{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:56:40Z","timestamp":1773511000897,"version":"3.50.1"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&amp;D Program of China","award":["2018AAA0100101"],"award-info":[{"award-number":["2018AAA0100101"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61932006"],"award-info":[{"award-number":["61932006"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772434"],"award-info":[{"award-number":["61772434"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61403121"],"award-info":[{"award-number":["61403121"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61806169"],"award-info":[{"award-number":["61806169"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Chongqing Technology Innovation and Application Development","award":["cstc2020jscx-msxmx0156"],"award-info":[{"award-number":["cstc2020jscx-msxmx0156"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2023,1,1]]},"DOI":"10.1109\/tcc.2021.3098420","type":"journal-article","created":{"date-parts":[[2021,7,21]],"date-time":"2021-07-21T20:36:50Z","timestamp":1626899810000},"page":"457-469","source":"Crossref","is-referenced-by-count":15,"title":["A Novel Privacy-Preserving Location-Based Services Search Scheme in Outsourced Cloud"],"prefix":"10.1109","volume":"11","author":[{"given":"Dong","family":"Li","sequence":"first","affiliation":[{"name":"Key Laboratory of Dependable Services Computing in Cyber Physical &amp; Society-Ministry of Education, College of Computer, Chongqing University, Chongqing, China"}]},{"given":"Jiahui","family":"Wu","sequence":"additional","affiliation":[{"name":"Peng Cheng Laboratory, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2240-5263","authenticated-orcid":false,"given":"Junqing","family":"Le","sequence":"additional","affiliation":[{"name":"Key Laboratory of Dependable Services Computing in Cyber Physical &amp; Society-Ministry of Education, College of Computer, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3372-9207","authenticated-orcid":false,"given":"Xiaofeng","family":"Liao","sequence":"additional","affiliation":[{"name":"Key Laboratory of Dependable Services Computing in Cyber Physical &amp; Society-Ministry of Education, College of Computer, Chongqing University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9439-4623","authenticated-orcid":false,"given":"Tao","family":"Xiang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Dependable Services Computing in Cyber Physical &amp; Society-Ministry of Education, College of Computer, Chongqing University, Chongqing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2011.2164068"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2399291"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020602"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1145\/1868470.1868479","article-title":"Show me how you move and I will tell you who you are","volume-title":"Proc. 3rd ACM SIGSPATIAL Int. Workshop Secur. Privacy GIS LBS, SPRINGL","author":"Gambs","year":"2010"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1126\/science.1177170"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.10.135"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2668419"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24632-9_20"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03329-3_15"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2472996"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.105"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2013.55"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218474"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376631"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544932"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1062"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.12.010"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2499791"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2506573"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.45"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/477\/09303"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101701"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46447-2_33"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48797-6_20"},{"issue":"2","key":"ref25","first-page":"25","article-title":"Function encryption for inner product based on matrix","volume":"15","author":"Xu","year":"2016","journal-title":"J. Guangzhou Univ. (Natural Sci. Ed.)"},{"issue":"8","key":"ref26","first-page":"225","article-title":"Privacy-preserving method based on location service in personalized search","volume":"40","author":"Zhang","year":"2018","journal-title":"J. Electron. Inf. Technol."},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73540-3_14"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497445"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.87"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1995.492461"},{"issue":"2","key":"ref35","first-page":"340","volume-title":"IEEE Trans. Parallel Distrib. Syst.","volume":"27","author":"Xia","year":"2016"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567113"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2932065"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567085"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/srds45096.2018"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847945"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2016.11.028"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2016.23"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2017.2751471"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2172209"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2016.52"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.2295809"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2363765"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2947920"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245519\/10061174\/09492327.pdf?arnumber=9492327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T23:05:04Z","timestamp":1705014304000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9492327\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,1]]},"references-count":47,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2021.3098420","relation":{},"ISSN":["2168-7161","2372-0018"],"issn-type":[{"value":"2168-7161","type":"electronic"},{"value":"2372-0018","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,1]]}}}