{"id":"https://openalex.org/W4409274473","doi":"https://doi.org/10.32604/cmc.2025.063274","title":"Efficient Searchable Encryption Scheme Supporting Fuzzy Multi-Keyword Ranking Search on Blockchain","display_name":"Efficient Searchable Encryption Scheme Supporting Fuzzy Multi-Keyword Ranking Search on Blockchain","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4409274473","doi":"https://doi.org/10.32604/cmc.2025.063274"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.063274","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.063274","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.063274","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100563445","display_name":"Hongliang Tian","orcid":"https://orcid.org/0009-0005-1248-4078"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hongliang Tian","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103163895","display_name":"Zhong Fan","orcid":"https://orcid.org/0000-0002-5575-1536"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhong Fan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Zhiyang Ruan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhiyang Ruan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Aomen Zhao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Aomen Zhao","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100563445"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08318964,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"83","issue":"3","first_page":"5199","last_page":"5217"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.8840000033378601,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.8840000033378601,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.8529999852180481,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12541","display_name":"Graph Labeling and Dimension Problems","score":0.8472999930381775,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.8796485662460327},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.7549245357513428},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6774327158927917},{"id":"https://openalex.org/keywords/keyword-search","display_name":"Keyword search","score":0.6400900483131409},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6271464824676514},{"id":"https://openalex.org/keywords/ranking","display_name":"Ranking (information retrieval)","score":0.6113914847373962},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.5186495184898376},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.4548242390155792},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3702552318572998},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28937816619873047},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2133658230304718},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.14263319969177246}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.8796485662460327},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.7549245357513428},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6774327158927917},{"id":"https://openalex.org/C2988412617","wikidata":"https://www.wikidata.org/wiki/Q7441656","display_name":"Keyword search","level":2,"score":0.6400900483131409},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6271464824676514},{"id":"https://openalex.org/C189430467","wikidata":"https://www.wikidata.org/wiki/Q7293293","display_name":"Ranking (information retrieval)","level":2,"score":0.6113914847373962},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.5186495184898376},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.4548242390155792},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3702552318572998},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28937816619873047},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2133658230304718},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.14263319969177246},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.063274","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.063274","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.063274","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.063274","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1979493600","https://openalex.org/W2006118065","https://openalex.org/W2089993141","https://openalex.org/W2145426052","https://openalex.org/W2732367933","https://openalex.org/W2807455604","https://openalex.org/W2887451642","https://openalex.org/W2897549154","https://openalex.org/W2943403461","https://openalex.org/W3000690211","https://openalex.org/W3112827404","https://openalex.org/W3127586197","https://openalex.org/W3134152183","https://openalex.org/W4403059163","https://openalex.org/W4405443638"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3048554917","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4386732777","https://openalex.org/W1503401473","https://openalex.org/W1993927003"],"abstract_inverted_index":{"With":[0],"the":[1,17,45,50,73,106,116,130,134,137,146,151,154,166,172,181,207,218,222,236,241,249],"continuous":[2],"growth":[3],"of":[4,34,53,75,129,136,153],"exponential":[5],"data":[6,15,38,140,155],"in":[7,121,255],"IoT,":[8],"it":[9,48],"is":[10,31,143,163,203,214,232,251],"usually":[11,24],"chosen":[12],"to":[13,16,114,149,170,179,205,216,234],"outsource":[14],"cloud":[18,21,86],"server.":[19],"However,":[20],"servers":[22,87],"are":[23,112],"provided":[25],"by":[26,145],"third":[27],"parties,":[28],"and":[29,84,90,110,118,185,197,221,239,253],"there":[30],"a":[32,122,187],"risk":[33],"privacy":[35],"leakage.":[36],"Encrypting":[37],"can":[39,59],"ensure":[40,150],"its":[41],"security,":[42],"but":[43],"at":[44],"same":[46],"time,":[47],"loses":[49],"retrieval":[51,62,79,82,141,175,242],"function":[52,162],"IoT":[54],"data.":[55,66,138],"Searchable":[56],"Encryption":[57],"(SE)":[58],"achieve":[60],"direct":[61],"based":[63],"on":[64,105],"ciphertext":[65],"The":[67,108,126,139,157,210,244],"traditional":[68],"searchable":[69,97],"encryption":[70,98],"scheme":[71,99,231,250],"has":[72],"problems":[74],"imperfect":[76],"function,":[77],"low":[78],"efficiency,":[80],"inaccurate":[81],"results,":[83],"centralized":[85],"being":[88],"vulnerable":[89],"untrustworthy.":[91],"This":[92],"paper":[93],"proposes":[94],"an":[95],"Efficient":[96],"supporting":[100],"fuzzy":[101,173],"multi-keyword":[102,174],"ranking":[103],"search":[104,208],"blockchain.":[107],"blockchain":[109],"IPFS":[111],"used":[113],"store":[115],"index":[117,219,223,237],"encrypted":[119],"files":[120],"distributed":[123,131],"manner":[124],"respectively.":[125],"tamper":[127],"resistance":[128],"ledger":[132],"ensures":[133],"authenticity":[135],"work":[142],"performed":[144],"smart":[147],"contract":[148],"reliability":[152],"retrieval.":[156],"Local":[158],"Sensitive":[159],"Hash":[160],"(LSH)":[161],"combined":[164],"with":[165],"Bloom":[167],"Filter":[168],"(BF)":[169],"realize":[171],"function.":[176],"In":[177],"addition,":[178],"measure":[180],"correlation":[182],"between":[183],"keywords":[184],"files,":[186],"new":[188],"weighted":[189],"statistical":[190],"algorithm":[191],"combining":[192],"Regional":[193],"Weight":[194],"Score":[195],"(RWS)":[196],"Term":[198],"Frequency\u2013Inverse":[199],"Document":[200],"Frequency":[201],"(TF-IDF)":[202],"proposed":[204],"rank":[206],"results.":[209],"balanced":[211],"binary":[212,224],"tree":[213,225],"introduced":[215],"establish":[217],"structure,":[220],"traversal":[226],"strategy":[227],"suitable":[228],"for":[229],"this":[230],"constructed":[233],"optimize":[235],"structure":[238],"improve":[240],"efficiency.":[243],"experimental":[245],"results":[246],"show":[247],"that":[248],"safe":[252],"effective":[254],"practical":[256],"applications.":[257]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
