{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T21:22:00Z","timestamp":1774128120591,"version":"3.50.1"},"reference-count":29,"publisher":"Oxford University Press (OUP)","issue":"5","license":[{"start":{"date-parts":[[2024,12,27]],"date-time":"2024-12-27T00:00:00Z","timestamp":1735257600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/pages\/standard-publication-reuse-rights"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,15]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>In recent years, cloud storage has gradually become a promising tool for providing data sharing and data storage services with privacy protection. However, to enable users to search over encrypted data and to enable data owners to perform fine-grained search authorization on their encrypted files is still a great challenge. Although attribute-based keyword search (ABKS) is a well-received solution to the challenge, the direct adoption of the traditional ABKS schemes in cloud storage suffers two issues. The first problem is the lack of integrity verification of search results. That is, the users cannot verify whether the server has actually performed a search without compromise. The second issue is that the retrieval modes of most ABKS schemes are not flexible enough. Aiming at the above two issues, a verifiable ABKS scheme is proposed herein. Besides, we proposed security definitions for two types of adversaries and proved that the proposed scheme is verifiable and able of resisting outside keyword guessing attack and chosen keyword attack. Finally, we carried out all-round simulations with actual data set, showing that the proposed scheme has advantage in efficiency over other similar schemes.<\/jats:p>","DOI":"10.1093\/comjnl\/bxae128","type":"journal-article","created":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T07:31:41Z","timestamp":1735371101000},"page":"510-519","source":"Crossref","is-referenced-by-count":3,"title":["Verifiable attribute-based multi-keyword ranked search scheme in blockchain"],"prefix":"10.1093","volume":"68","author":[{"given":"Yang","family":"Chen","sequence":"first","affiliation":[{"name":"National Computer Network Emergency Response Technical Team\/Coordination Center of China (CNCERT\/CC) , A3 Yumin Road, Beijing 100029,","place":["China"]}]},{"given":"Chunlu","family":"Zhao","sequence":"additional","affiliation":[{"name":"National Computer Network Emergency Response Technical Team\/Coordination Center of China (CNCERT\/CC) , A3 Yumin Road, Beijing 100029,","place":["China"]}]},{"given":"Jin","family":"Pan","sequence":"additional","affiliation":[{"name":"National Computer Network Emergency Response Technical Team\/Coordination Center of China (CNCERT\/CC) , A3 Yumin Road, Beijing 100029,","place":["China"]}]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"National Computer Network Emergency Response Technical Team\/Coordination Center of China (CNCERT\/CC) , A3 Yumin Road, Beijing 100029,","place":["China"]}]}],"member":"286","published-online":{"date-parts":[[2024,12,27]]},"reference":[{"key":"2025052712494339900_ref1","first-page":"42","article-title":"Big data: a review","volume-title":"International Conference on Collaboration Technologies and Systems, California, USA, 20-24 May","author":"Sagiroglu","year":"2013"},{"key":"2025052712494339900_ref2","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.future.2015.10.003","article-title":"A model to compare cloud and non-cloud storage of big data","volume":"57","author":"Chang","year":"2016","journal-title":"Future Gener Comput Syst"},{"key":"2025052712494339900_ref3","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","article-title":"Public key encryption with keyword search","volume-title":"International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2-6 May","author":"Boneh","year":"2004"},{"key":"2025052712494339900_ref4","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.jss.2017.12.008","article-title":"Secure multi-keyword ranked search over encrypted cloud data for multiple data owners","volume":"137","author":"Guo","year":"2018","journal-title":"J Syst Softw"},{"key":"2025052712494339900_ref5","first-page":"522","article-title":"VABKS: verifiable attribute-based keyword search over outsourced encrypted data","volume-title":"IEEE Conference on Computer Communications, Toronto, Canada, 27 April-2 May","author":"Zheng","year":"2014"},{"key":"2025052712494339900_ref6","first-page":"226","article-title":"Protecting your right: attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud","volume-title":"IEEE Conference on Computer Communications, Toronto, Canada, 27 April-2 May","author":"Sun","year":"2014"},{"key":"2025052712494339900_ref7","doi-asserted-by":"publisher","first-page":"22315","DOI":"10.1109\/JIOT.2021.3056116","article-title":"Verifiable multikeyword search encryption scheme with anonymous key generation for medical internet of things","volume":"9","author":"Liu","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"2025052712494339900_ref8","doi-asserted-by":"crossref","first-page":"3008","DOI":"10.1109\/JIOT.2017.2779124","article-title":"Practical attribute-based multi-keyword search scheme in mobile crowdsourcing","volume":"5","author":"Miao","year":"2017","journal-title":"IEEE Internet Things J"},{"key":"2025052712494339900_ref9","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1109\/TSC.2018.2823309","article-title":"Lightweight fine-grained search over encrypted data in fog computing","volume":"12","author":"Miao","year":"2018","journal-title":"IEEE Trans Serv Comput"},{"key":"2025052712494339900_ref10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TSC.2017.2757467","article-title":"Attribute-based keyword search over hierarchical data in cloud computing","volume":"13","author":"Miao","year":"2017","journal-title":"IEEE Trans Serv Comput"},{"key":"2025052712494339900_ref11","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/s10916-016-0617-z","article-title":"M 2-ABKS: attribute-based multi-keyword search over encrypted personal health records in multi-owner setting","volume":"40","author":"Miao","year":"2016","journal-title":"J Med Syst"},{"key":"2025052712494339900_ref12","doi-asserted-by":"publisher","first-page":"1748","DOI":"10.1093\/comjnl\/bxz052","article-title":"Efficient attribute-based data sharing scheme with hidden access structures","volume":"62","author":"Chen","year":"2019","journal-title":"Comput J"},{"key":"2025052712494339900_ref13","first-page":"89","article-title":"Attribute-based encryption for fine-grained access control of encrypted data","volume-title":"Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, USA, 30 October-3 November","author":"Goyal","year":"2006"},{"key":"2025052712494339900_ref14","first-page":"195","article-title":"Attribute-based encryption with non-monotonic access structures","volume-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, USA, 29 October-2 November","author":"Ostrovsky","year":"2007"},{"key":"2025052712494339900_ref15","first-page":"321","article-title":"Ciphertext-policy attribute-based encryption","volume-title":"IEEE Symposium on Security and Privacy (SP\u201907), Oakland, USA, 20-23 May","author":"Bethencourt","year":"2007"},{"key":"2025052712494339900_ref16","article-title":"Outsourcing the decryption of ABE ciphertexts","volume-title":"USENIX Security Symposium, San Francisco, USA, 8-12 August, Vol. 2011, No. 3","author":"Green","year":"2011"},{"key":"2025052712494339900_ref17","doi-asserted-by":"publisher","first-page":"58955","DOI":"10.1109\/ACCESS.2018.2875070","article-title":"Generic construction of outsourced attribute-based encryption without key escrow","volume":"6","author":"Chen","year":"2018","journal-title":"IEEE Access"},{"key":"2025052712494339900_ref18","doi-asserted-by":"publisher","first-page":"1748","DOI":"10.1093\/comjnl\/bxz052","article-title":"Efficient attribute-based data sharing scheme with hidden access structures","volume":"62","author":"Chen","year":"2019","journal-title":"Comput J"},{"key":"2025052712494339900_ref19","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1109\/TDSC.2016.2608343","article-title":"White-box traceable CP-ABE for cloud storage service: how to catch people leaking their access credentials effectively","volume":"15","author":"Ning","year":"2016","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"2025052712494339900_ref20","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1007\/978-3-642-20465-4_31","article-title":"Decentralizing attribute-based encryption","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques, May Berlin, Heidelberg, May","author":"Lewko","year":"2011"},{"key":"2025052712494339900_ref21","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.compeleceng.2017.06.021","article-title":"Verifiable keyword search over encrypted cloud data in smart city","volume":"65","author":"Miao","year":"2018","journal-title":"Comput Electr Eng"},{"key":"2025052712494339900_ref22","doi-asserted-by":"publisher","first-page":"052105","DOI":"10.1007\/s11432-015-5449-9","article-title":"Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack","volume":"60","author":"Qiu","year":"2017","journal-title":"Sci China Inf Sci"},{"key":"2025052712494339900_ref23","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.1109\/TDSC.2018.2864186","article-title":"Attribute-based hybrid boolean keyword search over outsourced encrypted data","volume":"17","author":"He","year":"2018","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"2025052712494339900_ref24","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1109\/TSC.2019.2959306","article-title":"Practical attribute-based multi-keyword ranked search scheme in cloud computing","volume":"15","author":"Chen","year":"2019","journal-title":"IEEE Trans Serv Comput"},{"key":"2025052712494339900_ref25","first-page":"647","article-title":"Attribute-based encryption in the generic group model: automated proofs and new constructions","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, USA, 30 October-3 November","author":"Ambrona","year":"2017"},{"key":"2025052712494339900_ref26","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/3-540-69053-0_18","article-title":"Lower bounds for discrete logarithms and related problems","volume-title":"International Conference on the Theory and Applications of Cryptographic Techniques, Konstanz, Germany, 11-15 May","author":"Shoup","year":"1997"},{"key":"2025052712494339900_ref27","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/11844662_6","article-title":"Off-line keyword guessing attacks on recent keyword search schemes over encrypted data","volume-title":"Workshop on Secure Data Management, Seoul, Korea, 10-11 September","author":"Byun","year":"2006"},{"key":"2025052712494339900_ref28","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","article-title":"Short signatures from the Weil pairing","volume-title":"International Conference on the Theory and Application of Cryptology and Information Security, Berlin, Heidelberg, November","author":"Boneh","year":"2001"},{"key":"2025052712494339900_ref29","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/978-3-662-47854-7_19","article-title":"Efficient statically-secure large-universe multi-authority attribute-based encryption","volume-title":"International Conference on Financial Cryptography and Data Security, San Juan, Puerto Rico, 26-30 January","author":"Rouselakis","year":"2015"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/68\/5\/510\/61286439\/bxae128.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/68\/5\/510\/61286439\/bxae128.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T16:50:22Z","timestamp":1748364622000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/68\/5\/510\/7933712"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,27]]},"references-count":29,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2024,12,27]]},"published-print":{"date-parts":[[2025,5,15]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxae128","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2025,5]]},"published":{"date-parts":[[2024,12,27]]}}}