{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:33:29Z","timestamp":1772120009845,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62262041"],"award-info":[{"award-number":["62262041"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s12083-022-01418-0","type":"journal-article","created":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T10:06:57Z","timestamp":1669889217000},"page":"383-394","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An enhanced heterogeneous public key searchable encryption scheme supporting multiple keywords"],"prefix":"10.1007","volume":"16","author":[{"given":"Ming","family":"Luo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dashi","family":"Huang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Minrong","family":"Qiu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,12,1]]},"reference":[{"key":"1418_CR1","doi-asserted-by":"publisher","unstructured":"Arfat Y, Usman S, Mehmood R, Katib I (2020) Big data tools, technologies, and applications: A survey. In:\u00a0Mehmood R, See S, Katib I, Chlamtac I (eds) Smart Infrastructure and Applications. EAI\/Springer Innovations in Communication and Computing 19:453\u2013490. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-13705-2_19","DOI":"10.1007\/978-3-030-13705-2_19"},{"key":"1418_CR2","doi-asserted-by":"publisher","unstructured":"Ashabi A, Sahibuddin SB, Haghighi MS (2020) Big Data: Current Challenges and Future Scope. 2020 IEEE 10th Symposium on Computer Applications & Industrial Electronics, ISCAIE,\u00a0Malaysia, April 18-19, 2020. IEEE,\u00a02020,\u00a0pp 131\u2013134.\u00a0https:\/\/doi.org\/10.1109\/ISCAIE47305.2020.9108826","DOI":"10.1109\/ISCAIE47305.2020.9108826"},{"key":"1418_CR3","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5201","author":"R Handa","year":"2019","unstructured":"Handa R, Krishna CR, Aggarwal N (2019) Searchable encryption: A survey on privacy-preserving search schemes on encrypted outsourced data. Concurr Comput Pract Exp 31:e5201.\u00a0https:\/\/doi.org\/10.1002\/cpe.5201","journal-title":"Concurr Comput Pract Exp"},{"key":"1418_CR4","doi-asserted-by":"publisher","unstructured":"Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. Proceeding 2000 IEEE symposium on security and privacy,\u00a0S&P 2000, Berkeley, CA, USA, May 14-17, 2020. IEEE, pp 44\u201355.\u00a0https:\/\/doi.org\/10.1109\/secpri.2000.848445","DOI":"10.1109\/secpri.2000.848445"},{"key":"1418_CR5","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/s00145-007-9006-6","volume":"21","author":"M Abdalla","year":"2008","unstructured":"Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H (2008) Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. J Cryptol 21:350\u2013391. https:\/\/doi.org\/10.1007\/s00145-007-9006-6","journal-title":"J Cryptol"},{"key":"1418_CR6","doi-asserted-by":"publisher","unstructured":"Priya N, Ponnavaikko M (2020) Keyword search with two-side verification in encrypted data using blockchain. 2020 International Conference on Computer Communication and Informatics, ICCCI 2020,\u00a0Coimbatore, India,\u00a0January 22-24, 2020. IEEE, pp. 1\u20135.\u00a0https:\/\/doi.org\/10.1109\/ICCCI48352.2020.9104169","DOI":"10.1109\/ICCCI48352.2020.9104169"},{"key":"1418_CR7","doi-asserted-by":"publisher","unstructured":"Das, D., Amin, R., Kalra, S (2020) Algorithm for multi keyword search over encrypted data in cloud environment. 2020 International Wireless Communications and Mobile Computing, IWCMC, Limassol, Cyprus, June 15-19, 2020. IEEE, pp 733\u2013739.\u00a0https:\/\/doi.org\/10.1109\/IWCMC48107.2020.9148472","DOI":"10.1109\/IWCMC48107.2020.9148472"},{"key":"1418_CR8","doi-asserted-by":"publisher","unstructured":"Horv\u00e1th M, Vajda I (2017) Searchable symmetric encryption: Sequential scan can be practical. 2017 25th International Conference on Software, Telecommunications and Computer Networks, SoftCOM, Split, Croatia, September 21-23, 2017. IEEE, pp 1\u20135.\u00a0https:\/\/doi.org\/10.23919\/SOFTCOM.2017.8115532","DOI":"10.23919\/SOFTCOM.2017.8115532"},{"key":"1418_CR9","doi-asserted-by":"publisher","unstructured":"Fouque PA, Martinet G, Poupard G (2003) Practical symmetric on-line encryption. In:\u00a0Johansson T (eds) Fast Software Encryption, FSE 2003. Lecture Notes in Computer Science 2887:362\u2013375. Springer, Berlin, Heidelberg.\u00a0https:\/\/doi.org\/10.1007\/978-3-540-39887-5_26","DOI":"10.1007\/978-3-540-39887-5_26"},{"key":"1418_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2020.3025348","author":"Z Shi","year":"2020","unstructured":"Shi Z, Fu X, Li X, Zhu K (2020) ESVSSE: Enabling efficient, secure, verifiable searchable symmetric encryption. IEEE Trans Knowl Data Eng\u00a034(7):3241\u20133254.\u00a0https:\/\/doi.org\/10.1109\/tkde.2020.3025348","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"17","key":"1418_CR11","doi-asserted-by":"publisher","first-page":"26049","DOI":"10.1007\/s11042-021-10844-w","volume":"80","author":"A Najafi","year":"2021","unstructured":"Najafi A, Javadi HHS, Bayat M (2021) Efficient and dynamic verifiable multi-keyword searchable symmetric encryption with full security. Multimed Tools Appl 80(17):26049\u201326068. https:\/\/doi.org\/10.1007\/s11042-021-10844-w","journal-title":"Multimed Tools Appl"},{"key":"1418_CR12","doi-asserted-by":"publisher","unstructured":"Zhang Y, Li Y, Wang Y (2020) Efficient searchable symmetric encryption supporting dynamic multikeyword ranked search. Secur Commun Networks\u00a0vol 2020, Article ID 7298518.\u00a0https:\/\/doi.org\/10.1155\/2020\/7298518","DOI":"10.1155\/2020\/7298518"},{"key":"1418_CR13","doi-asserted-by":"publisher","unstructured":"Li L, Xu C, Liu Z, Mei L (2020) Forward secure conjunctive-keyword searchable symmetric encryption using shamir threshold secret sharing scheme. In: Batina L, Li G (eds) Applications and Techniques in Information Security, ATIS 2020. Commun Comput Inf Sci 1338:14\u201328. Springer, Singapore.\u00a0https:\/\/doi.org\/10.1007\/978-981-33-4706-9_2","DOI":"10.1007\/978-981-33-4706-9_2"},{"key":"1418_CR14","doi-asserted-by":"publisher","unstructured":"Braeken A (2022) Public key versus symmetric key cryptography in client\u2013server authentication protocols. Int J Inf Secur 21(1):103\u2013114. https:\/\/doi.org\/10.1007\/s10207-021-00543-w","DOI":"10.1007\/s10207-021-00543-w"},{"key":"1418_CR15","doi-asserted-by":"publisher","unstructured":"Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: Cachin C, Camenisch JL (eds) Advances in Cryptology - EUROCRYPT 2004, EUROCRYPT 2004. Lect Notes Comput Sci 3027:567\u2013522. Springer, Berlin, Heidelberg.\u00a0https:\/\/doi.org\/10.1007\/978-3-540-24676-3_30","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"1418_CR16","doi-asserted-by":"publisher","unstructured":"Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: Lim CH, Yung M (eds) Information Security Applications, WISA 2004. Lect Notes Comput Sci 3325:72\u201386. Springer, Berlin, Heidelberg.\u00a0https:\/\/doi.org\/10.1007\/978-3-540-31815-6_7","DOI":"10.1007\/978-3-540-31815-6_7"},{"issue":"1","key":"1418_CR17","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.jnca.2010.07.007","volume":"34","author":"B Zhang","year":"2011","unstructured":"Zhang B, Zhang F (2011) An efficient public key encryption with conjunctive-subset keywords search. J Netw Comput Appl 34(1):262\u2013267. https:\/\/doi.org\/10.1016\/j.jnca.2010.07.007","journal-title":"J Netw Comput Appl"},{"key":"1418_CR18","doi-asserted-by":"publisher","first-page":"20849","DOI":"10.1109\/ACCESS.2020.2968501","volume":"8","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Liu X, Lang X, Zhang Y, Wang C (2020) VCLPKES: Verifiable certificateless public key searchable encryption scheme for industrial internet of things. IEEE Access 8:20849\u201320861. https:\/\/doi.org\/10.1109\/ACCESS.2020.2968501","journal-title":"IEEE Access"},{"key":"1418_CR19","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4257","author":"OO Olakanmi","year":"2021","unstructured":"Olakanmi OO, Odeyemi KO (2021) A certificateless keyword searchable encryption scheme in multi-user setting for fog-enhanced Industrial Internet of Things. Trans Emerg Telecommun Technol\u00a033(4):e4257. https:\/\/doi.org\/10.1002\/ett.4257","journal-title":"Trans Emerg Telecommun Technol"},{"key":"1418_CR20","doi-asserted-by":"publisher","unstructured":"Byun JW, Rhee HS, Park HA, Lee DH (2006) Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In: Jonker W, Petkovi\u0107 M (eds) Secure Data Management, SDM 2006. Lect Notes Comput Sci 4165:75\u201383. Springer, Berlin, Heidelberg.\u00a0https:\/\/doi.org\/10.1007\/11844662_6","DOI":"10.1007\/11844662_6"},{"key":"1418_CR21","doi-asserted-by":"publisher","unstructured":"Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In: Gervasi O, Murgante B, Lagan\u00e0 A, Taniar D, Mun Y, Gavrilova ML (eds) Computational Science and Its Applications \u2013 ICCSA 2008, ICCSA 2008. Lect Notes Comput Sci 5072:1249\u20131259. Springer, Berlin, Heidelberg.\u00a0https:\/\/doi.org\/10.1007\/978-3-540-69839-5_96","DOI":"10.1007\/978-3-540-69839-5_96"},{"issue":"6","key":"1418_CR22","doi-asserted-by":"publisher","first-page":"2041","DOI":"10.1109\/TSC.2019.2910113","volume":"14","author":"Y Lu","year":"2021","unstructured":"Lu Y, Li J, Zhang Y (2021) Secure channel free certificate-based searchable encryption withstanding outside and inside keyword guessing attacks. IEEE Trans Serv Comput 14(6):2041\u20132054. https:\/\/doi.org\/10.1109\/TSC.2019.2910113","journal-title":"IEEE Trans Serv Comput"},{"issue":"7","key":"1418_CR23","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s12243-018-00701-7","volume":"74","author":"L Wu","year":"2019","unstructured":"Wu L, Zhang Y, Ma M, Kumar N, He D (2019) Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things. Ann Telecommun 74(7):423\u2013434. https:\/\/doi.org\/10.1007\/s12243-018-00701-7","journal-title":"Ann Telecommun"},{"key":"1418_CR24","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0230722","author":"B Wu","year":"2020","unstructured":"Wu B, Wang C, Yao H (2020) Security analysis and secure channel-free certificateless searchable public key authenticated encryption for a cloud-based Internet of things. PLoS ONE\u00a015(4):e0230722. https:\/\/doi.org\/10.1371\/journal.pone.0230722","journal-title":"PLoS ONE"},{"key":"1418_CR25","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8850520","author":"M Ma","year":"2020","unstructured":"Ma M, Luo M, Fan S, Feng D (2020) An efficient pairing-free certificateless searchable public key encryption for cloud-based IIoT. Wirel Commun Mob Comput,\u00a0vol 2020, Article ID 8850520.\u00a0https:\/\/doi.org\/10.1155\/2020\/8850520","journal-title":"Wirel Commun Mob Comput"},{"key":"1418_CR26","doi-asserted-by":"publisher","unstructured":"Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci 403\u2013404:1\u201314.\u00a0https:\/\/doi.org\/10.1016\/j.ins.2017.03.038","DOI":"10.1016\/j.ins.2017.03.038"},{"key":"1418_CR27","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1016\/j.ins.2019.12.063","volume":"516","author":"B Qin","year":"2020","unstructured":"Qin B, Chen Y, Huang Q, Liu X, Zheng D (2020) Public-key authenticated encryption with keyword search revisited: Security model and constructions. Inf Sci 516:515\u2013528. https:\/\/doi.org\/10.1016\/j.ins.2019.12.063","journal-title":"Inf Sci"},{"issue":"1","key":"1418_CR28","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/s12083-021-01253-9","volume":"15","author":"G Yang","year":"2022","unstructured":"Yang G, Guo J, Han L, Liu X, Tian C (2022) An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy. Peer-to-Peer Netw Appl 15(1):503\u2013515. https:\/\/doi.org\/10.1007\/s12083-021-01253-9","journal-title":"Peer-to-Peer Netw Appl"},{"key":"1418_CR29","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.25","author":"AA Omala","year":"2018","unstructured":"Omala AA, Ali I, Li F (2018) Heterogeneous signcryption with keyword search for wireless body area network. Secur Priv\u00a01(5):e25.\u00a0https:\/\/doi.org\/10.1002\/spy2.25","journal-title":"Secur Priv"},{"key":"1418_CR30","doi-asserted-by":"publisher","unstructured":"Ballard L, Kamara S, Monrose F (2005) Achieving efficient conjunctive keyword searches over encrypted data. In: Qing S, Mao W, L\u00f3pez J, Wang G (eds) Information and Communications Security, ICICS 2005. Lect Notes Comput Sci 3783:414\u2013426. Springer, Berlin, Heidelberg.\u00a0https:\/\/doi.org\/10.1007\/11602897_35","DOI":"10.1007\/11602897_35"},{"issue":"2\u20133","key":"1418_CR31","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1504\/IJICS.2021.116303","volume":"15","author":"D Sharma","year":"2021","unstructured":"Sharma D, Jinwala DC (2021) Multi-writer multi-reader conjunctive keyword searchable encryption. Int J Inf Comput Secur 15(2\u20133):141\u2013162. https:\/\/doi.org\/10.1504\/IJICS.2021.116303","journal-title":"Int J Inf Comput Secur"},{"issue":"7","key":"1418_CR32","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/s12243-019-00716-8","volume":"74","author":"E Uwizeye","year":"2019","unstructured":"Uwizeye E, Wang J, Cheng Z, Li F (2019) Certificateless public key encryption with conjunctive keyword search and its application to cloud-based reliable smart grid system. Ann Telecommun 74(7):435\u2013449. https:\/\/doi.org\/10.1007\/s12243-019-00716-8","journal-title":"Ann Telecommun"},{"key":"1418_CR33","doi-asserted-by":"publisher","first-page":"158765","DOI":"10.1109\/ACCESS.2020.3020841","volume":"8","author":"X Yang","year":"2020","unstructured":"Yang X, Chen G, Wang M, Li T, Wang C (2020) Multi-keyword certificateless searchable public key authenticated encryption scheme based on blockchain. IEEE Access 8:158765\u2013158777. https:\/\/doi.org\/10.1109\/ACCESS.2020.3020841","journal-title":"IEEE Access"},{"issue":"18","key":"1418_CR34","doi-asserted-by":"publisher","first-page":"5064","DOI":"10.1002\/sec.1679","volume":"9","author":"P Jiang","year":"2016","unstructured":"Jiang P, Mu Y, Guo F, Wang X, Lai J (2016) Centralized keyword search on encrypted data for cloud applications. Secur Commun Networks 9(18):5064\u20135084. https:\/\/doi.org\/10.1002\/sec.1679","journal-title":"Secur Commun Networks"},{"issue":"3","key":"1418_CR35","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1007\/s11390-017-1745-8","volume":"32","author":"P Jiang","year":"2017","unstructured":"Jiang P, Mu Y, Guo F, Wen Q (2017) Private keyword-search for database systems against insider attacks. J Comput Sci Technol 32(3):599\u2013617. https:\/\/doi.org\/10.1007\/s11390-017-1745-8","journal-title":"J Comput Sci Technol"},{"key":"1418_CR36","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6619689","author":"Z Chen","year":"2021","unstructured":"Chen Z, Wu A, Li Y, Xing Q, Geng S (2021) Blockchain-enabled public key encryption with multi-keyword search in cloud computing. Secur Commun Networks, vol 2021, Article ID 6619689.\u00a0https:\/\/doi.org\/10.1155\/2021\/6619689","journal-title":"Secur Commun Networks"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01418-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-022-01418-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01418-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,21]],"date-time":"2023-03-21T01:00:20Z","timestamp":1679360420000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-022-01418-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,1]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["1418"],"URL":"https:\/\/doi.org\/10.1007\/s12083-022-01418-0","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-1651720\/v1","asserted-by":"object"}]},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,1]]},"assertion":[{"value":"13 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval and consent to participate"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal ethics"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}