{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T13:42:29Z","timestamp":1777902149607,"version":"3.51.4"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030369378","type":"print"},{"value":"9783030369385","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-36938-5_34","type":"book-chapter","created":{"date-parts":[[2019,12,10]],"date-time":"2019-12-10T00:04:11Z","timestamp":1575936251000},"page":"552-566","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Attribute-Based Encryption with Publicly Verifiable Outsourced Decryption"],"prefix":"10.1007","author":[{"given":"Hui","family":"Zheng","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jun","family":"Shao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guiyi","family":"Wei","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Li","family":"Hu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bianjing","family":"Pan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kai","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaohang","family":"Mao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,12,10]]},"reference":[{"key":"34_CR1","unstructured":"https:\/\/www.vice.com\/en_us\/article\/ywanev"},{"key":"34_CR2","unstructured":"Beimel, A.: Secure schemes for secret sharing and key distribution (1996)"},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Campanelli, M., Gennaro, R., Goldfeder, S., Nizzardo, L.: Zero-knowledge contingent payments revisited: attacks and payments for services. In: Proceedings of the 2017 ACM SIGSAC, pp. 229\u2013243 (2017)","DOI":"10.1145\/3133956.3134060"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Canetti, R., Riva, B., Rothblum, G.N.: Practical delegation of computation using multiple servers. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS, pp. 445\u2013454 (2011)","DOI":"10.1145\/2046707.2046759"},{"key":"34_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-32284-6_3","volume-title":"Information Theoretic Security","author":"R Canetti","year":"2012","unstructured":"Canetti, R., Riva, B., Rothblum, G.N.: Two protocols for delegation of computation. In: Smith, A. (ed.) ICITS 2012. LNCS, vol. 7412, pp. 37\u201361. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-32284-6_3"},{"key":"34_CR6","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ic.2013.03.003","volume":"226","author":"R Canetti","year":"2013","unstructured":"Canetti, R., Riva, B., Rothblum, G.N.: Refereed delegation of computation. Inf. Comput. 226, 16\u201336 (2013)","journal-title":"Inf. Comput."},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Dong, C., Wang, Y., Aldweesh, A., McCorry, P., van Moorsel, A.: Betrayal, distrust, and rationality: smart counter-collusion contracts for verifiable cloud computing. In: Proceedings of the 2017 ACM SIGSAC, pp. 211\u2013227 (2017)","DOI":"10.1145\/3133956.3134032"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Feige, U., Kilian, J.: Making games short (extended abstract). In: Proceedings of the Twenty-Ninth Annual ACM Symposium on the Theory of Computing, pp. 506\u2013516 (1997)","DOI":"10.1145\/258533.258644"},{"key":"34_CR9","unstructured":"Gokuldev, S., Leelavathi, S.: HASBE: a hierarchical attribute-based solution for flexible and scalable access control by separate encryption\/decryption in cloud computing. Int. J. Eng. Sci. Innov. Technol. (IJESIT) 2(3) (2013)"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Kalai, Y.T., Rothblum, G.N.: Delegating computation: interactive proofs for muggles. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, pp. 113\u2013122 (2008)","DOI":"10.1145\/1374376.1374396"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89\u201398 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"34_CR12","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89\u201398. ACM (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"34_CR13","unstructured":"Green, M., Hohenberger, S., Waters, B., et al.: Outsourcing the decryption of ABE ciphertexts. In: USENIX Security Symposium, vol. 2011 (2011)"},{"issue":"5","key":"34_CR14","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1109\/TIFS.2014.2309858","volume":"9","author":"F Guo","year":"2014","unstructured":"Guo, F., Mu, Y., Susilo, W., Wong, D.S., Varadharajan, V.: CP-ABE with constant-size keys for lightweight devices. IEEE Trans. Inf. Forensics Secur. 9(5), 763\u2013771 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"Hu, S., Cai, C., Wang, Q., Wang, C., Luo, X., Ren, K.: Searching an encrypted cloud meets blockchain: a decentralized, reliable and fair realization. In: 2018 IEEE Conference on Computer Communications, INFOCOM, pp. 792\u2013800 (2018)","DOI":"10.1109\/INFOCOM.2018.8485890"},{"key":"34_CR16","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1016\/j.future.2016.12.016","volume":"78","author":"H Huang","year":"2018","unstructured":"Huang, H., Chen, X., Wu, Q., Huang, X., Shen, J.: Bitcoin-based fair payments for outsourcing computations of fog devices. Future Gener. Comput. Syst. 78, 850\u2013858 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"34_CR17","unstructured":"Kiraz, M.S., Uzunkol, O.: Still wrong use of pairings in cryptography. arXiv preprint \narXiv:1603.02826\n\n (2016)"},{"key":"34_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1007\/978-3-030-26951-7_23","volume-title":"Advances in Cryptology \u2013 CRYPTO 2019","author":"V Koppula","year":"2019","unstructured":"Koppula, V., Waters, B.: Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019. LNCS, vol. 11693, pp. 671\u2013700. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-26951-7_23"},{"key":"34_CR19","doi-asserted-by":"crossref","unstructured":"Kr\u00f3l, M., Psaras, I.: SPOC: secure payments for outsourced computations. CoRR abs\/1807.06462 (2018)","DOI":"10.14722\/diss.2018.23002"},{"key":"34_CR20","doi-asserted-by":"crossref","unstructured":"Kumaresan, R., Bentov, I.: How to use bitcoin to incentivize correct computations. In: Proceedings of the 2014 ACM SIGSAC, pp. 30\u201341 (2014)","DOI":"10.1145\/2660267.2660380"},{"issue":"8","key":"34_CR21","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1109\/TIFS.2013.2271848","volume":"8","author":"J Lai","year":"2013","unstructured":"Lai, J., Deng, R.H., Guan, C., Weng, J.: Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 8(8), 1343\u20131354 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"34_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-13190-5_4","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"A Lewko","year":"2010","unstructured":"Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62\u201391. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-13190-5_4"},{"issue":"1","key":"34_CR23","doi-asserted-by":"publisher","first-page":"e2942","DOI":"10.1002\/dac.2942","volume":"30","author":"J Li","year":"2017","unstructured":"Li, J., Shi, Y., Zhang, Y.: Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage. Int. J. Commun. Syst. 30(1), e2942 (2017)","journal-title":"Int. J. Commun. Syst."},{"key":"34_CR24","doi-asserted-by":"crossref","unstructured":"Li, J., Wang, Y., Zhang, Y., Han, J.: Full verifiability for outsourced decryption in attribute based encryption. IEEE Trans. Serv. Comput. (2017, in press)","DOI":"10.1109\/TSC.2017.2710190"},{"issue":"8","key":"34_CR25","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1109\/TPDS.2013.271","volume":"25","author":"J Li","year":"2013","unstructured":"Li, J., Huang, X., Li, J., Chen, X., Xiang, Y.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25(8), 2201\u20132210 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"34_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2017.08.007","volume":"72","author":"J Li","year":"2018","unstructured":"Li, J., Zhang, Y., Chen, X., Xiang, Y.: Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72, 1\u201312 (2018)","journal-title":"Comput. Secur."},{"issue":"5","key":"34_CR27","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1109\/TPDS.2015.2448095","volume":"27","author":"W Li","year":"2015","unstructured":"Li, W., Xue, K., Xue, Y., Hong, J.: TMACS: a robust and verifiable threshold multi-authority access control system in public cloud storage. IEEE Trans. Parallel Distrib. Syst. 27(5), 1484\u20131496 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"34_CR28","doi-asserted-by":"publisher","first-page":"176","DOI":"10.3390\/s18010176","volume":"18","author":"Y Liao","year":"2018","unstructured":"Liao, Y., He, Y., Li, F., Jiang, S., Zhou, S.: Analysis of an ABE scheme with verifiable outsourced decryption. Sensors 18(1), 176 (2018)","journal-title":"Sensors"},{"key":"34_CR29","doi-asserted-by":"crossref","unstructured":"Lin, C., He, D., Huang, X., Xie, X., Choo, K.K.R.: Blockchain-based system for secure outsourcing of bilinear pairings. Inf. Sci. (2018, in press)","DOI":"10.1016\/j.ins.2018.12.043"},{"issue":"10","key":"34_CR30","doi-asserted-by":"publisher","first-page":"2119","DOI":"10.1109\/TIFS.2015.2449264","volume":"10","author":"S Lin","year":"2015","unstructured":"Lin, S., Zhang, R., Ma, H., Wang, M.: Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 10(10), 2119\u20132130 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"34_CR31","unstructured":"Lynn, B., et al.: The pairing-based cryptography library. Internet: crypto. stanford. edu\/pbc\/[27 Mar. 2013] (2006)"},{"issue":"5","key":"34_CR32","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1109\/TDSC.2015.2423669","volume":"13","author":"X Mao","year":"2015","unstructured":"Mao, X., Lai, J., Mei, Q., Chen, K., Weng, J.: Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Dependable Secur. Comput. 13(5), 533\u2013546 (2015)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"34_CR33","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.jnca.2015.11.023","volume":"64","author":"SK Pasupuleti","year":"2016","unstructured":"Pasupuleti, S.K., Ramalingam, S., Buyya, R.: An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. J. Netw. Comput. Appl. 64, 12\u201322 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"7","key":"34_CR34","doi-asserted-by":"publisher","first-page":"1384","DOI":"10.1109\/TIFS.2015.2410137","volume":"10","author":"B Qin","year":"2015","unstructured":"Qin, B., Deng, R.H., Liu, S., Ma, S.: Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 10(7), 1384\u20131393 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"34_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005). \nhttps:\/\/doi.org\/10.1007\/11426639_27"},{"issue":"6","key":"34_CR36","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1109\/TIFS.2016.2523941","volume":"11","author":"S Wang","year":"2016","unstructured":"Wang, S., Zhou, J., Liu, J.K., Yu, J., Chen, J., Xie, W.: An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(6), 1265\u20131277 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"34_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"B Waters","year":"2011","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53\u201370. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-19379-8_4"},{"key":"34_CR38","doi-asserted-by":"crossref","unstructured":"Wu, J., Ping, L., Ge, X., Wang, Y., Fu, J.: Cloud storage as the infrastructure of cloud computing. In: 2010 International Conference on Intelligent Computing and Cognitive Informatics, pp. 380\u2013383 (2010)","DOI":"10.1109\/ICICCI.2010.119"},{"issue":"1","key":"34_CR39","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1109\/TPDS.2015.2392752","volume":"27","author":"J Xu","year":"2015","unstructured":"Xu, J., Wen, Q., Li, W., Jin, Z.: Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation in cloud computing. IEEE Trans. Parallel Distrib. Syst. 27(1), 119\u2013129 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"34_CR40","unstructured":"Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. In: 2012 8th International Conference on Network and Service Management (CNSM) and 2012 Workshop on Systems Virtualiztion Management (SVM), pp. 37\u201345 (2012)"},{"key":"34_CR41","doi-asserted-by":"publisher","first-page":"730","DOI":"10.1016\/j.future.2016.10.028","volume":"78","author":"C Zuo","year":"2018","unstructured":"Zuo, C., Shao, J., Wei, G., Xie, M., Ji, M.: CCA-secure ABE with outsourced decryption for fog computing. Future Gener. Comput. Syst. 78, 730\u2013738 (2018)","journal-title":"Future Gener. Comput. Syst."}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-36938-5_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,10]],"date-time":"2019-12-10T00:08:18Z","timestamp":1575936498000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-36938-5_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030369378","9783030369385"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-36938-5_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"10 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sapporo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/nss2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"89","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.8","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}