{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T12:49:37Z","timestamp":1777898977621,"version":"3.51.4"},"reference-count":19,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2028,2,13]],"date-time":"2028-02-13T00:00:00Z","timestamp":1834012800000},"content-version":"am","delay-in-days":653,"URL":"http:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["JP21K11897"],"award-info":[{"award-number":["JP21K11897"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["JP25H01106"],"award-info":[{"award-number":["JP25H01106"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.jisa.2026.104410","type":"journal-article","created":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T13:29:40Z","timestamp":1770989380000},"page":"104410","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Security analysis on a public-key inverted-index keyword search scheme with designated tester"],"prefix":"10.1016","volume":"98","author":[{"given":"Mizuki","family":"Hayashi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8969-3581","authenticated-orcid":false,"given":"Keita","family":"Emura","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2026.104410_bib0001","series-title":"EUROCRYPT","first-page":"506","article-title":"Public key encryption with keyword search","author":"Boneh","year":"2004"},{"key":"10.1016\/j.jisa.2026.104410_bib0002","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1007\/s00145-007-9006-6","article-title":"Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions","volume":"21","author":"Abdalla","year":"2008","journal-title":"J Cryptology"},{"key":"10.1016\/j.jisa.2026.104410_bib0003","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2017.03.038","article-title":"An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks","volume":"403","author":"Huang","year":"2017","journal-title":"Inf Sci"},{"key":"10.1016\/j.jisa.2026.104410_bib0004","first-page":"16","article-title":"Public-key authenticated encryption with keyword search made easy","volume":"1","author":"Li","year":"2024","journal-title":"IACR Commun Cryptology"},{"key":"10.1016\/j.jisa.2026.104410_bib0005","series-title":"ICCSA","first-page":"1249","article-title":"Public key encryption with keyword search revisited","author":"Baek","year":"2008"},{"key":"10.1016\/j.jisa.2026.104410_bib0006","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.ins.2012.03.020","article-title":"Generic construction of designated tester public-key encryption with keyword search","volume":"205","author":"Rhee","year":"2012","journal-title":"Inf Sci"},{"key":"10.1016\/j.jisa.2026.104410_bib0007","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1109\/JIOT.2023.3288119","article-title":"Public-key inverted-index keyword search with designated tester and multiuser key decryption in IoT","volume":"11","author":"Gao","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"10.1016\/j.jisa.2026.104410_bib0008","series-title":"Public key cryptography","first-page":"104","article-title":"The Gap-problems: a new class of problems for the security of cryptographic schemes","author":"Okamoto","year":"2001"},{"key":"10.1016\/j.jisa.2026.104410_bib0009","series-title":"Cryptanalysis of keyword confidentiality in a searchable public-key encryption scheme against malicious server","first-page":"2025","author":"Zhang","year":"2025"},{"key":"10.1016\/j.jisa.2026.104410_bib0010","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1186\/s13677-022-00287-5","article-title":"An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability","volume":"11","author":"Guo","year":"2022","journal-title":"J Cloud Comput"},{"key":"10.1016\/j.jisa.2026.104410_bib0011","series-title":"Applied cryptography and network security","first-page":"237","article-title":"Generic construction of forward secure public key authenticated encryption with keyword search","author":"Emura","year":"2024"},{"key":"10.1016\/j.jisa.2026.104410_bib0012","doi-asserted-by":"crossref","first-page":"2265","DOI":"10.1093\/comjnl\/bxac075","article-title":"Forward secure public-key authenticated encryption with conjunctive keyword search","volume":"66","author":"Jiang","year":"2023","journal-title":"Comput J"},{"key":"10.1016\/j.jisa.2026.104410_bib0013","series-title":"AsiaJCIS","first-page":"31","article-title":"Security analysis on a public-key inverted-index keyword search scheme with designated tester","volume":"106","author":"Hayashi","year":"2025"},{"key":"10.1016\/j.jisa.2026.104410_bib0014","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"31","author":"Gamal","year":"1985","journal-title":"IEEE Trans Inf Theory"},{"key":"10.1016\/j.jisa.2026.104410_bib0015","first-page":"185","article-title":"Implementation and evaluation of an identity-based encryption with security against the kgc","volume":"33","author":"Ema","year":"2025","journal-title":"J Inf Process"},{"key":"10.1016\/j.jisa.2026.104410_bib0016","series-title":"ISCC","first-page":"850","article-title":"jPBC: Java pairing based cryptography","author":"Caro","year":"2011"},{"key":"10.1016\/j.jisa.2026.104410_bib0017","series-title":"SCN","first-page":"257","article-title":"Constructing elliptic curves with prescribed embedding degrees","author":"Barreto","year":"2002"},{"key":"10.1016\/j.jisa.2026.104410_bib0018","series-title":"SAC","first-page":"319","article-title":"Pairing-friendly elliptic curves of prime order","author":"Barreto","year":"2005"},{"key":"10.1016\/j.jisa.2026.104410_bib0019","doi-asserted-by":"crossref","first-page":"922","DOI":"10.1093\/comjnl\/bxu013","article-title":"Speks: secure server-designation public key encryption with keyword search against keyword guessing attacks","volume":"58","author":"Chen","year":"2015","journal-title":"Comput J"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000402?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000402?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T09:46:36Z","timestamp":1777628796000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212626000402"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":19,"alternative-id":["S2214212626000402"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104410","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Security analysis on a public-key inverted-index keyword search scheme with designated tester","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104410","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"104410"}}