{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:22:06Z","timestamp":1742912526994,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319175324"},{"type":"electronic","value":"9783319175331"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17533-1_33","type":"book-chapter","created":{"date-parts":[[2015,4,8]],"date-time":"2015-04-08T12:50:20Z","timestamp":1428497420000},"page":"485-498","source":"Crossref","is-referenced-by-count":1,"title":["Non-interactive Revocable Identity-Based Access Control over e-Healthcare Records"],"prefix":"10.1007","author":[{"given":"Yunya","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Belsis, P., Vassis, D., Gritzalis, S., Skourlas, C.: W-ehr: a wireless distributed framework for secure dissemination of electronic healthcare records. In: IWSSIP 2009, pp. 1\u20134. IEEE (2009)","DOI":"10.1109\/IWSSIP.2009.5367721"},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encrytion with efficient revocation. In: ACM CCS 2008, pp. 417\u2013426. ACM (2008)","DOI":"10.1145\/1455770.1455823"},{"key":"33_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/11426639_26","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"D. Boneh","year":"2005","unstructured":"Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 440\u2013456. Springer, Heidelberg (2005)"},{"key":"33_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Deng, H., Wu, Q., Qin, B., Chow, S.S.M., Domingo-Ferrer, J., Shi, W.: Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data. In: ASIACCS 2014, pp. 425\u2013434. ACM (2014)","DOI":"10.1145\/2590296.2590342"},{"key":"33_CR6","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/j.ins.2014.01.035","volume":"275","author":"H. Deng","year":"2014","unstructured":"Deng, H., Wu, Q., Qin, B., Domingo-Ferrer, J., Zhang, L., Liu, J., Shi, W.: Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Information Sciences\u00a0275, 370\u2013384 (2014)","journal-title":"Information Sciences"},{"key":"33_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1007\/978-3-319-11203-9_21","volume-title":"Computer Security - ESORICS 2014","author":"H. Deng","year":"2014","unstructured":"Deng, H., Wu, Q., Qin, B., Mao, J., Liu, X., Zhang, L., Shi, W.: Who is touching my cloud. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014, Part I. LNCS, vol.\u00a08712, pp. 362\u2013379. Springer, Heidelberg (2014)"},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Jin, J., Ahn, G.-J., Hu, H., Covington, M.J., Zhang, X.: Patient-centric authorization framework for sharing electronic health records. In: SACMAT 2009, pp. 125\u2013134. ACM (2009)","DOI":"10.1145\/1542207.1542228"},{"key":"33_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-642-42033-7_13","volume-title":"Advances in Cryptology - ASIACRYPT 2013","author":"K. Lee","year":"2013","unstructured":"Lee, K., Choi, S.G., Lee, D.H., Park, J.H., Yung, M.: Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part I. LNCS, vol.\u00a08269, pp. 235\u2013254. Springer, Heidelberg (2013)"},{"issue":"1","key":"33_CR10","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M. Li","year":"2013","unstructured":"Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel and Distributed Systems\u00a024(1), 131\u2013143 (2013)","journal-title":"IEEE Trans. Parallel and Distributed Systems"},{"key":"33_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/978-3-319-11203-9_15","volume-title":"Computer Security - ESORICS 2014","author":"K. Liang","year":"2014","unstructured":"Liang, K., Liu, J.K., Wong, D.S., Susilo, W.: An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014, Part I. LNCS, vol.\u00a08712, pp. 257\u2013272. Springer, Heidelberg (2014)"},{"key":"33_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-00862-7_1","volume-title":"Topics in Cryptology \u2013 CT-RSA 2009","author":"B. Libert","year":"2009","unstructured":"Libert, B., Vergnaud, D.: Adaptive-ID secure revocable identity-based encryption. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol.\u00a05473, pp. 1\u201315. Springer, Heidelberg (2009)"},{"key":"33_CR13","unstructured":"Mashima, D., Ahamad, M.: Enabling robust information accountability in e-healthcare systems. In: 3rd USENIX Workshop on Health Security and Privacy (2012)"},{"key":"33_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-44647-8_3","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Naor","year":"2001","unstructured":"Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 41\u201362. Springer, Heidelberg (2001)"},{"key":"33_CR15","unstructured":"Park, S., Lee, K., Lee, D.H.: New constructions of revocable identity-based encryption from multilinear maps. In: Cryptology ePrint Archive, Report 2013\/880 (2013), \n                        http:\/\/eprint.iacr.org\/2013\/880"},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"Perumal, B., Rajasekaran, M.P., Duraiyarasan, S.: An efficient hierarchical attribute set based encryption scheme with revocation for outsourcing personal health records in cloud computing. In: ICACCS 2013, pp. 1\u20135. IEEE (2013)","DOI":"10.1109\/ICACCS.2013.6938700"},{"key":"33_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-642-32009-5_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"A. Sahai","year":"2012","unstructured":"Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol.\u00a07417, pp. 199\u2013217. Springer, Heidelberg (2012)"},{"key":"33_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-642-36362-7_14","volume-title":"Public-Key Cryptography \u2013 PKC 2013","author":"J.H. Seo","year":"2013","unstructured":"Seo, J.H., Emura, K.: Revocable identity-based encryption revisited: Security model and construction. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol.\u00a07778, pp. 216\u2013234. Springer, Heidelberg (2013)"},{"key":"33_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-642-36095-4_22","volume-title":"Topics in Cryptology \u2013 CT-RSA 2013","author":"J.H. Seo","year":"2013","unstructured":"Seo, J.H., Emura, K.: Efficient delegation of key generation and revocation functionalities in identity-based encryption. In: Dawson, E. (ed.) CT-RSA 2013. LNCS, vol.\u00a07779, pp. 343\u2013358. Springer, Heidelberg (2013)"},{"key":"33_CR20","doi-asserted-by":"crossref","unstructured":"Shoniregun, C.A., Dube, K., Mtenzi, F.: Secure e-healthcare information systems. In: Electronic Healthcare Information Security, pp. 101\u2013121. Springer US (2010)","DOI":"10.1007\/978-0-387-84919-5_4"},{"key":"33_CR21","doi-asserted-by":"crossref","unstructured":"Sun, L., Wang, H., Yong, J., Wu, G.: Semantic access control for cloud computing based on e-Healthcare. In: CSCWD 2012, pp. 512\u2013518. IEEE (2012)","DOI":"10.1109\/CSCWD.2012.6221866"},{"key":"33_CR22","unstructured":"Yi, X., Miao, Y., Bertino, E., Willemson, J.: Multiparty privacy protection for electronic health records. In: GLOBECOM 2013, pp. 2730\u20132735. IEEE (2013)"},{"key":"33_CR23","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Attribute based data sharing with attribute revocation. In: ASIACCS 2010, pp. 261\u2013270. ACM (2010)","DOI":"10.1145\/1755688.1755720"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17533-1_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T14:48:12Z","timestamp":1675262892000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-17533-1_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319175324","9783319175331"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17533-1_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}