{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T14:52:13Z","timestamp":1758811933161,"version":"3.44.0"},"reference-count":26,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T00:00:00Z","timestamp":1645747200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["4212022","61772536","61772537","61772538","62072460","62076245"],"award-info":[{"award-number":["4212022","61772536","61772537","61772538","62072460","62076245"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["High-Confidence Computing"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1016\/j.hcc.2022.100058","type":"journal-article","created":{"date-parts":[[2022,3,4]],"date-time":"2022-03-04T06:09:16Z","timestamp":1646374156000},"page":"100058","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":4,"title":["Search geometric ranges efficiently as keywords over encrypted spatial data"],"prefix":"10.1016","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6640-8717","authenticated-orcid":false,"given":"Ruoyang","family":"Guo","sequence":"first","affiliation":[]},{"given":"Bo","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Yuncheng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Cuiping","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.hcc.2022.100058_bib0001","first-page":"577","article-title":"Collective data-sanitization for preventing sensitive information inference attacks in social networks","volume":"15","author":"Cai","year":"2018","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"2","key":"10.1016\/j.hcc.2022.100058_bib0002","doi-asserted-by":"crossref","first-page":"766","DOI":"10.1109\/TNSE.2018.2830307","article-title":"A private and efficient mechanism for data uploading in smart cyber-physical systems","volume":"7","author":"Cai","year":"2020","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"1","key":"10.1016\/j.hcc.2022.100058_bib0003","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/TDSC.2018.2877332","article-title":"Enabling reliable keyword search in encrypted decentralized storage with fairness","volume":"18","author":"Cai","year":"2021","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"3","key":"10.1016\/j.hcc.2022.100058_bib0004","first-page":"1019","article-title":"FS-PEKS: lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial internet of things","volume":"18","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"10.1016\/j.hcc.2022.100058_bib0005","series-title":"INFOCOM","first-page":"2494","article-title":"Strongly secure and efficient range queries in cloud databases under multiple keys","author":"Cheng","year":"2019"},{"issue":"2","key":"10.1016\/j.hcc.2022.100058_bib0006","first-page":"459","article-title":"Enhanced privacy preserving group nearest neighbor search","volume":"33","author":"Wu","year":"2021","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10.1016\/j.hcc.2022.100058_bib0007","first-page":"1","article-title":"Adaptively secure and fast processing of conjunctive queries over encrypted data","author":"Li","year":"2020","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10.1016\/j.hcc.2022.100058_bib0008","series-title":"39th IEEE International Conference on Distributed Computing Systems, ICDCS 2019, Dallas, TX, USA, July 7-10, 2019","first-page":"144","article-title":"Trading private range counting over big IoT data","author":"Cai","year":"2019"},{"issue":"6","key":"10.1016\/j.hcc.2022.100058_bib0009","doi-asserted-by":"crossref","first-page":"1034","DOI":"10.1109\/TSC.2017.2768045","article-title":"Dynamic multi-phrase ranked search over encrypted data with symmetric searchable encryption","volume":"13","author":"Guo","year":"2020","journal-title":"IEEE Transactions on Services Computing"},{"key":"10.1016\/j.hcc.2022.100058_bib0010","series-title":"INFOCOM","first-page":"1","article-title":"When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data","author":"Sun","year":"2017"},{"key":"10.1016\/j.hcc.2022.100058_bib0011","series-title":"35th IEEE International Conference on Data Engineering (ICDE), 2019, Macao, China, April 8-11, 2019","first-page":"1070","article-title":"Imageproof: enabling authentication for large-scale image retrieval","author":"Guo","year":"2019"},{"issue":"12","key":"10.1016\/j.hcc.2022.100058_bib0012","doi-asserted-by":"crossref","first-page":"2691","DOI":"10.14778\/3407790.3407854","article-title":"Saqe: practical privacy-preserving approximate query processing for data federations","volume":"13","author":"Bater","year":"2020","journal-title":"Proceedings of the VLDB Endowment"},{"issue":"2","key":"10.1016\/j.hcc.2022.100058_bib0013","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1109\/TDSC.2017.2684802","article-title":"Fastgeo: efficient geometric range queries on encrypted spatial data","volume":"16","author":"Wang","year":"2019","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"10.1016\/j.hcc.2022.100058_bib0014","series-title":"A Fully Homomorphic Encryption Scheme","volume":"volume\u00a020","author":"Gentry","year":"2009"},{"issue":"2","key":"10.1016\/j.hcc.2022.100058_bib0015","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1016\/j.dam.2005.03.020","article-title":"Secure multi-party computation made simple","volume":"154","author":"Maurer","year":"2006","journal-title":"Discret. Appl. Math."},{"issue":"5","key":"10.1016\/j.hcc.2022.100058_bib0016","doi-asserted-by":"crossref","first-page":"968","DOI":"10.1109\/JSAC.2020.2980802","article-title":"Privacy-preserved data sharing towards multiple parties in industrial iots","volume":"38","author":"Zheng","year":"2020","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"2","key":"10.1016\/j.hcc.2022.100058_bib0017","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/s00145-012-9119-4","article-title":"Predicate encryption supporting disjunctions, polynomial equations, and inner products","volume":"26","author":"Katz","year":"2013","journal-title":"J. Cryptol."},{"key":"10.1016\/j.hcc.2022.100058_bib0018","series-title":"Proceedings of the International Symposium on Quality of Service, IWQoS 2019, Phoenix, AZ, USA, June 24-25, 2019","first-page":"29:1","article-title":"Mixgeo: efficient secure range queries on encrypted dense spatial data in the cloud","author":"Guo","year":"2019"},{"key":"10.1016\/j.hcc.2022.100058_bib0019","doi-asserted-by":"crossref","DOI":"10.1109\/TKDE.2021.3093909","article-title":"Luxgeo: efficient and secure enhanced geometric range queries","author":"Guo","year":"2021","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10.1016\/j.hcc.2022.100058_bib0020","series-title":"2015 IEEE Conference on Communications and Network Security, CNS 2015, Florence, Italy, September 28-30, 2015","first-page":"182","article-title":"Circular range search on encrypted spatial data","author":"Wang","year":"2015"},{"issue":"1","key":"10.1016\/j.hcc.2022.100058_bib0021","first-page":"207","article-title":"Privacy-preserving linear region search service","volume":"14","author":"Zhang","year":"2021","journal-title":"IEEE Transactions on Services Computing"},{"key":"10.1016\/j.hcc.2022.100058_bib0022","series-title":"Fourth ACM Conference on Data and Application Security and Privacy, CODASPY\u201914, San Antonio, TX, USA - March 03 - 05, 2014","first-page":"321","article-title":"An efficient privacy-preserving system for monitoring mobile users: making searchable encryption practical","author":"Ghinita","year":"2014"},{"issue":"4","key":"10.1016\/j.hcc.2022.100058_bib0023","doi-asserted-by":"crossref","first-page":"704","DOI":"10.1109\/TIFS.2015.2506145","article-title":"Geometric range search on encrypted spatial data","volume":"11","author":"Wang","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.hcc.2022.100058_bib0024","series-title":"25th IEEE\/ACM International Symposium on Quality of Service, IWQoS 2017, Vilanova i la Geltr\u00fa, Spain, June 14-16, 2017","first-page":"1","article-title":"Efficient and generalized geometric range search on encrypted spatial data in the cloud","author":"Luo","year":"2017"},{"key":"10.1016\/j.hcc.2022.100058_bib0025","series-title":"Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings","first-page":"457","article-title":"Predicate privacy in encryption systems","volume":"volume 5444","author":"Shen","year":"2009"},{"issue":"9","key":"10.1016\/j.hcc.2022.100058_bib0026","doi-asserted-by":"crossref","first-page":"7729","DOI":"10.1109\/TVT.2015.2499791","article-title":"An efficient privacy-preserving location-based services query scheme in outsourced cloud","volume":"65","author":"Zhu","year":"2016","journal-title":"IEEE Trans. Veh. Technol."}],"container-title":["High-Confidence Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295222000101?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295222000101?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T08:39:32Z","timestamp":1757407172000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2667295222000101"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["S2667295222000101"],"URL":"https:\/\/doi.org\/10.1016\/j.hcc.2022.100058","relation":{},"ISSN":["2667-2952"],"issn-type":[{"type":"print","value":"2667-2952"}],"subject":[],"published":{"date-parts":[[2022,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Search geometric ranges efficiently as keywords over encrypted spatial data","name":"articletitle","label":"Article Title"},{"value":"High-Confidence Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.hcc.2022.100058","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 The Author(s). Published by Elsevier B.V. on behalf of Shandong University.","name":"copyright","label":"Copyright"}],"article-number":"100058"}}