{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T02:48:14Z","timestamp":1776134894348,"version":"3.50.1"},"reference-count":43,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/100014472","name":"Scientific Research Foundation of Hunan Provincial Education Department","doi-asserted-by":"publisher","award":["24A0230"],"award-info":[{"award-number":["24A0230"]}],"id":[{"id":"10.13039\/100014472","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","award":["2024JJ5043"],"award-info":[{"award-number":["2024JJ5043"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Systems Architecture"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.sysarc.2026.103781","type":"journal-article","created":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T08:54:06Z","timestamp":1773392046000},"page":"103781","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Supporting efficient and verifiable keyword queries on dynamic blockchain data"],"prefix":"10.1016","volume":"175","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0281-5970","authenticated-orcid":false,"given":"Bo","family":"Yin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7771-9618","authenticated-orcid":false,"given":"Tianliang","family":"Xie","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.sysarc.2026.103781_b1","first-page":"1","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008","journal-title":"Decentralized Bus. Rev."},{"key":"10.1016\/j.sysarc.2026.103781_b2","doi-asserted-by":"crossref","DOI":"10.1016\/j.future.2025.107859","article-title":"A verifiable query scheme with rich query capabilities and low storage redundancy on blockchain","author":"Sun","year":"2025","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.sysarc.2026.103781_b3","doi-asserted-by":"crossref","DOI":"10.1016\/j.future.2024.107556","article-title":"Skip index: Supporting efficient inter-block queries and query authentication on the blockchain","volume":"164","author":"Loporchio","year":"2025","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.sysarc.2026.103781_b4","series-title":"Proceedings of the 35th International Conference on Data Engineering","first-page":"842","article-title":"Gem\u0302 2-tree: A gas-efficient structure for authenticated range queries in blockchain","author":"Zhang","year":"2019"},{"key":"10.1016\/j.sysarc.2026.103781_b5","series-title":"Proceedings of the 37th International Conference on Data Engineering","first-page":"996","article-title":"Authenticated keyword search in scalable hybrid-storage blockchains","author":"Zhang","year":"2021"},{"key":"10.1016\/j.sysarc.2026.103781_b6","doi-asserted-by":"crossref","unstructured":"C. Xu, C. Zhang, J. Xu, vchain: Enabling verifiable boolean range queries over blockchain databases, in: Proceedings of the 2019 International Conference on Management of Data, 2019, pp. 141\u2013158.","DOI":"10.1145\/3299869.3300083"},{"key":"10.1016\/j.sysarc.2026.103781_b7","series-title":"2022 IEEE 38th International Conference on Data Engineering","first-page":"1927","article-title":"Vchain+: Optimizing verifiable blockchain boolean range queries","author":"Wang","year":"2022"},{"key":"10.1016\/j.sysarc.2026.103781_b8","series-title":"Proceedings of the IEEE 38th International Conference on Data Engineering","first-page":"1808","article-title":"Ubiquitous verification in centralized ledger database","author":"Yang","year":"2022"},{"key":"10.1016\/j.sysarc.2026.103781_b9","doi-asserted-by":"crossref","first-page":"9176","DOI":"10.1109\/TKDE.2024.3436514","article-title":"RollStore: hybrid onchain-offchain data indexing for blockchain applications","author":"Lin","year":"2024","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"11","key":"10.1016\/j.sysarc.2026.103781_b10","doi-asserted-by":"crossref","first-page":"2314","DOI":"10.14778\/3476249.3476283","article-title":"SlimChain: Scaling blockchain transactions through off-chain storage and parallel processing","volume":"14","author":"Xu","year":"2021","journal-title":"Proc. VLDB Endow."},{"key":"10.1016\/j.sysarc.2026.103781_b11","doi-asserted-by":"crossref","unstructured":"X. Dai, J. Xiao, W. Yang, C. Wang, J. Chang, R. Han, H. Jin, Lvq: A lightweight verifiable query approach for transaction history in bitcoin, in: Proceedings of the IEEE 40th International Conference on Distributed Computing Systems, ICDCS, 2020, pp. 1020\u20131030.","DOI":"10.1109\/ICDCS47774.2020.00096"},{"key":"10.1016\/j.sysarc.2026.103781_b12","doi-asserted-by":"crossref","unstructured":"Y. Teng, J. Lv, Z. Wang, Y. Gao, W. Dong, TimeChain: A secure and decentralized off-chain storage system for IoT time series data, in: Proceedings of the ACM on Web Conference 2025, WWW, 2025, pp. 3651\u20133659.","DOI":"10.1145\/3696410.3714791"},{"key":"10.1016\/j.sysarc.2026.103781_b13","series-title":"2024 IEEE 40th International Conference on Data Engineering","first-page":"1999","article-title":"V2FS: A verifiable virtual filesystem for multi-chain query authentication","author":"Wang","year":"2024"},{"key":"10.1016\/j.sysarc.2026.103781_b14","doi-asserted-by":"crossref","unstructured":"S. Li, Z. Zhang, M. Zhang, Y. Yuan, G. Wang, Authenticated subgraph matching in hybrid-storage blockchains, in: 2024 IEEE 40th International Conference on Data Engineering, ICDE, 2024, pp. 1986\u20131998.","DOI":"10.1109\/ICDE60146.2024.00159"},{"key":"10.1016\/j.sysarc.2026.103781_b15","doi-asserted-by":"crossref","unstructured":"S. Li, Z. Zhang, J. Xiao, M. Zhang, Y. Yuan, G. Wang, Authenticated keyword search on large-scale graphs in hybrid-storage blockchains, in: 2024 IEEE 40th International Conference on Data Engineering, ICDE, 2024, pp. 1958\u20131971.","DOI":"10.1109\/ICDE60146.2024.00155"},{"key":"10.1016\/j.sysarc.2026.103781_b16","doi-asserted-by":"crossref","unstructured":"R.W. Lai, G. Malavolta, Subvector commitments with application to succinct arguments, in: Proceedings of the 39th Annual International Cryptology Conference, 2019, pp. 530\u2013560.","DOI":"10.1007\/978-3-030-26948-7_19"},{"key":"10.1016\/j.sysarc.2026.103781_b17","doi-asserted-by":"crossref","unstructured":"D. Boneh, B. B\u00fcnz, B. Fisch, Batching techniques for accumulators with applications to IOPs and stateless blockchains, in: Proceedings of the 39th Annual International Cryptology Conference, 2019, pp. 561\u2013586.","DOI":"10.1007\/978-3-030-26948-7_20"},{"key":"10.1016\/j.sysarc.2026.103781_b18","unstructured":"M. Campanelli, D. Fiore, N. Greco, D. Kolonelos, L. Nizzardo, Incrementally aggregatable vector commitments and applications to verifiable decentralized storage."},{"key":"10.1016\/j.sysarc.2026.103781_b19","series-title":"Authenticated dictionaries with cross-incremental proof (dis) aggregation","author":"Tomescu","year":"2020"},{"key":"10.1016\/j.sysarc.2026.103781_b20","unstructured":"S. Srinivasan, A. Chepurnoy, C. Papamanthou, A. Tomescu, Y. Zhang, Hyperproofs: Aggregating and maintaining proofs in vector commitments, in: Proceedings of the 31st USENIX Security Symposium, USENIX Security 22, 2022, pp. 3001\u20133018."},{"key":"10.1016\/j.sysarc.2026.103781_b21","doi-asserted-by":"crossref","unstructured":"D. Catalano, D. Fiore, M. Messina, Zero-knowledge sets with short proofs, in: Proceedings of the 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2008, pp. 433\u2013450.","DOI":"10.1007\/978-3-540-78967-3_25"},{"key":"10.1016\/j.sysarc.2026.103781_b22","doi-asserted-by":"crossref","unstructured":"B. Libert, M. Yung, Concise mercurial vector commitments and independent zero-knowledge sets with short proofs, in: Theory of Cryptography Conference, 2010, pp. 499\u2013517.","DOI":"10.1007\/978-3-642-11799-2_30"},{"key":"10.1016\/j.sysarc.2026.103781_b23","series-title":"Proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security","first-page":"839","article-title":"KVaC:Key-value commitments for blockchains and beyond","author":"Agrawal","year":"2020"},{"key":"10.1016\/j.sysarc.2026.103781_b24","series-title":"Proceedings of the 19th IACR International Conference on Practice and Theory in Public-Key Cryptography","first-page":"417","article-title":"Nearly optimal verifiable data streaming","author":"Krupp","year":"2016"},{"key":"10.1016\/j.sysarc.2026.103781_b25","doi-asserted-by":"crossref","unstructured":"S. Gorbunov, L. Reyzin, H. Wee, Z. Zhang, Pointproofs: Aggregating proofs for multiple vector commitments, in: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020, pp. 2007\u20132023.","DOI":"10.1145\/3372297.3417244"},{"key":"10.1016\/j.sysarc.2026.103781_b26","unstructured":"E. Ben-Sasson, A. Chiesa, E. Tromer, M. Virza, Succinct {Non\u2212Interactive} zero knowledge for a von neumann architecture, in: 23rd USENIX Security Symposium, USENIX Security 14, 2014, pp. 781\u2013796."},{"issue":"2","key":"10.1016\/j.sysarc.2026.103781_b27","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1145\/2856449","article-title":"Pinocchio: Nearly practical verifiable computation","volume":"59","author":"Parno","year":"2016","journal-title":"Commun. ACM"},{"key":"10.1016\/j.sysarc.2026.103781_b28","series-title":"Conference on the Theory and Application of Cryptology","first-page":"218","article-title":"A certified digital signature","author":"Merkle","year":"1989"},{"key":"10.1016\/j.sysarc.2026.103781_b29","doi-asserted-by":"crossref","unstructured":"F. Li, M. Hadjieleftheriou, G. Kollios, L. Reyzin, Dynamic authenticated index structures for outsourced databases, in: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, 2006, pp. 121\u2013132.","DOI":"10.1145\/1142473.1142488"},{"key":"10.1016\/j.sysarc.2026.103781_b30","series-title":"2008 IEEE 24th International Conference on Data Engineering","first-page":"1082","article-title":"Spatial outsourcing for location-based services","author":"Yang","year":"2008"},{"key":"10.1016\/j.sysarc.2026.103781_b31","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1007\/s00778-008-0113-2","article-title":"Authenticated indexing for outsourced spatial databases","volume":"18","author":"Yang","year":"2009","journal-title":"VLDB J."},{"key":"10.1016\/j.sysarc.2026.103781_b32","doi-asserted-by":"crossref","unstructured":"M.L. Yiu, E. Lo, D. Yung, Authentication of moving knn queries, in: 2011 IEEE 27th International Conference on Data Engineering, 2011, pp. 565\u2013576.","DOI":"10.1109\/ICDE.2011.5767829"},{"issue":"11","key":"10.1016\/j.sysarc.2026.103781_b33","doi-asserted-by":"crossref","first-page":"3293","DOI":"10.1109\/TC.2015.2401036","article-title":"Verifiable auditing for outsourced database in cloud computing","volume":"64","author":"Wang","year":"2015","journal-title":"IEEE Trans. Comput."},{"key":"10.1016\/j.sysarc.2026.103781_b34","series-title":"Verkle trees","author":"Kuszmaul","year":"2019"},{"issue":"3","key":"10.1016\/j.sysarc.2026.103781_b35","first-page":"1","article-title":"LVMT: An efficient authenticated storage for blockchain","volume":"20","author":"Li","year":"2024","journal-title":"ACM Trans. Storage"},{"key":"10.1016\/j.sysarc.2026.103781_b36","series-title":"Proceedings of the IEEE 26th International Conference on Parallel and Distributed Systems","first-page":"456","article-title":"Enabling generic verifiable aggregate query on blockchain systems","author":"Zhu","year":"2020"},{"issue":"9","key":"10.1016\/j.sysarc.2026.103781_b37","doi-asserted-by":"crossref","first-page":"975","DOI":"10.14778\/3329772.3329775","article-title":"Fine-grained, secure and efficient data provenance on blockchain systems","volume":"12","author":"Ruan","year":"2019","journal-title":"Proc. VLDB Endow."},{"issue":"1","key":"10.1016\/j.sysarc.2026.103781_b38","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1145\/3422648.3422665","article-title":"Revealing every story of data in blockchain systems","volume":"49","author":"Ruan","year":"2020","journal-title":"ACM Sigmod Rec."},{"key":"10.1016\/j.sysarc.2026.103781_b39","doi-asserted-by":"crossref","unstructured":"R. Nygaard, V. Estrada-Gali\u00f1anes, H. Meling, Snarl: Entangled merkle trees for improved file availability and storage utilization, in: Proceedings of the 22nd International Middleware Conference, 2021, pp. 236\u2013247.","DOI":"10.1145\/3464298.3493397"},{"key":"10.1016\/j.sysarc.2026.103781_b40","series-title":"Proceedings of 2021 IEEE 27th International Conference on Parallel and Distributed Systems","first-page":"257","article-title":"Trusted sliding-window aggregation over blockchains","author":"Shao","year":"2021"},{"key":"10.1016\/j.sysarc.2026.103781_b41","doi-asserted-by":"crossref","unstructured":"Y. Ji, C. Xu, C. Zhang, J. Xu, DCert: towards secure, efficient, and versatile blockchain light clients, in: Proceedings of the 23rd ACM\/IFIP International Middleware Conference, 2022, pp. 269\u2013280.","DOI":"10.1145\/3528535.3565250"},{"issue":"4","key":"10.1016\/j.sysarc.2026.103781_b42","doi-asserted-by":"crossref","first-page":"1799","DOI":"10.1109\/TSC.2020.3020688","article-title":"Prime inner product encoding for effective wildcard-based multi-keyword fuzzy search","volume":"15","author":"Liu","year":"2020","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"2","key":"10.1016\/j.sysarc.2026.103781_b43","doi-asserted-by":"crossref","first-page":"2046","DOI":"10.1109\/TNSM.2020.3045467","article-title":"Secure multi-keyword fuzzy searches with enhanced service quality in cloud computing","volume":"18","author":"Liu","year":"2020","journal-title":"IEEE Trans. Netw. Serv. Manag."}],"container-title":["Journal of Systems Architecture"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1383762126000998?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1383762126000998?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T01:59:37Z","timestamp":1776131977000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1383762126000998"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":43,"alternative-id":["S1383762126000998"],"URL":"https:\/\/doi.org\/10.1016\/j.sysarc.2026.103781","relation":{},"ISSN":["1383-7621"],"issn-type":[{"value":"1383-7621","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Supporting efficient and verifiable keyword queries on dynamic blockchain data","name":"articletitle","label":"Article Title"},{"value":"Journal of Systems Architecture","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.sysarc.2026.103781","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"103781"}}