{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T05:07:26Z","timestamp":1771564046478,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819615278","type":"print"},{"value":"9789819615285","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1528-5_5","type":"book-chapter","created":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T17:23:22Z","timestamp":1739553802000},"page":"75-84","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secure and\u00a0Revocable Multi-authority CP-ABE for\u00a0Mobile Cloud Computing"],"prefix":"10.1007","author":[{"given":"Junyang","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1493-9671","authenticated-orcid":false,"given":"Hongyang","family":"Yan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8737-3189","authenticated-orcid":false,"given":"Arthur Sandor Voundi","family":"Koe","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4623-6241","authenticated-orcid":false,"given":"Weichu","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Zhengxi","family":"Zhong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,15]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security And Privacy (SP 2007), pp. 321\u2013334. IEEE (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 514\u2013532. Springer (2001)","DOI":"10.1007\/3-540-45682-1_30"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/978-3-540-70936-7_28","volume-title":"Theory of Cryptography","author":"M Chase","year":"2007","unstructured":"Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515\u2013534. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-70936-7_28"},{"issue":"1","key":"5_CR4","doi-asserted-by":"publisher","first-page":"45","DOI":"10.3390\/e26010045","volume":"26","author":"Z He","year":"2023","unstructured":"He, Z., Chen, Y., Luo, Y., Zhang, L., Tang, Y.: Revocable and traceable undeniable attribute-based encryption in cloud-enabled e-health systems. Entropy 26(1), 45 (2023)","journal-title":"Entropy"},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"53576","DOI":"10.1109\/ACCESS.2021.3070907","volume":"9","author":"K Huang","year":"2021","unstructured":"Huang, K.: Secure efficient revocable large universe multi-authority attribute-based encryption for cloud-aided iot. IEEE Access 9, 53576\u201353588 (2021)","journal-title":"IEEE Access"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 568\u2013588. Springer (2011)","DOI":"10.1007\/978-3-642-20465-4_31"},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1016\/j.future.2016.12.027","volume":"78","author":"Y Liu","year":"2018","unstructured":"Liu, Y., Zhang, Y., Ling, J., Liu, Z.: Secure and fine-grained access control on e-healthcare records in mobile cloud computing. Futur. Gener. Comput. Syst. 78, 1020\u20131026 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"5_CR8","unstructured":"Reed, D., et al.: Decentralized identifiers (DIDS) v1.0. Tech. rep., W3C (2022). https:\/\/www.w3.org\/TR\/2022\/REC-did-core-20220719"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Saeed, I., Baras, S., Hajjdiab, H.: Security and privacy of AWS S3 and azure blob storage services. In: 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS), pp. 388\u2013394. IEEE (2019)","DOI":"10.1109\/CCOMS.2019.8821735"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Sanchol, P., Fugkeaw, S.: An analytical review of data access control schemes in mobile cloud computing. In: International Conference on Computing and Information Technology, pp. 310\u2013321. Springer (2021)","DOI":"10.1007\/978-3-030-79757-7_30"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1016\/j.procs.2019.08.059","volume":"155","author":"MB Taha","year":"2019","unstructured":"Taha, M.B., Talhi, C., Ould-Slimane, H.: Performance evaluation of CP-ABE schemes under constrained devices. Procedia Comput. Sci. 155, 425\u2013432 (2019)","journal-title":"Procedia Comput. Sci."},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Xiao, M., Ma, Z., Li, T.: Privacy-preserving and scalable data access control based on self-sovereign identity management in large-scale cloud storage. In: Security, Privacy, and Anonymity in Computation, Communication, and Storage: 13th International Conference, SpaCCS 2020, Nanjing, 18\u201320 December 2020, Proceedings 13, pp. 1\u201318. Springer (2021)","DOI":"10.1007\/978-3-030-68851-6_1"},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.future.2021.03.021","volume":"121","author":"M Xie","year":"2021","unstructured":"Xie, M., Ruan, Y., Hong, H., Shao, J.: A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices. Futur. Gener. Comput. Syst. 121, 114\u2013122 (2021)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"20","key":"5_CR14","doi-asserted-by":"publisher","first-page":"11269","DOI":"10.3390\/app132011269","volume":"13","author":"X Yan","year":"2023","unstructured":"Yan, X., Tu, S., Alasmary, H., Huang, F.: Multiauthority ciphertext policy-attribute-based encryption (MA-CP-ABE) with revocation and computation outsourcing for resource-constraint devices. Appl. Sci. 13(20), 11269 (2023)","journal-title":"Appl. Sci."},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Yan, X., Chen, Y., Zhai, Y., Ba, Y., Li, X., Jia, H.: An encryption and decryption outsourcing CP-ABE scheme supporting efficient ciphertext evolution. In: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy, pp. 116\u2013125 (2020)","DOI":"10.1145\/3377644.3377669"},{"key":"5_CR16","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.1007\/s00607-018-0637-2","volume":"101","author":"Y Zhao","year":"2019","unstructured":"Zhao, Y., Ren, M., Jiang, S., Zhu, G., Xiong, H.: An efficient and revocable storage CP-ABE scheme in the cloud computing. Computing 101, 1041\u20131065 (2019)","journal-title":"Computing"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1528-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T11:29:43Z","timestamp":1750937383000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1528-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819615278","9789819615285"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1528-5_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"15 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ica3pp2024.scimeeting.cn\/en\/web\/index\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}