{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:50:44Z","timestamp":1771707044938,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"7-8","license":[{"start":{"date-parts":[[2019,1,4]],"date-time":"2019-01-04T00:00:00Z","timestamp":1546560000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572370"],"award-info":[{"award-number":["61572370"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572379"],"award-info":[{"award-number":["61572379"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61472287"],"award-info":[{"award-number":["61472287"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61772377"],"award-info":[{"award-number":["61772377"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National High-Tech Research and Development Program of China","award":["2015AA016004"],"award-info":[{"award-number":["2015AA016004"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s12243-018-00701-7","type":"journal-article","created":{"date-parts":[[2019,1,4]],"date-time":"2019-01-04T04:54:02Z","timestamp":1546577642000},"page":"423-434","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":54,"title":["Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things"],"prefix":"10.1007","volume":"74","author":[{"given":"Libing","family":"Wu","sequence":"first","affiliation":[]},{"given":"Yubo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Mimi","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2446-7436","authenticated-orcid":false,"given":"Debiao","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,4]]},"reference":[{"key":"701_CR1","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.comnet.2016.01.009","volume":"101","author":"M Hossain","year":"2016","unstructured":"Hossain M, Muhammad G (2016) Cloud-assisted industrial internet of things (iiot)\u2013enabled framework for health monitoring. Comput Net 101:192\u2013202","journal-title":"Comput Net"},{"issue":"3","key":"701_CR2","doi-asserted-by":"publisher","first-page":"156","DOI":"10.4258\/hir.2016.22.3.156","volume":"22","author":"DV Dimitrov","year":"2016","unstructured":"Dimitrov DV (2016) Medical internet of things and big data in healthcare. Healthcare Informatics Research 22(3):156\u2013 163","journal-title":"Healthcare Informatics Research"},{"key":"701_CR3","doi-asserted-by":"publisher","unstructured":"Wang C, Shen J, Liu Q, Ren Y, Li Y (2018) A novel security scheme based on instant encrypted transmission for internet of things. Security and Communication Networks, https:\/\/doi.org\/10.1155\/2018\/3680851 , 2018","DOI":"10.1155\/2018\/3680851"},{"key":"701_CR4","doi-asserted-by":"publisher","first-page":"20085","DOI":"10.1109\/ACCESS.2018.2822945","volume":"6","author":"RH Jhaveri","year":"2018","unstructured":"Jhaveri RH, Patel NM, Zhong Y, Sangaiah AK (2018) Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial IoT. IEEE Access 6:20085\u201320103","journal-title":"IEEE Access"},{"issue":"15","key":"701_CR5","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Net 54(15):2787\u20132805","journal-title":"Comput Net"},{"issue":"1","key":"701_CR6","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MC.2015.12","volume":"48","author":"R Want","year":"2015","unstructured":"Want R, Schilit BN, Jenson S (2015) Enabling the internet of things. Computer 48(1):28\u201335","journal-title":"Computer"},{"issue":"8","key":"701_CR7","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1109\/TPDS.2013.271","volume":"25","author":"Y Li","year":"2014","unstructured":"Li Y, Huang X, Li J, Chen X, Xiang X (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib. Syst 25(8):2201\u20132210","journal-title":"IEEE Trans Parallel Distrib. Syst"},{"key":"701_CR8","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.ins.2016.04.015","volume":"379","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, Chen X, Li J, Wong DS, Li H, You I (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42\u201361","journal-title":"Inf Sci"},{"key":"701_CR9","unstructured":"Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Y Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl"},{"issue":"9","key":"701_CR10","doi-asserted-by":"publisher","first-page":"3735","DOI":"10.1007\/s00500-015-1759-5","volume":"20","author":"C Xiang","year":"2016","unstructured":"Xiang C, Tang C, Cai Y, Qiuxia X (2016) Privacy-preserving face recognition with outsourced computation. Soft Comput 20(9):3735\u20133744","journal-title":"Soft Comput"},{"issue":"4","key":"701_CR11","doi-asserted-by":"publisher","first-page":"1494","DOI":"10.1007\/s11227-016-1677-z","volume":"72","author":"I Anagnostopoulos","year":"2016","unstructured":"Anagnostopoulos I, Zeadally S, EXposito E (2016) Handling big data: research challenges and future directions. J Supercomput 72(4):1494\u20131516","journal-title":"J Supercomput"},{"issue":"8","key":"701_CR12","doi-asserted-by":"publisher","first-page":"3243","DOI":"10.1007\/s00500-015-1699-0","volume":"20","author":"Z Liu","year":"2016","unstructured":"Liu Z, Weng J, Li J, Yang J, Chuan F, Jia C (2016) Cloud-based electronic health record system supporting fuzzy keyword search. Soft Comput 20(8):3243\u20133255","journal-title":"Soft Comput"},{"key":"701_CR13","doi-asserted-by":"crossref","unstructured":"Botta A, DeDonato W, Persico V, Pescap\u00e9 A (2014) On the integration of cloud computing and internet of things. In: 2014 international conference on future internet of things and cloud (FiCloud). IEEE, pp 23\u201330","DOI":"10.1109\/FiCloud.2014.14"},{"issue":"11","key":"701_CR14","doi-asserted-by":"publisher","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594\u20132608","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"701_CR15","doi-asserted-by":"publisher","unstructured":"Fu Z, Huang Z, Sun X, Vasilakos A, Yang C-N (2016) Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Serv Comput, https:\/\/doi.org\/10.1109\/TSC.2016.2622697","DOI":"10.1109\/TSC.2016.2622697"},{"key":"701_CR16","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.ins.2018.02.058","volume":"444","author":"C-Z Gao","year":"2018","unstructured":"Gao C-Z, Cheng Q, He P, Susilo W, Li J (2018) Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack. Inf Sci 444:72\u201388","journal-title":"Inf Sci"},{"key":"701_CR17","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.ins.2017.05.031","volume":"412","author":"Z Huang","year":"2017","unstructured":"Huang Z, Liu S, Mao X, Chen K, Li J (2017) Insight of the protection for data security under selective opening attacks. Inf Sci 412:223\u2013241","journal-title":"Inf Sci"},{"key":"701_CR18","unstructured":"Zhang X, Tan Y, Liang C, Li Y, Li J A covert channel over volte via adjusting silence periods. IEEE Access"},{"key":"701_CR19","unstructured":"QiJiang JM, Wei F (2016) On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal"},{"key":"701_CR20","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MCC.2016.79","volume":"3","author":"C Esposito","year":"2016","unstructured":"Esposito C, Castiglione A, Martini B, Choo K-K (2016) Cloud manufacturing: security, privacy, and forensic concerns. IEEE Cloud Comput 3:16\u201322","journal-title":"IEEE Cloud Comput"},{"key":"701_CR21","unstructured":"Song X, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: IEEE symposium on security and privacy, 2000. S&P 2000. Proceedings. IEEE, p 2000"},{"issue":"5","key":"701_CR22","doi-asserted-by":"publisher","first-page":"895","DOI":"10.3233\/JCS-2011-0426","volume":"19","author":"R Curtmola","year":"2011","unstructured":"Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895\u2013934","journal-title":"J Comput Secur"},{"key":"701_CR23","unstructured":"Cong Z, Macindoe J, Yang S, Steinfeld R, Liu JK (2016) Trusted boolean search on cloud using searchable symmetric encryption. In: 2016 IEEE Trustcom\/BigDataSE\/I? SPA. IEEE, pp 113\u2013120"},{"key":"701_CR24","doi-asserted-by":"publisher","first-page":"38860","DOI":"10.1109\/ACCESS.2018.2852329","volume":"6","author":"C Gao","year":"2018","unstructured":"Gao C, Lv S, YuWei ZW, Liu Z, Cheng X (2018) M-SSE: an effective searchable symmetric encryption with enhanced security for mobile devices. IEEE Access 6:38860\u201338869","journal-title":"IEEE Access"},{"key":"701_CR25","doi-asserted-by":"crossref","unstructured":"Boneh D, Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 506\u2013522","DOI":"10.1007\/978-3-540-24676-3_30"},{"issue":"4","key":"701_CR26","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1109\/TIFS.2015.2510822","volume":"11","author":"R Chen","year":"2016","unstructured":"Chen R, Mu Y, Yang G, Guo F, Wang X (2016) Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Trans Inf Forensics Secur 11(4):789\u2013798","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"701_CR27","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340\u2013352","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"5","key":"701_CR28","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1109\/TSC.2016.2542813","volume":"10","author":"J Li","year":"2017","unstructured":"Li J, Lin X, Zhang Y, Han J (2017) KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans Serv Comput 10(5):715\u2013725","journal-title":"IEEE Trans Serv Comput"},{"key":"701_CR29","doi-asserted-by":"crossref","unstructured":"Al-Riyami SS, Paterso KG (2003) Certificateless public key cryptography. In: International conference on the theory and application of cryptology and information security. Springer, pp 452\u2013473","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"701_CR30","doi-asserted-by":"crossref","unstructured":"Kuchta V, Sharma G, Sahu RA, Bhatia T, Markowitch O (2017) Secure certificateless proxy re-encryption without pairing. In: International workshop on security. Springer, pp 85\u2013101","DOI":"10.1007\/978-3-319-64200-0_6"},{"issue":"2","key":"701_CR31","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/JSYST.2014.2379646","volume":"11","author":"M Ali","year":"2017","unstructured":"Ali M, Dhamotharan R, Khan E, Khan SU, Vasilakos AV, Li K, Zomaya AY (2017) SeDaSC: secure data sharing in clouds. IEEE Syst J 11(2):395\u2013404","journal-title":"IEEE Syst J"},{"issue":"11","key":"701_CR32","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/CC.2013.6674208","volume":"10","author":"Y Qi","year":"2013","unstructured":"Qi Y, Tang C, Lou Y, Guo B (2013) Certificateless proxy identity-based signcryption scheme without bilinear pairings. China Commun 10(11):37\u201341","journal-title":"China Commun"},{"key":"701_CR33","unstructured":"Islam SKH, Biswas GP (2014) Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings. In: Journal of King Saud University-Computer and Information Sciences, vol 26, pp 89\u201397"},{"key":"701_CR34","doi-asserted-by":"crossref","unstructured":"Baek J, Safavi-Naini R, Susilo W (2008) Public key encryption with keyword search revisited. In: International conference on computational science and its applications. Springer, pp 1249\u20131259","DOI":"10.1007\/978-3-540-69839-5_96"},{"key":"701_CR35","unstructured":"Crescenzo GD, Saraswat V (2007) Public key encryption with searchable keywords based on Jacobi symbols. In: International conference on cryptology in India. Springer, pp 282\u2013296"},{"key":"701_CR36","unstructured":"Tang Q, Chen L (2009) Public-key encryption with registered keyword search. In: European public key infrastructure workshop. Springer, pp 163\u2013178"},{"key":"701_CR37","doi-asserted-by":"crossref","unstructured":"Golle P, Staddon J, Waters B (2004) Secure conjunctive keyword search over encrypted data. In: International conference on applied cryptography and network security. Springer, pp 31\u201345","DOI":"10.1007\/978-3-540-24852-1_3"},{"key":"701_CR38","unstructured":"Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: WISA, vol 4. Springer, pp 73\u201386"},{"key":"701_CR39","unstructured":"Hwang YH, Lee PJ (2007) Public key encryption with conjunctive keyword search and its extension to multi-user system. In: International conference on pairing-based cryptography. Springer, pp 2\u201322"},{"issue":"11","key":"701_CR40","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1109\/TC.2012.215","volume":"62","author":"X Peng","year":"2013","unstructured":"Peng X, Jin H, et al. (2013) Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack. IEEE Trans Comput 62(11):2266\u20132277","journal-title":"IEEE Trans Comput"},{"issue":"4","key":"701_CR41","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1109\/TPDS.2014.2355202","volume":"27","author":"W Sun","year":"2016","unstructured":"Sun W, Shucheng Y, Lou W, Hou YT, Li H (2016) Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans Parallel Distrib Syst 27(4):1187\u20131198","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"3","key":"701_CR42","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1109\/TIFS.2014.2378592","volume":"10","author":"S Ma","year":"2015","unstructured":"Ma S, Huang Q, Zhang M, Yang B (2015) Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans Inf Forensics Secur 10(3):458\u2013470","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"701_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2017.03.038","volume":"403","author":"Q Huang","year":"2017","unstructured":"Huang Q, Li H (2017) An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks. Inf Sci 403:1\u201314","journal-title":"Inf Sci"},{"key":"701_CR44","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.knosys.2014.04.010","volume":"79","author":"J Li","year":"2015","unstructured":"Li J, Liu Z, Chen X, Xhafa F, Tan X, Wong DS (2015) L-encdb: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl-Based Syst 79:18\u201326","journal-title":"Knowl-Based Syst"},{"issue":"8","key":"701_CR45","doi-asserted-by":"publisher","first-page":"1532","DOI":"10.1016\/j.jcss.2014.12.026","volume":"81","author":"J Li","year":"2015","unstructured":"Li J, Chen X, Xhafa F, Barolli L (2015) Secure deduplication storage systems supporting keyword search. J Comput Syst Sci 81(8):1532\u20131541","journal-title":"J Comput Syst Sci"},{"key":"701_CR46","unstructured":"Wang X, Zhang Y, Zhu H, Jiang L (2018) An identity-based signcryption on lattice without trapdoor. In: Journal of universal computer science"},{"key":"701_CR47","doi-asserted-by":"crossref","unstructured":"Li T, Chen W, Tang Y, Yan H (2018) A homomorphic network coding signature scheme for multiple sources and its application in IoT. Security and Communication Networks, 2018","DOI":"10.1155\/2018\/9641273"},{"key":"701_CR48","unstructured":"Zhu Y, Zhang Y, Li X, Yan H, Li J Improved collusion-resisting secure nearest neighbor query over encrypted data in cloud. Concurrency and Computation: Practice and Experience :e4681"},{"issue":"11","key":"701_CR49","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/CC.2014.7004528","volume":"11","author":"Y Peng","year":"2014","unstructured":"Peng Y, Cui J, Ying Z (2014) Certificateless public key encryption with keyword search. China Commun 11(11):100\u2013113","journal-title":"China Commun"},{"issue":"2","key":"701_CR50","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1109\/TII.2017.2703922","volume":"14","author":"M Ma","year":"2018","unstructured":"Ma M, He D, Kumar N, Choo K-KR, Chen J (2018) Certificateless searchable public key encryption scheme for industrial internet of things. IEEE Trans Ind Inf 14(2):759\u2013767","journal-title":"IEEE Trans Ind Inf"},{"key":"701_CR51","unstructured":"MIRACL Cryptographic library: multiprecision integer and rational arithmetic C\/C++ library"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-018-00701-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-018-00701-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-018-00701-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T17:29:25Z","timestamp":1694539765000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-018-00701-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,4]]},"references-count":51,"journal-issue":{"issue":"7-8","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["701"],"URL":"https:\/\/doi.org\/10.1007\/s12243-018-00701-7","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,4]]},"assertion":[{"value":"16 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 December 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}