{"id":"https://openalex.org/W4415222764","doi":"https://doi.org/10.1109/cns66487.2025.11195061","title":"MulShare: A Multi-Receiver Encrypted Search Scheme to Secure Cloud-Assisted EMRs Sharing","display_name":"MulShare: A Multi-Receiver Encrypted Search Scheme to Secure Cloud-Assisted EMRs Sharing","publication_year":2025,"publication_date":"2025-09-08","ids":{"openalex":"https://openalex.org/W4415222764","doi":"https://doi.org/10.1109/cns66487.2025.11195061"},"language":"en","primary_location":{"id":"doi:10.1109/cns66487.2025.11195061","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns66487.2025.11195061","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102714724","display_name":"Shiyuan Xu","orcid":"https://orcid.org/0000-0001-9076-1695"},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Shiyuan Xu","raw_affiliation_strings":["The University of Hong Kong,Department of Computer Science,Pokfulam,Hong Kong"],"affiliations":[{"raw_affiliation_string":"The University of Hong Kong,Department of Computer Science,Pokfulam,Hong Kong","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100408555","display_name":"Xue Chen","orcid":"https://orcid.org/0000-0002-9456-3124"},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xue Chen","raw_affiliation_strings":["The University of Hong Kong,Department of Computer Science,Pokfulam,Hong Kong"],"affiliations":[{"raw_affiliation_string":"The University of Hong Kong,Department of Computer Science,Pokfulam,Hong Kong","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022746086","display_name":"Yan Zhao","orcid":"https://orcid.org/0000-0003-1143-355X"},"institutions":[{"id":"https://openalex.org/I25254941","display_name":"Beijing Normal University","ror":"https://ror.org/022k4wk35","country_code":"CN","type":"education","lineage":["https://openalex.org/I25254941"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Zhao","raw_affiliation_strings":["School of Artificial Intelligence, Beijing Normal University,Beijing,China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Beijing Normal University,Beijing,China","institution_ids":["https://openalex.org/I25254941"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076028438","display_name":"Shang Gao","orcid":"https://orcid.org/0000-0003-2692-057X"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Shang Gao","raw_affiliation_strings":["School of Accounting and Finance, Hong Kong Polytechnic University,Department of Computing,Hong Kong"],"affiliations":[{"raw_affiliation_string":"School of Accounting and Finance, Hong Kong Polytechnic University,Department of Computing,Hong Kong","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101984165","display_name":"Jing Wang","orcid":"https://orcid.org/0000-0002-9653-7253"},"institutions":[{"id":"https://openalex.org/I25254941","display_name":"Beijing Normal University","ror":"https://ror.org/022k4wk35","country_code":"CN","type":"education","lineage":["https://openalex.org/I25254941"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Wang","raw_affiliation_strings":["School of Artificial Intelligence, Beijing Normal University,Beijing,China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Beijing Normal University,Beijing,China","institution_ids":["https://openalex.org/I25254941"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025130883","display_name":"Siu Ming Yiu","orcid":"https://orcid.org/0000-0002-3975-8500"},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Siu-Ming Yiu","raw_affiliation_strings":["The University of Hong Kong,Department of Computer Science,Pokfulam,Hong Kong"],"affiliations":[{"raw_affiliation_string":"The University of Hong Kong,Department of Computer Science,Pokfulam,Hong Kong","institution_ids":["https://openalex.org/I889458895"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5102714724"],"corresponding_institution_ids":["https://openalex.org/I889458895"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31142258,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9733999967575073,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9733999967575073,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.949999988079071,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9445000290870667,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6717000007629395},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6169999837875366},{"id":"https://openalex.org/keywords/ciphertext-indistinguishability","display_name":"Ciphertext indistinguishability","score":0.4912000000476837},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.4449000060558319},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.4284000098705292},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.4260999858379364},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.42289999127388},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4226999878883362},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4099000096321106},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.39340001344680786}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7846999764442444},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6717000007629395},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6169999837875366},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5453000068664551},{"id":"https://openalex.org/C182776695","wikidata":"https://www.wikidata.org/wiki/Q840661","display_name":"Ciphertext indistinguishability","level":5,"score":0.4912000000476837},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.4449000060558319},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.4284000098705292},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.4260999858379364},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.42289999127388},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4226999878883362},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4099000096321106},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.39340001344680786},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.38179999589920044},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.37619999051094055},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.37139999866485596},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.3695000112056732},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.353300005197525},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3398999869823456},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.33059999346733093},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.3301999866962433},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.32670000195503235},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.31779998540878296},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.31520000100135803},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3107999861240387},{"id":"https://openalex.org/C2778950925","wikidata":"https://www.wikidata.org/wiki/Q4672474","display_name":"Access structure","level":4,"score":0.310699999332428},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.30250000953674316},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2939000129699707},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.28439998626708984},{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.28349998593330383},{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.2799000144004822},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.27900001406669617},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.2712000012397766},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.2632000148296356},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.26269999146461487},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.25609999895095825},{"id":"https://openalex.org/C205711294","wikidata":"https://www.wikidata.org/wiki/Q176953","display_name":"Rendering (computer graphics)","level":2,"score":0.2506999969482422}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cns66487.2025.11195061","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns66487.2025.11195061","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W2967320897","https://openalex.org/W3019423257","https://openalex.org/W3048191665","https://openalex.org/W3127586197","https://openalex.org/W3152607780","https://openalex.org/W3167326923","https://openalex.org/W3202964153","https://openalex.org/W3208451968","https://openalex.org/W4220854638","https://openalex.org/W4280602049","https://openalex.org/W4290996397","https://openalex.org/W4312658206","https://openalex.org/W4318323571","https://openalex.org/W4322576820","https://openalex.org/W4324292887","https://openalex.org/W4361860636","https://openalex.org/W4365806749","https://openalex.org/W4376481172","https://openalex.org/W4383113006","https://openalex.org/W4386825120","https://openalex.org/W4391174664","https://openalex.org/W4391725264","https://openalex.org/W4392140910","https://openalex.org/W4392956768","https://openalex.org/W4398759940","https://openalex.org/W4402592908","https://openalex.org/W4403578209","https://openalex.org/W4403937362","https://openalex.org/W4404239113","https://openalex.org/W4405517714","https://openalex.org/W4407361694","https://openalex.org/W4407764606","https://openalex.org/W4408324963","https://openalex.org/W4408521117","https://openalex.org/W4408609361"],"related_works":[],"abstract_inverted_index":{"Cloud-assisted":[0],"electronic":[1],"medical":[2,132,159],"records":[3],"(EMRs)":[4],"sharing":[5,30,128,227],"has":[6],"garnered":[7],"significant":[8],"attention":[9],"in":[10,117],"the":[11,21,158,165,173],"context":[12],"of":[13,23],"smart":[14],"and":[15,35,45,86,147,181,190,201,212,223],"connected":[16],"healthcare":[17],"systems.":[18,228],"However,":[19],"ensuring":[20],"security":[22,174,179],"EMRs":[24,62,126,226],"remains":[25],"a":[26,106,149],"critical":[27],"challenge":[28],"when":[29],"sensitive":[31],"data":[32,58,133],"between":[33],"patients":[34],"doctors,":[36],"primarily":[37],"due":[38],"to":[39,63,89,113,168,210,214,217],"risks":[40],"such":[41],"as":[42],"malicious":[43],"access":[44],"information":[46],"leakage.":[47],"To":[48,171],"mitigate":[49],"these,":[50],"recent":[51],"studies":[52],"leveraged":[53],"searchable":[54],"encryption":[55,166],"techniques,":[56],"where":[57],"senders":[59],"outsource":[60],"encrypted":[61,109],"cloud":[64],"servers":[65],"while":[66],"allowing":[67],"receivers":[68,146],"query":[69],"confidentially.":[70],"Despite":[71],"these":[72],"efforts,":[73],"existing":[74,137],"solutions":[75],"face":[76],"limitations:":[77],"multi-receiver":[78,108],"search":[79,110],"mechanisms":[80],"rely":[81],"on":[82],"cumbersome":[83],"key-sharing":[84],"protocols,":[85],"their":[87],"vulnerability":[88],"keyword":[90],"guessing":[91],"attacks":[92],"(KGA),":[93],"rendering":[94],"them":[95],"unsuitable":[96],"for":[97,144,204,225],"EMR-sharing":[98],"scenarios.":[99],"In":[100],"this":[101],"paper,":[102],"we":[103,156,176],"propose":[104],"MulShare,":[105],"novel":[107],"scheme":[111],"designed":[112],"address":[114],"privacy":[115],"preservation":[116],"cloud-assisted":[118],"EMR":[119],"sharing.":[120],"MulShare":[121],"not":[122],"only":[123,208],"enjoys":[124],"efficient":[125],"ciphertext":[127,153,186,205],"but":[129],"also":[130],"realizes":[131],"sender":[134],"authentication.":[135],"Unlike":[136],"solutions,":[138],"our":[139,199],"design":[140],"distributes":[141],"distinct":[142],"keys":[143],"multiple":[145],"integrates":[148],"randomization":[150],"mechanism":[151],"into":[152,164],"generation.":[154],"Additionally,":[155],"embed":[157],"sender's":[160],"secret":[161],"key":[162],"directly":[163],"process":[167],"ensure":[169],"authenticity.":[170],"validate":[172],"guarantees,":[175],"formalize":[177],"its":[178],"model":[180],"give":[182],"rigorous":[183],"proofs":[184],"demonstrating":[185],"indistinguishability":[187,192],"(CI":[188],"security)":[189],"token":[191],"(TI":[193],"security).":[194],"Comparative":[195],"results":[196],"indicate":[197],"that":[198],"communication":[200],"computational":[202],"overhead":[203],"generation":[206],"is":[207,221],"13.2%":[209],"21.1%":[211],"5.8%":[213],"32.1%":[215],"compared":[216],"prior":[218],"arts,":[219],"which":[220],"effective":[222],"practical":[224]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-16T00:00:00"}
