{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T06:41:53Z","timestamp":1759992113446,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319462974"},{"type":"electronic","value":"9783319462981"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-46298-1_5","type":"book-chapter","created":{"date-parts":[[2016,9,19]],"date-time":"2016-09-19T22:40:37Z","timestamp":1474324837000},"page":"65-79","source":"Crossref","is-referenced-by-count":10,"title":["Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Kai","family":"He","sequence":"first","affiliation":[]},{"given":"Jian","family":"Weng","sequence":"additional","affiliation":[]},{"given":"Joseph K.","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wanlei","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Jia-Nan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,21]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, 28\u201331 October 2007, pp. 185\u2013194 (2007)","DOI":"10.1145\/1315245.1315269"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"De Caro, A., Iovino, V.: jPBC: Java pairing based cryptography. In: Proceedings of the 16th IEEE Symposium on Computers andCommunications, ISCC 2011, Kerkyra, Corfu, Greece, 28 June \u2013 1 July 2011, pp. 850\u2013855 (2011)","DOI":"10.1109\/ISCC.2011.5983948"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Chase, M., Chow, S.S.M.: Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, 9\u201313 November 2009, pp. 121\u2013130 (2009)","DOI":"10.1145\/1653662.1653678"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/978-3-642-12678-9_19","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2010","author":"SSM Chow","year":"2010","unstructured":"Chow, S.S.M., Weng, J., Yang, Y., Deng, R.H.: Efficient unidirectional proxy re-encryption. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 316\u2013332. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-12678-9_19"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-02620-1_23","volume-title":"Information Security and Privacy","author":"C-K Chu","year":"2009","unstructured":"Chu, C.-K., Weng, J., Chow, S.S.M., Zhou, J., Deng, R.H.: Conditional proxy broadcast re-encryption. In: Boyd, C., Gonz\u00e1lez Nieto, J. (eds.) ACISP 2009. LNCS, vol. 5594, pp. 327\u2013342. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-02620-1_23"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-89641-8_1","volume-title":"Cryptology and Network Security","author":"RH Deng","year":"2008","unstructured":"Deng, R.H., Weng, J., Liu, S., Chen, K.: Chosen-ciphertext secure proxy re-encryption without pairings. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 1\u201317. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-89641-8_1"},{"issue":"6","key":"5_CR7","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theor. 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theor."},{"issue":"2","key":"5_CR8","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/s10207-013-0208-7","volume":"13","author":"DAB Fernandes","year":"2014","unstructured":"Fernandes, D.A.B., Soares, L.F.B., Gomes, J.V.P., Freire, M.M., In\u00e1cio, P.R.M.: Security issues in cloud environments: a survey. Int. J. Inf. Sec. 13(2), 113\u2013170 (2014)","journal-title":"Int. J. Inf. Sec."},{"issue":"2","key":"5_CR9","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s10207-013-0205-x","volume":"13","author":"A Gouglidis","year":"2014","unstructured":"Gouglidis, A., Mavridis, I., Vincent, C.H.: Security policy verification for multi-domains in cloud systems. Int. J. Inf. Sec. 13(2), 97\u2013111 (2014)","journal-title":"Int. J. Inf. Sec."},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, 30 October \u2013 3 November 2006, pp. 89\u201398 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-642-27954-6_22","volume-title":"Topics in Cryptology \u2013 CT-RSA 2012","author":"G Hanaoka","year":"2012","unstructured":"Hanaoka, G., Kawai, Y., Kunihiro, N., Matsuda, T., Weng, J., Zhang, R., Zhao, Y.: Generic construction of chosen ciphertext secure proxy re-encryption. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 349\u2013364. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-27954-6_22"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Huang, K.-H., Chang, E.-C., Wang, S.-J.: A patient-centric access control scheme for personal health records in the cloud. In: 2013 Fourth International Conference on Networking and Distributed Computing (ICNDC), pp. 85\u201388, December 2013","DOI":"10.1109\/ICNDC.2013.19"},{"issue":"7","key":"5_CR13","doi-asserted-by":"crossref","first-page":"1214","DOI":"10.1109\/TPDS.2010.203","volume":"22","author":"J Hur","year":"2011","unstructured":"Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214\u20131221 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Ibraimi, L., Asim, M., Petkovic, M.: Secure management of personal health records by applying attribute-based encryption. In: 2009 6th International Workshop on Wearable Micro and Nano Technologies for Personalized Health (pHealth), pp. 71\u201374, June 2009","DOI":"10.1109\/PHEALTH.2009.5754828"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-642-36095-4_18","volume-title":"Topics in Cryptology \u2013 CT-RSA 2013","author":"T Isshiki","year":"2013","unstructured":"Isshiki, T., Nguyen, M.H., Tanaka, K.: Proxy re-encryption in a stronger security model extended from CT-RSA2012. In: Dawson, E. (ed.) CT-RSA 2013. LNCS, vol. 7779, pp. 277\u2013292. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-36095-4_18"},{"issue":"4","key":"5_CR16","first-page":"2200","volume":"11","author":"C Leng","year":"2013","unstructured":"Leng, C., Huiqun, Y., Wang, J., Huang, J.: Securing personal health records in the cloud by enforcing sticky policies. TELKOMNIKA Indonesian J. Electr. Eng. 11(4), 2200\u20132208 (2013)","journal-title":"TELKOMNIKA Indonesian J. Electr. Eng."},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1007\/978-3-642-40203-6_33","volume-title":"Computer Security \u2013 ESORICS 2013","author":"J Li","year":"2013","unstructured":"Li, J., Chen, X., Li, J., Jia, C., Ma, J., Lou, W.: Fine-grained access control system based on outsourced attribute-based encryption. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 592\u2013609. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-40203-6_33"},{"key":"5_CR18","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-642-16161-2_6","volume-title":"Security and Privacy in Communication Networks","author":"M Li","year":"2010","unstructured":"Li, M., Yu, S., Ren, K., Lou, W.: Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 89\u2013106. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-16161-2_6"},{"issue":"1","key":"5_CR19","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2013","unstructured":"Li, M., Shucheng, Y., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131\u2013143 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"5_CR20","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.tcs.2014.04.027","volume":"539","author":"K Liang","year":"2014","unstructured":"Liang, K., Chu, C.-K., Tan, X., Wong, D.S., Tang, C., Zhou, J.: Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts. Theor. Comput. Sci. 539, 87\u2013105 (2014)","journal-title":"Theor. Comput. Sci."},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-37682-5_17","volume-title":"Information Security and Cryptology \u2013 ICISC 2012","author":"K Liang","year":"2013","unstructured":"Liang, K., Liu, Z., Tan, X., Wong, D.S., Tang, C.: A CCA-secure identity-based conditional proxy re-encryption without random oracles. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol. 7839, pp. 231\u2013246. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-37682-5_17"},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/978-3-540-78440-1_21","volume-title":"Public Key Cryptography \u2013 PKC 2008","author":"B Libert","year":"2008","unstructured":"Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360\u2013379. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-78440-1_21"},{"key":"5_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-642-13013-7_16","volume-title":"Public Key Cryptography \u2013 PKC 2010","author":"T Matsuda","year":"2010","unstructured":"Matsuda, T., Nishimaki, R., Tanaka, K.: CCA proxy re-encryption without bilinear maps in the standard model. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 261\u2013278. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-13013-7_16"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Narayan, S., Gagn\u00e9, M., Safavi-Naini, R.: Privacy preserving EHR system using attribute-based infrastructure. In: Proceedings of the 2nd ACM Cloud Computing Security Workshop, CCSW 2010, Chicago, IL, USA, 8 October 2010, pp. 47\u201352 (2010)","DOI":"10.1145\/1866835.1866845"},{"key":"5_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005). doi: 10.1007\/11426639_27"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Shao, J., Wei, G., Ling, Y., Xie, M.: Identity-based conditional proxy re-encryption. In: Proceedings of IEEE International Conference onCommunications, ICC 2011, Kyoto, Japan, 5\u20139 June 2011, pp. 1\u20135 (2011)","DOI":"10.1109\/icc.2011.5962419"},{"issue":"1","key":"5_CR27","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/S1386-5056(98)00168-3","volume":"54","author":"E Smith","year":"1999","unstructured":"Smith, E., Eloff, H.P.: Security in health-care information systemscurrent trends. Int. J. Med. Inform. 54(1), 39\u201354 (1999)","journal-title":"Int. J. Med. Inform."},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Wang, C.-J., Xu, X.-L., Shi, D.-Y., Lin, W.-L.: An efficient cloud-based personal health records system using attribute-based encryption and anonymous multi-receiver identity-based encryption. In: 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Guangdong, China, 8\u201310 November 2014, pp. 74\u201381 (2014)","DOI":"10.1109\/3PGCIC.2014.38"},{"issue":"8","key":"5_CR29","doi-asserted-by":"crossref","first-page":"1661","DOI":"10.1109\/TIFS.2016.2549004","volume":"11","author":"S Wang","year":"2016","unstructured":"Wang, S., Liang, K., Liu, J.K., Chen, J., Jianping, Y., Xie, W.: Attribute-based data sharing scheme revisited in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(8), 1661\u20131673 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"5_CR30","doi-asserted-by":"crossref","first-page":"1265","DOI":"10.1109\/TIFS.2016.2523941","volume":"11","author":"S Wang","year":"2016","unstructured":"Wang, S., Zhou, J., Liu, J.K., Jianping, Y., Chen, J., Xie, W.: An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(6), 1265\u20131277 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"5_CR31","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1007\/s11432-010-0047-3","volume":"53","author":"J Weng","year":"2010","unstructured":"Weng, J., Chen, M.-R., Yang, Y., Deng, R.H., Chen, K., Bao, F.: CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Sci. China Inf. Sci. 53(3), 593\u2013606 (2010)","journal-title":"Sci. China Inf. Sci."},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Weng, J., Deng, R.H., Ding, X., Chu, C-K., Lai, J.: Conditional proxy re-encryption secure against chosen-ciphertext attack. In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, 10\u201312 March 2009, pp. 322\u2013332 (2009)","DOI":"10.1145\/1533057.1533100"},{"key":"5_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-642-04474-8_13","volume-title":"Information Security","author":"J Weng","year":"2009","unstructured":"Weng, J., Yang, Y., Tang, Q., Deng, R.H., Bao, F.: Efficient conditional proxy re-encryption with chosen-ciphertext security. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 151\u2013166. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-04474-8_13"},{"key":"5_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/978-3-642-19379-8_18","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"J Weng","year":"2011","unstructured":"Weng, J., Zhao, Y., Hanaoka, G.: On the security of a bidirectional proxy re-encryption scheme from PKC 2010. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 284\u2013295. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-19379-8_18"},{"key":"5_CR35","doi-asserted-by":"crossref","unstructured":"Yang, K., Jia, X., Ren, K.: Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2013, Hangzhou, China, 08\u201310 May 2013, pp. 523\u2013528 (2013)","DOI":"10.1145\/2484313.2484383"},{"key":"5_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-319-12475-9_15","volume-title":"Provable Security","author":"Y Yang","year":"2014","unstructured":"Yang, Y., Lu, H., Weng, J., Zhang, Y., Sakurai, K.: Fine-grained conditional proxy re-encryption and application. In: Chow, S.S.M., Liu, J.K., Hui, L.C.K., Yiu, S.M. (eds.) ProvSec 2014. LNCS, vol. 8782, pp. 206\u2013222. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-12475-9_15"},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control incloud computing. In: 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2010, San Diego, CA, USA, 15\u201319 March 2010, pp. 534\u2013542 (2010)","DOI":"10.1109\/INFCOM.2010.5462174"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-46298-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T15:35:49Z","timestamp":1568388949000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-46298-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319462974","9783319462981"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-46298-1_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}