{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:33:42Z","timestamp":1772908422777,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662460771","type":"print"},{"value":"9783662460788","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-46078-8_47","type":"book-chapter","created":{"date-parts":[[2015,1,14]],"date-time":"2015-01-14T09:54:29Z","timestamp":1421229269000},"page":"566-577","source":"Crossref","is-referenced-by-count":36,"title":["Attribute-Based Encryption Optimized for Cloud Computing"],"prefix":"10.1007","author":[{"given":"M\u00e1t\u00e9","family":"Horv\u00e1th","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"47_CR1","unstructured":"Beimel, A.: Secure schemes for secret sharing and key distribution. Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel (1996)"},{"key":"47_CR2","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321\u2013334 (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"47_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/978-3-540-70936-7_28","volume-title":"Theory of Cryptography","author":"M. Chase","year":"2007","unstructured":"Chase, M.: Multi-authority Attribute Based Encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol.\u00a04392, pp. 515\u2013534. Springer, Heidelberg (2007)"},{"key":"47_CR4","unstructured":"Horv\u00e1th, M.: Attribute-Based Encryption Optimized for Cloud Computing. Cryptology ePrint Archive, Report 2014\/612 (2014), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"47_CR5","doi-asserted-by":"crossref","unstructured":"Lewko, A., Sahai, A., Waters, B.: Revocation systems with very small private keys. In: IEEE Symposium on Security and Privacy, pp. 273\u2013285 (2010)","DOI":"10.1109\/SP.2010.23"},{"key":"47_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1007\/978-3-642-20465-4_31","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"A. Lewko","year":"2011","unstructured":"Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol.\u00a06632, pp. 568\u2013588. Springer, Heidelberg (2011)"},{"issue":"1","key":"47_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1504\/IJSN.2013.055036","volume":"8","author":"Q. Li","year":"2013","unstructured":"Li, Q., Xiong, H., Zhang, F.: Broadcast revocation scheme in composite-order bilinear group and its application to attribute-based encryption. International Journal of Security and Networks\u00a08(1), 1\u201312 (2013)","journal-title":"International Journal of Security and Networks"},{"key":"47_CR8","doi-asserted-by":"crossref","unstructured":"Li, Y., Zhu, J., Wang, X., Chai, Y., Shao, S.: Optimized Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation. International Journal of Security & Its Applications\u00a07(6) (2013)","DOI":"10.14257\/ijsia.2013.7.6.38"},{"key":"47_CR9","unstructured":"Liang, X., Lu, R., Lin, X., Shen, X.S.: Ciphertext policy attribute based encryption with efficient revocation. TechnicalReport, University of Waterloo (2010)"},{"key":"47_CR10","doi-asserted-by":"crossref","unstructured":"Ruj, S., Nayak, A., Stojmenovic, I.: Dacc: Distributed access control in clouds. In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 91\u201398 (2011)","DOI":"10.1109\/TrustCom.2011.15"},{"key":"47_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-642-32009-5_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"A. Sahai","year":"2012","unstructured":"Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol.\u00a07417, pp. 199\u2013217. Springer, Heidelberg (2012)"},{"key":"47_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A. Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 457\u2013473. Springer, Heidelberg (2005)"},{"issue":"5","key":"47_CR13","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.cose.2011.05.006","volume":"30","author":"G. Wang","year":"2011","unstructured":"Wang, G., Liu, Q., Wu, J., Guo, M.: Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Computers & Security\u00a030(5), 320\u2013331 (2011)","journal-title":"Computers & Security"},{"key":"47_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"B. Waters","year":"2011","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol.\u00a06571, pp. 53\u201370. Springer, Heidelberg (2011)"},{"key":"47_CR15","unstructured":"Yang, K., Jia, X., Ren, K., Zhang, B.: DAC-MACS: Effective data access control for multi-authority cloud storage systems. In: INFOCOM, 2013 Proceedings IEEE, pp. 2895\u20132903 (2013)"}],"container-title":["Lecture Notes in Computer Science","SOFSEM 2015: Theory and Practice of Computer Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-46078-8_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T00:15:38Z","timestamp":1559088938000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-46078-8_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662460771","9783662460788"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-46078-8_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}