{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:27:12Z","timestamp":1725888432931},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319594620"},{"type":"electronic","value":"9783319594637"}],"license":[{"start":{"date-parts":[[2017,5,28]],"date-time":"2017-05-28T00:00:00Z","timestamp":1495929600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-59463-7_6","type":"book-chapter","created":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T22:26:44Z","timestamp":1495837604000},"page":"54-63","source":"Crossref","is-referenced-by-count":0,"title":["A BGN Type Outsourcing the Decryption of CP-ABE Ciphertexts"],"prefix":"10.1007","author":[{"given":"Li","family":"Zhenlin","sequence":"first","affiliation":[]},{"given":"Zhang","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Ding","family":"Yitao","sequence":"additional","affiliation":[]},{"given":"Bai","family":"Ping","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,28]]},"reference":[{"issue":"7165","key":"6_CR1","doi-asserted-by":"crossref","first-page":"963","DOI":"10.1038\/449963a","volume":"449","author":"E Hand","year":"2007","unstructured":"Hand, E.: Head in the clouds. Nature 449(7165), 963 (2007)","journal-title":"Nature"},{"issue":"3","key":"6_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJITWE.2016070101","volume":"11","author":"A Alamareen","year":"2016","unstructured":"Alamareen, A., Al-Jarrah, O., Aljarrah, I.A.: Image mosaicing using binary edge detection algorithm in a cloud-computing environment. Int. J. Inf. Technol. Web. Eng. 11(3), 1\u201314 (2016)","journal-title":"Int. J. Inf. Technol. Web. Eng."},{"issue":"3","key":"6_CR3","doi-asserted-by":"crossref","first-page":"65","DOI":"10.4018\/IJITWE.2016070105","volume":"11","author":"M Almiani","year":"2016","unstructured":"Almiani, M., Razaque, A., Al-Dmour, A.: Privacy preserving framework to support mobile government services. Int. J. Inf. Technol. Web. Eng. 11(3), 65\u201378 (2016)","journal-title":"Int. J. Inf. Technol. Web. Eng."},{"issue":"2","key":"6_CR4","doi-asserted-by":"crossref","first-page":"43","DOI":"10.4018\/IJITWE.2015040103","volume":"10","author":"HK Dam","year":"2015","unstructured":"Dam, H.K., Ghose, A., Qasim, M.: An agent-mediated platform for business processes. Int. J. Inf. Technol. Web. Eng. 10(2), 43\u201361 (2015)","journal-title":"Int. J. Inf. Technol. Web. Eng."},{"issue":"1","key":"6_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJTHI.2016010101","volume":"12","author":"K Mezghani","year":"2016","unstructured":"Mezghani, K., Ayadi, F.: Factors explaining IS managers attitudes toward cloud computing adoption. Int. J. Technol. Human Interact. 12(1), 1\u201320 (2016)","journal-title":"Int. J. Technol. Human Interact."},{"issue":"3","key":"6_CR6","doi-asserted-by":"crossref","first-page":"50","DOI":"10.4018\/IJITWE.2016070104","volume":"11","author":"N Khan","year":"2016","unstructured":"Khan, N., Al-Yasiri, A.: Cloud security threats and techniques to strengthen cloud computing adoption framework. Int. J. Inf. Technol. Web. Eng. 11(3), 50\u201364 (2016)","journal-title":"Int. J. Inf. Technol. Web. Eng."},{"issue":"4","key":"6_CR7","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/MSP.2009.87","volume":"7","author":"LM Kaufman","year":"2009","unstructured":"Kaufman, L.M.: Data security in the world of cloud computing. IEEE Secur. Priv. 7(4), 61\u201364 (2009)","journal-title":"IEEE Secur. Priv."},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Shamir A.: Identity-based cryptosystems and signature schemes. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 47\u201353. Springer, Heidelberg (1984)","DOI":"10.1007\/3-540-39568-7_5"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457\u2013473. Springer, Heidelberg (2005)","DOI":"10.1007\/11426639_27"},{"issue":"5","key":"6_CR10","doi-asserted-by":"crossref","first-page":"799","DOI":"10.3233\/JCS-2009-0383","volume":"18","author":"M Pirretti","year":"2010","unstructured":"Pirretti, M., Traynor, P., McDaniel, P., et al.: Secure attribute-based systems. J. Comput. Secur. 18(5), 799\u2013837 (2010)","journal-title":"J. Comput. Secur."},{"issue":"6","key":"6_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TIFS.2015.2423100","volume":"10","author":"J Ning","year":"2015","unstructured":"Ning, J., Dong, X., Cao, Z., et al.: White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans. Inf. Forensics Secur. 10(6), 1 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Zhang, K., Ma, J., Liu, J., et al.: Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption. Sci. China Inf. Sci. (2016)","DOI":"10.1007\/s11432-016-0012-9"},{"key":"6_CR13","unstructured":"Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: USENIX Security Symposium (2011)"},{"issue":"2","key":"6_CR14","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1109\/TIFS.2011.2172209","volume":"7","author":"Z Wan","year":"2012","unstructured":"Wan, Z., Liu, J., Deng, R.H.: HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 7(2), 743\u2013754 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"6_CR15","doi-asserted-by":"crossref","first-page":"1790","DOI":"10.1109\/TIFS.2013.2279531","volume":"8","author":"K Yang","year":"2013","unstructured":"Yang, K., Jia, X., Ren, K., et al.: DAC-MACS: effective data access control for multi-authority cloud storage systems. IEEE Trans. Inf. Forensics Secur. 8(11), 1790\u20131801 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"6_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TIFS.2016.2547797","volume":"11","author":"S Wang","year":"2016","unstructured":"Wang, S., Zhou, J., Liu, J., et al.: An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(6), 1 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Boneh, D., Goh, E.J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Theory of Cryptography Conference, pp. 325\u2013341. Springer, Heidelberg (2005)","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"6_CR18","unstructured":"Beimel A.: Secure schemes for secret sharing and key distribution. Int. J. Pure Appl. Math. (1996)"},{"issue":"11","key":"6_CR19","first-page":"169","volume":"4","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. Found. Secure Comput. 4(11), 169\u2013180 (1978)","journal-title":"Found. Secure Comput."},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Gentry, C., Halevi, S., Vaikuntanathan, V.: A simple BGN-type cryptosystem from LWE. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506\u2013522. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-13190-5_26"},{"key":"6_CR21","first-page":"425","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"1999","unstructured":"Menezes, A.J., Oorschot, P.V., Vanstone, S.A.: Handbook of Applied Cryptography, pp. 425\u2013488. CRC Press, Boca Raton (1999)"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internetworking, Data &amp; Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59463-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T01:19:48Z","timestamp":1569374388000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59463-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,28]]},"ISBN":["9783319594620","9783319594637"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59463-7_6","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2017,5,28]]}}}