{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:10:21Z","timestamp":1772907021529,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T00:00:00Z","timestamp":1736553600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T00:00:00Z","timestamp":1736553600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the Yunnan Key Laboratory of Blockchain Application Technology","award":["(202105AG070005&YNB202301; 202305AG340008),"],"award-info":[{"award-number":["(202105AG070005&YNB202301; 202305AG340008),"]}]},{"name":"the Project of Science and Technology Major Project of Yunnan Province","award":["202302AF080006"],"award-info":[{"award-number":["202302AF080006"]}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["72293583, 72293580"],"award-info":[{"award-number":["72293583, 72293580"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s12083-024-01842-4","type":"journal-article","created":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T08:30:07Z","timestamp":1736584207000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["AAQ-PEKS: An Attribute-based Anti-Quantum Public\u00a0Key Encryption Scheme with Keyword Search for E-healthcare Scenarios"],"prefix":"10.1007","volume":"18","author":[{"given":"Gang","family":"Xu","sequence":"first","affiliation":[]},{"given":"Shiyuan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yibo","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Yanhui","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Xiu-Bo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Mianxiong","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Shui","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,11]]},"reference":[{"issue":"5","key":"1842_CR1","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1109\/TDSC.2018.2844814","volume":"17","author":"H Ma","year":"2020","unstructured":"Ma H, Zhang R, Yang G, Song Z, He K, Xiao Y (2020) Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices. IEEE Trans Dependable Secur Comput 17(5):1026\u20131038","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"1842_CR2","doi-asserted-by":"crossref","unstructured":"Liu J, Liang T, Sun R, Du X, Guizani M (2020) A privacy-preserving medical data sharing scheme based on consortium blockchain. In: 2020 IEEE Global Communications Conference (GLOBECOM).\u00a0IEEE, Taipei, Taiwan, pp 1\u20136","DOI":"10.1109\/GLOBECOM42002.2020.9348251"},{"issue":"5","key":"1842_CR3","first-page":"2301","volume":"18","author":"J Wei","year":"2021","unstructured":"Wei J, Chen X, Huang X, Hu X, Susilo W (2021) RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud. IEEE Trans Dependable Secur Comput 18(5):2301\u20132315","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"1842_CR4","doi-asserted-by":"crossref","unstructured":"Huang Q, Yan G, Yang Y (2022) Privacy-preserving traceable attribute-based keyword search in multi-authority medical cloud. IEEE Trans Cloud Comput 11(1): 678\u2013691","DOI":"10.1109\/TCC.2021.3109282"},{"key":"1842_CR5","doi-asserted-by":"crossref","unstructured":"Chen X, Xu S, Qin T, Cui Y, Gao S, Kong W (2022) AQ\u2013ABS: Anti-quantum attribute-based signature for Emrs sharing with blockchain. In: 2022 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, Austin, TX, USA, pp 1176\u20131181","DOI":"10.1109\/WCNC51071.2022.9771830"},{"key":"1842_CR6","doi-asserted-by":"publisher","first-page":"103633","DOI":"10.1016\/j.jnca.2023.103633","volume":"215","author":"J Andrew","year":"2023","unstructured":"Andrew J, Isravel DP, Sagayam KM, Bhushan B, Sei Y, Eunice J (2023) Blockchain for healthcare systems: Architecture, security challenges, trends and future directions. J Netw Comput Appl 215:103633","journal-title":"J Netw Comput Appl"},{"key":"1842_CR7","doi-asserted-by":"publisher","first-page":"103696","DOI":"10.1016\/j.jnca.2023.103696","volume":"217","author":"RU Haque","year":"2023","unstructured":"Haque RU, Hasan ASMT, Daria A, Rasool A, Chen H, Jiang Q et al (2023) A novel secure and distributed architecture for privacy-preserving healthcare system. J Netw Comput Appl 217:103696","journal-title":"J Netw Comput Appl"},{"key":"1842_CR8","doi-asserted-by":"crossref","unstructured":"Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public Key Encryption with Keyword Search. In: Advances in Cryptology \u2013 EUROCRYPT, Interlaken, Switzerland, pp 506\u2013522","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"1842_CR9","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.jnca.2018.12.003","volume":"128","author":"L Xu","year":"2019","unstructured":"Xu L, Li J, Chen X, Li W, Tang S, Wu H (2019) Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things. J Netw Comput Appl 128:11\u201320","journal-title":"J Netw Comput Appl"},{"key":"1842_CR10","doi-asserted-by":"crossref","unstructured":"Zhandry M (2021) Redeeming Reset Indifferentiability and Applications to Post-quantum Security,\" In: 27th Advances in Cryptology \u2013 ASIACRYPT, Singapore, pp 518\u2013548","DOI":"10.1007\/978-3-030-92062-3_18"},{"issue":"3","key":"1842_CR11","first-page":"1307","volume":"18","author":"H Wang","year":"2021","unstructured":"Wang H, Ning J, Huang X, Wei G, Poh GS, Liu X (2021) Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud. IEEE Trans Dependable Secur Comput 18(3):1307\u20131319","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"3","key":"1842_CR12","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.1109\/TDSC.2019.2897675","volume":"18","author":"Y Miao","year":"2021","unstructured":"Miao Y, Liu X, Choo K-KR, Deng RH, Li J, Li H et al (2021) Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting. IEEE Trans Dependable Secur Comput 18(3):1080\u20131094","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"1842_CR13","doi-asserted-by":"crossref","unstructured":"Jiang P, Mu Y, Guo F, Wen Q (2016) Public key encryption with authorized keyword search. In: 2016 Australasian Conference on Information Security and Privacy (ACISP). Springer, Melbourne, VIC, Australia, pp 170\u2013186","DOI":"10.1007\/978-3-319-40367-0_11"},{"issue":"4","key":"1842_CR14","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1109\/TIFS.2015.2510822","volume":"11","author":"R Chen","year":"2016","unstructured":"Chen R, Mu Y, Yang G, Guo F, Wang X (2016) Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage. IEEE Trans Inf Forensics Secur 11(4):789\u2013798","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"1842_CR15","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1109\/TCC.2019.2945714","volume":"10","author":"B Chen","year":"2022","unstructured":"Chen B, Wu L, Zeadally S, He D (2022) Dual-Server Public-Key Authenticated Encryption with Keyword Search. IEEE Trans Cloud Comput 10(1):322\u2013333","journal-title":"IEEE Trans Cloud Comput"},{"issue":"11","key":"1842_CR16","doi-asserted-by":"publisher","first-page":"2763","DOI":"10.1109\/TIFS.2017.2721221","volume":"12","author":"X Yuan","year":"2017","unstructured":"Yuan X, Wang X, Wang C, Yu C, Nutanong S (2017) Privacy-Preserving Similarity Joins Over Encrypted Data. IEEE Trans Inf Forensics Secur 12(11):2763\u20132775","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1842_CR17","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1016\/j.ins.2019.12.063","volume":"516","author":"B Qin","year":"2020","unstructured":"Qin B, Chen Y, Huang Q, Liu X, Zheng D (2020) Public-key authenticated encryption with keyword search revisited: Security model and constructions. Inform Sci 516:515\u2013528","journal-title":"Inform Sci"},{"issue":"5","key":"1842_CR18","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1109\/TDSC.2018.2822294","volume":"17","author":"X Song","year":"2020","unstructured":"Song X, Dong C, Yuan D, Xu Q, Zhao M (2020) Forward Private Searchable Symmetric Encryption with Optimized I\/O Efficiency. IEEE Trans Dependable Secur Comput 17(5):912\u2013927","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"7","key":"1842_CR19","doi-asserted-by":"publisher","first-page":"4875","DOI":"10.1109\/TII.2021.3110193","volume":"18","author":"J Cui","year":"2022","unstructured":"Cui J, Lu J, Zhong H, Zhang Q, Gu C, Liu L (2022) Parallel Key-Insulated Multiuser Searchable Encryption for Industrial Internet of Things. IEEE Trans Ind Informatics 18(7):4875\u20134883","journal-title":"IEEE Trans Ind Informatics"},{"issue":"6","key":"1842_CR20","doi-asserted-by":"publisher","first-page":"1675","DOI":"10.1109\/TSC.2019.2897096","volume":"14","author":"T Hoang","year":"2021","unstructured":"Hoang T, Yavuz AA, Guajardo J (2021) A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services. IEEE Trans Serv Comput 14(6):1675\u20131689","journal-title":"IEEE Trans Serv Comput"},{"key":"1842_CR21","doi-asserted-by":"crossref","unstructured":"Xu G, Cao Y, Xu S, Liu X, Chen XB, Yu Y, Wang X (2022) A\u00a0searchable encryption scheme based on lattice for log systems in blockchain. CMC- Comput Mater Contin 72(3):5429\u20135441","DOI":"10.32604\/cmc.2022.028562"},{"key":"1842_CR22","doi-asserted-by":"crossref","unstructured":"Chen X, Xu S, He Y, Cui Y, He J, Gao S (2022) LFS-AS: Lightweight forward secure aggregate signature for e-health scenarios. In: 2022 IEEE International Conference on Communications (ICC). IEEE, Seoul, South Korea, pp 1176\u20131181","DOI":"10.1109\/ICC45855.2022.9838582"},{"issue":"6","key":"1842_CR23","doi-asserted-by":"publisher","first-page":"978","DOI":"10.1109\/TSC.2017.2762296","volume":"11","author":"R Zhang","year":"2018","unstructured":"Zhang R, Xue R, Liu L (2018) Searchable Encryption for Healthcare Clouds: A Survey. IEEE Trans Serv Comput 11(6):978\u2013996","journal-title":"IEEE Trans Serv Comput"},{"issue":"5","key":"1842_CR24","doi-asserted-by":"publisher","first-page":"8345","DOI":"10.1109\/JIOT.2019.2917186","volume":"6","author":"C Xu","year":"2019","unstructured":"Xu C, Wang N, Zhu L, Sharif K, Zhang C (2019) Achieving Searchable and Privacy-Preserving Data Sharing for Cloud-Assisted E-Healthcare System. IEEE Internet Things J 6(5):8345\u20138356","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"1842_CR25","doi-asserted-by":"publisher","first-page":"2513","DOI":"10.1109\/JIOT.2021.3063846","volume":"9","author":"Y Bao","year":"2022","unstructured":"Bao Y, Qiu W, Cheng X (2022) Secure and Lightweight Fine-Grained Searchable Data Sharing for IoT-Oriented and Cloud-Assisted Smart Healthcare System. IEEE Internet Things J 9(4):2513\u20132526","journal-title":"IEEE Internet Things J"},{"key":"1842_CR26","doi-asserted-by":"crossref","unstructured":"Xu S, Chen X, Wang C, He Y, Xiao K, Cao Y (2021) A lattice-based ring signature scheme to secure automated valet parking. In: 2021 International Conference on Wireless Algorithms, Systems, and Applications (WASA) vol. 12938. Springer, Nanjing, China, pp 70\u201383","DOI":"10.1007\/978-3-030-86130-8_6"},{"key":"1842_CR27","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.ins.2019.01.068","volume":"494","author":"X Zhang","year":"2019","unstructured":"Zhang X, Tang Y, Wang H, Xu C, Miao Y, Cheng H (2019) Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage. Inf Sci 494:183\u2013207","journal-title":"Inf Sci"},{"key":"1842_CR28","doi-asserted-by":"crossref","unstructured":"Xu S, Cao Y, Chen X, Guo Y, Yang Y, Guo F, Yiu SM (2024) Post-quantum searchable encryption supporting user-authorization for outsourced data management. In: 2024 ACM International Conference on Information and Knowledge Management (CIKM). ACM, Boise, Idaho, USA, pp 2702\u20132711","DOI":"10.1145\/3627673.3679522"},{"key":"1842_CR29","doi-asserted-by":"crossref","unstructured":"Xu S, Cao Y, Chen X, Zhao Y, Yiu SM (2023) Post-quantum public-key authenticated searchable encryption with forward security: general construction, and applications. In: 2023 International Conference on Information Security and Cryptology (Inscrypt).\u00a0Springer, Hangzhou, China, pp 274\u2013298)","DOI":"10.1007\/978-981-97-0942-7_14"},{"key":"1842_CR30","doi-asserted-by":"publisher","first-page":"109149","DOI":"10.1016\/j.comnet.2022.109149","volume":"214","author":"Y Cao","year":"2022","unstructured":"Cao Y, Xu S, Chen X, He Y, Jiang S (2022) A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios. Comput Netw 214:109149","journal-title":"Comput Netw"},{"issue":"3","key":"1842_CR31","first-page":"5429","volume":"72","author":"G Xu","year":"2022","unstructured":"Xu G, Cao Y, Xu S, Liu X, Chen XB, Yu Y et al (2022) \"A Searchable Encryption Scheme Based on Lattice for Log Systems in Blockchain. CMC- Comput Mater Contin 72(3):5429\u20135441","journal-title":"CMC- Comput Mater Contin"},{"issue":"1","key":"1842_CR32","first-page":"25","volume":"5","author":"C Hou","year":"2014","unstructured":"Hou C, Liu F, Bai H, Ren L (2014) Public-key searchable encryption from lattices. Int J High Perform Syst Archit 5(1):25\u201332","journal-title":"Int J High Perform Syst Archit"},{"key":"1842_CR33","first-page":"102433","volume":"51","author":"P Wang","year":"2020","unstructured":"Wang P, Xiang T, Li X, Xiang H (2020) Public key encryption with conjunctive keyword search on lattice. J Inf Secur Appl 51:102433","journal-title":"J Inf Secur Appl"},{"issue":"6","key":"1842_CR34","doi-asserted-by":"publisher","first-page":"1269","DOI":"10.1109\/TDSC.2018.2867462","volume":"17","author":"R Behnia","year":"2020","unstructured":"Behnia R, Ozmen MO, Yavuz AA (2020) Lattice-Based Public Key Searchable Encryption from Experimental Perspectives. IEEE Trans Dependable Secur Comput 17(6):1269\u20131282","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"1842_CR35","first-page":"3368819","volume":"2022","author":"G Xu","year":"2022","unstructured":"Xu G, Xu S, Cao Y, Yun F, Cui Y, Yu Y et al (2022) PPSEB: A Postquantum Public-Key Searchable Encryption Scheme on Blockchain for E-Healthcare Scenarios. Secur Commun Netw 2022:3368819","journal-title":"Secur Commun Netw"},{"key":"1842_CR36","first-page":"457","volume":"3494","author":"A Sahai","year":"2005","unstructured":"Sahai A, Waters B (2005) \u201cFuzzy Identity-Based Encryption,\u201d in Advances in Cryptology \u2013 EUROCRYPT. Aarhus, Denmark 3494:457\u2013473","journal-title":"Aarhus, Denmark"},{"key":"1842_CR37","doi-asserted-by":"crossref","unstructured":"Yin C, Wang H, Zhou L, Fang L (2020) Ciphertext-policy attribute-based encryption with multi-keyword search over medical cloud data. In: 2020 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE,\u00a0Guangzhou, China, pp 277\u2013284","DOI":"10.1109\/TrustCom50675.2020.00047"},{"key":"1842_CR38","doi-asserted-by":"publisher","unstructured":"Liu J, Li Y, Sun R, Pei Q, Zhang N, Dong M, et al (2022) EMK-ABSE: Efficient Multi-Keyword Attribute-Based Searchable Encryption Scheme Through Cloud-Edge Coordination. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2022.3163340.","DOI":"10.1109\/JIOT.2022.3163340"},{"issue":"2","key":"1842_CR39","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1109\/TSC.2020.2973256","volume":"15","author":"S Zhao","year":"2022","unstructured":"Zhao S, Jiang R, Bhargava B (2022) RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage. IEEE Trans Serv Comput 15(2):1026\u20131035","journal-title":"IEEE Trans Serv Comput"},{"key":"1842_CR40","doi-asserted-by":"crossref","unstructured":"Ajtai M (1999) Generating hard instances of the short basis problem. In: 1999 Automata, Languages and Programming: 26th International Colloquium (ICALP).\u00a0Springer, Prague, Czech, pp 1\u20139","DOI":"10.1007\/3-540-48523-6_1"},{"key":"1842_CR41","doi-asserted-by":"crossref","unstructured":"Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proc. of STOC, Victoria, British Columbia, vol 14, pp 197\u2013206","DOI":"10.1145\/1374376.1374407"},{"key":"1842_CR42","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1007\/s00145-011-9105-2","volume":"25","author":"D Cash","year":"2012","unstructured":"Cash D, Hofheinz D, Kiltz E, Peikert C (2012) Bonsai Trees, or How to Delegate a Lattice Basis. J Cryptol 25:601\u2013639","journal-title":"J Cryptol"},{"key":"1842_CR43","doi-asserted-by":"crossref","unstructured":"Agrawal S, Boneh D, Boyen X (2010) Efficient lattice (H)IBE in the standard model. In: 2010 Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT).\u00a0Springer, Riviera, France, pp 553\u2013572","DOI":"10.1007\/978-3-642-13190-5_28"},{"issue":"1","key":"1842_CR44","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/TCC.2019.2931896","volume":"10","author":"NH Sultan","year":"2022","unstructured":"Sultan NH, Kaaniche N, Laurent M, Barbhuiya FA (2022) Authorized Keyword Search over Outsourced Encrypted Data in Cloud Environment. IEEE Trans Cloud Comput 10(1):216\u2013233","journal-title":"IEEE Trans Cloud Comput"},{"issue":"1","key":"1842_CR45","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1109\/TCC.2019.2944367","volume":"10","author":"M Zeng","year":"2022","unstructured":"Zeng M, Qian H, Chen J, Zhang K (2022) Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage. IEEE Trans Cloud Comput 10(1):426\u2013438","journal-title":"IEEE Trans Cloud Comput"},{"issue":"1","key":"1842_CR46","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1109\/TNSM.2021.3123475","volume":"19","author":"K Gu","year":"2022","unstructured":"Gu K, Zhang W, Li X, Jia W (2022) Self-Verifiable Attribute-Based Keyword Search Scheme for Distributed Data Storage in Fog Computing With Fast Decryption. IEEE Trans Netw Serv Manag 19(1):271\u2013288","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"1842_CR47","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.ins.2018.06.025","volume":"462","author":"H Qu","year":"2018","unstructured":"Qu H, Yan Z, Lin X, Zhang Q, Sun L (2018) Certificateless public key encryption with equality test. Inf Sci 462:76\u201392","journal-title":"Inf Sci"},{"key":"1842_CR48","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ins.2019.09.025","volume":"510","author":"Y Ling","year":"2020","unstructured":"Ling Y, Ma S, Huang Q, Li X, Ling Y (2020) Group public key encryption with equality test against offline message recovery attack. Inf Sci 510:16\u201332","journal-title":"Inf Sci"},{"key":"1842_CR49","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.ins.2017.11.010","volume":"429","author":"S Ma","year":"2018","unstructured":"Ma S, Mu Y, Susilo W (2018) A Generic Scheme of Plaintext-Checkable Database Encryption. Inf Sci 429:88\u2013101","journal-title":"Inf Sci"},{"key":"1842_CR50","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.ins.2019.12.023","volume":"516","author":"HT Lee","year":"2020","unstructured":"Lee HT, Ling S, Seo JH, Wang H, Youn TY (2020) Public key encryption with equality test in the standard model,\". Inf Sci 516:89\u2013108","journal-title":"Inf Sci"},{"issue":"9","key":"1842_CR51","first-page":"4742","volume":"13","author":"R Elhabob","year":"2019","unstructured":"Elhabob R, Zhao Y, Sellla I, Xiong H (2019) Public key encryption with equality test for heterogeneous systems in cloud computing. KSII Trans Internet Inf Syst 13(9):4742\u20134770","journal-title":"KSII Trans Internet Inf Syst"},{"key":"1842_CR52","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.ins.2019.05.026","volume":"500","author":"HT Lee","year":"2019","unstructured":"Lee HT, Ling S, Seoet JH, Wang H (2019) Public key encryption with equality test from generic assumptions in the random oracle model. Inf Sci 500:15\u201333","journal-title":"Inf Sci"},{"key":"1842_CR53","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/j.ins.2016.09.013","volume":"373","author":"HT Lee","year":"2016","unstructured":"Lee HT, Ling S, Seo JH, Wang H (2016) Semi-generic construction of public key encryption and identity-based encryption with equality test. Inf Sci 373:419\u2013440","journal-title":"Inf Sci"},{"issue":"3","key":"1842_CR54","first-page":"1019","volume":"18","author":"X Zhang","year":"2021","unstructured":"Zhang X, Xu C, Wang H, Zhang Y, Wang S (2021) FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things. IEEE Trans Dependable Secur Comput 18(3):1019\u20131032","journal-title":"IEEE Trans Dependable Secur Comput"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01842-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01842-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01842-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:35:06Z","timestamp":1747474506000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01842-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,11]]},"references-count":54,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["1842"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01842-4","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,11]]},"assertion":[{"value":"11 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"All authors gave their consent for publication.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing of interest"}},{"value":"The authors declare that they have no conflict of interest.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"64"}}