{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T00:11:34Z","timestamp":1760746294151,"version":"build-2065373602"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T00:00:00Z","timestamp":1755302400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T00:00:00Z","timestamp":1755302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"BUPT Excellent Ph.D. Students Foundation","award":["CX20241060"],"award-info":[{"award-number":["CX20241060"]}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["72293583,72293580"],"award-info":[{"award-number":["72293583,72293580"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Open Foundation of State Key Laboratory of Networking and Switching Technology","award":["SKLNST-2024-1-06"],"award-info":[{"award-number":["SKLNST-2024-1-06"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s12083-025-02089-3","type":"journal-article","created":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T10:17:22Z","timestamp":1755339442000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards attribute-based conjunctive encrypted search over lattice for internet of medical things"],"prefix":"10.1007","volume":"18","author":[{"given":"Yibo","family":"Cao","sequence":"first","affiliation":[]},{"given":"Shiyuan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xiu-Bo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yuling","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zongpeng","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,16]]},"reference":[{"key":"2089_CR1","doi-asserted-by":"publisher","first-page":"8875","DOI":"10.1109\/TIFS.2024.3455772","volume":"19","author":"X Chen","year":"2024","unstructured":"Chen X, Xu S, Gao S, Guo Y, Yiu S-M, Xiao B (2024) Fs-llrs: Lattice-based linkable ring signature with forward security for cloud-assisted electronic medical records. IEEE Tran Inf Foren Secur 19:8875\u20138891","journal-title":"IEEE Tran Inf Foren Secur"},{"issue":"2","key":"2089_CR2","doi-asserted-by":"publisher","first-page":"854","DOI":"10.1109\/JBHI.2022.3157725","volume":"27","author":"R Wang","year":"2022","unstructured":"Wang R, Lai J, Zhang Z, Li X, Vijayakumar P, Karuppiah M (2022) Privacy-preserving federated learning for internet of medical things under edge computing. IEEE J Biomed Health Inf 27(2):854\u2013865","journal-title":"IEEE J Biomed Health Inf"},{"key":"2089_CR3","doi-asserted-by":"publisher","first-page":"1119","DOI":"10.1109\/TIFS.2024.3520007","volume":"20","author":"S Xu","year":"2025","unstructured":"Xu S, Chen X, Guo Y, Yiu S-M, Gao S, Xiao B (2025) Efficient and secure post-quantum certificateless signcryption with linkability for iomt. IEEE Trans Inf Foren Secur 20:1119\u20131134","journal-title":"IEEE Trans Inf Foren Secur"},{"key":"2089_CR4","doi-asserted-by":"publisher","first-page":"5647","DOI":"10.1109\/TIFS.2025.3574959","volume":"20","author":"G Xu","year":"2025","unstructured":"Xu G, Fan X, Xu S, Cao Y, Chen X-B, Shang T, Yu S (2025) Anonymity-enhanced sequential multi-signer ring signature for secure medical data sharing in iomt. IEEE Trans Inf Forens Secur 20:5647\u20135662","journal-title":"IEEE Trans Inf Forens Secur"},{"issue":"3","key":"2089_CR5","doi-asserted-by":"publisher","first-page":"1569","DOI":"10.1007\/s12083-024-01669-z","volume":"17","author":"X Yang","year":"2024","unstructured":"Yang X, Zhang K, Jia K, Zhao P (2024) A personalized and efficient emr sharing and management scheme based on smart contracts. Peer-to-Peer Netw Appl 17(3):1569\u20131587","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"3","key":"2089_CR6","doi-asserted-by":"publisher","first-page":"2530","DOI":"10.1109\/JIOT.2024.3468443","volume":"12","author":"G Xu","year":"2025","unstructured":"Xu G, Kong D-L, Zhangs K, Xu S, Cao Y, Mao Y, Duan J, Kang J, Chen X-B (2025) A model value transfer incentive mechanism for federated learning with smart contracts in aiot. IEEE Internet of Things Journal 12(3):2530\u20132544","journal-title":"IEEE Internet of Things Journal"},{"key":"2089_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2025.104165","volume":"238","author":"G Xu","year":"2025","unstructured":"Xu G, Lei L, Mao Y, Li Z, Chen X-B, Zhang K (2025) Cbrfl: A framework for committee-based byzantine-resilient federated learning. J Netw Comput Appl 238:104165","journal-title":"J Netw Comput Appl"},{"key":"2089_CR8","doi-asserted-by":"publisher","unstructured":"Xu G, Xu S, Fan X, Cao Y, Mao Y, Xie Y, Chen X-B (2025) Rat ring: Event driven publish\/subscribe communication protocol for iiot by report and traceable ring signature. IEEE Transactions on Industrial Informatics, pp 1\u20139. https:\/\/doi.org\/10.1109\/TII.2025.3567265","DOI":"10.1109\/TII.2025.3567265"},{"issue":"5","key":"2089_CR9","first-page":"1","volume":"56","author":"F Li","year":"2023","unstructured":"Li F, Ma J, Miao Y, Liu X, Ning J, Deng RH (2023) A survey on searchable symmetric encryption. ACM Comput Surv 56(5):1\u201342","journal-title":"ACM Comput Surv"},{"key":"2089_CR10","doi-asserted-by":"crossref","unstructured":"Chen X, Xu S, Qin T, Cui Y, Gao S, Kong W (2022) Aq\u2013abs: Anti-quantum attribute-based signature for emrs sharing with blockchain. In: 2022 IEEE wireless communications and networking conference (WCNC), pp 1176\u20131181. IEEE","DOI":"10.1109\/WCNC51071.2022.9771830"},{"key":"2089_CR11","unstructured":"Mondal P, Chamani J.G, Demertzis I, Papadopoulos D (2024) $$\\{I\/O-Efficient\\}$$ dynamic searchable encryption meets forward & backward privacy. In: 33rd USENIX security symposium (USENIX Security 24), pp 2527\u20132544"},{"key":"2089_CR12","unstructured":"Meng L, Chen L, Tian Y, Manulis M, Liu S (2024) $$\\{FEASE\\}$$: Fast and expressive asymmetric searchable encryption. In: 33rd USENIX Security Symposium (USENIX Security 24), pp 2545\u20132562"},{"key":"2089_CR13","doi-asserted-by":"crossref","unstructured":"Wang J, Chow SS (2024) Unus pro omnibus: Multi-client searchable encryption via access control. In: 31st Annual network and distributed system security symposium, NDSS 2024, San Diego, California, USA, February 26-March 1","DOI":"10.14722\/ndss.2024.23288"},{"issue":"6","key":"2089_CR14","doi-asserted-by":"publisher","first-page":"4033","DOI":"10.1007\/s12083-024-01795-8","volume":"17","author":"X Yang","year":"2024","unstructured":"Yang X, Li L (2024) Bppks: A blockchain-based privacy preserving and keyword-searchable scheme for medical data sharing. Peer-to-Peer Netw Appl 17(6):4033\u20134048","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"1","key":"2089_CR15","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1109\/TNSM.2021.3123475","volume":"19","author":"K Gu","year":"2021","unstructured":"Gu K, Zhang W, Li X, Jia W (2021) Self-verifiable attribute-based keyword search scheme for distributed data storage in fog computing with fast decryption. IEEE Trans Netw Service Manage 19(1):271\u2013288","journal-title":"IEEE Trans Netw Service Manage"},{"key":"2089_CR16","doi-asserted-by":"publisher","first-page":"1771","DOI":"10.1109\/TIFS.2022.3172627","volume":"17","author":"K Zhang","year":"2022","unstructured":"Zhang K, Jiang Z, Ning J, Huang X (2022) Subversion-resistant and consistent attribute-based keyword search for secure cloud storage. IEEE Trans Inf Foren Secur 17:1771\u20131784","journal-title":"IEEE Trans Inf Foren Secur"},{"issue":"1","key":"2089_CR17","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1109\/TCC.2021.3109282","volume":"11","author":"Q Huang","year":"2021","unstructured":"Huang Q, Yan G, Yang Y (2021) Privacy-preserving traceable attribute-based keyword search in multi-authority medical cloud. IEEE Trans Cloud Comput 11(1):678\u2013691","journal-title":"IEEE Trans Cloud Comput"},{"issue":"1","key":"2089_CR18","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1186\/s13677-023-00451-5","volume":"12","author":"Y Sun","year":"2023","unstructured":"Sun Y, Han L, Bi J, Tan X, Xie Q (2023) Verifiable attribute-based keyword search scheme over encrypted data for personal health records in cloud. J Cloud Comput 12(1):77","journal-title":"J Cloud Comput"},{"key":"2089_CR19","doi-asserted-by":"crossref","unstructured":"Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: International workshop on information security applications, pp 73\u201386. Springer","DOI":"10.1007\/978-3-540-31815-6_7"},{"key":"2089_CR20","volume":"72","author":"VB Chenam","year":"2023","unstructured":"Chenam VB, Ali ST (2023) A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based miot in dynamic multi-user environment. J Inf Secur Appl 72:103377","journal-title":"J Inf Secur Appl"},{"issue":"6","key":"2089_CR21","doi-asserted-by":"publisher","first-page":"4168","DOI":"10.1109\/TSC.2023.3311877","volume":"16","author":"D Zhang","year":"2023","unstructured":"Zhang D, Wang S, Zhang Q, Zhang Y (2023) Attribute based conjunctive keywords search with verifiability and fair payment using blockchain. IEEE Trans Serv Comput 16(6):4168\u20134182","journal-title":"IEEE Trans Serv Comput"},{"issue":"9","key":"2089_CR22","doi-asserted-by":"publisher","first-page":"2265","DOI":"10.1093\/comjnl\/bxac075","volume":"66","author":"Z Jiang","year":"2023","unstructured":"Jiang Z, Zhang K, Wang L, Ning J (2023) Forward secure public-key authenticated encryption with conjunctive keyword search. Comput J 66(9):2265\u20132278","journal-title":"Comput J"},{"issue":"3","key":"2089_CR23","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1007\/s12083-023-01618-2","volume":"17","author":"VB Chenam","year":"2024","unstructured":"Chenam VB, Tummala SY, Ali ST (2024) Public key authenticated encryption with field-free subset conjunctive and disjunctive keyword search against keyword guessing attacks. Peer-to-Peer Netw Appl 17(3):1036\u20131050","journal-title":"Peer-to-Peer Netw Appl"},{"key":"2089_CR24","doi-asserted-by":"crossref","unstructured":"Chenam V.B, Sree K.D, Ali ST (2024) A multi-receiver certificateless public-key searchable encryption: Field-free subset conjunctive and disjunctive. Peer-to-Peer Networking and Applications, pp 1\u201316","DOI":"10.1007\/s12083-024-01767-y"},{"key":"2089_CR25","doi-asserted-by":"crossref","unstructured":"Argo S, G\u00fcneysu T, Jeudy C, Land G, Roux-Langlois A, Sanders O (2024) Practical post-quantum signatures for privacy. In: Proceedings of the 2024 on ACM SIGSAC conference on computer and communications security, pp 1523\u20131537","DOI":"10.1145\/3658644.3670297"},{"key":"2089_CR26","doi-asserted-by":"crossref","unstructured":"Hou Y, Yao W, Li X, Xia Y, Wang M (2024) Lattice-based semantic-aware searchable encryption for internet of things. IEEE Internet of Things Journal 11(17):28370\u201328384","DOI":"10.1109\/JIOT.2024.3400816"},{"issue":"3","key":"2089_CR27","first-page":"1019","volume":"18","author":"X Zhang","year":"2019","unstructured":"Zhang X, Xu C, Wang H, Zhang Y, Wang S (2019) Fs-peks: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial internet of things. IEEE Trans Dependable Secur Comput 18(3):1019\u20131032","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"2089_CR28","doi-asserted-by":"crossref","unstructured":"Chen X, Gao S, Xu S, Chen L, Yiu S-M, Xiao B (2025) From $${\\sigma }$$-protocol-based signatures to ring signatures: General construction and applications. IEEE Trans Inf Foren Secur 20:3646\u20133661","DOI":"10.1109\/TIFS.2025.3552199"},{"key":"2089_CR29","doi-asserted-by":"crossref","unstructured":"Xu S, Cao Y, Chen X, Zhao Y, Yiu S-M (2023) Post-quantum public-key authenticated searchable encryption with forward security: General construction, and applications. In: International conference on information security and cryptology, pp 274\u2013298. Springer","DOI":"10.1007\/978-981-97-0942-7_14"},{"issue":"1","key":"2089_CR30","first-page":"122","volume":"16","author":"X Zhang","year":"2021","unstructured":"Zhang X, Huang C, Gu D, Zhang J, Wang H (2021) Bib-mks: post-quantum secure biometric identity-based multi-keyword search over encrypted data in cloud storage systems. IEEE Trans Serv Comput 16(1):122\u2013133","journal-title":"IEEE Trans Serv Comput"},{"key":"2089_CR31","doi-asserted-by":"crossref","unstructured":"Xu S, Cao Y, Chen X, Guo Y, Yang Y, Guo F, Yiu S-M (2024) Post-quantum searchable encryption supporting user-authorization for outsourced data management. In: Proceedings of the 33rd ACM international conference on information and knowledge management, pp 2702\u20132711","DOI":"10.1145\/3627673.3679522"},{"issue":"5","key":"2089_CR32","doi-asserted-by":"publisher","first-page":"1663","DOI":"10.1109\/TC.2025.3540649","volume":"74","author":"S Xu","year":"2025","unstructured":"Xu S, Chen X, Guo Y, Yang Y, Wang S, Yiu S-M, Cheng X (2025) Lattice-based forward secure multi-user authenticated searchable encryption for cloud storage systems. IEEE Trans Comput 74(5):1663\u20131677","journal-title":"IEEE Trans Comput"},{"key":"2089_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109149","volume":"214","author":"Y Cao","year":"2022","unstructured":"Cao Y, Xu S, Chen X, He Y, Jiang S (2022) A forward-secure and efficient authentication protocol through lattice-based group signature in vanets scenarios. Comput Netw 214:109149","journal-title":"Comput Netw"},{"key":"2089_CR34","doi-asserted-by":"crossref","unstructured":"Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques, pp 506\u2013522. Springer","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"2089_CR35","doi-asserted-by":"crossref","unstructured":"Zheng Q, Xu S, Ateniese G (2014) Vabks: Verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014-IEEE conference on computer communications, pp 522\u2013530. IEEE","DOI":"10.1109\/INFOCOM.2014.6847976"},{"issue":"4","key":"2089_CR36","first-page":"1667","volume":"18","author":"Y Miao","year":"2019","unstructured":"Miao Y, Deng RH, Liu X, Choo K-KR, Wu H, Li H (2019) Multi-authority attribute-based keyword search over encrypted cloud data. IEEE Trans Dependable Secur Comput 18(4):1667\u20131680","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"2089_CR37","doi-asserted-by":"publisher","first-page":"1290","DOI":"10.1007\/s12083-020-01057-3","volume":"14","author":"US Varri","year":"2021","unstructured":"Varri US, Pasupuleti SK, Kadambari K (2021) Cp-absel: Ciphertext-policy attribute-based searchable encryption from lattice in cloud storage. Peer-to-Peer Netw Appl 14:1290\u20131302","journal-title":"Peer-to-Peer Netw Appl"},{"key":"2089_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102684","volume":"130","author":"X Fu","year":"2022","unstructured":"Fu X, Wang Y, You L, Ning J, Hu Z, Li F (2022) Offline\/online lattice-based ciphertext policy attribute-based encryption. J Syst Archit 130:102684","journal-title":"J Syst Archit"},{"key":"2089_CR39","doi-asserted-by":"publisher","first-page":"4970","DOI":"10.1109\/TIFS.2023.3301740","volume":"18","author":"F Luo","year":"2023","unstructured":"Luo F, Wang H, Lin C, Yan X (2023) Abaeks: Attribute-based authenticated encryption with keyword search over outsourced encrypted data. IEEE Trans Inf Foren Secur 18:4970\u20134983","journal-title":"IEEE Trans Inf Foren Secur"},{"key":"2089_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110559","volume":"250","author":"X Shen","year":"2024","unstructured":"Shen X, Li X, Yin H, Cao C, Zhang L (2024) Lattice-based multi-authority ciphertext-policy attribute-based searchable encryption with attribute revocation for cloud storage. Comput Netw 250:110559","journal-title":"Comput Netw"},{"issue":"2","key":"2089_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-024-01842-4","volume":"18","author":"G Xu","year":"2025","unstructured":"Xu G, Xu S, Cao Y, Xiao K, Mao Y, Chen X-B, Dong M, Yu S (2025) Aaq-peks: An attribute-based anti-quantum public key encryption scheme with keyword search for e-healthcare scenarios. Peer-to-Peer Netw Appl 18(2):1\u201321","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"4","key":"2089_CR42","doi-asserted-by":"publisher","first-page":"2305","DOI":"10.1007\/s10586-021-03488-w","volume":"25","author":"Y Tang","year":"2022","unstructured":"Tang Y, Ba Y, Li L, Wang X, Yan X (2022) Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for iiot. Cluster Comput 25(4):2305\u20132316","journal-title":"Cluster Comput"},{"key":"2089_CR43","doi-asserted-by":"crossref","unstructured":"Yu X, Xu C, Xu L, Mei L (2022) Hardening secure search in encrypted database: a kga-resistance conjunctive searchable encryption scheme from lattice. Soft Comput 26(21):11139\u201311151","DOI":"10.1007\/s00500-022-07469-y"},{"key":"2089_CR44","doi-asserted-by":"crossref","unstructured":"Lin Z, Li H, Chen X, Xiao M, Huang Q (2024) Identity-based encryption with disjunctive, conjunctive and range keyword search from lattices. IEEE Transactions on Information Forensics and Security","DOI":"10.1109\/TIFS.2024.3459646"},{"key":"2089_CR45","doi-asserted-by":"crossref","unstructured":"Micciancio D, Peikert C (2012) Trapdoors for lattices: Simpler, tighter, faster, smaller. In: Eurocrypt, pp 700\u2013718. Springer","DOI":"10.1007\/978-3-642-29011-4_41"},{"key":"2089_CR46","doi-asserted-by":"crossref","unstructured":"Agrawal S, Boneh D, Boyen X (2010) Efficient lattice (h) ibe in the standard model. In: EUROCRYPT, pp 553\u2013572. Springer","DOI":"10.1007\/978-3-642-13190-5_28"},{"key":"2089_CR47","doi-asserted-by":"crossref","unstructured":"Cash D, Hofheinz D, Kiltz E, Peikert C (2012) Bonsai trees, or how to delegate a lattice basis. J Cryptol 25:601\u2013639","DOI":"10.1007\/s00145-011-9105-2"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02089-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02089-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02089-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T06:39:51Z","timestamp":1760683191000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02089-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,16]]},"references-count":47,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2089"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02089-3","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,8,16]]},"assertion":[{"value":"23 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"The authors claim that there is no conflict of interest in this manuscript.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest\/Competing Interests"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval and Consent to Participate"}},{"value":"The authors agree with it.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}],"article-number":"266"}}