{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:04:49Z","timestamp":1774541089474,"version":"3.50.1"},"reference-count":26,"publisher":"Tech Science Press","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.063274","type":"journal-article","created":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T04:16:11Z","timestamp":1744085771000},"page":"5199-5217","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Searchable Encryption Scheme Supporting Fuzzy Multi-Keyword Ranking Search on Blockchain"],"prefix":"10.32604","volume":"83","author":[{"given":"Hongliang","family":"Tian","sequence":"first","affiliation":[]},{"given":"Zhong","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Zhiyang","family":"Ruan","sequence":"additional","affiliation":[]},{"given":"Aomen","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"2000 IEEE Symposium on Security & Privacy (IEEE S&P)","first-page":"44","article-title":"Practical techniques for searches on encrypted data","author":"Song","year":"2000 May 14\u201317"},{"key":"ref2","series-title":"2017 International Conference on Computer Technology, Electronics and Communication (ICCTEC)","first-page":"579","article-title":"A privacy preserving public-key searchable encryption scheme with fast keyword search","author":"Wu","year":"2017 Dec 19\u201321"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"895","DOI":"10.3233\/JCS-2011-0426","article-title":"Searchable symmetric encryption: improved definitions and efficient constructions","volume":"19","author":"Curtmola","year":"2011","journal-title":"J Comput Secur"},{"key":"ref4","series-title":"2004 Cryptography & Network Security Conference (ACNS)","first-page":"31","article-title":"Secure conjunctive keyword search over encrypted data","author":"Golle","year":"2004 Jun 8\u201311"},{"key":"ref5","series-title":"2010 IEEE 30th International Conference on Distributed Computing Systems (ICDCS)","first-page":"253","article-title":"Secure ranked keyword search over encrypted cloud data","author":"Wang","year":"2010 Jun 21\u201325"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","article-title":"A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data","volume":"27","author":"Xia","year":"2016","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"951","DOI":"10.1109\/TPDS.2015.2425407","article-title":"An efficient privacy-preserving ranked keyword search method","volume":"27","author":"Chen","year":"2016","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2017\/1404279","article-title":"Muse: an efficient and accurate verifiable privacy-preserving multi-keyword text search over encrypted cloud data","volume":"2017","author":"Zhu","year":"2017","journal-title":"Secur Commun Netw"},{"key":"ref9","series-title":"2010 Proceedings IEEE International Conference on Computer Communications","first-page":"1","article-title":"Fuzzy keyword search over encrypted data in cloud computing","author":"Li","year":"2010 Mar 14\u201319"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"3914","DOI":"10.3934\/mbe.2019193","article-title":"Public key encryption with temporary and fuzzy keyword search","volume":"16","author":"Vaanchig","year":"2019","journal-title":"Math Biosci Eng"},{"key":"ref11","series-title":"2014 Proceedings IEEE International Conference on Computer Communications","first-page":"2112","article-title":"Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud","author":"Wang","year":"2014 Apr 27\u2013May 2"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"2046","DOI":"10.1109\/TNSM.2020.3045467","article-title":"Secure multi-keyword fuzzy searches with enhanced service quality in cloud computing","volume":"18","author":"Liu","year":"2021","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"ref13","first-page":"1804","article-title":"Optimized verifiable fine-grained keyword search in dynamic multi-owner settings","volume":"18","author":"Miao","year":"2021","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"12902","DOI":"10.1109\/JIOT.2021.3063855","article-title":"Toward verifiable phrase search over encrypted cloud-based IoT data","volume":"8","author":"Ge","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"22315","DOI":"10.1109\/JIOT.2021.3056116","article-title":"Verifiable multi-keyword search encryption scheme with anonymous key generation for medical internet of things","volume":"9","author":"Liu","year":"2022","journal-title":"IEEE Internet Things J"},{"key":"ref16","series-title":"2018 Proceedings IEEE International Conference on Computer Communications","article-title":"Searching an encrypted cloud meets blockchain: a decentralized, reliable and fair realization","author":"Hu","year":"2018 Apr 16\u201319"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"31077","DOI":"10.1109\/ACCESS.2018.2844400","article-title":"Tkse: trustworthy keyword search over encrypted data with two-side verifiability via blockchain","volume":"6","author":"Zhang","year":"2018","journal-title":"IEEE Access"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"148677","DOI":"10.1109\/ACCESS.2024.3472119","article-title":"Enhancing IoT security and efficiency: a blockchain-assisted multi-keyword searchable encryption scheme","volume":"12","author":"Han","year":"2024","journal-title":"IEEE Access"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"11740","DOI":"10.3390\/app142411740","article-title":"Blockchain-assisted verifiable and multi-user fuzzy search encryption scheme","volume":"14","author":"Yan","year":"2024","journal-title":"Appl Sci"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"71893","DOI":"10.1109\/ACCESS.2020.2966367","article-title":"Fsse: an effective fuzzy semantic searchable encryption scheme over encrypted cloud data","volume":"8","author":"Liu","year":"2020","journal-title":"IEEE Access"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"45725","DOI":"10.1109\/ACCESS.2018.2866031","article-title":"Enabling efficient verifiable fuzzy keyword search over encrypted data in cloud computing","volume":"6","author":"Ge","year":"2018","journal-title":"IEEE Access"},{"key":"ref22","first-page":"698","article-title":"Vrfms: verifiable ranked fuzzy multi-keyword search over encrypted data","volume":"16","author":"Li","year":"2023","journal-title":"IEEE Trans Serv Comput"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"667","DOI":"10.2298\/CSIS121104028W","article-title":"Efficient verifiable fuzzy keyword search over encrypted data in cloud computing","volume":"10","author":"Wang","year":"2013","journal-title":"Comput Sci Inf Syst"},{"key":"ref24","series-title":"2019 International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS)","first-page":"397","article-title":"A verifiable encryption scheme supporting fuzzy search","author":"Huang","year":"2019 Jul 14\u201317"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1109\/TDSC.2018.2875682","article-title":"Proxy-free privacy-preserving task matching with efficient revocation in crowdsourcing","volume":"18","author":"Shu","year":"2021","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"ref26","series-title":"2021 Proceedings of the 30th ACM International Conference on Information and Knowledge Management (CIKM)","first-page":"1879","article-title":"Reliable and privacy-preserving task matching in blockchain-based crowdsourcing","author":"Wang","year":"2021 Nov 1\u20135"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-3\/TSP_CMC_63274\/TSP_CMC_63274.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:28:49Z","timestamp":1763342929000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n3\/61038"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":26,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.063274","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}