{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T20:58:42Z","timestamp":1725915522337},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319696041"},{"type":"electronic","value":"9783319696058"}],"license":[{"start":{"date-parts":[[2017,11,12]],"date-time":"2017-11-12T00:00:00Z","timestamp":1510444800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-69605-8_14","type":"book-chapter","created":{"date-parts":[[2017,11,10]],"date-time":"2017-11-10T23:03:26Z","timestamp":1510355006000},"page":"145-161","source":"Crossref","is-referenced-by-count":3,"title":["A Revocable Outsourcing Attribute-Based Encryption Scheme"],"prefix":"10.1007","author":[{"given":"Zoe L.","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Ruoqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zechao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"S. M.","family":"Yiu","sequence":"additional","affiliation":[]},{"given":"Lucas C. K.","family":"Hui","sequence":"additional","affiliation":[]},{"given":"Xuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Junbin","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,12]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89\u201398. ACM (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, SP 2007, pp. 321\u2013334. IEEE (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"14_CR3","unstructured":"Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: USENIX Security Symposium, vol. 2011 (2011)"},{"issue":"7","key":"14_CR4","doi-asserted-by":"crossref","first-page":"1384","DOI":"10.1109\/TIFS.2015.2410137","volume":"10","author":"B Qin","year":"2015","unstructured":"Qin, B., Deng, R.H., Liu, S., Ma, S.: Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 10(7), 1384\u20131393 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"14_CR5","doi-asserted-by":"crossref","first-page":"2201","DOI":"10.1109\/TPDS.2013.271","volume":"25","author":"J Li","year":"2014","unstructured":"Li, J., Huang, X., Li, J., Chen, X., Xiang, Y.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25(8), 2201\u20132210 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/978-3-319-21966-0_20","volume-title":"Information and Communications Security","author":"Y Chen","year":"2015","unstructured":"Chen, Y., Jiang, Z.L., Yiu, S.M., Liu, J.K., Au, M.H., Wang, X.: Fully secure ciphertext-policy attribute based encryption with security mediator. In: Hui, L.C.K., Qing, S.H., Shi, E., Yiu, S.M. (eds.) ICICS 2014. LNCS, vol. 8958, pp. 274\u2013289. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21966-0_20"},{"key":"14_CR7","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/978-3-319-18467-8_31","volume-title":"ICT Systems Security and Privacy Protection","author":"W Lueks","year":"2015","unstructured":"Lueks, W., Alp\u00e1r, G., Hoepman, J.-H., Vullers, P.: Fast revocation of attribute-based credentials for both users and verifiers. In: Federrath, H., Gollmann, D. (eds.) SEC 2015. IAICT, vol. 455, pp. 463\u2013478. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-18467-8_31"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encryption with efficient revocation. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 417\u2013426. ACM (2008)","DOI":"10.1145\/1455770.1455823"},{"key":"14_CR9","unstructured":"Beimel, A.: Secure schemes for secret sharing and key distribution. Technion Israel Institute of Technology, Faculty of Computer Science (1996)"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"B Waters","year":"2011","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53\u201370. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19379-8_4"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/978-3-540-45146-4_33","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"R Canetti","year":"2003","unstructured":"Canetti, R., Krawczyk, H., Nielsen, J.B.: Relaxing chosen-ciphertext security. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 565\u2013582. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_33"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 195\u2013203. ACM (2007)","DOI":"10.1145\/1315245.1315270"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Staddon, J., Golle, P., Gagn\u00e9, M., Rasmussen, P.: A content-driven access control system. In: Proceedings of the 7th Symposium on Identity and Trust on the Internet, pp. 26\u201335. ACM (2008)","DOI":"10.1145\/1373290.1373296"},{"issue":"2","key":"14_CR14","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1109\/TC.2013.208","volume":"64","author":"J Li","year":"2015","unstructured":"Li, J., Li, J., Chen, X., Jia, C., Lou, W.: Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans. Comput. 64(2), 425\u2013437 (2015)","journal-title":"IEEE Trans. Comput."},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-3-319-24174-6_15","volume-title":"Computer Security \u2013 ESORICS 2015","author":"B Qin","year":"2015","unstructured":"Qin, B., Deng, R.H., Li, Y., Liu, S.: Server-aided revocable identity-based encryption. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9326, pp. 286\u2013304. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24174-6_15"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 261\u2013270. ACM (2010)","DOI":"10.1145\/1755688.1755720"},{"issue":"5","key":"14_CR17","doi-asserted-by":"crossref","first-page":"799","DOI":"10.3233\/JCS-2009-0383","volume":"18","author":"M Pirretti","year":"2010","unstructured":"Pirretti, M., Traynor, P., McDaniel, P., Waters, B.: Secure attribute-based systems. J. Comput. Secur. 18(5), 799\u2013837 (2010)","journal-title":"J. Comput. Secur."},{"key":"14_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-642-03298-1_16","volume-title":"Pairing-Based Cryptography \u2013 Pairing 2009","author":"N Attrapadung","year":"2009","unstructured":"Attrapadung, N., Imai, H.: Conjunctive broadcast and attribute-based encryption. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 248\u2013265. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03298-1_16"},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-642-32009-5_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"A Sahai","year":"2012","unstructured":"Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 199\u2013217. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_13"},{"issue":"7","key":"14_CR20","doi-asserted-by":"crossref","first-page":"1214","DOI":"10.1109\/TPDS.2010.203","volume":"22","author":"J Hur","year":"2011","unstructured":"Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214\u20131221 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Cloud Computing, Security, Privacy in New Computing Environments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69605-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T21:05:46Z","timestamp":1570309546000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69605-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,12]]},"ISBN":["9783319696041","9783319696058"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69605-8_14","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017,11,12]]}}}