{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:47:18Z","timestamp":1767340038103},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319600321"},{"type":"electronic","value":"9783319600338"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60033-8_41","type":"book-chapter","created":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T12:18:42Z","timestamp":1495801122000},"page":"469-482","source":"Crossref","is-referenced-by-count":7,"title":["An Attribute-Based Secure and Scalable Scheme for Data Communications in Smart Grids"],"prefix":"10.1007","author":[{"given":"Chunqiang","family":"Hu","sequence":"first","affiliation":[]},{"given":"Yan","family":"Huo","sequence":"additional","affiliation":[]},{"given":"Liran","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Hang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shaojiang","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Liping","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,27]]},"reference":[{"issue":"4","key":"41_CR1","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1109\/TSG.2011.2138172","volume":"2","author":"Q Li","year":"2011","unstructured":"Li, Q., Cao, G.: Multicast authentication in the smart grid with one-time signature. IEEE Trans. Smart Grid 2(4), 686\u2013696 (2011)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"2","key":"41_CR2","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MPE.2008.931384","volume":"7","author":"A Ipakchi","year":"2009","unstructured":"Ipakchi, A., Albuyeh, F.: Grid of the future. IEEE Power Energy Magazine 7(2), 52\u201362 (2009)","journal-title":"IEEE Power Energy Magazine"},{"issue":"1","key":"41_CR3","first-page":"13:1","volume":"14","author":"Y Liu","year":"2011","unstructured":"Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 13:1\u201313:33 (2011)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"41_CR4","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1007\/978-3-319-28865-9_23","volume-title":"Security and Privacy in Communication Networks","author":"C Hu","year":"2015","unstructured":"Hu, C., Cheng, X., Tian, Z., Yu, J., Akkaya, K., Sun, L.: An attribute-based signcryption scheme to secure attribute-defined multicast communications. In: Thuraisingham, B., Wang, X.F., Yegneswaran, V. (eds.) SecureComm 2015. LNICSSITE, vol. 164, pp. 418\u2013437. Springer, Cham (2015). doi: 10.1007\/978-3-319-28865-9_23"},{"key":"41_CR5","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.tcs.2012.05.006","volume":"445","author":"H Chunqiang","year":"2012","unstructured":"Chunqiang, H., Liao, X., Cheng, X.: Verifiable multi-secret sharing based on LFSR sequences. Theoret. Comput. Sci. 445, 52\u201362 (2012)","journal-title":"Theoret. Comput. Sci."},{"key":"41_CR6","doi-asserted-by":"publisher","unstructured":"Hu, C., Li, W., Cheng, X., Yu, J., Wang, S., Bie, R.: A secure and verifiable access control scheme for big data storage in clouds. IEEE Trans. Big Data (2017). doi: 10.1109\/TBDATA.2016.2621106","DOI":"10.1109\/TBDATA.2016.2621106"},{"issue":"9","key":"41_CR7","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1109\/TPDS.2012.86","volume":"23","author":"L Rongxing","year":"2012","unstructured":"Rongxing, L., Xiaohui Liang, X., Li, X.L., Shen, X.: EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23(9), 1621\u20131631 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"41_CR8","doi-asserted-by":"crossref","unstructured":"Li, D., Aung, Z., Williams, J.R., Sanchez, A.: Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis. In: 2012 IEEE PES Innovative Smart Grid Technologies (ISGT), pp. 1\u20138. IEEE (2012)","DOI":"10.1109\/ISGT.2012.6175680"},{"key":"41_CR9","doi-asserted-by":"publisher","unstructured":"Cai, A., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secure Comput. (2016). doi: 10.1109\/TDSC.2016.2613521","DOI":"10.1109\/TDSC.2016.2613521"},{"issue":"2","key":"41_CR10","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1109\/TNSM.2016.2559448","volume":"13","author":"L Zhang","year":"2016","unstructured":"Zhang, L., Cai, Z., Wang, X.: Fakemask: a novel privacy preserving approach for smartphones. IEEE Trans. Netw. Serv. Manag. 13(2), 335\u2013348 (2016)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"41_CR11","unstructured":"Ruj, S., Nayak, A., Stojmenovic, I.: A security architecture for data aggregation and access control in smart grids. arxiv preprint arXiv:1111.2619 (2011)"},{"key":"41_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1007\/978-3-642-20465-4_31","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"A Lewko","year":"2011","unstructured":"Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568\u2013588. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-20465-4_31"},{"key":"41_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47\u201353. Springer, Heidelberg (1985). doi: 10.1007\/3-540-39568-7_5"},{"key":"41_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology \u2014 CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001). doi: 10.1007\/3-540-44647-8_13"},{"key":"41_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/3-540-39200-9_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"R Canetti","year":"2003","unstructured":"Canetti, R., Halevi, S., Katz, J.: A forward-secure public-key encryption scheme. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 255\u2013271. Springer, Heidelberg (2003). doi: 10.1007\/3-540-39200-9_16"},{"key":"41_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-540-24676-3_14","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223\u2013238. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-24676-3_14"},{"key":"41_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005). doi: 10.1007\/11426639_27"},{"key":"41_CR18","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89\u201398. ACM (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"41_CR19","doi-asserted-by":"crossref","unstructured":"Zheng, X., Cai, Z., Li, J., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: INFOCOM. IEEE (2017)","DOI":"10.1109\/INFOCOM.2017.8056976"},{"issue":"5","key":"41_CR20","doi-asserted-by":"crossref","first-page":"704","DOI":"10.1049\/iet-com.2016.0782","volume":"11","author":"C Hu","year":"2017","unstructured":"Hu, C., Huo, Y.: Efficient privacy-preserving dot-product computation for mobile big data. IET Commun. 11(5), 704\u2013712 (2017)","journal-title":"IET Commun."},{"issue":"4","key":"41_CR21","doi-asserted-by":"crossref","first-page":"981","DOI":"10.1109\/SURV.2011.122111.00145","volume":"14","author":"J Liu","year":"2012","unstructured":"Liu, J., Xiao, Y., Li, S., Liang, W., Chen, P.C.L.: Cyber security and privacy issues in smart grids. IEEE Commun. Surv. Tutor. 14(4), 981\u2013997 (2012)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"41_CR22","doi-asserted-by":"crossref","unstructured":"Zhongwei, S., Sitian, H., Yaning, M., Fengjie, S.: Security mechanism for smart distribution grid using ethernet passive optical network. In: 2010 2nd International Conference on Advanced Computer Control (ICACC), vol. 3, pp. 246\u2013250. IEEE (2010)","DOI":"10.1109\/ICACC.2010.5486625"},{"issue":"9","key":"41_CR23","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/JSAC.2013.SUP.0513004","volume":"31","author":"H Chunqiang","year":"2013","unstructured":"Chunqiang, H., Zhang, N., Li, H., Cheng, X., Liao, X.: Body area network security: a fuzzy attribute-based signcryption scheme. IEEE J. Sel. Areas Commun. 31(9), 37\u201346 (2013)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"2","key":"41_CR24","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/TMSCS.2016.2525997","volume":"2","author":"H Chunqiang","year":"2016","unstructured":"Chunqiang, H., Li, H., Huo, Y., Xiang, T., Liao, X.: Secure and efficient data communication protocol for wireless body area networks. IEEE Trans. Multi-Scale Comput. Syst. 2(2), 94\u2013107 (2016)","journal-title":"IEEE Trans. Multi-Scale Comput. Syst."},{"key":"41_CR25","unstructured":"Beimel, A.: Secure schemes for secret sharing and key distribution. Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel (1996)"},{"key":"41_CR26","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, SP 2007, pp. 321\u2013334. IEEE (2007)","DOI":"10.1109\/SP.2007.11"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60033-8_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T01:07:21Z","timestamp":1569373641000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60033-8_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319600321","9783319600338"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60033-8_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}