{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T16:00:26Z","timestamp":1776528026083,"version":"3.51.2"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,12,21]],"date-time":"2022-12-21T00:00:00Z","timestamp":1671580800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,21]],"date-time":"2022-12-21T00:00:00Z","timestamp":1671580800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62262041"],"award-info":[{"award-number":["62262041"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s12083-022-01417-1","type":"journal-article","created":{"date-parts":[[2022,12,21]],"date-time":"2022-12-21T16:03:30Z","timestamp":1671638610000},"page":"644-656","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Cross-domain heterogeneous signcryption with keyword search for wireless body area network"],"prefix":"10.1007","volume":"16","author":[{"given":"Ming","family":"Luo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dashi","family":"Huang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Minrong","family":"Qiu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,12,21]]},"reference":[{"key":"1417_CR1","doi-asserted-by":"publisher","unstructured":"Arfat Y, Usman S, Mehmood R, Katib I (2020) Big data tools, technologies, and applications: a survey. In: Smart Infrastructure and Applications. Springer, Switzerland, pp 453\u2013490. https:\/\/doi.org\/10.1007\/978-3-030-13705-2_19","DOI":"10.1007\/978-3-030-13705-2_19"},{"key":"1417_CR2","doi-asserted-by":"publisher","unstructured":"Ashabi A, Sahibuddin, Bin S, Haghighi MS (2020) Big data: Current challenges and future scope. In: IEEE 10th Symposium on Computer Applications and Industrial Electronics (ISCAIE 2020). IEEE, pp 131\u2013134. https:\/\/doi.org\/10.1109\/ISCAIE47305.2020.9108826","DOI":"10.1109\/ISCAIE47305.2020.9108826"},{"key":"1417_CR3","doi-asserted-by":"publisher","DOI":"10.3390\/su132313184","author":"I Ullah","year":"2021","unstructured":"Ullah I, Khan MA, Alkhalifah A, Nordin R, Alsharif MH, Alghtani AH, Aly AA (2021) A multi-message multi-receiver signcryption scheme with edge computing for secure and reliable wireless internet of medical things communications. Sustain. https:\/\/doi.org\/10.3390\/su132313184","journal-title":"Sustain"},{"key":"1417_CR4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3097403","author":"I Ullah","year":"2021","unstructured":"Ullah I, Alkhalifah A, Rehman SU, Kumar N, Khan MA (2021) An anonymous certificateless signcryption scheme for internet of health things. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2021.3097403","journal-title":"IEEE Access"},{"key":"1417_CR5","doi-asserted-by":"publisher","unstructured":"Sadeeq MM, Abdulkareem NM, Zeebaree SRM, Ahmed DM, Sami AS, Zebari RR (2021) IoT and cloud computing issues, challenges and opportunities: a review. Qubahan Acad J. https:\/\/doi.org\/10.48161\/qaj.v1n2a36","DOI":"10.48161\/qaj.v1n2a36"},{"key":"1417_CR6","doi-asserted-by":"publisher","unstructured":"Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. IEEE, pp 44\u201355. https:\/\/doi.org\/10.1109\/secpri.2000.848445","DOI":"10.1109\/secpri.2000.848445"},{"key":"1417_CR7","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/s00145-007-9006-6","volume":"21","author":"M Abdalla","year":"2008","unstructured":"Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H (2008) Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. J Cryptol 21:350\u2013391. https:\/\/doi.org\/10.1007\/s00145-007-9006-6","journal-title":"J Cryptol"},{"key":"1417_CR8","doi-asserted-by":"publisher","unstructured":"Priya N, Ponnavaikko M (2020) Keyword search with two-side verification in encrypted data using blockchain. In: 2020 International Conference on Computer Communication and Informatics (ICCCI 2020). IEEE, pp 1\u20135. https:\/\/doi.org\/10.1109\/ICCCI48352.2020.9104169","DOI":"10.1109\/ICCCI48352.2020.9104169"},{"key":"1417_CR9","doi-asserted-by":"publisher","unstructured":"Das D, Amin R, Kalra S (2020) Algorithm for multi keyword search over encrypted data in cloud environment. In: 2020 International Wireless Communications and Mobile Computing (IWCMC). IEEE, pp 733\u2013739. https:\/\/doi.org\/10.1109\/IWCMC48107.2020.9148472","DOI":"10.1109\/IWCMC48107.2020.9148472"},{"key":"1417_CR10","doi-asserted-by":"publisher","unstructured":"Salmani K (2022) An efficient, verifiable, and dynamic searchable symmetric encryption with forward privacy. In: 2022 19th Annual International Conference on Privacy, Security & Trust (PST). IEEE, pp 1\u201310. https:\/\/doi.org\/10.1109\/pst55820.2022.9851964","DOI":"10.1109\/pst55820.2022.9851964"},{"key":"1417_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2020.3025348","author":"Z Shi","year":"2020","unstructured":"Shi Z, Fu X, Li X, Zhu K (2020) ESVSSE: Enabling efficient, secure, verifiable searchable symmetric encryption. IEEE Trans Knowl Data Eng. https:\/\/doi.org\/10.1109\/tkde.2020.3025348","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1417_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10844-w","author":"A Najafi","year":"2021","unstructured":"Najafi A, Javadi HHS, Bayat M (2021) Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-021-10844-w","journal-title":"Multimed Tools Appl"},{"key":"1417_CR13","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/7298518","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Li Y, Wang Y (2020) Efficient searchable symmetric encryption supporting dynamic multikeyword ranked search. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2020\/7298518","journal-title":"Secur Commun Netw"},{"key":"1417_CR14","doi-asserted-by":"publisher","unstructured":"Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, Berlin, Heidelberg, pp 506\u2013522. https:\/\/doi.org\/10.1007\/978-3-540-24676-3_30","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"1417_CR15","doi-asserted-by":"publisher","unstructured":"Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: International Workshop on Information Security Applications. Springer, Berlin, Heidelberg, pp 73\u201386. https:\/\/doi.org\/10.1007\/978-3-540-31815-6_7","DOI":"10.1007\/978-3-540-31815-6_7"},{"key":"1417_CR16","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.jnca.2010.07.007","volume":"34","author":"B Zhang","year":"2011","unstructured":"Zhang B, Zhang F (2011) An efficient public key encryption with conjunctive-subset keywords search. J Netw Comput Appl 34:262\u2013267. https:\/\/doi.org\/10.1016\/j.jnca.2010.07.007","journal-title":"J Netw Comput Appl"},{"key":"1417_CR17","doi-asserted-by":"publisher","unstructured":"Byun JW, Rhee HS, Park HA, Lee DH (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Workshop on secure data management. Springer, Berlin, Heidelberg, pp 75\u201383. https:\/\/doi.org\/10.1007\/11844662_6","DOI":"10.1007\/11844662_6"},{"key":"1417_CR18","doi-asserted-by":"publisher","first-page":"4307","DOI":"10.32604\/cmc.2022.017380","volume":"70","author":"I Ullah","year":"2022","unstructured":"Ullah I, Zahid H, Algarni F, Khan MA (2022) An access control scheme using heterogeneous signcryption for IoT environments. Comput Mater Contin 70:4307\u20134321. https:\/\/doi.org\/10.32604\/cmc.2022.017380","journal-title":"Comput Mater Contin"},{"key":"1417_CR19","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8850520","author":"M Ma","year":"2020","unstructured":"Ma M, Luo M, Fan S, Feng D (2020) An efficient pairing-free certificateless searchable public key encryption for cloud-based IIoT. Wirel Commun Mob Comput. https:\/\/doi.org\/10.1155\/2020\/8850520","journal-title":"Wirel Commun Mob Comput"},{"key":"1417_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102709","author":"ZY Liu","year":"2021","unstructured":"Liu ZY, Tseng YF, Tso R, Mambo M (2021) Designated-ciphertext searchable encryption. J Inf Secur Appl. https:\/\/doi.org\/10.1016\/j.jisa.2020.102709","journal-title":"J Inf Secur Appl"},{"key":"1417_CR21","doi-asserted-by":"publisher","unstructured":"Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In: International conference on Computational Science and its Applications. Springer, Heidelberg, pp 1249\u20131259. https:\/\/doi.org\/10.1007\/978-3-540-69839-5_96.","DOI":"10.1007\/978-3-540-69839-5_96"},{"key":"1417_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.03.038","author":"Q Huang","year":"2017","unstructured":"Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci (Ny). https:\/\/doi.org\/10.1016\/j.ins.2017.03.038","journal-title":"Inf Sci (Ny)"},{"key":"1417_CR23","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-022-00287-5","author":"J Guo","year":"2022","unstructured":"Guo J, Han L, Yang G, Liu X, Tian C (2022) An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability. J Cloud Comput. https:\/\/doi.org\/10.1186\/s13677-022-00287-5","journal-title":"J Cloud Comput"},{"key":"1417_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2021.103603","author":"VB Chenam","year":"2022","unstructured":"Chenam VB, Ali ST (2022) A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA. Comput Stand Interfaces. https:\/\/doi.org\/10.1016\/j.csi.2021.103603","journal-title":"Comput Stand Interfaces"},{"key":"1417_CR25","doi-asserted-by":"publisher","unstructured":"Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, Berlin, Heidelberg, pp 452\u2013473. https:\/\/doi.org\/10.1007\/978-3-540-40061-5_29","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"1417_CR26","doi-asserted-by":"publisher","first-page":"20849","DOI":"10.1109\/ACCESS.2020.2968501","volume":"8","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Liu X, Lang X, Zhang Y, Wang C (2020) VCLPKES: Verifiable certificateless public key searchable encryption scheme for industrial internet of things. IEEE Access 8:20849\u201320861. https:\/\/doi.org\/10.1109\/ACCESS.2020.2968501","journal-title":"IEEE Access"},{"key":"1417_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3207229","author":"L Cheng","year":"2022","unstructured":"Cheng L, Meng F (2022) Certificateless public key authenticated searchable encryption with enhanced security model in IIoT applications. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2022.3207229","journal-title":"IEEE Internet Things J"},{"key":"1417_CR28","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1016\/j.compeleceng.2017.05.014","volume":"65","author":"M Ma","year":"2018","unstructured":"Ma M, He D, Khan MK, Chen J (2018) Certificateless searchable public key encryption scheme for mobile healthcare system. Comput Electr Eng 65:413\u2013424. https:\/\/doi.org\/10.1016\/j.compeleceng.2017.05.014","journal-title":"Comput Electr Eng"},{"key":"1417_CR29","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/s12083-021-01253-9","volume":"15","author":"G Yang","year":"2022","unstructured":"Yang G, Guo J, Han L, Liu X, Tian C (2022) An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy. Peer-to-Peer Netw Appl 15:503\u2013515. https:\/\/doi.org\/10.1007\/s12083-021-01253-9","journal-title":"Peer-to-Peer Netw Appl"},{"key":"1417_CR30","doi-asserted-by":"publisher","first-page":"3618","DOI":"10.1109\/TII.2017.2771382","volume":"14","author":"D He","year":"2018","unstructured":"He D, Ma M, Zeadally S, Kumar N, Liang K (2018) Certificateless public key authenticated encryption with keyword search for industrial internet of things. IEEE Trans Ind Inform 14:3618\u20133627. https:\/\/doi.org\/10.1109\/TII.2017.2771382","journal-title":"IEEE Trans Ind Inform"},{"key":"1417_CR31","doi-asserted-by":"publisher","unstructured":"Omala AA, Ali I, Li F (2018) Heterogeneous signcryption with keyword search for wireless body area network. Secur Priv. https:\/\/doi.org\/10.1002\/spy2.25","DOI":"10.1002\/spy2.25"},{"key":"1417_CR32","doi-asserted-by":"publisher","first-page":"2696","DOI":"10.1109\/TII.2020.3006474","volume":"17","author":"Y Lu","year":"2021","unstructured":"Lu Y, Li J, Wang F (2021) Pairing-free certificate-based searchable encryption supporting privacy-preserving keyword search function for IIoTs. IEEE Trans Ind Informatics 17:2696\u20132706. https:\/\/doi.org\/10.1109\/TII.2020.3006474","journal-title":"IEEE Trans Ind Informatics"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01417-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-022-01417-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01417-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T04:13:19Z","timestamp":1683259999000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-022-01417-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,21]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["1417"],"URL":"https:\/\/doi.org\/10.1007\/s12083-022-01417-1","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,21]]},"assertion":[{"value":"25 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 December 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal ethics"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}