{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T11:27:08Z","timestamp":1753356428016,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811591280"},{"type":"electronic","value":"9789811591297"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9129-7_26","type":"book-chapter","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T23:07:29Z","timestamp":1603321649000},"page":"369-383","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Revocable Attribute-Based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT"],"prefix":"10.1007","author":[{"given":"Hu","family":"Xiong","sequence":"first","affiliation":[]},{"given":"Jinhao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Minghao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,22]]},"reference":[{"key":"26_CR1","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1016\/j.future.2017.09.037","volume":"79","author":"M Farhan","year":"2018","unstructured":"Farhan, M., et al.: IoT-based students interaction framework using attention-scoring assessment in elearning. Future Gener. Comput. Syst. 79, 909\u2013919 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"26_CR2","doi-asserted-by":"publisher","first-page":"2751","DOI":"10.1109\/ACCESS.2016.2577036","volume":"4","author":"S Yu","year":"2016","unstructured":"Yu, S.: Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4, 2751\u20132763 (2016)","journal-title":"IEEE Access"},{"issue":"1","key":"26_CR3","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1109\/COMST.2016.2610963","volume":"19","author":"S Yu","year":"2016","unstructured":"Yu, S., Liu, M., Dou, W., Liu, X., Zhou, S.: Networking for big data: a survey. IEEE Commun. Surv. Tutorials 19(1), 531\u2013549 (2016)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"26_CR4","doi-asserted-by":"publisher","unstructured":"Xiong, H., et al.: Heterogeneous signcryption with equality test for IIoT environment. IEEE Internet Things J. (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.3008955","DOI":"10.1109\/JIOT.2020.3008955"},{"issue":"2","key":"26_CR5","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1109\/TII.2019.2921516","volume":"16","author":"H Xiong","year":"2019","unstructured":"Xiong, H., Bao, Y., Nie, X., Asoor, Y.I.: Server-aided attribute-based signature supporting expressive access structures for industrial Internet of Things. IEEE Trans. Ind. Inform. 16(2), 1013\u20131023 (2019)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"26_CR6","doi-asserted-by":"publisher","unstructured":"Xiong, H., Wu, Y., Jin, C., Kumari, S.: Efficient and privacy-preserving authentication protocol for heterogeneous systems in IIoT. IEEE Internet of Things J. (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.2999510","DOI":"10.1109\/JIOT.2020.2999510"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Belguith, S., Kaaniche, N., Russello, G.: PU-ABE: lightweight attribute-based encryption supporting access policy update for cloud assisted IoT. In: 11th IEEE International Conference on Cloud Computing, CLOUD 2018, San Francisco, CA, USA, 2\u20137 July 2018, pp. 924\u2013927. IEEE Computer Society (2018)","DOI":"10.1109\/CLOUD.2018.00137"},{"issue":"4","key":"26_CR8","first-page":"231","volume":"15","author":"C Lee","year":"2013","unstructured":"Lee, C., Chung, P., Hwang, M.: A survey on attribute-based encryption schemes of access control in cloud environments. I. J. Netw. Secur. 15(4), 231\u2013240 (2013)","journal-title":"I. J. Netw. Secur."},{"key":"26_CR9","doi-asserted-by":"publisher","unstructured":"Fu, A., Yu, S., Zhang, Y., Wang, H., Huang, C.: NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Trans. Big Data (2017). https:\/\/doi.org\/10.1109\/TBDATA.2017.2701347","DOI":"10.1109\/TBDATA.2017.2701347"},{"key":"26_CR10","doi-asserted-by":"publisher","unstructured":"Mei, Q., Xiong, H., Chen, J., Yang, M., Kumari, S., Khan, M.K.: Efficient certificateless aggregate signature with conditional privacy preservation in IoV. IEEE Syst. J. (2020). https:\/\/doi.org\/10.1109\/JSYST.2020.2966526","DOI":"10.1109\/JSYST.2020.2966526"},{"key":"26_CR11","unstructured":"Sahai, A., Waters, B.: Fuzzy identity based encryption. IACR Cryptology ePrint Archive, vol. 2004, p. 86 (2004)"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), pp. 89\u201398 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Kaaniche, N., Laurent, M.: Privacy-preserving multi-user encrypted access control scheme for cloud-assisted IoT applications. In: 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), pp. 590\u2013597. IEEE (2018)","DOI":"10.1109\/CLOUD.2018.00082"},{"key":"26_CR14","doi-asserted-by":"publisher","unstructured":"Li, J., Zhang, Y., Ning, J., Huang, X., Poh, G.S., Wang, D.: Attribute based encryption with privacy protection and accountability for cloudIoT. IEEE Trans. Cloud Comput. (2020). https:\/\/doi.org\/10.1109\/TCC.2020.2975184","DOI":"10.1109\/TCC.2020.2975184"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. IACR Cryptology ePrint Archive vol. 2006, p. 309 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"26_CR16","unstructured":"Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F., (eds.) Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, 28\u201331 October 2007, pp. 195\u2013203. ACM (2007)"},{"key":"26_CR17","doi-asserted-by":"publisher","unstructured":"Xiong, H., Choo, K.-K.R., Vasilakos, A.V.: Revocable identity-based access control for big data with verifiable outsourced computing. IEEE Trans. Big Data (2017). https:\/\/doi.org\/10.1109\/TBDATA.2017.2697448","DOI":"10.1109\/TBDATA.2017.2697448"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Chen, X., Li, J., Li, H., Li, F.: FDR-ABE: attribute-based encryption with flexible and direct revocation. In: 2013 5th International Conference on Intelligent Networking and Collaborative Systems, pp. 38\u201345. IEEE (2013)","DOI":"10.1109\/INCoS.2013.16"},{"issue":"7","key":"26_CR19","doi-asserted-by":"publisher","first-page":"2158","DOI":"10.3390\/s18072158","volume":"18","author":"A Wu","year":"2018","unstructured":"Wu, A., Zheng, D., Zhang, Y., Yang, M.: Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing. Sensors 18(7), 2158 (2018)","journal-title":"Sensors"},{"key":"26_CR20","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.ins.2019.03.053","volume":"490","author":"B Qin","year":"2019","unstructured":"Qin, B., Zhao, Q., Zheng, D., Cui, H.: (dual) server-aided revocable attribute-based encryption with decryption key exposure resistance. Inf. Sci. 490, 74\u201392 (2019)","journal-title":"Inf. Sci."},{"key":"26_CR21","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1016\/j.future.2019.02.051","volume":"97","author":"S Xu","year":"2019","unstructured":"Xu, S., Yang, G., Mu, Y., Liu, X.: A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance. Future Gen. Comput. Syst. 97, 284\u2013294 (2019)","journal-title":"Future Gen. Comput. Syst."},{"key":"26_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1007\/978-3-319-45741-3_29","volume-title":"Computer Security \u2013 ESORICS 2016","author":"H Cui","year":"2016","unstructured":"Cui, H., Deng, R.H., Li, Y., Qin, B.: Server-aided revocable attribute-based encryption. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9879, pp. 570\u2013587. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45741-3_29"},{"key":"26_CR23","doi-asserted-by":"publisher","unstructured":"Wei, J., Chen, X., Huang, X., Hu, X., Susilo, W.: RS-HABE: revocable-storage and hierarchical attribute-based access scheme for secure sharing of e-health records in public cloud. IEEE Trans. Dependable Secur. Comput. (2019). https:\/\/doi.org\/10.1109\/TDSC.2019.2947920","DOI":"10.1109\/TDSC.2019.2947920"},{"key":"26_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1007\/978-3-662-48797-6_24","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2015","author":"N Attrapadung","year":"2015","unstructured":"Attrapadung, N., Hanaoka, G., Yamada, S.: Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs. In: Iwata, T., Cheon, J.H. (eds.) ASIACRYPT 2015. LNCS, vol. 9452, pp. 575\u2013601. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48797-6_24"},{"key":"26_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/978-3-319-78381-9_19","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"J Chen","year":"2018","unstructured":"Chen, J., Gong, J., Kowalczyk, L., Wee, H.: Unbounded ABE via bilinear entropy expansion, revisited. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10820, pp. 503\u2013534. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78381-9_19"},{"key":"26_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"650","DOI":"10.1007\/978-3-662-43948-7_54","volume-title":"Automata, Languages, and Programming","author":"Y Ishai","year":"2014","unstructured":"Ishai, Y., Wee, H.: Partial garbling schemes and their applications. In: Esparza, J., Fraigniaud, P., Husfeldt, T., Koutsoupias, E. (eds.) ICALP 2014. LNCS, vol. 8572, pp. 650\u2013662. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43948-7_54"},{"key":"26_CR27","unstructured":"Ma, C., Gao, H., Wei, D.: A CP-ABE scheme supporting arithmetic span programs. Secur. Commun. Netw. 2020, 1\u201316 (2020)"},{"key":"26_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/978-3-642-55220-5_31","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2014","author":"N Attrapadung","year":"2014","unstructured":"Attrapadung, N.: Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 557\u2013577. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-55220-5_31"},{"issue":"1","key":"26_CR29","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/s00145-015-9220-6","volume":"30","author":"A Escala","year":"2017","unstructured":"Escala, A., Herold, G., Kiltz, E., Rafols, C., Villar, J.: An algebraic framework for Diffie-Hellman assumptions. J. Crypto. 30(1), 242\u2013288 (2017)","journal-title":"J. Crypto."},{"key":"26_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/978-3-662-46803-6_20","volume-title":"Advances in Cryptology - EUROCRYPT 2015","author":"J Chen","year":"2015","unstructured":"Chen, J., Gay, R., Wee, H.: Improved dual system ABE in prime-order groups via predicate encodings. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 595\u2013624. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46803-6_20"},{"key":"26_CR31","first-page":"553","volume":"2020","author":"H Xiong","year":"2020","unstructured":"Xiong, H., Chen, J., Yang, M., Huang, X.: Revocable attribute-based encryption scheme with arithmetic span program for cloud-assisted IoT. IACR Cryptology ePrint Archive, 2020:553 2020, 553 (2020)","journal-title":"IACR Cryptology ePrint Archive, 2020:553"}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Digital Economy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9129-7_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T02:30:32Z","timestamp":1619317832000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-9129-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811591280","9789811591297"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9129-7_26","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPDE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Digital Economy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spde2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spde2020.csp.escience.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}