{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T13:30:26Z","timestamp":1768829426422,"version":"3.49.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,9,14]],"date-time":"2022-09-14T00:00:00Z","timestamp":1663113600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,14]],"date-time":"2022-09-14T00:00:00Z","timestamp":1663113600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1007\/s11280-022-01097-0","type":"journal-article","created":{"date-parts":[[2022,9,14]],"date-time":"2022-09-14T05:03:27Z","timestamp":1663131807000},"page":"1459-1479","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["EVSS: An efficient verifiable search scheme over encrypted cloud data"],"prefix":"10.1007","volume":"26","author":[{"given":"Qian","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Hua","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Wenjie","family":"Sheng","sequence":"additional","affiliation":[]},{"given":"Yuanlong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Geng","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,14]]},"reference":[{"issue":"3","key":"1097_CR1","doi-asserted-by":"publisher","first-page":"2185","DOI":"10.1007\/s11280-019-00774-x","volume":"23","author":"H Jiaxun","year":"2020","unstructured":"Jiaxun, H., Yu, L., He, C., Xiuxia, T., Cheqing, J.: An enhanced wildcard-based fuzzy searching scheme in encrypted databases. World Wide Web 23(3), 2185\u20132214 (2020)","journal-title":"World Wide Web"},{"issue":"2","key":"1097_CR2","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1007\/s11280-019-00671-3","volume":"23","author":"C Qiang","year":"2020","unstructured":"Qiang, C., Yanping, L., Zhenqiang, W., Yinbin, M., Jianqing, L.: Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control. World Wide Web 23(2), 959\u2013989 (2020)","journal-title":"World Wide Web"},{"key":"1097_CR3","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp 44\u201355. IEEE Computer Society (2000)"},{"key":"1097_CR4","unstructured":"Goh, E.-J.: Secure indexes, IACR Cryptology ePrint Archive. 2003, 1\u201318 (2004)"},{"issue":"5","key":"1097_CR5","doi-asserted-by":"publisher","first-page":"895","DOI":"10.3233\/JCS-2011-0426","volume":"19","author":"R Curtmola","year":"2011","unstructured":"Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: Improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895\u2013934 (2011)","journal-title":"J. Comput. Secur."},{"issue":"6","key":"1097_CR6","first-page":"15","volume":"4","author":"M Tiwari","year":"2016","unstructured":"Tiwari, M.: Fuzzy keyword search over encrypted data in cloud computing. International Journal of Research in Engineering & Technology 4(6), 15\u201320 (2016)","journal-title":"International Journal of Research in Engineering & Technology"},{"issue":"4","key":"1097_CR7","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1109\/TPDS.2014.2355202","volume":"27","author":"W Sun","year":"2016","unstructured":"Sun, W., Shucheng, Y., Lou, W., Thomas, Y., Li, H.: Protecting your right: Verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Transaction on Parallel Distributed System 27(4), 1187\u20131198 (2016)","journal-title":"IEEE Transaction on Parallel Distributed System"},{"key":"1097_CR8","unstructured":"Zhang, W., Lin, Y., Xiao, S., Liu, Q., Zhou, T.: Secure distributed keyword search in multiple clouds. IEEE, IWQoS (2014)"},{"key":"1097_CR9","doi-asserted-by":"crossref","unstructured":"Kurosawa, K., Ohtaki, Y.: Uc-secure searchable symmetric encryption. In: Financial Cryptography and Data Security, pp 285\u2013298. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-32946-3_21"},{"key":"1097_CR10","doi-asserted-by":"crossref","unstructured":"Pang, H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying completeness of relational query results in data publishing. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp 407\u2013418. Association for Computing Machinery (2005)","DOI":"10.1145\/1066157.1066204"},{"key":"1097_CR11","doi-asserted-by":"crossref","unstructured":"Narasimha, M., Tsudik, G.: Dsac: integrity for outsourced databases with signature aggregation and chaining. In: Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, pp 235\u2013236. Association for Computing Machinery (2005)","DOI":"10.1145\/1099554.1099604"},{"key":"1097_CR12","doi-asserted-by":"crossref","unstructured":"Chai, Q., Gong, G.: Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers. IEEE (2012)","DOI":"10.1109\/ICC.2012.6364125"},{"key":"1097_CR13","doi-asserted-by":"crossref","unstructured":"Kumar, M., Pasupuleti, S.K.: Lightweight verifiable auditing for outsourced database in cloud computing. In: Distributed Computing and Internet Technology - 14th International Conference, pp 280\u2013287. Springer (2018)","DOI":"10.1007\/978-3-319-72344-0_23"},{"issue":"3","key":"1097_CR14","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1007\/s00778-008-0113-2","volume":"18","author":"Y Yang","year":"2009","unstructured":"Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Authenticated indexing for outsourced spatial databases. VLDB J. 18(3), 631\u2013648 (2009)","journal-title":"VLDB J."},{"key":"1097_CR15","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Advances in Cryptology-CRYPTO 2002, pp 61\u201376. Springer, Berlin (2002)","DOI":"10.1007\/3-540-45708-9_5"},{"key":"1097_CR16","doi-asserted-by":"crossref","unstructured":"Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Applied Cryptography and Network Security, vol. 3531, pp 442\u2013455. Springer, Berlin (2005)","DOI":"10.1007\/11496137_30"},{"key":"1097_CR17","doi-asserted-by":"crossref","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Advances in Cryptology-EUROCRYPT 2004, vol. 3027, pp 506\u2013522. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"1097_CR18","doi-asserted-by":"crossref","unstructured":"Golle, P., Staddon, J., Waters, B.: Secure conjunctive keyword search over encrypted data. In: Applied Cryptography and Network Security, pp 31\u201345. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-24852-1_3"},{"key":"1097_CR19","doi-asserted-by":"crossref","unstructured":"Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Theory of Cryptography, pp 535\u2013554. Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"1097_CR20","doi-asserted-by":"crossref","unstructured":"Hore, B., Chang, E.-C., Diallo, M., Mehrotra, S.: Indexing encrypted documents for supporting efficient keyword search. In: Secure Data Management-9th VLDB Workshop, pp 93\u2013110. Springer (2012)","DOI":"10.1007\/978-3-642-32873-2_7"},{"key":"1097_CR21","doi-asserted-by":"crossref","unstructured":"Chuah, M., Hu, W.: Privacy-aware bedtree based solution for fuzzy multi-keyword search over encrypted data. In: Proceedings of the 2011 31st International Conference on Distributed Computing Systems Workshops, pp 273\u2013281. IEEE Computer Society (2011)","DOI":"10.1109\/ICDCSW.2011.11"},{"issue":"11","key":"1097_CR22","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1109\/TC.2012.215","volume":"62","author":"P Xu","year":"2013","unstructured":"Xu, P., Jin, H.: Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack. IEEE Transaction on Computers 62(11), 2266\u20132277 (2013)","journal-title":"IEEE Transaction on Computers"},{"key":"1097_CR23","doi-asserted-by":"crossref","unstructured":"Wang, C., Ren, K., Yu, S.: Achieving usable and privacy-assured similarity search over outsourced cloud data. In: Proceedings of the IEEE INFOCOM 2012, pp 451\u2013459. IEEE (2012)","DOI":"10.1109\/INFCOM.2012.6195784"},{"issue":"1","key":"1097_CR24","doi-asserted-by":"publisher","first-page":"126","DOI":"10.14778\/1453856.1453875","volume":"1","author":"H Pang","year":"2008","unstructured":"Pang, H., Mouratidis, K.: Authenticating the query results of text search engines. The Proceedings of the VLDB Endowment (PVLDB) 1(1), 126\u2013137 (2008)","journal-title":"The Proceedings of the VLDB Endowment (PVLDB)"},{"key":"1097_CR25","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Wang, J., Wang, Y., Su, Y., Chen, X.: Towards efficient verifiable forward secure searchable symmetric encryption. In: Computer Security-ESORICS 2019, vol. 11736, pp 304\u2013321. Springer International Publishing (2019)","DOI":"10.1007\/978-3-030-29962-0_15"},{"key":"1097_CR26","unstructured":"Gao, X., Yu, J., Chang, Y., Wang, H., Fan, J.: Checking only when it is necessary: Enabling integrity auditing based on the keyword with sensitive information privacy for encrypted cloud data. IEEE Transactions on Dependable and Secure Computing PP 1\u201317 (2021)"},{"key":"1097_CR27","doi-asserted-by":"crossref","unstructured":"Hu, H., Xu, J., Chen, Q., Yang, Z.: Authenticating location-based services without compromising location privacy. In: Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, pp 301\u2013312. Association for Computing Machinery (2012)","DOI":"10.1145\/2213836.2213871"},{"issue":"10","key":"1097_CR28","doi-asserted-by":"publisher","first-page":"7149","DOI":"10.1007\/s00500-019-04322-7","volume":"24","author":"N Deepa","year":"2020","unstructured":"Deepa, N., Perumal, P.: Hybrid context aware recommendation system for e-health care by merkle hash tree from cloud using evolutionary algorithm. Soft. Comput. 24(10), 7149\u20137161 (2020)","journal-title":"Soft. Comput."},{"issue":"8","key":"1097_CR29","doi-asserted-by":"publisher","first-page":"1721","DOI":"10.1109\/TPDS.2018.2808283","volume":"29","author":"J Zhu","year":"2018","unstructured":"Zhu, J., Li, Q., Wang, C., Yuan, X., Wang, Q., Ren, K.: Enabling generic, verifiable, and secure data search in cloud services. IEEE Trans. Parallel Distrib. Syst. 29(8), 1721\u20131735 (2018)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"1097_CR30","doi-asserted-by":"crossref","unstructured":"Liu, Q., Nie, X., Liu, X., Peng, T., Wu, J.: Verifiable ranked search over dynamic encrypted data in cloud computing. In: 25th IEEE\/ACM International Symposium on Quality of Service, pp 1\u20136. IEEE (2017)","DOI":"10.1109\/IWQoS.2017.7969156"},{"issue":"1","key":"1097_CR31","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/TSC.2019.2922177","volume":"15","author":"Q Liu","year":"2022","unstructured":"Liu, Q., Tian, Y., Wu, J., Peng, T., Wang, G.: Enabling verifiable and dynamic ranked search over outsourced data. IEEE Trans. Serv. Comput. 15(1), 69\u201382 (2022)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"1097_CR32","unstructured":"Goodrich, M., Tamassia, R., Hasic Telalovic, J.: An efficient dynamic and distributed rsa accumulator. arXiv:0905.1307 (2009)"},{"key":"1097_CR33","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G.: Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151, 1\u201332 (2014)","journal-title":"Ethereum Project Yellow Paper"},{"key":"1097_CR34","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1016\/j.future.2017.02.024","volume":"78","author":"Z Liu","year":"2018","unstructured":"Liu, Z., Li, T., Li, P., Jia, C., Li, J.: Verifiable searchable encryption with aggregate keys for data sharing system. Futur. Gener. Comput. Syst. 78, 778\u2013788 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"1097_CR35","unstructured":"Kamara, S., Papamanthou, C., Roeder, T.: Cs2: A searchable cryptographic cloud storage system (2011)"},{"key":"1097_CR36","unstructured":"New york times database: https:\/\/developer,nytimes.com\/docs (2020)"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-022-01097-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11280-022-01097-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-022-01097-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T01:04:42Z","timestamp":1690419882000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11280-022-01097-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,14]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["1097"],"URL":"https:\/\/doi.org\/10.1007\/s11280-022-01097-0","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"value":"1386-145X","type":"print"},{"value":"1573-1413","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,14]]},"assertion":[{"value":"11 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 August 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 September 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Our manuscripts were not submitted to multiple journals for simultaneous consideration and original. All authors agree with the content of the article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Our manuscript is approved by all authors for publication.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"No conflict of interest exits in the submission of this manuscript, and manuscript is approved by all authors for publication.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}