{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T20:31:29Z","timestamp":1757449889557,"version":"3.37.3"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"14","license":[{"start":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T00:00:00Z","timestamp":1689379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T00:00:00Z","timestamp":1689379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T00:00:00Z","timestamp":1689379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB1005900"],"award-info":[{"award-number":["2020YFB1005900"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072051","61672110","61671082","61976024","61972048"],"award-info":[{"award-number":["62072051","61672110","61671082","61976024","61972048"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2023,7,15]]},"DOI":"10.1109\/jiot.2021.3128528","type":"journal-article","created":{"date-parts":[[2021,11,16]],"date-time":"2021-11-16T20:36:03Z","timestamp":1637094963000},"page":"12090-12101","source":"Crossref","is-referenced-by-count":8,"title":["Privacy Protection Data Retrieval Scheme With Inverted Index for IoT Based on Blockchain"],"prefix":"10.1109","volume":"10","author":[{"given":"Wenmin","family":"Li","sequence":"first","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8999-1511","authenticated-orcid":false,"given":"Yang","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Emergency Responding, National Computer Network Emergency Response Technical Team\/Coordination Center of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1546-4364","authenticated-orcid":false,"given":"Fei","family":"Gao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5362-8916","authenticated-orcid":false,"given":"Shuo","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0532-9783","authenticated-orcid":false,"given":"Hua","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7142-9726","authenticated-orcid":false,"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2875070"},{"key":"ref12","first-page":"34","article-title":"Outsourcing the decryption of ABE ciphertexts","volume":"2011","author":"green","year":"2011","journal-title":"Proc Usenix Security Symp"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2608343"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2475723"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0057-3"},{"key":"ref30","first-page":"256","article-title":"Lower bounds for discrete logarithms and related problems","author":"shoup","year":"1997","journal-title":"Proc Int Conf Theory Appl Cryptogr Techn"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_19"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/6GSUMMIT49458.2020.9083832"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3087818"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847943"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847976"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.11.018"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/11844662_6"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2779124"},{"key":"ref23","article-title":"The art of computer programming","volume":"1","author":"knuth","year":"1997","journal-title":"Fundamental Algorithms"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2017.2757467"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2823309"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0617-z"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2011-0426"},{"key":"ref21","article-title":"Practical attribute-based multi-keyword ranked search scheme in cloud computing","author":"chen","year":"2019","journal-title":"IEEE Trans Services Comput"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1587\/elex.6.237"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2864186"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134088"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3057890"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.12.008"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2020.100158"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3069324"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3072236"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3078639"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10175002\/09615371.pdf?arnumber=9615371","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T17:44:08Z","timestamp":1690825448000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9615371\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,15]]},"references-count":32,"journal-issue":{"issue":"14"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2021.3128528","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2023,7,15]]}}}