{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:25:56Z","timestamp":1757543156209,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642550317"},{"type":"electronic","value":"9783642550324"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-55032-4_60","type":"book-chapter","created":{"date-parts":[[2014,3,25]],"date-time":"2014-03-25T06:15:38Z","timestamp":1395728138000},"page":"586-595","source":"Crossref","is-referenced-by-count":6,"title":["Attribute-Based Fine-Grained Access Control with User Revocation"],"prefix":"10.1007","author":[{"given":"Jun","family":"Ye","sequence":"first","affiliation":[]},{"given":"Wujun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shu-lin","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yuan-yuan","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Jia-tao","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"60_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-642-03298-1_16","volume-title":"Pairing-Based Cryptography \u2013 Pairing 2009","author":"N. Attrapadung","year":"2009","unstructured":"Attrapadung, N., Imai, H.: Conjunctive broadcast and attribute-based encryption. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol.\u00a05671, pp. 248\u2013265. Springer, Heidelberg (2009)"},{"key":"60_CR2","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption, vol.\u00a03494, pp. 321\u2013334. Springer (May 2007)","DOI":"10.1109\/SP.2007.11"},{"key":"60_CR3","doi-asserted-by":"crossref","unstructured":"Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encryption with efficient revocation, pp. 417\u2013426 (October 2008)","DOI":"10.1145\/1455770.1455823"},{"key":"60_CR4","doi-asserted-by":"crossref","unstructured":"Chase, M., Chow, S.S.M.: Privacy-aware attribute-based encryption with user accountability, pp. 121\u2013130. Springer (November 2009)","DOI":"10.1145\/1653662.1653678"},{"key":"60_CR5","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data, vol.\u00a03494, pp. 89\u201398 (October 2006)","DOI":"10.1145\/1180405.1180418"},{"key":"60_CR6","unstructured":"Kapadia, A., Tsang, P.P., Smith, S.W.: Attribute-based publishing with hidden credentials and hidden policies, pp. 179\u2013192 (2007)"},{"key":"60_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/978-3-642-04474-8_28","volume-title":"Information Security","author":"J. Li","year":"2009","unstructured":"Li, J., Ren, K., Zhu, B., Wan, Z.: Privacy-aware attribute-based encryption with user accountability. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol.\u00a05735, pp. 347\u2013362. Springer, Heidelberg (2009)"},{"key":"60_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1007\/978-3-642-34601-9_37","volume-title":"Network and System Security","author":"J. Li","year":"2012","unstructured":"Li, J., Li, J., Chen, X., Jia, C., Liu, Z.: Efficient keyword search over encrypted data with fine-grained access control in hybrid cloud. In: Xu, L., Bertino, E., Mu, Y. (eds.) NSS 2012. LNCS, vol.\u00a07645, pp. 490\u2013502. Springer, Heidelberg (2012)"},{"issue":"13","key":"60_CR9","doi-asserted-by":"publisher","first-page":"2618","DOI":"10.1016\/j.ins.2010.03.004","volume":"180","author":"H. Lin","year":"2010","unstructured":"Lin, H., Cao, Z., Liang, X., Shao, J.: Secure threshold multi-authority attribute based encryption without a central authority. Information Sciences\u00a0180(13), 2618\u20132632 (2010)","journal-title":"Information Sciences"},{"key":"60_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-540-68164-9_22","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"D. Lubicz","year":"2008","unstructured":"Lubicz, D., Sirvent, T.: Attribute-based broadcast encryption scheme made efficient. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol.\u00a05023, pp. 325\u2013342. Springer, Heidelberg (2008)"},{"key":"60_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-540-68914-0_7","volume-title":"Applied Cryptography and Network Security","author":"T. Nishide","year":"2008","unstructured":"Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: Bellovin, S.M., Gennaro, R., Keromytis, A., Yung, M. (eds.) ACNS 2008. LNCS, vol.\u00a05037, pp. 111\u2013129. Springer, Heidelberg (2008)"},{"key":"60_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/978-3-642-29011-4_35","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2012","author":"T. Okamoto","year":"2012","unstructured":"Okamoto, T., Takashima, K.: Adaptively attribute-hiding (hierarchical) inner product encryption. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol.\u00a07237, pp. 591\u2013608. Springer, Heidelberg (2012)"},{"key":"60_CR13","doi-asserted-by":"crossref","unstructured":"Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures, pp. 195\u2013203 (October 2007)","DOI":"10.1145\/1315245.1315270"},{"key":"60_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-642-28914-9_24","volume-title":"Theory of Cryptography","author":"B. Parno","year":"2012","unstructured":"Parno, B., Raykova, M., Vaikuntanathan, V.: How to delegate and verify in public: Verifiable computation from attribute-based encryption. In: Cramer, R. (ed.) TCC 2012. LNCS, vol.\u00a07194, pp. 422\u2013439. Springer, Heidelberg (2012)"},{"key":"60_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A. Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 457\u2013473. Springer, Heidelberg (2005)"},{"key":"60_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/978-3-642-36818-9_41","volume-title":"Information and Communication Technology","author":"X. Xie","year":"2013","unstructured":"Xie, X., Ma, H., Li, J., Chen, X.: New ciphertext-policy attribute-based access control with efficient revocation. In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds.) ICT-EurAsia 2013. LNCS, vol.\u00a07804, pp. 373\u2013382. Springer, Heidelberg (2013)"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55032-4_60","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:29:42Z","timestamp":1746160182000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-55032-4_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642550317","9783642550324"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-55032-4_60","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}