{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T13:00:22Z","timestamp":1763643622239,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T00:00:00Z","timestamp":1664236800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T00:00:00Z","timestamp":1664236800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the Natural Science Foundation of Jiangsu Province","award":["BK20210330"],"award-info":[{"award-number":["BK20210330"]}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62072240"],"award-info":[{"award-number":["62072240"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s12083-022-01392-7","type":"journal-article","created":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T06:02:58Z","timestamp":1664258578000},"page":"156-169","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage"],"prefix":"10.1007","volume":"16","author":[{"given":"Mu","family":"Han","sequence":"first","affiliation":[]},{"given":"Puyi","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Chungen","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,27]]},"reference":[{"issue":"6","key":"1392_CR1","first-page":"1","volume":"53","author":"P Mell","year":"2011","unstructured":"Mell P, Grance T (2011) The nist defifinition of cloud computing. Commun ACM 53(6):1\u201350","journal-title":"Commun ACM"},{"key":"1392_CR2","doi-asserted-by":"crossref","unstructured":"Wu J, Ping L, Ge X, Wang Y, Fu J (2010) Cloud storage as the infrastructure of cloud computing. In Proc of IEEE 2010 International Conference on Intelligent Computing and Cognitive Informatics pp. 380-383","DOI":"10.1109\/ICICCI.2010.119"},{"key":"1392_CR3","doi-asserted-by":"crossref","unstructured":"Kamara S, Lauter K (2010) Cryptographic cloud storage. Financial Cryptography and Data Security- FC2010 6054:136-149","DOI":"10.1007\/978-3-642-14992-4_13"},{"key":"1392_CR4","doi-asserted-by":"crossref","unstructured":"Song D, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In Proc of IEEE 2000 Symposium on Security and Privacy pp. 44-55","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"1392_CR5","doi-asserted-by":"crossref","unstructured":"Boldyreva A, Chenette N (2009) Order-preserving symmetric encryption. In Advances in Cryptology - EUROCRYPT 2009 5479:224-241","DOI":"10.1007\/978-3-642-01001-9_13"},{"issue":"1","key":"1392_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1504\/IJWGS.2018.088357","volume":"14","author":"R Xie","year":"2018","unstructured":"Xie R, Xu C, He C (2018) Lattice-based searchable public-key encryption scheme for secure cloud storage. Int J Web Grid Serv 14(1):3\u201320","journal-title":"Int J Web Grid Serv"},{"key":"1392_CR7","doi-asserted-by":"publisher","unstructured":"Dong Z, Tianze Z, Rui G (2021) Public key searchable encryption scheme in blockchain-enabled multiuser environment. J Commun 42. https:\/\/doi.org\/10.11959\/j.issn.1000-436x.2021130","DOI":"10.11959\/j.issn.1000-436x.2021130"},{"issue":"8","key":"1392_CR8","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/s10916-018-0995-5","volume":"42","author":"A Zhang","year":"2018","unstructured":"Zhang A, Lin X (2018) Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain. J Med Syst 42(8):140","journal-title":"J Med Syst"},{"issue":"4","key":"1392_CR9","first-page":"423","volume":"15","author":"W Bin","year":"2020","unstructured":"Bin W, Caifen W (2020) Security analysis and secure channel-free certificateless searchable public key authenticated encryption for a cloud-based internet of things. PLoS ONE 15(4):423\u2013434","journal-title":"PLoS ONE"},{"key":"1392_CR10","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1016\/j.ins.2019.01.004","volume":"481","author":"L Hongbo","year":"2019","unstructured":"Hongbo L, Qiong H, Jea Shen (2019) Designated-server identity-based authenticated encryption with keyword search for encrypted emails. Inf Sci 481:330\u2013343","journal-title":"Inf Sci"},{"key":"1392_CR11","doi-asserted-by":"publisher","unstructured":"Shen J, Zhou T, Chen X, Li J, Susilo\u00a0W (2017) Anonymous and traceable group data sharing in cloud computing. IEEE Trans Inf Forensics Secur 99. https:\/\/doi.org\/10.1109\/TIFS.2017.2774439","DOI":"10.1109\/TIFS.2017.2774439"},{"issue":"7\u20138","key":"1392_CR12","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s12243-018-00701-7","volume":"74","author":"L Wu","year":"2019","unstructured":"Wu L, Zhang Y, Ma M et al (2019) Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical internet of things. Ann Telecommun 74(7\u20138):423\u2013434","journal-title":"Ann Telecommun"},{"key":"1392_CR13","doi-asserted-by":"crossref","unstructured":"Wu T, Chen C, Wang K (2019b) Security analysis and enhancement of a certificateless searchable public key encryption scheme for iiot environments. IEEE Access 7:49232-49239","DOI":"10.1109\/ACCESS.2019.2909040"},{"key":"1392_CR14","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1016\/j.compeleceng.2017.05.014","volume":"65","author":"M Mimi","year":"2018","unstructured":"Mimi M, Debiao H, Khan KM, Jianhua C (2018) Certificateless searchable public key encryption scheme for mobile healthcare system. Comput Electr Eng 65:413\u2013424. https:\/\/doi.org\/10.1016\/j.compeleceng.2017.05.014","journal-title":"Comput Electr Eng"},{"key":"1392_CR15","doi-asserted-by":"crossref","unstructured":"Boneh D, Di\u00a0Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In Advances in Cryptology - EUROCRYPT 2004 3027:506-522","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"1392_CR16","doi-asserted-by":"crossref","unstructured":"Baek J, Naini RS, Susilo W (2008) Public key encryption with keyword search revisited. In Computational Science and Its Applications-ICCSA 2008 5072:1249-1259","DOI":"10.1007\/978-3-540-69839-5_96"},{"key":"1392_CR17","unstructured":"Rhee HS, Park JH, Susilo W et\u00a0al (2000) Practical techniques for searches on encrypted data. In Proc of IEEE 2000 Symposium on Security and Privacy pp. 44-55"},{"issue":"7","key":"1392_CR18","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.ins.2013.03.008","volume":"238","author":"L Fang","year":"2013","unstructured":"Fang L, Susilo W (2013) Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Inf Sci 238(7):221\u2013241","journal-title":"Inf Sci"},{"issue":"2","key":"1392_CR19","first-page":"1833","volume":"11","author":"R Chen","year":"2016","unstructured":"Chen R, Mu Y, Yang G, Guo F, Huang X, Wang X, Wang Y (2016) Server-aided public key encryption with keyword search. IEEE Trans Inf Forensics Secur 11(2):1833\u20132842","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1392_CR20","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1016\/j.ins.2019.05.056","volume":"527","author":"X Lei","year":"2020","unstructured":"Lei X, Chungen X, Joseph KL et al (2020) Building a dynamic searchable encrypted medical database for multi-client. Inf Sci 527:394\u2013405","journal-title":"Inf Sci"},{"key":"1392_CR21","first-page":"403","volume":"1\u201314","author":"Q Huang","year":"2017","unstructured":"Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci 1\u201314:403\u2013404","journal-title":"Inf Sci"},{"key":"1392_CR22","doi-asserted-by":"crossref","unstructured":"Xu P, Wu Q, Wang W, Susilo W, Domingo-Ferrer J, Jin H (2015) Generating searchable public-key ciphertexts with hidden structures for fast keyword search. IEEE Trans Inf Forensics Secur 10(9)","DOI":"10.1109\/TIFS.2015.2442220"},{"issue":"11","key":"1392_CR23","first-page":"8","volume":"18","author":"M Chunguang","year":"2018","unstructured":"Chunguang M, Jing A, Bea Wei (2018) Smart contract in blockchain. Netinfo Security 18(11):8\u201317","journal-title":"Netinfo Security"},{"key":"1392_CR24","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1016\/j.future.2019.01.018","volume":"95","author":"L Chen","year":"2019","unstructured":"Chen L, Lee W et al (2019) Blockchain based searchable encryption for electronic health record sharing. Futur Gener Comput Syst 95:420\u2013429","journal-title":"Futur Gener Comput Syst"},{"key":"1392_CR25","doi-asserted-by":"publisher","unstructured":"Shufen N, Pingping Y et\u00a0al (2021) Cloud-assisted ciphertext policy attribute based eencryption data sharing encryption scheme based on blockchain. J Electron Inf Technol. https:\/\/doi.org\/10.11999\/JEIT200124","DOI":"10.11999\/JEIT200124"},{"key":"1392_CR26","doi-asserted-by":"crossref","unstructured":"Chen B, Wu L (2020) A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks. IEEE Trans Veh Technol 69(6)","DOI":"10.1109\/TVT.2019.2959383"},{"issue":"11","key":"1392_CR27","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/CC.2014.7004528","volume":"11","author":"Y Peng","year":"2014","unstructured":"Peng Y, Cui J, Peng C et al (2014) Certificateless public key encryption with keyword search. China Communications 11(11):100\u2013113. https:\/\/doi.org\/10.1109\/CC.2014.7004528","journal-title":"China Communications"},{"key":"1392_CR28","doi-asserted-by":"crossref","unstructured":"Islam SH, Obaidat MS, Rajeev V (2017) Design of a certificateless designated server based searchable public key encryption scheme[c]. Springer International Conference on Mathematics and Computing 3-15","DOI":"10.1007\/978-981-10-4642-1_1"},{"issue":"2","key":"1392_CR29","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1109\/TII.2017.2703922","volume":"14","author":"M Mimi","year":"2018","unstructured":"Mimi M, Debiao H, Neeraj K et al (2018) Certificateless searchable public key encryption scheme for industrial internet of things. IEEE Transactions on Industrial Informatics 14(2):759\u2013767. https:\/\/doi.org\/10.1109\/TII.2017.2703922","journal-title":"IEEE Transactions on Industrial Informatics"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01392-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-022-01392-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01392-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,21]],"date-time":"2023-03-21T04:57:32Z","timestamp":1679374652000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-022-01392-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,27]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["1392"],"URL":"https:\/\/doi.org\/10.1007\/s12083-022-01392-7","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2022,9,27]]},"assertion":[{"value":"26 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 September 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The work has not been published before. The work is not under consideration elsewhere. Copyright has not been breached in seeking its publication. The publication has been approved by all co-authors and responsible authorities at the institute or organization where the work has been carried out. The submitted work is original and the results\/data\/figures in this manuscript have not been published elsewhere, nor are they under consideration by another publisher. Informed consent was obtained from all individual participants included in the study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and Consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal ethics"}},{"value":"The Author agrees to pubilcation of the article in English by Springer in Springer\u2019s corresponding English-language journal.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}