{"id":"https://openalex.org/W7129371620","doi":"https://doi.org/10.1109/ton.2026.3665769","title":"A Multi-Semantic Scheme to Verifiable EHRs Retrieval for Cloud-Based Telemedicine","display_name":"A Multi-Semantic Scheme to Verifiable EHRs Retrieval for Cloud-Based Telemedicine","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7129371620","doi":"https://doi.org/10.1109/ton.2026.3665769"},"language":null,"primary_location":{"id":"doi:10.1109/ton.2026.3665769","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ton.2026.3665769","pdf_url":null,"source":{"id":"https://openalex.org/S5407042750","display_name":"IEEE Transactions on Networking","issn_l":"2998-4157","issn":["2998-4157"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Na Wang","orcid":"https://orcid.org/0000-0002-8687-8820"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Na Wang","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126210029","display_name":"Guizhen Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guizhen Chen","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jianwei Liu","orcid":"https://orcid.org/0000-0003-2965-3518"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianwei Liu","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011916209","display_name":"Junsong Fu","orcid":"https://orcid.org/0000-0002-2445-1987"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junsong Fu","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.39232376,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"34","issue":null,"first_page":"3719","last_page":"3734"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9265000224113464,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9265000224113464,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.015200000256299973,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.008200000040233135,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.633899986743927},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5600000023841858},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.46639999747276306},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.4616999924182892},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4537999927997589},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.44179999828338623},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4147999882698059},{"id":"https://openalex.org/keywords/masking","display_name":"Masking (illustration)","score":0.4007999897003174},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.3790000081062317}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7608000040054321},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.633899986743927},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5600000023841858},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5407000184059143},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.46639999747276306},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.4616999924182892},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4537999927997589},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.44179999828338623},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4147999882698059},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.4007999897003174},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.3790000081062317},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3653999865055084},{"id":"https://openalex.org/C145642194","wikidata":"https://www.wikidata.org/wiki/Q870895","display_name":"Health informatics","level":3,"score":0.35190001130104065},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.34529998898506165},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.3296000063419342},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3138999938964844},{"id":"https://openalex.org/C2779891985","wikidata":"https://www.wikidata.org/wiki/Q46994","display_name":"Telemedicine","level":3,"score":0.3084000051021576},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.30169999599456787},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.29490000009536743},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.28679999709129333},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.271699994802475},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.2660999894142151},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.2644999921321869},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.2590999901294708}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ton.2026.3665769","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ton.2026.3665769","pdf_url":null,"source":{"id":"https://openalex.org/S5407042750","display_name":"IEEE Transactions on Networking","issn_l":"2998-4157","issn":["2998-4157"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Networking","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1377012391","display_name":null,"funder_award_id":"KG16395001","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G201280181","display_name":null,"funder_award_id":"2025TSQY04","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G4055927445","display_name":null,"funder_award_id":"62472015","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5422189942","display_name":null,"funder_award_id":"62472020","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G883877396","display_name":null,"funder_award_id":"2022YFB2702700","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"As":[0,19],"the":[1,42,57,75,82,89,99,120,126,131,154,159,191,199,211,229,247,260],"cornerstone":[2],"of":[3,78,84,130,193,201,232,251,264],"telemedicine,":[4],"Electronic":[5],"Health":[6],"Records":[7],"(EHRs)":[8],"not":[9],"only":[10],"reduce":[11],"clinical":[12,100],"costs":[13],"but":[14],"also":[15],"enable":[16],"precision":[17],"diagnostics.":[18],"medical":[20,46,58,79,108,161,209],"institutions":[21,80],"increasingly":[22],"outsource":[23],"EHRs":[24,148],"to":[25,116,219],"Cloud":[26],"Service":[27],"Providers":[28],"(CSPs),":[29],"dual":[30,169],"challenges":[31],"have":[32,66],"emerged":[33],"as":[34,60],"critical":[35],"issues:":[36],"preserving":[37],"patient":[38],"privacy":[39,200],"and":[40,72,86,128,249,256,262],"enhancing":[41],"search":[43,91,207,225],"experience":[44],"for":[45,147,177,208],"personnel.":[47],"While":[48],"multi-keyword":[49],"searchable":[50],"encryption":[51],"has":[52],"gained":[53],"significant":[54,67],"attention":[55],"in":[56,69,93,107,149],"domain":[59],"a":[61,140,166,236],"potential":[62,230],"solution,":[63],"existing":[64,94],"schemes":[65],"limitations":[68],"both":[70],"practicality":[71],"security.":[73],"First,":[74],"growing":[76],"number":[77],"complicates":[81],"management":[83],"key":[85,178],"privileges.":[87],"Second,":[88],"impoverished":[90],"semantics":[92,226],"query":[95],"mechanisms":[96],"severely":[97],"degrades":[98],"user":[101],"experience,":[102],"creating":[103],"unacceptable":[104],"operational":[105],"bottlenecks":[106],"practice.":[109],"Furthermore,":[110],"excessive":[111],"reliance":[112],"on":[113],"CSPs":[114],"leads":[115],"ignoring":[117],"situations":[118],"where":[119],"returned":[121,252],"results":[122],"are":[123],"incorrect,":[124],"impacting":[125],"availability":[127],"security":[129,155,261],"telemedicine":[132],"system.":[133],"To":[134,152,203],"address":[135],"these":[136],"limitations,":[137],"we":[138,163],"propose":[139],"Verifiable":[141],"Multi-Semantic":[142],"Keyword":[143],"Search":[144],"scheme":[145],"(VMSKS)":[146],"cloud-based":[150],"telemedicine.":[151],"resolve":[153],"requirements":[156],"arising":[157],"from":[158],"increasing":[160],"institutions,":[162],"innovatively":[164],"design":[165],"more":[167],"efficient":[168],"Secure":[170],"<italic":[171],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[172],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">k</i>-Nearest":[173],"Neighbor":[174],"technique":[175,216],"(SKNN)":[176],"distribution.":[179],"Meanwhile,":[180],"fine-grained":[181],"access":[182,187],"control":[183],"is":[184,217],"implemented":[185],"using":[186],"policy":[188],"trees,":[189],"ensuring":[190,246],"controllability":[192],"data":[194],"access.":[195],"This":[196],"approach":[197],"safeguards":[198],"EHRs.":[202],"support":[204,223],"flexible":[205],"EHR":[206],"personnel,":[210],"prime":[212],"Hadamard":[213],"product":[214],"encoding":[215],"exploited":[218],"provide":[220],"queries":[221],"that":[222],"multiple":[224],"simultaneously.":[227],"Given":[228],"unreliability":[231],"CSPs,":[233],"VMSKS":[234],"introduces":[235],"novel":[237],"verification":[238,242],"mechanism":[239],"by":[240],"constructing":[241],"proofs":[243],"during":[244],"encryption,":[245],"authenticity":[248],"integrity":[250],"results.":[253],"Theoretical":[254],"analysis":[255],"experimental":[257],"evaluation":[258],"demonstrate":[259],"efficiency":[263],"VMSKS,":[265],"respectively.":[266]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-02-18T00:00:00"}
