Fuzzy Encryption Search Scheme and Data Verification Mechanism Based on Blockchain Article Swipe
With the development of blockchain technology, the security of blockchain data verification has received increasing attention. A fuzzy encryption search scheme and data verification mechanism are proposed in the study. First, privacy protection of the raw data is achieved through a hierarchical Mini Batch K-Means clustering algorithm and locally sensitive hash functions. Second, the study proposes a blockchain data verification mechanism that employs a fuzzy encryption search scheme, in conjunction with cloud storage and a fuzzy encryption algorithm. This mechanism is designed to ensure data integrity and confidentiality. When the number of attributes was 30, the initialization time cost of the proposed fuzzy encryption search scheme was 98 ms, which was reduced by about 51.6% compared to the blockchain-assisted sorting method. The encryption time cost of the proposed search method was 61 ms, which was reduced by about 35.6% compared to the multi-permission data access method. When the number of parallel transactions reached 1000, the transaction duration for smart contract Upload was 23.68 s, while the transaction duration for Search was 24.36 s. The proposed fuzzy encryption search scheme and data verification mechanism not only protect data privacy and ensure data integrity and confidentiality, but also have high search efficiency and low time overhead, providing better security for blockchain data.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1007/s44196-025-00804-9
- https://link.springer.com/content/pdf/10.1007/s44196-025-00804-9.pdf
- OA Status
- gold
- Cited By
- 1
- References
- 21
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4409967221
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4409967221Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1007/s44196-025-00804-9Digital Object Identifier
- Title
-
Fuzzy Encryption Search Scheme and Data Verification Mechanism Based on BlockchainWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-04-30Full publication date if available
- Authors
-
Kuan‐Ching LiList of authors in order
- Landing page
-
https://doi.org/10.1007/s44196-025-00804-9Publisher landing page
- PDF URL
-
https://link.springer.com/content/pdf/10.1007/s44196-025-00804-9.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://link.springer.com/content/pdf/10.1007/s44196-025-00804-9.pdfDirect OA link when available
- Concepts
-
Blockchain, Computer science, Encryption, Data mining, Scheme (mathematics), Fuzzy logic, Theoretical computer science, Artificial intelligence, Computer security, Mathematics, Mathematical analysisTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
1Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 1Per-year citation counts (last 5 years)
- References (count)
-
21Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4409967221 |
|---|---|
| doi | https://doi.org/10.1007/s44196-025-00804-9 |
| ids.doi | https://doi.org/10.1007/s44196-025-00804-9 |
| ids.openalex | https://openalex.org/W4409967221 |
| fwci | 9.66367325 |
| type | article |
| title | Fuzzy Encryption Search Scheme and Data Verification Mechanism Based on Blockchain |
| biblio.issue | 1 |
| biblio.volume | 18 |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10270 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.993399977684021 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Blockchain Technology Applications and Security |
| topics[1].id | https://openalex.org/T11614 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.963699996471405 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1710 |
| topics[1].subfield.display_name | Information Systems |
| topics[1].display_name | Cloud Data Security Solutions |
| topics[2].id | https://openalex.org/T10388 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.958899974822998 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1707 |
| topics[2].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[2].display_name | Advanced Steganography and Watermarking Techniques |
| is_xpac | False |
| apc_list.value | 1390 |
| apc_list.currency | GBP |
| apc_list.value_usd | 1704 |
| apc_paid.value | 1390 |
| apc_paid.currency | GBP |
| apc_paid.value_usd | 1704 |
| concepts[0].id | https://openalex.org/C2779687700 |
| concepts[0].level | 2 |
| concepts[0].score | 0.7430194020271301 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q20514253 |
| concepts[0].display_name | Blockchain |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.7308396697044373 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C148730421 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5904738903045654 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[2].display_name | Encryption |
| concepts[3].id | https://openalex.org/C124101348 |
| concepts[3].level | 1 |
| concepts[3].score | 0.5784886479377747 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q172491 |
| concepts[3].display_name | Data mining |
| concepts[4].id | https://openalex.org/C77618280 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5758048892021179 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1155772 |
| concepts[4].display_name | Scheme (mathematics) |
| concepts[5].id | https://openalex.org/C58166 |
| concepts[5].level | 2 |
| concepts[5].score | 0.5526694059371948 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q224821 |
| concepts[5].display_name | Fuzzy logic |
| concepts[6].id | https://openalex.org/C80444323 |
| concepts[6].level | 1 |
| concepts[6].score | 0.3923802971839905 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q2878974 |
| concepts[6].display_name | Theoretical computer science |
| concepts[7].id | https://openalex.org/C154945302 |
| concepts[7].level | 1 |
| concepts[7].score | 0.2710479497909546 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[7].display_name | Artificial intelligence |
| concepts[8].id | https://openalex.org/C38652104 |
| concepts[8].level | 1 |
| concepts[8].score | 0.2063206136226654 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[8].display_name | Computer security |
| concepts[9].id | https://openalex.org/C33923547 |
| concepts[9].level | 0 |
| concepts[9].score | 0.195738285779953 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[9].display_name | Mathematics |
| concepts[10].id | https://openalex.org/C134306372 |
| concepts[10].level | 1 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q7754 |
| concepts[10].display_name | Mathematical analysis |
| keywords[0].id | https://openalex.org/keywords/blockchain |
| keywords[0].score | 0.7430194020271301 |
| keywords[0].display_name | Blockchain |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.7308396697044373 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/encryption |
| keywords[2].score | 0.5904738903045654 |
| keywords[2].display_name | Encryption |
| keywords[3].id | https://openalex.org/keywords/data-mining |
| keywords[3].score | 0.5784886479377747 |
| keywords[3].display_name | Data mining |
| keywords[4].id | https://openalex.org/keywords/scheme |
| keywords[4].score | 0.5758048892021179 |
| keywords[4].display_name | Scheme (mathematics) |
| keywords[5].id | https://openalex.org/keywords/fuzzy-logic |
| keywords[5].score | 0.5526694059371948 |
| keywords[5].display_name | Fuzzy logic |
| keywords[6].id | https://openalex.org/keywords/theoretical-computer-science |
| keywords[6].score | 0.3923802971839905 |
| keywords[6].display_name | Theoretical computer science |
| keywords[7].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[7].score | 0.2710479497909546 |
| keywords[7].display_name | Artificial intelligence |
| keywords[8].id | https://openalex.org/keywords/computer-security |
| keywords[8].score | 0.2063206136226654 |
| keywords[8].display_name | Computer security |
| keywords[9].id | https://openalex.org/keywords/mathematics |
| keywords[9].score | 0.195738285779953 |
| keywords[9].display_name | Mathematics |
| language | en |
| locations[0].id | doi:10.1007/s44196-025-00804-9 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S190680769 |
| locations[0].source.issn | 1875-6883, 1875-6891 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 1875-6883 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | International Journal of Computational Intelligence Systems |
| locations[0].source.host_organization | https://openalex.org/P4310319965 |
| locations[0].source.host_organization_name | Springer Nature |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319965 |
| locations[0].source.host_organization_lineage_names | Springer Nature |
| locations[0].license | cc-by-nc-nd |
| locations[0].pdf_url | https://link.springer.com/content/pdf/10.1007/s44196-025-00804-9.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc-nd |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | International Journal of Computational Intelligence Systems |
| locations[0].landing_page_url | https://doi.org/10.1007/s44196-025-00804-9 |
| locations[1].id | pmh:oai:doaj.org/article:51b780f84cba40faa8f7bcf3dad4ff21 |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | International Journal of Computational Intelligence Systems, Vol 18, Iss 1, Pp 1-19 (2025) |
| locations[1].landing_page_url | https://doaj.org/article/51b780f84cba40faa8f7bcf3dad4ff21 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5063188437 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-1381-4364 |
| authorships[0].author.display_name | Kuan‐Ching Li |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Kuan Li |
| authorships[0].is_corresponding | True |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://link.springer.com/content/pdf/10.1007/s44196-025-00804-9.pdf |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Fuzzy Encryption Search Scheme and Data Verification Mechanism Based on Blockchain |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10270 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.993399977684021 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Blockchain Technology Applications and Security |
| related_works | https://openalex.org/W4210406818, https://openalex.org/W4306779889, https://openalex.org/W3048554917, https://openalex.org/W3211706803, https://openalex.org/W4382775358, https://openalex.org/W4246942721, https://openalex.org/W3209862047, https://openalex.org/W4386732777, https://openalex.org/W4304136894, https://openalex.org/W2989851257 |
| cited_by_count | 1 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 1 |
| locations_count | 2 |
| best_oa_location.id | doi:10.1007/s44196-025-00804-9 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S190680769 |
| best_oa_location.source.issn | 1875-6883, 1875-6891 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 1875-6883 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | International Journal of Computational Intelligence Systems |
| best_oa_location.source.host_organization | https://openalex.org/P4310319965 |
| best_oa_location.source.host_organization_name | Springer Nature |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319965 |
| best_oa_location.source.host_organization_lineage_names | Springer Nature |
| best_oa_location.license | cc-by-nc-nd |
| best_oa_location.pdf_url | https://link.springer.com/content/pdf/10.1007/s44196-025-00804-9.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | International Journal of Computational Intelligence Systems |
| best_oa_location.landing_page_url | https://doi.org/10.1007/s44196-025-00804-9 |
| primary_location.id | doi:10.1007/s44196-025-00804-9 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S190680769 |
| primary_location.source.issn | 1875-6883, 1875-6891 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 1875-6883 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | International Journal of Computational Intelligence Systems |
| primary_location.source.host_organization | https://openalex.org/P4310319965 |
| primary_location.source.host_organization_name | Springer Nature |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319965 |
| primary_location.source.host_organization_lineage_names | Springer Nature |
| primary_location.license | cc-by-nc-nd |
| primary_location.pdf_url | https://link.springer.com/content/pdf/10.1007/s44196-025-00804-9.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc-nd |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | International Journal of Computational Intelligence Systems |
| primary_location.landing_page_url | https://doi.org/10.1007/s44196-025-00804-9 |
| publication_date | 2025-04-30 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W2990099041, https://openalex.org/W4285891253, https://openalex.org/W3154141271, https://openalex.org/W3041188391, https://openalex.org/W3155146201, https://openalex.org/W3024176277, https://openalex.org/W3045661091, https://openalex.org/W4205926171, https://openalex.org/W4286203047, https://openalex.org/W3008706840, https://openalex.org/W4307102041, https://openalex.org/W3175073186, https://openalex.org/W4223500838, https://openalex.org/W4297813717, https://openalex.org/W4283072157, https://openalex.org/W4307945795, https://openalex.org/W4386565847, https://openalex.org/W4389057234, https://openalex.org/W3018481268, https://openalex.org/W4386930848, https://openalex.org/W4385637690 |
| referenced_works_count | 21 |
| abstract_inverted_index.A | 17 |
| abstract_inverted_index.a | 41, 57, 64, 75 |
| abstract_inverted_index.61 | 132 |
| abstract_inverted_index.98 | 108 |
| abstract_inverted_index.by | 113, 137 |
| abstract_inverted_index.in | 28, 69 |
| abstract_inverted_index.is | 38, 81 |
| abstract_inverted_index.of | 4, 9, 34, 92, 100, 126, 150 |
| abstract_inverted_index.s, | 164 |
| abstract_inverted_index.s. | 173 |
| abstract_inverted_index.to | 83, 117, 141 |
| abstract_inverted_index.30, | 95 |
| abstract_inverted_index.The | 122, 174 |
| abstract_inverted_index.and | 22, 48, 74, 87, 180, 189, 193, 201 |
| abstract_inverted_index.are | 26 |
| abstract_inverted_index.but | 195 |
| abstract_inverted_index.for | 158, 169, 208 |
| abstract_inverted_index.has | 13 |
| abstract_inverted_index.low | 202 |
| abstract_inverted_index.ms, | 109, 133 |
| abstract_inverted_index.not | 184 |
| abstract_inverted_index.raw | 36 |
| abstract_inverted_index.the | 2, 7, 29, 35, 54, 90, 96, 101, 118, 127, 142, 148, 155, 166 |
| abstract_inverted_index.was | 94, 107, 111, 131, 135, 162, 171 |
| abstract_inverted_index.Mini | 43 |
| abstract_inverted_index.This | 79 |
| abstract_inverted_index.When | 89, 147 |
| abstract_inverted_index.With | 1 |
| abstract_inverted_index.also | 196 |
| abstract_inverted_index.cost | 99, 125 |
| abstract_inverted_index.data | 11, 23, 37, 59, 85, 144, 181, 187, 191 |
| abstract_inverted_index.hash | 51 |
| abstract_inverted_index.have | 197 |
| abstract_inverted_index.high | 198 |
| abstract_inverted_index.only | 185 |
| abstract_inverted_index.that | 62 |
| abstract_inverted_index.time | 98, 124, 203 |
| abstract_inverted_index.with | 71 |
| abstract_inverted_index.1000, | 154 |
| abstract_inverted_index.23.68 | 163 |
| abstract_inverted_index.24.36 | 172 |
| abstract_inverted_index.35.6% | 139 |
| abstract_inverted_index.51.6% | 115 |
| abstract_inverted_index.Batch | 44 |
| abstract_inverted_index.about | 114, 138 |
| abstract_inverted_index.cloud | 72 |
| abstract_inverted_index.data. | 210 |
| abstract_inverted_index.fuzzy | 18, 65, 76, 103, 176 |
| abstract_inverted_index.smart | 159 |
| abstract_inverted_index.study | 55 |
| abstract_inverted_index.which | 110, 134 |
| abstract_inverted_index.while | 165 |
| abstract_inverted_index.First, | 31 |
| abstract_inverted_index.Search | 170 |
| abstract_inverted_index.Upload | 161 |
| abstract_inverted_index.access | 145 |
| abstract_inverted_index.better | 206 |
| abstract_inverted_index.ensure | 84, 190 |
| abstract_inverted_index.method | 130 |
| abstract_inverted_index.number | 91, 149 |
| abstract_inverted_index.scheme | 21, 106, 179 |
| abstract_inverted_index.search | 20, 67, 105, 129, 178, 199 |
| abstract_inverted_index.study. | 30 |
| abstract_inverted_index.K-Means | 45 |
| abstract_inverted_index.Second, | 53 |
| abstract_inverted_index.employs | 63 |
| abstract_inverted_index.locally | 49 |
| abstract_inverted_index.method. | 121, 146 |
| abstract_inverted_index.privacy | 32, 188 |
| abstract_inverted_index.protect | 186 |
| abstract_inverted_index.reached | 153 |
| abstract_inverted_index.reduced | 112, 136 |
| abstract_inverted_index.scheme, | 68 |
| abstract_inverted_index.sorting | 120 |
| abstract_inverted_index.storage | 73 |
| abstract_inverted_index.through | 40 |
| abstract_inverted_index.Abstract | 0 |
| abstract_inverted_index.achieved | 39 |
| abstract_inverted_index.compared | 116, 140 |
| abstract_inverted_index.contract | 160 |
| abstract_inverted_index.designed | 82 |
| abstract_inverted_index.duration | 157, 168 |
| abstract_inverted_index.parallel | 151 |
| abstract_inverted_index.proposed | 27, 102, 128, 175 |
| abstract_inverted_index.proposes | 56 |
| abstract_inverted_index.received | 14 |
| abstract_inverted_index.security | 8, 207 |
| abstract_inverted_index.algorithm | 47 |
| abstract_inverted_index.integrity | 86, 192 |
| abstract_inverted_index.mechanism | 25, 61, 80, 183 |
| abstract_inverted_index.overhead, | 204 |
| abstract_inverted_index.providing | 205 |
| abstract_inverted_index.sensitive | 50 |
| abstract_inverted_index.algorithm. | 78 |
| abstract_inverted_index.attention. | 16 |
| abstract_inverted_index.attributes | 93 |
| abstract_inverted_index.blockchain | 5, 10, 58, 209 |
| abstract_inverted_index.clustering | 46 |
| abstract_inverted_index.efficiency | 200 |
| abstract_inverted_index.encryption | 19, 66, 77, 104, 123, 177 |
| abstract_inverted_index.functions. | 52 |
| abstract_inverted_index.increasing | 15 |
| abstract_inverted_index.protection | 33 |
| abstract_inverted_index.conjunction | 70 |
| abstract_inverted_index.development | 3 |
| abstract_inverted_index.technology, | 6 |
| abstract_inverted_index.transaction | 156, 167 |
| abstract_inverted_index.hierarchical | 42 |
| abstract_inverted_index.transactions | 152 |
| abstract_inverted_index.verification | 12, 24, 60, 182 |
| abstract_inverted_index.initialization | 97 |
| abstract_inverted_index.confidentiality, | 194 |
| abstract_inverted_index.confidentiality. | 88 |
| abstract_inverted_index.multi-permission | 143 |
| abstract_inverted_index.blockchain-assisted | 119 |
| cited_by_percentile_year.max | 95 |
| cited_by_percentile_year.min | 91 |
| corresponding_author_ids | https://openalex.org/A5063188437 |
| countries_distinct_count | 0 |
| institutions_distinct_count | 1 |
| citation_normalized_percentile.value | 0.93885289 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |