{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:20:31Z","timestamp":1743067231667,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030373511"},{"type":"electronic","value":"9783030373528"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-37352-8_17","type":"book-chapter","created":{"date-parts":[[2020,1,3]],"date-time":"2020-01-03T01:03:00Z","timestamp":1578013380000},"page":"192-204","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Requester-Centric CP-ABE Combining Removing Escrow and Outsourcing Decryption"],"prefix":"10.1007","author":[{"given":"Wang","family":"Yao","sequence":"first","affiliation":[]},{"given":"Faguo","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,3]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321\u2013334 (2007)","key":"17_CR1","DOI":"10.1109\/SP.2007.11"},{"issue":"4","key":"17_CR2","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1109\/TIFS.2015.2512533","volume":"11","author":"A Castiglione","year":"2016","unstructured":"Castiglione, A., et al.: Hierarchical and shared access control. IEEE Trans. Inf. Forensics Secur. 11(4), 850\u2013865 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"58955","DOI":"10.1109\/ACCESS.2018.2875070","volume":"6","author":"Y Chen","year":"2018","unstructured":"Chen, Y., Wen, Q., Li, W., Zhang, H., Jin, Z.: Generic construction of outsourced attribute-based encryption without key escrow. IEEE Access 6, 58955\u201358966 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2875070","journal-title":"IEEE Access"},{"issue":"7","key":"17_CR4","doi-asserted-by":"publisher","first-page":"2811","DOI":"10.1109\/TCOMM.2017.2691712","volume":"65","author":"L Fan","year":"2017","unstructured":"Fan, L., Zhao, R., Gong, F.K., Yang, N., Karagiannidis, G.: Secure multiple amplify-and-forward relaying over correlated fading channels. IEEE Trans. Commun. 65(7), 2811\u20132820 (2017)","journal-title":"IEEE Trans. Commun."},{"doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security, pp. 89\u201398 (2006)","key":"17_CR5","DOI":"10.1145\/1180405.1180418"},{"unstructured":"Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of abe ciphertexts. In: Proceedings of the 20th USENIX Conference on Security, SEC 2011, p. 34. USENIX Association, Berkeley (2011). http:\/\/dl.acm.org\/citation.cfm?id=2028067.2028101","key":"17_CR6"},{"issue":"4","key":"17_CR7","doi-asserted-by":"publisher","first-page":"862","DOI":"10.1049\/cje.2015.10.033","volume":"24","author":"Q Huang","year":"2015","unstructured":"Huang, Q., Zhaofeng, M.A., Yang, Y., Jingyi, F.U., Niu, X.: Eabds:attribute-based secure data sharing with efficient revocation in cloud computing. Chin. J. Electron. 24(4), 862\u2013868 (2015)","journal-title":"Chin. J. Electron."},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.cose.2016.07.007","volume":"62","author":"R Jiang","year":"2016","unstructured":"Jiang, R., Wu, X., Bhargava, B.: SDSS-MAC: secure data sharing scheme in multi-authority cloud storage systems. Comput. Secur. 62, 193\u2013212 (2016). https:\/\/doi.org\/10.1016\/j.cose.2016.07.007","journal-title":"Comput. Secur."},{"issue":"1","key":"17_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2906151","volume":"49","author":"W Jiang","year":"2016","unstructured":"Jiang, W., Wang, G., Bhuiyan, M.Z.A., Wu, J.: Understanding graph-based trust evaluation in online social networks: methodologies and challenges. ACM Comput. Surv. 49(1), 1\u201335 (2016)","journal-title":"ACM Comput. Surv."},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-13190-5_4","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"A Lewko","year":"2010","unstructured":"Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62\u201391. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13190-5_4"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-3-642-11799-2_27","volume-title":"Theory of Cryptography","author":"A Lewko","year":"2010","unstructured":"Lewko, A., Waters, B.: New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 455\u2013479. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-11799-2_27"},{"issue":"1","key":"17_CR12","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/TETC.2015.2511457","volume":"6","author":"H Li","year":"2015","unstructured":"Li, H., Liu, D., Dai, Y., Luan, T., Yu, S.: Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Trans. Emerg. Top. Comput. 6(1), 97\u2013109 (2015)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"1","key":"17_CR13","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/TETC.2014.2371239","volume":"3","author":"H Li","year":"2015","unstructured":"Li, H., Liu, D., Dai, Y., Luan, T.H., Shen, X.S.: Enabling efficient multi-keyword ranked search over encrypted mobile cloud data through blind storage. IEEE Trans. Emerg. Top. Comput. 3(1), 127\u2013138 (2015)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"8","key":"17_CR14","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1109\/TPDS.2013.271","volume":"25","author":"J Li","year":"2014","unstructured":"Li, J., Huang, X., Li, J., Chen, X., Xiang, Y.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25(8), 2201\u20132210 (2014). https:\/\/doi.org\/doi.ieeecomputersociety.org\/10.1109\/TPDS.2013.271","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"17_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2017.08.007","volume":"72","author":"J Li","year":"2017","unstructured":"Li, J., et al.: Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72, 1\u201312 (2017)","journal-title":"Comput. Secur."},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-642-34129-8_17","volume-title":"Information and Communications Security","author":"J Li","year":"2012","unstructured":"Li, J., Jia, C., Li, J., Chen, X.: Outsourcing encryption of attribute-based encryption with MapReduce. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 191\u2013201. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34129-8_17"},{"issue":"10","key":"17_CR17","doi-asserted-by":"publisher","first-page":"2119","DOI":"10.1109\/TIFS.2015.2449264","volume":"10","author":"S Lin","year":"2015","unstructured":"Lin, S., Zhang, R., Ma, H., Wang, M.: Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 10(10), 2119\u20132130 (2015). https:\/\/doi.org\/10.1109\/TIFS.2015.2449264","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"17_CR18","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1109\/TIFS.2015.2493983","volume":"11","author":"JK Liu","year":"2015","unstructured":"Liu, J.K., Man, H.A., Huang, X., Lu, R., Li, J.: Fine-grained two-factor access control for web-based cloud computing services. IEEE Trans. Inf. Forensics Secur. 11(3), 484\u2013497 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9","key":"17_CR19","doi-asserted-by":"publisher","first-page":"1772","DOI":"10.1109\/LCOMM.2016.2584614","volume":"20","author":"E Luo","year":"2016","unstructured":"Luo, E., Liu, Q., Wang, G.: Hierarchical multi-authority and attribute-based encryption friend discovery scheme in mobile social networks. IEEE Commun. Lett. 20(9), 1772\u20131775 (2016)","journal-title":"IEEE Commun. Lett."},{"issue":"5","key":"17_CR20","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1109\/TDSC.2015.2423669","volume":"13","author":"X Mao","year":"2016","unstructured":"Mao, X., Lai, J., Mei, Q., Chen, K., Weng, J.: Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Dependable Secure Comput. 13(5), 533\u2013546 (2016). https:\/\/doi.org\/10.1109\/TDSC.2015.2423669","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"9","key":"17_CR21","doi-asserted-by":"publisher","first-page":"3831","DOI":"10.1109\/TCOMM.2016.2573822","volume":"64","author":"G Pan","year":"2016","unstructured":"Pan, G., Lei, H., Deng, Y., Fan, L., Yang, J., Chen, Y., Ding, Z.: On secrecy performance of MISO SWIPT systems with TAS and imperfect CSI. IEEE Trans. Commun. 64(9), 3831\u20133843 (2016)","journal-title":"IEEE Trans. Commun."},{"issue":"7","key":"17_CR22","doi-asserted-by":"publisher","first-page":"1384","DOI":"10.1109\/TIFS.2015.2410137","volume":"10","author":"B Qin","year":"2015","unstructured":"Qin, B., Deng, R.H., Liu, S., Ma, S.: Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 10(7), 1384\u20131393 (2015). https:\/\/doi.org\/10.1109\/TIFS.2015.2410137","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_27"},{"issue":"8","key":"17_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIFS.2016.2588730","volume":"11","author":"S Wang","year":"2016","unstructured":"Wang, S., Liang, K., Liu, J.K., Chen, J.: Attribute-based data sharing scheme revisited in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(8), 1\u20131 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"14","key":"17_CR25","doi-asserted-by":"publisher","first-page":"2387","DOI":"10.1002\/sec.1507","volume":"9","author":"Z Wang","year":"2016","unstructured":"Wang, Z., Liu, W.: CP-ABE with outsourced decryption and directionally hidden policy. Secur. Commun. Netw. 9(14), 2387\u20132396 (2016)","journal-title":"Secur. Commun. Netw."},{"key":"17_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"B Waters","year":"2011","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53\u201370. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19379-8_4"},{"issue":"5","key":"17_CR27","doi-asserted-by":"publisher","first-page":"1607","DOI":"10.1007\/s11227-014-1253-3","volume":"71","author":"F Xhafa","year":"2015","unstructured":"Xhafa, F., Feng, J., Zhang, Y., Chen, X., Li, J.: Privacy-aware attribute-based PHR sharing with user accountability in cloud computing. J. Supercomput. 71(5), 1607\u20131619 (2015)","journal-title":"J. Supercomput."},{"issue":"2","key":"17_CR28","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1109\/TCOMM.2016.2618793","volume":"65","author":"R Zhao","year":"2017","unstructured":"Zhao, R., Yuan, Y., Fan, L., He, Y.C.: Secrecy performance analysis of cognitive decode-and-forward relay networks in nakagami-$$m$$ fading channels. IEEE Trans. Commun. 65(2), 549\u2013563 (2017)","journal-title":"IEEE Trans. Commun."},{"doi-asserted-by":"publisher","unstructured":"Zuo, C., Shao, J., Wei, G., Xie, M., Ji, M.: CCA-secure ABE with outsourced decryption for fog computing. Future Gener. Comput. Syst. https:\/\/doi.org\/10.1016\/j.future.2016.10.028 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X16304745","key":"17_CR29","DOI":"10.1016\/j.future.2016.10.028"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37352-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T16:43:38Z","timestamp":1695573818000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37352-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030373511","9783030373528"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37352-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"3 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Cyberspace Safety and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"css2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/css2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"235","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"61","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}