{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:59:49Z","timestamp":1742914789335,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319986531"},{"type":"electronic","value":"9783319986548"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99136-8_13","type":"book-chapter","created":{"date-parts":[[2018,8,14]],"date-time":"2018-08-14T08:39:41Z","timestamp":1534235981000},"page":"231-249","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-authority Fast Data Cloud-Outsourcing for Mobile Devices"],"prefix":"10.1007","author":[{"given":"Yanting","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zongyang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,15]]},"reference":[{"issue":"1","key":"13_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. TISSEC 9(1), 1\u201330 (2006)","journal-title":"TISSEC"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1007\/978-3-642-32009-5_36","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"R Bardou","year":"2012","unstructured":"Bardou, R., et al.: Efficient padding oracle attacks on cryptographic hardware. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 608\u2013625. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_36"},{"key":"13_CR3","unstructured":"Beimel, A.: Secure schemes for secret sharing and key distribution. Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel (1996)"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encryption with efficient revocation. In: CCS 2008, pp. 417\u2013426 (2008)","DOI":"10.1145\/1455770.1455823"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-540-24676-3_14","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223\u2013238. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24676-3_14"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Chase, M., Chow, S.S.M.: Improving privacy and security in multi-authority attribute-based encryption. In: CCS 2009, pp. 121\u2013130 (2009)","DOI":"10.1145\/1653662.1653678"},{"key":"13_CR7","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.future.2016.04.017","volume":"62","author":"KR Choo","year":"2016","unstructured":"Choo, K.R., Domingo-Ferrer, J., Zhang, L.: Cloud cryptography: theory, practice and future research directions. FGCS 62, 51\u201353 (2016)","journal-title":"FGCS"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Chow, S.S.M.: A framework of multi-authority attribute-based encryption with outsourcing and revocation. In: SACMAT 2016, pp. 215\u2013226 (2016)","DOI":"10.1145\/2914642.2914659"},{"key":"13_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-540-85855-3_9","volume-title":"Security and Cryptography for Networks","author":"SSM Chow","year":"2008","unstructured":"Chow, S.S.M., Roth, V., Rieffel, E.G.: General certificateless encryption and timed-release encryption. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 126\u2013143. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85855-3_9"},{"key":"13_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The Design of Rijndael: AES - The Advanced Encryption Standard","author":"J Daemen","year":"2002","unstructured":"Daemen, J., Vincent, R.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/978-3-662-04722-4"},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.ins.2018.01.024","volume":"436\u2013437","author":"J Domingo-Ferrer","year":"2018","unstructured":"Domingo-Ferrer, J., Ricci, S., Domingo-Enrich, C.: Outsourcing scalar products and matrix products on privacy-protected unencrypted data stored in untrusted clouds. Inf. Sci. 436\u2013437, 320\u2013342 (2018)","journal-title":"Inf. Sci."},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Hohenberger, S., Waters, B.: Online\/offline attribute-based encryption. In: PKC 2014, pp. 293\u2013310 (2014)","DOI":"10.1007\/978-3-642-54631-0_17"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Hung, T., Li, X., Wan, Z., Wan, M.: Privacy preserving cloud data access with multi-authorities. In: INFOCOM 2013, pp. 2625\u20132633 (2013)","DOI":"10.1109\/INFCOM.2013.6567070"},{"key":"13_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-662-54388-7_3","volume-title":"Public-Key Cryptography \u2013 PKC 2017","author":"G Itkis","year":"2017","unstructured":"Itkis, G., Shen, E., Varia, M., Wilson, D., Yerukhimovich, A.: Bounded-collusion attribute-based encryption from minimal assumptions. In: Fehr, S. (ed.) PKC 2017. LNCS, vol. 10175, pp. 67\u201387. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54388-7_3"},{"key":"13_CR15","unstructured":"Krawczyk, H., Rabin, T.: Chameleon signatures. In: NDSS 2000 (2000)"},{"key":"13_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1007\/978-3-642-20465-4_31","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"A Lewko","year":"2011","unstructured":"Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568\u2013588. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20465-4_31"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Li, J., Huang, Q., Chen, X., Chow, S.S.M., Wong, D.S., Xie, D.: Multi-authority ciphertext-policy attribute-based encryption with accountability. In: ASIACCS 2011, pp. 386\u2013390 (2011)","DOI":"10.1145\/1966913.1966964"},{"issue":"1","key":"13_CR18","first-page":"131","volume":"24","author":"M Li","year":"2013","unstructured":"Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. TPDS 24(1), 131\u2013143 (2013)","journal-title":"TPDS"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Rouselakis, Y., Waters, B.: Practical constructions and new proof methods for large universe attribute-based encryption. In: CCS 2013, pp. 463\u2013474 (2013)","DOI":"10.1145\/2508859.2516672"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Rouselakis, Y., Waters, B.: Efficient statically-secure large-universe multi-authority attribute-based encryption. In: FC 2015, pp. 315\u2013332 (2015)","DOI":"10.1007\/978-3-662-47854-7_19"},{"key":"13_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_27"},{"key":"13_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-642-36362-7_14","volume-title":"Public-Key Cryptography \u2013 PKC 2013","author":"JH Seo","year":"2013","unstructured":"Seo, J.H., Emura, K.: Revocable identity-based encryption revisited: security model and construction. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 216\u2013234. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36362-7_14"},{"key":"13_CR23","unstructured":"Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. IACR Cryptology ePrint Archive (2006)"},{"issue":"2","key":"13_CR24","first-page":"743","volume":"7","author":"Z Wan","year":"2012","unstructured":"Wan, Z., Liu, J., Deng, R.H.: Hasbe: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. TIFS 7(2), 743\u2013754 (2012)","journal-title":"TIFS"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., Ren, K.: Privacy-preserving public auditing for data storage security in cloud computing. In: INFOCOM 2010, pp. 1\u20139 (2010)","DOI":"10.1109\/INFCOM.2010.5462173"},{"issue":"8","key":"13_CR26","first-page":"1661","volume":"11","author":"S Wang","year":"2017","unstructured":"Wang, S., Liang, K., Liu, J.K., Chen, J., Yu, J., Xie, W.: Attribute-based data sharing scheme revisited in cloud computing. TIFS 11(8), 1661\u20131673 (2017)","journal-title":"TIFS"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: PKC 2011, pp. 53\u201370 (2011)","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Yang, K., Jia, X., Ren, K., Zhang, B.: DAC-MACS: effective data access control for multi-authority cloud storage systems. In: INFOCOM 2010, pp. 2895\u20132903 (2013)","DOI":"10.1109\/INFCOM.2013.6567100"},{"key":"13_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/978-3-540-72738-5_30","volume-title":"Applied Cryptography and Network Security","author":"W-S Yap","year":"2007","unstructured":"Yap, W.-S., Chow, S.S.M., Heng, S.-H., Goi, B.-M.: Security mediated certificateless signatures. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 459\u2013477. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-72738-5_30"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: INFOCOM 2010, pp. 1\u20139 (2010)","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"13_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.csi.2017.03.005","volume":"54","author":"Y Yu","year":"2017","unstructured":"Yu, Y., Miyaji, A., Au, M.H., Susilo, W.: Cloud computing security and privacy: standards and regulations. Comput. Stand. Interfaces 54, 1\u20132 (2017)","journal-title":"Comput. Stand. Interfaces"},{"key":"13_CR32","unstructured":"Zhang, Y., Liu, J., Zhang, Z., Liu, W.: Fast data cloud-outsourcing with public filtering and flexible access control for mobile devices (2018, submitted)"}],"container-title":["Lecture Notes in Computer Science","Developments in Language Theory"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99136-8_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,22]],"date-time":"2019-10-22T04:37:26Z","timestamp":1571719046000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-99136-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319986531","9783319986548"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99136-8_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}