data through machine learning method. IEEE Transactions on Services Computing, 1, 1.","journal-title":"IEEE Transactions on Services Computing"},{"key":"3109_CR7","doi-asserted-by":"crossref","unstructured":"Wang, C, Cao, N, Li, J, Ren, K, & Lou, W. (2010). Secure ranked keyword search over encrypted cloud data. In Proceedings of ICDCS (pp. 253\u2013262). IEEE.","DOI":"10.1109\/ICDCS.2010.34"},{"issue":"9","key":"3109_CR8","doi-asserted-by":"publisher","first-page":"1918","DOI":"10.1109\/TIFS.2015.2435697","volume":"10","author":"K Li","year":"2015","unstructured":"Li, K., Zhang, W., Yang, C., & Nenghai, Yu. (2015). Security analysis on one-to-many order preserving encryption-based cloud data search. IEEE Transactions on Information Forensics and Security, 10(9), 1918\u20131926.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"3109_CR9","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/s12083-019-00736-0","volume":"13","author":"M Zarezadeh","year":"2020","unstructured":"Zarezadeh, M., Mala, H., & Ashouri-Talouki, M. (2020). Multi-keyword ranked searchable encryption scheme with access control for cloud storage. Peer-to-Peer Networking and Applications, 13(1), 207\u2013218.","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"3109_CR10","unstructured":"Rakesh, A., Jerry, K., Ramakrishnan, S., & Xu, Y. (2004). Order-preserving encryption for numeric data. In Proceedings of ACM SIGMOD (pp. 563\u2013574). ACM."},{"key":"3109_CR11","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.jpdc.2019.10.008","volume":"137","author":"A Abdulatif","year":"2020","unstructured":"Abdulatif, A., Ibrahim, K., & Xun, Y. (2020). Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption. Journal of Parallel and Distributed Computing, 137, 192\u2013204.","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"3109_CR12","doi-asserted-by":"crossref","unstructured":"Alexandra, B., Nathan, C., Younho, L., & Adam, O. (2009). Order-preserving symmetric encryption. In Proceedings of EUROCRYPT (pp. 224\u2013241). Springer.","DOI":"10.1007\/978-3-642-01001-9_13"},{"key":"3109_CR13","doi-asserted-by":"crossref","unstructured":"Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2011). Privacy-preserving multi-keyword ranked search over encrypted cloud data. In Proceedings of IEEE INFOCOM (pp. 829\u2013837). IEEE.","DOI":"10.1109\/INFCOM.2011.5935306"},{"key":"3109_CR14","unstructured":"Reza, C., Garay, J. A., Seny, K., & Rafail, O. (2006). Searchable symmetric encryption: Improved definitions and efficient constructions. In Proceedings of ACM CCS (pp. 79\u201388). ACM."},{"key":"3109_CR15","unstructured":"Ding, B., Kulkarni, J., & Yekhanin, S. (2017). Collecting telemetry data privately. In Proceedings of NIPS (pp. 3571\u20133580)."},{"key":"3109_CR16","unstructured":"Benjamin, F., Mayank, V., Arkady, Y., Shen, E., Hamlin, A., Gadepally, V., Shay, R., Mitchell, J. D., & Cunningham, R. K. (2017). Sok: Cryptographically protected database search. In Proceedings of IEEE S &P (pp. 172\u2013191). IEEE."},{"key":"3109_CR17","unstructured":"Bet\u00fcl, D. F., DuBuisson, T. M., & Cash, D. (2016). What else is revealed by order-revealing encryption? In Proceedings of ACM CCS (pp. 1155\u20131166). ACM."},{"key":"3109_CR18","doi-asserted-by":"crossref","unstructured":"Dwork, C. (2006). Differential privacy: A survey of results. In Proceedings of TAMC (pp. 1\u201312). Springer.","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"3109_CR19","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.ins.2018.06.018","volume":"462","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Deng, R. H., Liu, X., & Zheng, D. (2018). Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Information Sciences, 462, 262\u2013277.","journal-title":"Information Sciences"},{"key":"3109_CR20","unstructured":"Song, D. X., Wagner, D., & Perrig, A. (2000). Practical techniques for searches on encrypted data. In Proceedings of IEEE S &P (pp. 44\u201355). IEEE."},{"key":"3109_CR21","unstructured":"Goh, E.-J.. (2003). Secure indexes. Cryptology ePrint Archive."},{"key":"3109_CR22","unstructured":"Seny, K., Charalampos, P., & Roeder, T. (2012). Dynamic searchable symmetric encryption. In Proceedings of ACM CCS (pp. 965\u2013976). ACM."},{"key":"3109_CR23","doi-asserted-by":"crossref","unstructured":"Sun, S.-F., Steinfeld, R., Lai, S., Yuan, X., Sakzad, A., Liu, J. K., Nepal, S., & Gu, D. (2021). Practical non-interactive searchable encryption with forward and backward privacy. In Proceedings of NDSS. The Internet Society.","DOI":"10.14722\/ndss.2021.24162"},{"key":"3109_CR24","doi-asserted-by":"publisher","first-page":"5310","DOI":"10.1109\/TIFS.2021.3128823","volume":"16","author":"X Lei","year":"2021","unstructured":"Lei, X., Huayi, D., Anxin, Z., Xingliang, Y., & Cong, W. (2021). Interpreting and mitigating leakage-abuse attacks in searchable symmetric encryption. IEEE Transactions on Information Forensics and Security, 16, 5310\u20135325.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"3109_CR25","doi-asserted-by":"crossref","unstructured":"Chen, T., Xu, P., Wang, W., Zheng, Y., Susilo, W., & Jin, H. (2021). Bestie: Very practical searchable encryption with forward and backward security. In Proceedings of ESORICS (pp. 3\u201323). Springer.","DOI":"10.1007\/978-3-030-88428-4_1"},{"issue":"11","key":"3109_CR26","doi-asserted-by":"publisher","first-page":"3025","DOI":"10.1109\/TPDS.2013.282","volume":"25","author":"W Sun","year":"2014","unstructured":"Sun, W., Wang, B., Cao, N., Li, M., Lou, W., Hou, Y. T., & Li, H. (2014). Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. IEEE Transactions on Parallel Distributed System, 25(11), 3025\u20133035.","journal-title":"IEEE Transactions on Parallel Distributed System"},{"key":"3109_CR27","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/TSC.2019.2922177","volume":"15","author":"Qin Liu","year":"2019","unstructured":"Liu, Qin, Tian, Yue, Wu, Jie, Peng, Tao, & Wang, Guojun. (2019). Enabling verifiable and dynamic ranked search over outsourced data. IEEE Transactions on Services Computing, 15, 69\u201382.","journal-title":"IEEE Transactions on Services Computing"},{"key":"3109_CR28","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1109\/TDSC.2017.2787588","volume":"17","author":"Y Yang","year":"2020","unstructured":"Yang, Y., Ximeng, L., & Deng, R. H. (2020). Multi-user multi-keyword rank search over encrypted data in arbitrary language. IEEE Transactions on Dependable and Secure Computing, 17, 320\u2013334.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"3109_CR29","doi-asserted-by":"crossref","unstructured":"Popa, R. A., Li, F. H., & Nickolai, Z. (2013). An ideal-security protocol for order-preserving encoding. In Proceedings of IEEE S &P (pp. 463\u2013477). IEEE.","DOI":"10.1109\/SP.2013.38"},{"key":"3109_CR30","unstructured":"Paul, G., Kevin, S., Vincent, B., Muhammad, N., & Thomas, R. (2017). Leakage-abuse attacks against order-revealing encryption. In Proceedings of IEEE S &P (pp. 655\u2013672). IEEE."},{"issue":"3\u20134","key":"3109_CR31","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., & Roth, A. (2014). The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science, 9(3\u20134), 211\u2013407.","journal-title":"Foundations and Trends in Theoretical Computer Science"},{"key":"3109_CR32","doi-asserted-by":"crossref","unstructured":"Friedman, A., & Schuster, A. (2010). Data mining with differential privacy. In Proceedings of ACM SIGKDD (pp. 493\u2013502). ACM.","DOI":"10.1145\/1835804.1835868"},{"key":"3109_CR33","doi-asserted-by":"crossref","unstructured":"Duchi, J. C., Jordan, M. I., & Wainwright, M. J. (2013). Local privacy and statistical minimax rates. In Proceedings of IEEE FOCS (pp. 429\u2013438). IEEE.","DOI":"10.1109\/FOCS.2013.53"},{"key":"3109_CR34","doi-asserted-by":"crossref","unstructured":"Kasiviswanathan, S. P., Lee, H. K., Nissim, K., Raskhodnikova, S., & Smith, A. D. (2008). What can we learn privately? In Proceedings of IEEE FOCS (pp. 531\u2013540). IEEE.","DOI":"10.1109\/FOCS.2008.27"},{"key":"3109_CR35","unstructured":"Ji, Z., Lipton, Z. C., & Elkan, C. (2014). Differential privacy and machine learning: A survey and review. arXiv preprint arXiv:1412.7584"},{"key":"3109_CR36","doi-asserted-by":"publisher","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","volume":"15","author":"K Wei","year":"2020","unstructured":"Wei, K., Li, J., Ding, M., Ma, C., Yang, H. H., Farokhi, F., et al. (2020). Federated learning with differential privacy: Algorithms and performance analysis. IEEE Transation Information Forensics Security, 15, 3454\u20133469.","journal-title":"IEEE Transation Information Forensics Security"},{"key":"3109_CR37","doi-asserted-by":"crossref","unstructured":"Wang, T., Ding, B., Zhou, J., Hong, C., Huang, Z., Li, N., & Jha, S. (2019). Answering multi-dimensional analytical queries under local differential privacy. In Proceedings of ACM SIGMOD (pp. 159\u2013176). ACM.","DOI":"10.1145\/3299869.3319891"},{"key":"3109_CR38","unstructured":"\u00dalfar, E., Vasyl, P., & Aleksandra, K. (2014). RAPPOR: Randomized aggregatable privacy-preserving ordinal response. In Proceedings of ACM CCS (pp. 1054\u20131067). ACM."},{"key":"3109_CR39","doi-asserted-by":"crossref","unstructured":"Liu, Q., Nie, X., Liu, X., Peng, T., & Wu, J. (2017). Verifiable ranked search over dynamic encrypted data in cloud computing. In Proceedings of IEEE IWQoS (pp. 1\u20136). IEEE.","DOI":"10.1109\/IWQoS.2017.7969156"},{"key":"3109_CR40","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.ins.2017.03.037","volume":"403","author":"X Jiang","year":"2017","unstructured":"Jiang, X., Jia, Yu., Yan, J., & Hao, R. (2017). Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data. Information Sciences, 403, 22\u201341.","journal-title":"Information Sciences"},{"key":"3109_CR41","unstructured":"Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review (p. 21260)."},{"key":"3109_CR42","doi-asserted-by":"publisher","first-page":"130:1","DOI":"10.1007\/s10916-018-0982-x","volume":"42","author":"KN Griggs","year":"2018","unstructured":"Griggs, K. N., Ossipova, O., Kohlios, C. P., Baccarini, A. N., Howson, E. A., & Hayajneh, T. (2018). Healthcare blockchain system using smart contracts for secure automated remote patient monitoring. Journal of Medical Systems, 42, 130:1-130:7.","journal-title":"Journal of Medical Systems"},{"key":"3109_CR43","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2018.05.005","volume":"116","author":"Chao Lin","year":"2018","unstructured":"Lin, Chao, He, Debiao, Huang, Xinyi, Choo, Kim-Kwang Raymond., & Vasilakos, Athanasios V. (2018). Bsein: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. Journal of Network and Computer Applications, 116, 42\u201352.","journal-title":"Journal of Network and Computer Applications"},{"key":"3109_CR44","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G., et al. (2014). Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 151, 1\u201332.","journal-title":"Ethereum Project Yellow Paper"},{"key":"3109_CR45","unstructured":"Li, H., Zhang, F., He, J., & Tian, H. (2017). A searchable symmetric encryption scheme using blockchain. arXiv preprint arXiv:1711.01030"},{"key":"3109_CR46","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.compeleceng.2018.10.015","volume":"73","author":"H Li","year":"2019","unstructured":"Li, H., Tian, H., Zhang, F., & He, J. (2019). Blockchain-based searchable symmetric encryption scheme. Computers & Electrical Engineering, 73, 32\u201345.","journal-title":"Computers & Electrical Engineering"},{"key":"3109_CR47","doi-asserted-by":"crossref","unstructured":"Hu, S., Cai, C., Wang, Q., Wang, C., Luo, X., & Ren, K. (2018). Searching an encrypted cloud meets blockchain: A decentralized, reliable and fair realization. In Proceedings of IEEE INFOCOM (pp. 792\u2013800). IEEE.","DOI":"10.1109\/INFOCOM.2018.8485890"},{"key":"3109_CR48","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1016\/j.future.2019.01.018","volume":"95","author":"L Chen","year":"2019","unstructured":"Chen, L., Lee, W.-K., Chang, C.-C., Choo, K.-K.R., & Zhang, N. (2019). Blockchain based searchable encryption for electronic health record sharing. Future Generation Computer Systems, 95, 420\u2013429.","journal-title":"Future Generation Computer Systems"},{"key":"3109_CR49","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102791","volume":"58","author":"H Li","year":"2021","unstructured":"Li, H., Wang, T., Qiao, Z., Yang, B., Gong, Y., Wang, J., & Qiu, G. (2021). Blockchain-based searchable encryption with efficient result verification and fair payment. Journal of Information Security and Applications, 58, 102791.","journal-title":"Journal of Information Security and Applications"},{"key":"3109_CR50","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Xu, C., Mei, L., & Zhang, P. (2021). Privacy-preserving ranked searchable encryption based on differential privacy. In Proceedings of QShine (pp. 323\u2013339). Springer.","DOI":"10.1007\/978-3-030-91424-0_19"},{"key":"3109_CR51","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2535-6","volume-title":"Introducing Ethereum and solidity","author":"C Dannen","year":"2017","unstructured":"Dannen, C. (2017). Introducing Ethereum and solidity. Springer."},{"key":"3109_CR52","doi-asserted-by":"crossref","unstructured":"Delmolino, K., Arnett, M., Kosba, A., Miller, A., & Shi, E. (2016). Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab. In Proceedings of FC (pp. 79\u201394). Springer.","DOI":"10.1007\/978-3-662-53357-4_6"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-022-03109-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-022-03109-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-022-03109-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T16:15:48Z","timestamp":1722615348000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-022-03109-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,6]]},"references-count":52,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["3109"],"URL":"https:\/\/doi.org\/10.1007\/s11276-022-03109-3","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,6]]},"assertion":[{"value":"18 August 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}