{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:34:45Z","timestamp":1743024885051,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030590154"},{"type":"electronic","value":"9783030590161"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-59016-1_27","type":"book-chapter","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T13:05:10Z","timestamp":1599743110000},"page":"322-332","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Outsourced Multi-authority ABE with White-Box Traceability for Cloud-IoT"],"prefix":"10.1007","author":[{"given":"Suhui","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jiguo","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Chunqiang","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Mengmeng","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,10]]},"reference":[{"issue":"2","key":"27_CR1","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s13389-013-0057-3","volume":"3","author":"JA Akinyele","year":"2013","unstructured":"Akinyele, J.A., et al.: Charm: a framework for rapidly prototyping cryptosystems. J. Cryptogr. Eng. 3(2), 111\u2013128 (2013). https:\/\/doi.org\/10.1007\/s13389-013-0057-3","journal-title":"J. Cryptogr. Eng."},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Belguith, S., Kaaniche, N., Jemai, A., Laurent, M., Attia, R.: PAbAC: a privacy preserving attribute based framework for fine grained access control in clouds (2016)","DOI":"10.5220\/0005968201330146"},{"key":"27_CR3","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/j.comnet.2018.01.036","volume":"133","author":"S Belguith","year":"2018","unstructured":"Belguith, S., Kaaniche, N., Laurent, M., Jemai, A., Attia, R.: Phoabe: securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Comput. Netw. 133, 141\u2013156 (2018)","journal-title":"Comput. Netw."},{"key":"27_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-540-24676-3_4","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X.: Short signatures without random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56\u201373. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24676-3_4"},{"issue":"3","key":"27_CR5","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1080\/00207160.2011.555642","volume":"89","author":"V Bo\u017eovi\u0107","year":"2012","unstructured":"Bo\u017eovi\u0107, V., Socek, D., Steinwandt, R., Vill\u00e1nyi, V.I.: Multi-authority attribute-based encryption with honest-but-curious central authority. Int. J. Comput. Math. 89(3), 268\u2013283 (2012)","journal-title":"Int. J. Comput. Math."},{"key":"27_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/978-3-540-45146-4_33","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"R Canetti","year":"2003","unstructured":"Canetti, R., Krawczyk, H., Nielsen, J.B.: Relaxing chosen-ciphertext security. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 565\u2013582. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_33"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Chase, M., Chow, S.S.: Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 121\u2013130 (2009)","DOI":"10.1145\/1653662.1653678"},{"key":"27_CR8","unstructured":"Green, M., Hohenberger, S., Waters, B., et al.: Outsourcing the decryption of abe ciphertexts. In: USENIX Security Symposium, vol. 2011 (2011)"},{"issue":"3","key":"27_CR9","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1504\/IJACT.2012.045587","volume":"2","author":"MJ Hinek","year":"2012","unstructured":"Hinek, M.J., Jiang, S., Safavi-Naini, R., Shahandashti, S.F.: Attribute-based encryption without key cloning. Int. J. Appl. Cryptogr. 2(3), 250\u2013270 (2012)","journal-title":"Int. J. Appl. Cryptogr."},{"key":"27_CR10","doi-asserted-by":"publisher","unstructured":"Hu, C., Pu, Y., Yang, F., Zhao, R., Alrawais, A., Xiang, T.: Secure and efficient data collection and storage of IoT in smart ocean. IEEE Internet Things J. 1 (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.2988733","DOI":"10.1109\/JIOT.2020.2988733"},{"issue":"9","key":"27_CR11","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/JSAC.2013.SUP.0513004","volume":"31","author":"C Hu","year":"2013","unstructured":"Hu, C., Zhang, N., Li, H., Cheng, X., Liao, X.: Body area network security: a fuzzy attribute-based signcryption scheme. IEEE J. Sel. Areas Commun. 31(9), 37\u201346 (2013)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"27_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1007\/978-3-642-20465-4_31","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"A Lewko","year":"2011","unstructured":"Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568\u2013588. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20465-4_31"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Li, J., Sha, F., Zhang, Y., Huang, X., Shen, J.: Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length. Secur. Commun. Netw. 2017 (2017)","DOI":"10.1155\/2017\/3596205"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Li, Q., Zhu, H., Ying, Z., Zhang, T.: Traceable ciphertext-policy attribute-based encryption with verifiable outsourced decryption in ehealth cloud. Wirel. Commun. Mobile Comput. 2018 (2018)","DOI":"10.1155\/2018\/1701675"},{"key":"27_CR15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2993231","author":"S Liu","year":"2020","unstructured":"Liu, S., Yu, J., Xiao, Y., Wan, Z., Wang, S., Yan, B.: BC-SABE: blockchain-aided searchable attribute-based encryption for cloud-IoT. IEEE Internet Things J. (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.2993231","journal-title":"IEEE Internet Things J."},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Pu, Y., Hu, C., Deng, S., Alrawais, A.: R$$^{2}$$PEDS: a recoverable and revocable privacy-preserving edge data sharing scheme. IEEE Internet Things J. 1 (2020)","DOI":"10.1109\/JIOT.2020.2997389"},{"key":"27_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/11426639_2","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"X Wang","year":"2005","unstructured":"Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19\u201335. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_2"},{"key":"27_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"B Waters","year":"2011","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53\u201370. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19379-8_4"},{"issue":"8","key":"27_CR19","doi-asserted-by":"publisher","first-page":"1608","DOI":"10.1109\/JPROC.2019.2918437","volume":"107","author":"Y Xiao","year":"2019","unstructured":"Xiao, Y., Jia, Y., Liu, C., Cheng, X., Yu, J., Lv, W.: Edge computing security: state of the art and challenges. Proc. IEEE 107(8), 1608\u20131631 (2019)","journal-title":"Proc. IEEE"},{"key":"27_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2988733","author":"J Yu","year":"2020","unstructured":"Yu, J., Liu, S., Wang, S., Xiao, Y., Yan, B.: LH-ABSC: a lightweight hybrid attribute-based signcryption scheme for cloud-fog assisted IoT. IEEE Internet Things J. (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.2988733","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"27_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-016-9019-8","volume":"61","author":"K Zhang","year":"2017","unstructured":"Zhang, K., Li, H., Ma, J., Liu, X.: Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability. Sci. China Inf. Sci. 61(3), 1\u201313 (2017). https:\/\/doi.org\/10.1007\/s11432-016-9019-8","journal-title":"Sci. China Inf. Sci."},{"issue":"5","key":"27_CR22","doi-asserted-by":"publisher","first-page":"968","DOI":"10.1109\/JSAC.2020.2980802","volume":"38","author":"X Zheng","year":"2020","unstructured":"Zheng, X., Cai, Z.: Privacy-preserved data sharing towards multiple parties in industrial IoTs. IEEE J. Sel. Commun. 38(5), 968\u2013979 (2020)","journal-title":"IEEE J. Sel. Commun."},{"issue":"1","key":"27_CR23","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s00500-016-2330-8","volume":"22","author":"H Zhong","year":"2016","unstructured":"Zhong, H., Zhu, W., Xu, Y., Cui, J.: Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput. 22(1), 243\u2013251 (2016). https:\/\/doi.org\/10.1007\/s00500-016-2330-8","journal-title":"Soft Comput."},{"issue":"3","key":"27_CR24","doi-asserted-by":"publisher","first-page":"4614","DOI":"10.1109\/JIOT.2018.2872458","volume":"6","author":"S Zhu","year":"2018","unstructured":"Zhu, S., Li, W., Li, H., Tian, L., Luo, G., Cai, Z.: Coin hopping attack in blockchain-based IoT. IEEE Internet Things J. 6(3), 4614\u20134626 (2018)","journal-title":"IEEE Internet Things J."}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-59016-1_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T10:10:29Z","timestamp":1619259029000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-59016-1_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030590154","9783030590161"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-59016-1_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Algorithms, Systems, and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qingdao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"216","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6-7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}