{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T19:09:50Z","timestamp":1765480190402,"version":"3.48.0"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"24","license":[{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["2023J01534"],"award-info":[{"award-number":["2023J01534"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"name":"External Cooperation Program of Science and Technology Department of Fujian Province, China","award":["2022I0027"],"award-info":[{"award-number":["2022I0027"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62401145"],"award-info":[{"award-number":["62401145"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Major Science and Technology Project of Fujian Province","award":["2024YZ040025"],"award-info":[{"award-number":["2024YZ040025"]}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20230479"],"award-info":[{"award-number":["BK20230479"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,12,15]]},"DOI":"10.1109\/jiot.2025.3613006","type":"journal-article","created":{"date-parts":[[2025,9,22]],"date-time":"2025-09-22T17:45:44Z","timestamp":1758563144000},"page":"52766-52780","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Attribute-Based Searchable Proxy Re-Encryption With Policy Hiding Over IoT Data"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-1218-2908","authenticated-orcid":false,"given":"Mengyan","family":"Li","sequence":"first","affiliation":[{"name":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3882-7041","authenticated-orcid":false,"given":"Yuexin","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"}]},{"given":"Chuan","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4562-9190","authenticated-orcid":false,"given":"He","family":"Fang","sequence":"additional","affiliation":[{"name":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8333-0704","authenticated-orcid":false,"given":"Jinbo","family":"Shen","sequence":"additional","affiliation":[{"name":"Fuzhou University Affiliated Provincial Hospital, Fuzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2971736"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3131724"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2012.106"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2916569"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/11844662_6"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet59005.2023.10490083"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3290975"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3365832"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2973570"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3432769"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2011.217"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2012.08.017"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2011.02.07"},{"key":"ref16","first-page":"563","article-title":"A multi-users searchable encryption scheme with proxy re-encryption","volume-title":"Proc. 10th Int. Conf. Comput. Intell. Secur.","author":"Zhang"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2973139"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77026-8_21"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03584-0_28"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2823309"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2729556"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3006474"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2935044"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3163340"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2012.11.002"},{"key":"ref26","first-page":"16","article-title":"On the security of a searchable anonymous attribute based encryption, in Communications in Computer, and Information Science, Haldia, India","volume-title":"Proc. Int. Conf. Math. Comput.","author":"Chaudhari"},{"key":"ref27","first-page":"168","article-title":"Recipient anonymous ciphertext-policy attribute-based broadcast encryption","volume":"20","author":"Zhang","year":"2018","journal-title":"Int. J. Netw. Secur."},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.01.021"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.2975184"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.102889"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2023.3242815"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3292129"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2017.2753231"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3574985"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3521423"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3529480"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11293846\/11175410.pdf?arnumber=11175410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T18:48:52Z","timestamp":1765478932000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11175410\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,15]]},"references-count":36,"journal-issue":{"issue":"24"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3613006","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2025,12,15]]}}}