{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T05:50:34Z","timestamp":1770529834282,"version":"3.49.0"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319647005","type":"print"},{"value":"9783319647012","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64701-2_37","type":"book-chapter","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T08:56:55Z","timestamp":1500973015000},"page":"499-509","source":"Crossref","is-referenced-by-count":3,"title":["OE-CP-ABE: Over-Encryption Based CP-ABE Scheme for Efficient Policy Updating"],"prefix":"10.1007","author":[{"given":"Jialu","family":"Hao","sequence":"first","affiliation":[]},{"given":"Jian","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Rong","sequence":"additional","affiliation":[]},{"given":"Huimei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Xian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,26]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Attribute based data sharing with attribute revocation. In: ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April, DBLP, pp. 261\u2013270 (2010)","DOI":"10.1145\/1755688.1755720"},{"key":"37_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005). doi: 10.1007\/11426639_27"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for finegrained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, 30 October\u20133 November 2006, pp. 89\u201398 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, vol. 2008, pp. 321\u2013334. IEEE Computer Society (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Rouselakis, Y., Waters, B.: Practical constructions and new proof methods for large universe attribute-based encryption. In: ACM Sigsac Conference on Computer and Communications Security, pp. 463\u2013474. ACM (2013)","DOI":"10.1145\/2508859.2516672"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Cryptology Conference on Advances in Cryptology, pp. 199\u2013217 (2012)","DOI":"10.1007\/978-3-642-32009-5_13"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Yang, K., Jia, X., Ren, K., Xie, R.: Enabling efficient access control with dynamic policy updating for big data in the cloud. In: IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, pp. 2013\u20132021. IEEE (2014)","DOI":"10.1109\/INFOCOM.2014.6848142"},{"key":"37_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11432-015-5435-2","volume":"59","author":"Z Ying","year":"2016","unstructured":"Ying, Z., Li, H., Ma, J., Zhang, J., Cui, J.: Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating. Sci. China Inf. Sci. 59, 1\u201316 (2016)","journal-title":"Sci. China Inf. Sci."},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Yuan, W.: Dynamic Policy Update for Ciphertext-Policy Attribute-Based Encryption (2016), http:\/\/eprint.iacr.org\/2016\/457.pdf","DOI":"10.1155\/2016\/1493290"},{"key":"37_CR10","unstructured":"Shimizu, H., Kakimoto, Y., Sano, I.: Over-encryption: management of access control evolution on outsourced data. In: International Conference on Very Large DataBases, vol. 299, pp. 123\u2013134 (2007)"},{"key":"37_CR11","doi-asserted-by":"crossref","unstructured":"Liu, S., Li, W., Wang, L.: Towards efficient over-encryption in outsourced databases using secret sharing. In: New Technologies, Mobility and Security, pp. 1\u20135. IEEE (2008)","DOI":"10.1109\/NTMS.2008.ECP.100"},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"Wang, X., Zhang, Y.: A dynamic access control scheme for outsourced database. In: International Conference on Network Computing and Information Security, vol. 1, pp. 3\u20137. IEEE Computer Society (2011)","DOI":"10.1109\/NCIS.2011.9"},{"key":"37_CR13","unstructured":"Beimel, A.: Secure schemes for secret sharing and key distribution. Int. J. Pure Appl. Math. (1996)"},{"key":"37_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-642-20901-7_2","volume-title":"Coding and Cryptology","author":"A Beimel","year":"2011","unstructured":"Beimel, A.: Secret-sharing schemes: a survey. In: Chee, Y.M., Guo, Z., Ling, S., Shao, F., Tang, Y., Wang, H., Xing, C. (eds.) IWCC 2011. LNCS, vol. 6639, pp. 11\u201346. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-20901-7_2"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64701-2_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,31]],"date-time":"2022-07-31T12:40:46Z","timestamp":1659271246000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64701-2_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319647005","9783319647012"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64701-2_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}