{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:59:26Z","timestamp":1743083966879,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811908514"},{"type":"electronic","value":"9789811908521"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-0852-1_11","type":"book-chapter","created":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T09:02:53Z","timestamp":1646816573000},"page":"137-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Review on Traceable Attribute-Based Encryption"],"prefix":"10.1007","author":[{"given":"Yanfeng","family":"Shi","sequence":"first","affiliation":[]},{"given":"Wenhui","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Wanni","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Wenxiu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Qiong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zekai","family":"Xue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,10]]},"reference":[{"key":"11_CR1","first-page":"102914","volume":"61","author":"M Bouchaala","year":"2021","unstructured":"Bouchaala, M., Ghazel, C., Saidane, L.A.: Trak-cpabe: a novel traceable, revocable and accountable ciphertext-policy attribute-based encryption scheme in cloud computing. J. Inf. Secur. Appl. 61, 102914 (2021)","journal-title":"J. Inf. Secur. Appl."},{"issue":"3","key":"11_CR2","doi-asserted-by":"publisher","first-page":"481","DOI":"10.3390\/info6030481","volume":"6","author":"X Fu","year":"2015","unstructured":"Fu, X., Nie, X., Li, F.: Black box traceable ciphertext policy attribute-based encryption scheme. Information 6(3), 481\u2013493 (2015)","journal-title":"Information"},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"8479","DOI":"10.1109\/ACCESS.2021.3049549","volume":"9","author":"L Guo","year":"2021","unstructured":"Guo, L., Yang, X., Yau, W.C.: TABE-DAC: Efficient traceable attribute-based encryption scheme with dynamic access control based on blockchain. IEEE Access 9, 8479\u20138490 (2021)","journal-title":"IEEE Access"},{"key":"11_CR4","doi-asserted-by":"publisher","unstructured":"Han, D., Pan, N., Li, K.C.: A traceable and revocable ciphertext-policy attribute based encryption scheme based on privacy protection. IEEE Trans. Dependable Secure Comput. 19(1), 316\u2013327 (2022). https:\/\/doi.org\/10.1109\/TDSC.2020.2977646","DOI":"10.1109\/TDSC.2020.2977646"},{"issue":"10","key":"11_CR5","first-page":"2160","volume":"56","author":"G Jiaxin","year":"2019","unstructured":"Jiaxin, G., Jiameng, S., Jing, Q.: Traceable outsourcing attribute-based encryption with attribute revocation. J. Comput. Res. Dev. 56(10), 2160 (2019)","journal-title":"J. Comput. Res. Dev."},{"issue":"4","key":"11_CR6","first-page":"61","volume":"9","author":"GS Kumar","year":"2020","unstructured":"Kumar, G.S.: Efficient data access control for cloud computing with large universe and traceable attribute-based encryption. Int. J. Fuzzy Syst. Appl. (IJFSA) 9(4), 61\u201381 (2020)","journal-title":"Int. J. Fuzzy Syst. Appl. (IJFSA)"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-319-72389-1_8","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"Y Li","year":"2017","unstructured":"Li, Y., Qi, F., Tang, Z.: Traceable and complete fine-grained revocable multi-authority attribute-based encryption scheme in social network. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 87\u201392. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72389-1_8"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Lian, H., Wang, G., Wang, Q.: Fully secure traceable and revocable-storage attribute-based encryption with short update keys via subset difference method. In: 2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC), pp. 1\u20138. IEEE (2018)","DOI":"10.1109\/SSIC.2018.8556734"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Ling, J., Chen, J., Chen, J., Gan, W.: Multiauthority attribute-based encryption with traceable and dynamic policy updating. Secur. Commun. Netw. 2021 (2021)","DOI":"10.1155\/2021\/6661450"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Liu, S., Yu, J., Hu, C., Li, M.: Traceable multiauthority attribute-based encryption with outsourced decryption and hidden policy for CIoT. Wirel. Commun. Mob. Comput. 2021 (2021)","DOI":"10.1155\/2021\/6682580"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Liu, Z., Wang, X., Cui, L., Jiang, Z.L., Zhang, C.: White-box traceable dynamic attribute based encryption. In: 2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC), pp. 526\u2013530. IEEE (2017)","DOI":"10.1109\/SPAC.2017.8304334"},{"issue":"1","key":"11_CR12","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/TIFS.2012.2223683","volume":"8","author":"Z Liu","year":"2012","unstructured":"Liu, Z., Cao, Z., Wong, D.S.: White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures. IEEE Trans. Inf. Forensics Secur. 8(1), 76\u201388 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/978-3-319-16745-9_22","volume-title":"Information Security and Cryptology","author":"Z Liu","year":"2015","unstructured":"Liu, Z., Cao, Z., Wong, D.S.: Fully collusion-resistant traceable key-policy attribute-based encryption with sub-linear size ciphertexts. In: Lin, D., Yung, M., Zhou, J. (eds.) Inscrypt 2014. LNCS, vol. 8957, pp. 403\u2013423. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-16745-9_22"},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1016\/j.future.2017.09.045","volume":"93","author":"Z Liu","year":"2019","unstructured":"Liu, Z., Duan, S., Zhou, P., Wang, B.: Traceable-then-revocable ciphertext-policy attribute-based encryption scheme. Futur. Gener. Comput. Syst. 93, 903\u2013913 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"6","key":"11_CR15","doi-asserted-by":"publisher","first-page":"1274","DOI":"10.1109\/TIFS.2015.2405905","volume":"10","author":"J Ning","year":"2015","unstructured":"Ning, J., Dong, X., Cao, Z., Wei, L., Lin, X.: White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans. Inf. Forensics Secur. 10(6), 1274\u20131288 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"11_CR16","first-page":"63","volume":"39","author":"F Qi","year":"2018","unstructured":"Qi, F., Li, Y., Tang, Z.: Revocable and traceable key-policy attribute-based encryption scheme. J. Commun. 39(11), 63\u201369 (2018)","journal-title":"J. Commun."},{"key":"11_CR17","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.future.2018.05.032","volume":"88","author":"H Qiao","year":"2018","unstructured":"Qiao, H., Ren, J., Wang, Z., Ba, H., Zhou, H.: Compulsory traceable ciphertextpolicy attribute-based encryption against privilege abuse in fog computing. Futur. Gener. Comput. Syst. 88, 107\u2013116 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"11_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_27"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Wang, S., Guo, K., Zhang, Y.: Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage. PLoS ONE 13(9), e0203225 (2018)","DOI":"10.1371\/journal.pone.0203225"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Wang, X., Chi, Y., Zhang, Y.: Traceable ciphertext policy attribute-based encryption scheme with user revocation for cloud storage. In: 2020 International Conference on Computer Engineering and Application (ICCEA), pp. 91\u201395. IEEE (2020)","DOI":"10.1109\/ICCEA50009.2020.00026"},{"issue":"7","key":"11_CR21","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s12243-018-00699-y","volume":"74","author":"A Wu","year":"2019","unstructured":"Wu, A., Zhang, Y., Zheng, X., Guo, R., Zhao, Q., Zheng, D.: Efficient and privacypreserving traceable attribute-based encryption in blockchain. Ann. Telecommun. 74(7), 401\u2013411 (2019)","journal-title":"Ann. Telecommun."},{"issue":"4","key":"11_CR22","first-page":"150","volume":"41","author":"Y Xixi","year":"2020","unstructured":"Xixi, Y., Xu, H., Tao, L., Qing, Y., Jinxia, Y., Yongli, T.: Traceable attribute-based encryption scheme with key-delegation abuse resistance. J. Commun. 41(4), 150 (2020)","journal-title":"J. Commun."},{"key":"11_CR23","doi-asserted-by":"publisher","first-page":"128298","DOI":"10.1109\/ACCESS.2019.2939413","volume":"7","author":"X Yan","year":"2019","unstructured":"Yan, X., He, X., Yu, J., Tang, Y.: White-box traceable ciphertext-policy attributebased encryption in multi-domain environment. IEEE Access 7, 128298\u2013128312 (2019)","journal-title":"IEEE Access"},{"key":"11_CR24","doi-asserted-by":"publisher","first-page":"38285","DOI":"10.1109\/ACCESS.2020.2975813","volume":"8","author":"X Yan","year":"2020","unstructured":"Yan, X., Yuan, X., Zhang, Q., Tang, Y.: Traceable and weighted attribute-based encryption scheme in the cloud environment. IEEE Access 8, 38285\u201338295 (2020)","journal-title":"IEEE Access"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Yang, X., Yang, P., An, F., Zhou, Q., Yang, M.: Traceable multi-authority attribute-based encryption scheme for cloud computing. In: 2017 14th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), pp. 263\u2013267. IEEE (2017)","DOI":"10.1109\/ICCWAMTIP.2017.8301492"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Yang, Y., et al.: Dual traceable distributed attribute-based searchable encryption and ownership transfer. IEEE Trans. Cloud Comput. (2021)","DOI":"10.1109\/TCC.2021.3090519"},{"issue":"4","key":"11_CR27","doi-asserted-by":"crossref","first-page":"155014771984127","DOI":"10.1177\/1550147719841276","volume":"15","author":"G Yu","year":"2019","unstructured":"Yu, G., Wang, Y., Cao, Z., Lin, J., Wang, X.: Traceable and undeniable ciphertextpolicy attribute-based encryption for cloud storage service. Int. J. Distrib. Sens. Netw. 15(4), 1550147719841276 (2019)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, K., Li, Y., Song, Y., Lu, L., Zhang, T., Jiang, Q.: A traceable and revocable multiauthority attribute-based encryption scheme with fast access. Secur. Commun. Netw. 2020 (2020)","DOI":"10.1155\/2020\/6661243"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Zhou, J., Cao, Z., Dong, X., Lin, X.: TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 2398\u20132406. IEEE (2015)","DOI":"10.1109\/INFOCOM.2015.7218628"}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-0852-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T09:05:21Z","timestamp":1646816721000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-0852-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811908514","9789811908521"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-0852-1_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"221","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}