{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T00:09:42Z","timestamp":1769818182401,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642407789","type":"print"},{"value":"9783642407796","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40779-6_5","type":"book-chapter","created":{"date-parts":[[2013,9,16]],"date-time":"2013-09-16T07:32:11Z","timestamp":1379316731000},"page":"66-81","source":"Crossref","is-referenced-by-count":9,"title":["Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption"],"prefix":"10.1007","author":[{"given":"Y. Sreenivasa","family":"Rao","sequence":"first","affiliation":[]},{"given":"Ratna","family":"Dutta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A. Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 457\u2013473. Springer, Heidelberg (2005)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute Based Encryption for Fine- Grained Access Control of Encrypted Data. In: ACM Conference on Computer and Communications Security, pp. 89\u201398 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-Policy Attribute-Based Encryption. In: IEEE Symposium on Security and Privacy, pp. 321\u2013334 (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"B. Waters","year":"2011","unstructured":"Waters, B.: Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol.\u00a06571, pp. 53\u201370. Springer, Heidelberg (2011)"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-00843-6_1","volume-title":"Information Security Practice and Experience","author":"L. Ibraimi","year":"2009","unstructured":"Ibraimi, L., Tang, Q., Hartel, P., Jonker, W.: Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol.\u00a05451, pp. 1\u201312. Springer, Heidelberg (2009)"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Stinson, D.R.: Cryptography: Theory and Practice, 3rd edn. CRC Press (2006)","DOI":"10.1201\/9781420057133"},{"key":"5_CR8","unstructured":"Lewko, A., Waters, B.: Decentralizing Attribute-Based Encryption. Cryptology ePrint Archive, Report 2010\/351 (2010)"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-540-89754-5_33","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"H. Lin","year":"2008","unstructured":"Lin, H., Cao, Z.-F., Liang, X., Shao, J.: Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol.\u00a05365, pp. 426\u2013436. Springer, Heidelberg (2008)"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/978-3-540-70936-7_28","volume-title":"Theory of Cryptography","author":"M. Chase","year":"2007","unstructured":"Chase, M.: Multi-authority Attribute Based Encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol.\u00a04392, pp. 515\u2013534. Springer, Heidelberg (2007)"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1145\/1653662.1653678","volume-title":"ACM Conference on Computer and Communications Security","author":"M. Chase","year":"2009","unstructured":"Chase, M., Chow, S.S.M.: Improving Privacy and Security in Multi-Authority Attribute-Based Encryption. In: ACM Conference on Computer and Communications Security, pp. 121\u2013130. ACM, New York (2009)"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-642-22450-8_15","volume-title":"Ad-hoc, Mobile, and Wireless Networks","author":"S. Ruj","year":"2011","unstructured":"Ruj, S., Nayak, A., Stojmenovic, I.: Improved Access Control Mechanism in Vehicular Ad Hoc Networks. In: Frey, H., Li, X., Ruehrup, S. (eds.) ADHOC-NOW 2011. LNCS, vol.\u00a06811, pp. 191\u2013205. Springer, Heidelberg (2011)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Ruj, S., Stojmenovic, M., Nayak, A.: Privacy Preserving Access Control with Authentication for Securing Data in Clouds. In: 12th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 556\u2013563 (2012)","DOI":"10.1109\/CCGrid.2012.92"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Yang, K., Jia, X., Ren, K.: DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems. Cryptology ePrint Archive, Report 2012\/419","DOI":"10.1109\/INFCOM.2013.6567100"},{"issue":"4","key":"5_CR15","doi-asserted-by":"publisher","first-page":"803","DOI":"10.4134\/BKMS.2009.46.4.803","volume":"46","author":"S. M\u00fcller","year":"2009","unstructured":"M\u00fcller, S., Katzenbeisser, S., Eckert, C.: On Multi-Authority Ciphertext-Policy Attribute-Based Encryption. Bulletin of the Korean Mathematical Society\u00a046(4), 803\u2013817 (2009)","journal-title":"Bulletin of the Korean Mathematical Society"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Ruj, S., Nayak, A., Stojmenovic, I.: DACC: Distributed access control in clouds. In: IEEE TrustCom 2011, pp. 91\u201398. IEEE (2011)","DOI":"10.1109\/TrustCom.2011.15"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-23822-2_16","volume-title":"Computer Security \u2013 ESORICS 2011","author":"Z. Liu","year":"2011","unstructured":"Liu, Z., Cao, Z., Huang, Q., Wong, D.S., Yuen, T.H.: Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol.\u00a06879, pp. 278\u2013297. Springer, Heidelberg (2011)"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-642-33272-2_13","volume-title":"Provable Security","author":"T. Pandit","year":"2012","unstructured":"Pandit, T., Barua, R.: Efficient Fully Secure Attribute-Based Encryption Schemes for General Access Structures. In: Takagi, T., Wang, G., Qin, Z., Jiang, S., Yu, Y. (eds.) ProvSec 2012. LNCS, vol.\u00a07496, pp. 193\u2013214. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Computer Science","Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40779-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,6]],"date-time":"2022-03-06T02:18:42Z","timestamp":1646533122000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40779-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642407789","9783642407796"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40779-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}