{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:06:38Z","timestamp":1771700798184,"version":"3.50.1"},"reference-count":37,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,1,20]],"date-time":"2021-01-20T00:00:00Z","timestamp":1611100800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&D Program of China","award":["2017YFB0802000"],"award-info":[{"award-number":["2017YFB0802000"]}]},{"name":"National Key R&D Program of China","award":["61862055"],"award-info":[{"award-number":["61862055"]}]},{"name":"National Key R&D Program of China","award":["62072369"],"award-info":[{"award-number":["62072369"]}]},{"name":"National Key R&D Program of China","award":["2020-SF-140"],"award-info":[{"award-number":["2020-SF-140"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2017YFB0802000"],"award-info":[{"award-number":["2017YFB0802000"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862055"],"award-info":[{"award-number":["61862055"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072369"],"award-info":[{"award-number":["62072369"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2020-SF-140"],"award-info":[{"award-number":["2020-SF-140"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Major Research and Development Project of Qinghai","award":["2017YFB0802000"],"award-info":[{"award-number":["2017YFB0802000"]}]},{"name":"Major Research and Development Project of Qinghai","award":["61862055"],"award-info":[{"award-number":["61862055"]}]},{"name":"Major Research and Development Project of Qinghai","award":["62072369"],"award-info":[{"award-number":["62072369"]}]},{"name":"Major Research and Development Project of Qinghai","award":["2020-SF-140"],"award-info":[{"award-number":["2020-SF-140"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,1,20]]},"abstract":"<jats:p>The emergence of the cloud storage has brought great convenience to people\u2019s life. Many individuals and enterprises have delivered a large amount of data to the third-party server for storage. Thus, the privacy protection of data retrieved by the user needs to be guaranteed. Searchable encryption technology for the cloud environment is adopted to ensure that the user information is secure with retrieving data. However, most schemes only support single-keyword search and do not support file updates, which limit the flexibility of the scheme. To eliminate these problems, we propose a blockchain-enabled public key encryption scheme with multi-keyword search (BPKEMS), and our scheme supports file updates. In addition, smart contract is used to ensure the fairness of transactions between data owner and user without introducing a third party. At the data storage stage, our scheme realizes the verifiability by numbering the files, which ensures that the ciphertext received by the user is complete. In terms of security and performance, our scheme is secure against inside keyword guessing attacks (KGAs) and has better computation overhead than other related schemes.<\/jats:p>","DOI":"10.1155\/2021\/6619689","type":"journal-article","created":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T00:50:24Z","timestamp":1611276624000},"page":"1-11","source":"Crossref","is-referenced-by-count":23,"title":["Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8773-778X","authenticated-orcid":true,"given":"Zhenwei","family":"Chen","sequence":"first","affiliation":[{"name":"School of Cyberspace Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an 710121, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4422-1270","authenticated-orcid":true,"given":"Axin","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Cybersecurity, Jinan University, Guangzhou 510632, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6507-7189","authenticated-orcid":true,"given":"Yifei","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an 710121, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8834-3531","authenticated-orcid":true,"given":"Qixuan","family":"Xing","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an 710121, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9897-3147","authenticated-orcid":true,"given":"Shengling","family":"Geng","sequence":"additional","affiliation":[{"name":"School of Computer, Qinghai Normal University, Xining, Qinghai 810008, China"},{"name":"Institute of Plateau Science and Sustainable Development, Xining, Qinghai, China"}]}],"member":"311","reference":[{"key":"1","first-page":"44","article-title":"Practical Techniques for Searches on Encrypted Data","author":"D. X. Song"},{"key":"2","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","article-title":"Public key encryption with keyword search","volume-title":"Advances in Cryptology-EUROCRYPT 2004","author":"D. Boneh","year":"2004"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8816172"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2915123"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3020841"},{"key":"6","first-page":"522","article-title":"Vabks: verifiable attribute-based keyword search over outsourced encrypted data","author":"Q. Zheng"},{"key":"7","first-page":"2110","article-title":"Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data","author":"W. Sun"},{"issue":"2","key":"8","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","article-title":"A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data","volume":"27","author":"Z. Xia","year":"2015","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.3233\/JCS-2011-0426","article-title":"Searchable symmetric encryption: improved definitions and efficient constructions","volume":"19","author":"R. Curtmola","year":"2011","journal-title":"Journal of Computer Security"},{"key":"10","first-page":"480","article-title":"Broadcast encryption,","volume-title":"Annual International Cryptology Conference","author":"A. Fiat","year":"1993"},{"key":"11","first-page":"646","article-title":"Threshold privacy preserving keyword searches","author":"P. Wang"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"issue":"4","key":"13","first-page":"760","article-title":"Public key timed-release searchable encryption in one-to-many scenarios","volume":"43","author":"K. Yuan","year":"2015","journal-title":"Acta Electronica Sinica"},{"issue":"10","key":"14","doi-asserted-by":"crossref","first-page":"1007","DOI":"10.1002\/sec.1395","article-title":"Many-to-one homomorphic encryption scheme","volume":"9","author":"H. Zhong","year":"2016","journal-title":"Security and Communication Networks"},{"key":"15","first-page":"163","article-title":"Public-key encryption with registered keyword search","author":"Q. Tang"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.03.008"},{"issue":"11","key":"17","doi-asserted-by":"crossref","first-page":"2266","DOI":"10.1109\/TC.2012.215","article-title":"Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack","volume":"62","author":"P. Xu","year":"2012","journal-title":"IEEE Transactions on Computers"},{"key":"18","first-page":"59","article-title":"A new general framework for secure public key encryption with keyword search","author":"R. Chen"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2015.07.006"},{"issue":"4","key":"20","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1109\/TIFS.2015.2510822","article-title":"Dual-server public-key encryption with keyword search for secure cloud storage","volume":"11","author":"R. Chen","year":"2015","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2017.03.038","article-title":"An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks","volume":"403","author":"Q. Huang","year":"2017","journal-title":"Information Sciences"},{"key":"22","first-page":"223","article-title":"A fully secure verifiable and outsourced decryption ranked searchable encryption scheme supporting synonym query,","author":"Y. Kang"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3224-8"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-018-00701-7"},{"issue":"2","key":"25","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1109\/TII.2017.2703922","article-title":"Certificateless searchable public key encryption scheme for industrial internet of things","volume":"14","author":"M. Ma","year":"2017","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2855-y"},{"key":"27","first-page":"89","article-title":"Outsourcing service fair payment based on blockchain and its applications in cloud computing","volume":"123","author":"Y. Zhang","year":"2018","journal-title":"IEEE Transactions on Services Computing"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.06.018"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2844400"},{"key":"30","article-title":"A searchable symmetric encryption scheme using blockchain","author":"H. Li","year":"2017"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.10.015"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.01.018"},{"key":"33","article-title":"robust and universal seamless handover authentication in 5g Hetnets","volume":"99","author":"Y. Zhang","year":"2019","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"9","key":"34","doi-asserted-by":"crossref","DOI":"10.5210\/fm.v2i9.548","article-title":"Formalizing and securing relationships on public networks","volume":"2","author":"N. Szabo","year":"1997","journal-title":"First Monday"},{"key":"35","first-page":"280","article-title":"Smart contracts and opportunities for formal methods","author":"A. Miller"},{"key":"36","first-page":"792","article-title":"Searching an encrypted cloud meets blockchain: a decentralized, reliable and fair realization","author":"S. Hu"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.12.003"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6619689.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6619689.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6619689.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,18]],"date-time":"2023-10-18T18:31:34Z","timestamp":1697653894000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/6619689\/"}},"subtitle":[],"editor":[{"given":"Qi","family":"Li","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1,20]]},"references-count":37,"alternative-id":["6619689","6619689"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6619689","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2021,1,20]]}}}