{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T12:01:57Z","timestamp":1774094517761,"version":"3.50.1"},"reference-count":31,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers and Electrical Engineering"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.compeleceng.2026.111106","type":"journal-article","created":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T08:06:26Z","timestamp":1774080386000},"page":"111106","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["On the verifiability of a dynamic ranked search scheme: Cryptanalysis and improvement"],"prefix":"10.1016","volume":"134","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2755-3150","authenticated-orcid":false,"given":"Mojtaba","family":"Rafiee","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.compeleceng.2026.111106_b1","doi-asserted-by":"crossref","DOI":"10.1109\/TNSM.2025.3557262","article-title":"Revokable blockchain-enabled ranked multi-keyword attribute-based searchable encryption scheme with mobile edge computing for vehicular","author":"Hou","year":"2025","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"10.1016\/j.compeleceng.2026.111106_b2","doi-asserted-by":"crossref","DOI":"10.1109\/TNSM.2025.3569833","article-title":"Secure deduplication and cloud storage auditing with efficient dynamic ownership management and data dynamics","author":"Peng","year":"2025","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111106_b3","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1109\/TNSM.2021.3123475","article-title":"Self-verifiable attribute-based keyword search scheme for distributed data storage in fog computing with fast decryption","volume":"19","author":"Gu","year":"2021","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"10.1016\/j.compeleceng.2026.111106_b4","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2025.3577466","article-title":"Evseb: Efficient and verifiable searchable encryption with boolean search for encrypted cloud logs","author":"Fugkeaw","year":"2025","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.111106_b5","doi-asserted-by":"crossref","first-page":"90840","DOI":"10.1109\/ACCESS.2024.3418886","article-title":"Attribute-based searchable encryption with forward security for cloud-assisted iot","volume":"12","author":"Ghopur","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2026.111106_b6","series-title":"Advances in cryptology-EUROCRYPT 2004: international conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23","first-page":"506","article-title":"Public key encryption with keyword search","author":"Boneh","year":"2004"},{"key":"10.1016\/j.compeleceng.2026.111106_b7","series-title":"Proceeding 2000 IEEE symposium on security and privacy","first-page":"44","article-title":"Practical techniques for searches on encrypted data","author":"Song","year":"2000"},{"key":"10.1016\/j.compeleceng.2026.111106_b8","series-title":"Secure indexes","author":"Goh","year":"2003"},{"key":"10.1016\/j.compeleceng.2026.111106_b9","doi-asserted-by":"crossref","unstructured":"Curtmola R, Garay J, Kamara S, Ostrovsky R. Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on computer and communications security. 2006, p. 79\u201388.","DOI":"10.1145\/1180405.1180417"},{"key":"10.1016\/j.compeleceng.2026.111106_b10","series-title":"Applied cryptography and network security: Second international conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings 2","first-page":"31","article-title":"Secure conjunctive keyword search over encrypted data","author":"Golle","year":"2004"},{"key":"10.1016\/j.compeleceng.2026.111106_b11","series-title":"Advances in cryptology\u2013CRYPTO 2013: 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I","first-page":"353","article-title":"Highly-scalable searchable symmetric encryption with support for boolean queries","author":"Cash","year":"2013"},{"key":"10.1016\/j.compeleceng.2026.111106_b12","doi-asserted-by":"crossref","DOI":"10.1109\/TCC.2025.3594575","article-title":"Mkac: Efficient and privacy-preserving multi-keyword ranked query with ciphertext access control in cloud environments","author":"Bao","year":"2025","journal-title":"IEEE Trans Cloud Comput"},{"key":"10.1016\/j.compeleceng.2026.111106_b13","doi-asserted-by":"crossref","DOI":"10.1016\/j.future.2025.107726","article-title":"Edp-cvsm model-based multi-keyword ranked search scheme over encrypted cloud data","volume":"167","author":"Deng","year":"2025","journal-title":"Future Gener Comput Syst"},{"issue":"5","key":"10.1016\/j.compeleceng.2026.111106_b14","doi-asserted-by":"crossref","first-page":"510","DOI":"10.1093\/comjnl\/bxae128","article-title":"Verifiable attribute-based multi-keyword ranked search scheme in blockchain","volume":"68","author":"Chen","year":"2025","journal-title":"Comput J"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111106_b15","first-page":"525","article-title":"Ranked keyword search over encrypted cloud data through machine learning method","volume":"16","author":"Miao","year":"2022","journal-title":"IEEE Trans Serv Comput"},{"key":"10.1016\/j.compeleceng.2026.111106_b16","series-title":"Verifiable dynamic symmetric searchable encryption: Optimality and forward security","author":"Bost","year":"2016"},{"key":"10.1016\/j.compeleceng.2026.111106_b17","series-title":"How to construct uc-secure searchable symmetric encryption scheme","author":"Kurosawa","year":"2015"},{"key":"10.1016\/j.compeleceng.2026.111106_b18","doi-asserted-by":"crossref","DOI":"10.1109\/JIOT.2025.3593221","article-title":"A searchable encryption scheme for blockchain-based digital twins","author":"Gao","year":"2025","journal-title":"IEEE Internet Things J"},{"key":"10.1016\/j.compeleceng.2026.111106_b19","doi-asserted-by":"crossref","first-page":"1071","DOI":"10.1109\/TIFS.2023.3330305","article-title":"Verifiable arbitrary queries with zero knowledge confidentiality in decentralized storage","volume":"19","author":"Wang","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.compeleceng.2026.111106_b20","doi-asserted-by":"crossref","DOI":"10.1109\/TCE.2025.3632071","article-title":"Secure and privacy-preserving post-quantum attribute-based searchable encryption for edge-driven transportation systems","author":"Thingom","year":"2025","journal-title":"IEEE Trans Consum Electron"},{"key":"10.1016\/j.compeleceng.2026.111106_b21","doi-asserted-by":"crossref","first-page":"4231","DOI":"10.1109\/TIFS.2024.3372804","article-title":"Qpase: Quantum-resistant password-authenticated searchable encryption for cloud storage","volume":"19","author":"Jiang","year":"2024","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.compeleceng.2026.111106_b22","article-title":"Verifiable and forward-secure multi-keyword query in internet of medical things","author":"Li","year":"2025","journal-title":"IEEE Internet Things J"},{"key":"10.1016\/j.compeleceng.2026.111106_b23","series-title":"Monetary dynamics and socio-economic development in emerging economies","first-page":"163","article-title":"Security and privacy in ai: Iot-enabled banking and finance services","author":"Seranmadevi","year":"2026"},{"key":"10.1016\/j.compeleceng.2026.111106_b24","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1016\/j.future.2019.06.018","article-title":"Verifiable ranked search over encrypted data with forward and backward privacy","volume":"101","author":"Najafi","year":"2019","journal-title":"Future Gener Comput Syst"},{"key":"10.1016\/j.compeleceng.2026.111106_b25","article-title":"A verifiable and efficient symmetric searchable encryption scheme for dynamic dataset with forward and backward privacy","author":"Zhu","year":"2024","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"2","key":"10.1016\/j.compeleceng.2026.111106_b26","doi-asserted-by":"crossref","first-page":"724","DOI":"10.1109\/TSC.2019.2959306","article-title":"Practical attribute-based multi-keyword ranked search scheme in cloud computing","volume":"15","author":"Chen","year":"2019","journal-title":"IEEE Trans Serv Comput"},{"issue":"3","key":"10.1016\/j.compeleceng.2026.111106_b27","doi-asserted-by":"crossref","first-page":"2005","DOI":"10.1109\/TCC.2020.3024226","article-title":"Practical multi-keyword ranked search with access control over encrypted cloud data","volume":"10","author":"Li","year":"2020","journal-title":"IEEE Trans Cloud Comput"},{"issue":"1","key":"10.1016\/j.compeleceng.2026.111106_b28","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/s10623-018-0489-y","article-title":"Publicly verifiable searchable symmetric encryption based on efficient cryptographic components","volume":"87","author":"Soleimanian","year":"2019","journal-title":"Des Codes Cryptogr"},{"key":"10.1016\/j.compeleceng.2026.111106_b29","series-title":"Financial cryptography and data security: 16th international conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, revised selected papers 16","first-page":"285","article-title":"Uc-secure searchable symmetric encryption","author":"Kurosawa","year":"2012"},{"key":"10.1016\/j.compeleceng.2026.111106_b30","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.ins.2017.03.037","article-title":"Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data","volume":"403","author":"Jiang","year":"2017","journal-title":"Inform Sci"},{"key":"10.1016\/j.compeleceng.2026.111106_b31","doi-asserted-by":"crossref","unstructured":"Wong WK, Cheung DW-l, Kao B, Mamoulis N. Secure knn computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data. 2009, p. 139\u201352.","DOI":"10.1145\/1559845.1559862"}],"container-title":["Computers and Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626001783?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790626001783?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T11:43:58Z","timestamp":1774093438000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790626001783"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":31,"alternative-id":["S0045790626001783"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111106","relation":{},"ISSN":["0045-7906"],"issn-type":[{"value":"0045-7906","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"On the verifiability of a dynamic ranked search scheme: Cryptanalysis and improvement","name":"articletitle","label":"Article Title"},{"value":"Computers and Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2026.111106","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"111106"}}