{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:27:46Z","timestamp":1725888466600},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319594620"},{"type":"electronic","value":"9783319594637"}],"license":[{"start":{"date-parts":[[2017,5,28]],"date-time":"2017-05-28T00:00:00Z","timestamp":1495929600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-59463-7_60","type":"book-chapter","created":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T22:26:44Z","timestamp":1495837604000},"page":"603-610","source":"Crossref","is-referenced-by-count":0,"title":["Improved Online\/Offline Attribute Based Encryption and More"],"prefix":"10.1007","author":[{"given":"Jindan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Baocang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xu An","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,28]]},"reference":[{"key":"60_CR1","unstructured":"Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: Proceedings of the USENIX Security Symposim, San Francisco, CA, USA (2013)"},{"issue":"8","key":"60_CR2","doi-asserted-by":"crossref","first-page":"1343","DOI":"10.1109\/TIFS.2013.2271848","volume":"8","author":"J Lai","year":"2013","unstructured":"Lai, J., Deng, R., Guan, C., Weng, J.: Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 8(8), 1343\u20131354 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"60_CR3","doi-asserted-by":"publisher","unstructured":"Li, J., Huang, X., Li, J., Chen, X., Xiang, Y.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. (2013, in Press). doi:\n10.1109\/TPDS.2013.27","DOI":"10.1109\/TPDS.2013.27"},{"issue":"7","key":"60_CR4","doi-asserted-by":"crossref","first-page":"1384","DOI":"10.1109\/TIFS.2015.2410137","volume":"10","author":"B Qin","year":"2015","unstructured":"Qin, B., Deng, R.H., Liu, S., Ma, S.: Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 10(7), 1384\u20131393 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2\/3","key":"60_CR5","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1504\/IJSSC.2011.040340","volume":"1","author":"M Puzar","year":"2015","unstructured":"Puzar, M., Plagemann, T.: Data sharing in mobile ad-hoc networks-a study of replication and performance in the MIDAS data space. Int. J. Space-Based Situated Comput. 1(2\/3), 137\u2013150 (2015)","journal-title":"Int. J. Space-Based Situated Comput."},{"issue":"4","key":"60_CR6","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1504\/IJGUC.2013.057120","volume":"4","author":"R Petrlic","year":"2013","unstructured":"Petrlic, R., Sekula, S., Sorge, C.: A privacy-friendly architecture for future cloud computing. Int. J. Grid Util. Comput. 4(4), 265\u2013277 (2013)","journal-title":"Int. J. Grid Util. Comput."},{"issue":"1","key":"60_CR7","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1504\/IJGUC.2016.073773","volume":"7","author":"Y Wang","year":"2016","unstructured":"Wang, Y., Du, J., Cheng, X., Liu, Z., Lin, K.: Degradation and encryption for outsourced PNG images in cloud storage. In. Int. J. Grid Util. Comput. 7(1), 22\u201328 (2016)","journal-title":"In. Int. J. Grid Util. Comput."},{"issue":"2\/3","key":"60_CR8","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1504\/IJGUC.2013.056252","volume":"4","author":"X Ye","year":"2013","unstructured":"Ye, X., Khoussainov, B.: Fine-grained access control for cloud computing. Int. J. Grid Util. Comput. 4(2\/3), 160\u2013168 (2013)","journal-title":"Int. J. Grid Util. Comput."},{"key":"60_CR9","doi-asserted-by":"crossref","unstructured":"Wang, X.A., Ma, J., Xhafa, F.: Outsourcing decryption of attribute based encryption with energy efficiency. In: Proceeding of the International Conference on P2P, Parallel, Grid, Cloud and Internet Computing 3PGCIC 2015, pp. 444-448. IEEE (2015)","DOI":"10.1109\/3PGCIC.2015.99"},{"key":"60_CR10","doi-asserted-by":"crossref","unstructured":"Hohenberger, S., Waters, B.: Online\/offline attribute-based encryption. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 293\u2013310. Springer, March 2014","DOI":"10.1007\/978-3-642-54631-0_17"},{"key":"60_CR11","doi-asserted-by":"crossref","unstructured":"Rouselakis, Y., Waters, B.: Practical constructions and new proof methods for large universe attribute-based encryption. In: Sadeghi, A.-R., Gligor, V.D., Yung, M. (eds.) ACM CCS 13, pp. 463\u2013474. ACM Press, November 2013","DOI":"10.1145\/2508859.2516672"},{"key":"60_CR12","doi-asserted-by":"crossref","unstructured":"Catalano, D., Fiore, D.: Vector commitments and their applications. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 55\u201372. Springer, February\/March 2013","DOI":"10.1007\/978-3-642-36362-7_5"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internetworking, Data &amp; Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59463-7_60","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T22:50:10Z","timestamp":1495839010000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59463-7_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,28]]},"ISBN":["9783319594620","9783319594637"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59463-7_60","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2017,5,28]]}}}