{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:49:52Z","timestamp":1742989792295,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":47,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819932993"},{"type":"electronic","value":"9789819933006"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-3300-6_30","type":"book-chapter","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:04:01Z","timestamp":1685459041000},"page":"420-432","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Attribute-Based Privacy-Preserving Computing Technologies"],"prefix":"10.1007","author":[{"given":"Shuo","family":"Qiu","sequence":"first","affiliation":[]},{"given":"Wenhui","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Yanfeng","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Wanni","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,31]]},"reference":[{"key":"30_CR1","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.ins.2020.05.041","volume":"536","author":"M Ali","year":"2020","unstructured":"Ali, M., Mohajeri, J., Sadeghi, M.R., Liu, X.: Attribute-based fine-grained access control for outscored private set intersection computation. Inf. Sci. 536, 222\u2013243 (2020)","journal-title":"Inf. Sci."},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Asano, K., Emura, K., Takayasu, A., Watanabe, Y.: A generic construction of cca- secure attribute-based encryption with equality test. Cryptology ePrint Archive (2021)","DOI":"10.1007\/978-3-031-20917-8_1"},{"key":"30_CR3","doi-asserted-by":"publisher","first-page":"210462210477","DOI":"10.1109\/ACCESS.2020.3038838","volume":"8","author":"A Bakas","year":"2020","unstructured":"Bakas, A., Dang, H.V., Michalas, A., Zalitko, A.: The cloud we share: access control on symmetrically encrypted data in untrusted clouds. IEEE Access 8, 210462210477 (2020)","journal-title":"IEEE Access"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Bakas, A., Michalas, A.: Modern family: A revocable hybrid encryption scheme based on attribute-based encryption, symmetric searchable encryption and sgx. In: International conference on security and privacy in communication systems. pp, 472\u2013486. Springer (2019)","DOI":"10.1007\/978-3-030-37231-6_28"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Cash, D., Tsabary, R., Wee, H.: Targeted homomorphic attributebased encryption. In: Theory of Cryptography Conference, pp. 330\u2013360. Springer (2016)","DOI":"10.1007\/978-3-662-53644-5_13"},{"issue":"4","key":"30_CR6","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1504\/IJACT.2017.089356","volume":"3","author":"M Clear","year":"2017","unstructured":"Clear, M., Goldrick, C.M.: Attribute-based fully homomorphic encryption with a bounded number of inputs. Int. J. Appl. Cryptogr. 3(4), 363\u2013376 (2017)","journal-title":"Int. J. Appl. Cryptogr."},{"key":"30_CR7","doi-asserted-by":"publisher","first-page":"99024","DOI":"10.1109\/ACCESS.2020.2996940","volume":"8","author":"Y Cui","year":"2020","unstructured":"Cui, Y., Gao, F., Shi, Y., Yin, W., Panaousis, E., Liang, K.: An efficient attributebased multi-keyword search scheme in encrypted keyword generation. IEEE Access 8, 99024\u201399036 (2020)","journal-title":"IEEE Access"},{"issue":"8","key":"30_CR8","doi-asserted-by":"publisher","first-page":"1166","DOI":"10.1093\/comjnl\/bxz036","volume":"62","author":"Y Cui","year":"2019","unstructured":"Cui, Y., Huang, Q., Huang, J., Li, H., Yang, G.: Ciphertext-policy attribute-based encrypted data equality test and classification. Comput. J. 62(8), 1166\u20131177 (2019)","journal-title":"Comput. J."},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Ding, Y., Li, X.: Policy based on homomorphic encryption and retrieval scheme in cloud computing. In: 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), vol. 1, pp. 568\u2013571. IEEE (2017)","DOI":"10.1109\/CSE-EUC.2017.105"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Eltayieb, N., Elhabob, R., Hassan, A., Li, F.: Fine-grained attribute-based encryption scheme supporting equality test. In: International Conference on Algorithms and Architectures for Parallel Processing, pp. 220\u2013233. Springer (2018)","DOI":"10.1007\/978-3-030-05063-4_18"},{"key":"30_CR11","doi-asserted-by":"publisher","first-page":"8184","DOI":"10.1109\/ACCESS.2021.3136331","volume":"10","author":"J Gao","year":"2021","unstructured":"Gao, J., Zhou, F.: An encrypted cloud email searching and filtering scheme based on hidden policy ciphertext-policy attribute-based encryption with keyword search. IEEE Access 10, 8184\u20138193 (2021)","journal-title":"IEEE Access"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Hiromasa, R., Kawai, Y.: Dynamic multi target homomorphic attribute-based encryption. In: IMA International Conference on Cryptography and Coding, p. 2543. Springer (2017)","DOI":"10.1007\/978-3-319-71045-7_2"},{"key":"30_CR13","doi-asserted-by":"publisher","first-page":"114392","DOI":"10.1109\/ACCESS.2021.3104899","volume":"9","author":"S Khan","year":"2021","unstructured":"Khan, S., Zareei, M., Khan, S., Alanazi, F., Alam, M., Waheed, A.: Oo- abms: Online\/offline-aided attribute-based multi-keyword search. IEEE Access 9, 114392\u2013114406 (2021)","journal-title":"IEEE Access"},{"issue":"5","key":"30_CR14","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1109\/TSC.2016.2542813","volume":"10","author":"J Li","year":"2016","unstructured":"Li, J., Lin, X., Zhang, Y., Han, J.: Ksf-oabe: Outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans. Serv. Comput. 10(5), 715\u2013725 (2016)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"30_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2020.103471","volume":"74","author":"J Li","year":"2021","unstructured":"Li, J., Wang, M., Lu, Y., Zhang, Y., Wang, H.: Abks-skga: Attribute-based keyword search secure against keyword guessing attack. Computer Standards & Interfaces 74, 103471 (2021)","journal-title":"Computer Standards & Interfaces"},{"issue":"1","key":"30_CR16","doi-asserted-by":"publisher","first-page":"63","DOI":"10.3390\/app11010063","volume":"11","author":"HY Lin","year":"2020","unstructured":"Lin, H.Y., Jiang, Y.R.: A multi-user ciphertext policy attribute-based encryption scheme with keyword search for medical cloud system. Appl. Sci. 11(1), 63 (2020)","journal-title":"Appl. Sci."},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Liu, P., Wang, J., Ma, H., Nie, H.: Efficient verifiable public key encryption with keyword search based on kp-abe. In: 2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications, pp. 584\u2013589. IEEE (2014)","DOI":"10.1109\/BWCCA.2014.119"},{"issue":"9","key":"30_CR18","doi-asserted-by":"publisher","first-page":"7851","DOI":"10.1109\/JIOT.2020.2993231","volume":"7","author":"S Liu","year":"2020","unstructured":"Liu, S., Yu, J., Xiao, Y., Wan, Z., Wang, S., Yan, B.: Bc-sabe: Blockchain-aided searchable attribute-based encryption for cloud-iot. IEEE Internet Things J. 7(9), 7851\u20137867 (2020)","journal-title":"IEEE Internet Things J."},{"key":"30_CR19","first-page":"5206252074","volume":"8","author":"X Liu","year":"2020","unstructured":"Liu, X., Lu, T., He, X., Yang, X., Niu, S.: Verifiable attribute-based keyword search over encrypted cloud data supporting data deduplication. IEEE Access 8, 5206252074 (2020)","journal-title":"IEEE Access"},{"key":"30_CR20","doi-asserted-by":"crossref","unstructured":"Liu, Y., Pan, Y., Gu, L., Zhang, Y., An, D.: Attribute-based fully homomorphic encryption scheme from lattices with short ciphertext. Mathematical Problems in Engineering 2021 (2021)","DOI":"10.1155\/2021\/6656764"},{"key":"30_CR21","doi-asserted-by":"crossref","unstructured":"Lv, Z., Zhang, M., Feng, D.: Multi-user searchable encryption with efficient access control for cloud storage. In: 2014 IEEE 6th International Conference on Cloud Computing Technology and Science, pp. 366\u2013373. IEEE (2014)","DOI":"10.1109\/CloudCom.2014.45"},{"issue":"5","key":"30_CR22","first-page":"1","volume":"15","author":"F Meng","year":"2021","unstructured":"Meng, F., Cheng, L., Wang, M.: Abdks: attribute-based encryption with dynamic keyword search in fog computing. Front. Comp. Sci. 15(5), 1\u20139 (2021)","journal-title":"Front. Comp. Sci."},{"issue":"1","key":"30_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-020-01875-2","volume":"2021","author":"F Meng","year":"2021","unstructured":"Meng, F., Cheng, L., Wang, M.: Ciphertext-policy attribute-based encryption with hidden sensitive policy from keyword search techniques in smart city. EURASIP J. Wirel. Commun. Netw. 2021(1), 1\u201322 (2021). https:\/\/doi.org\/10.1186\/s13638-020-01875-2","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"30_CR24","doi-asserted-by":"crossref","unstructured":"Michalas, A.: The lord of the shares: Combining attribute-based encryption and searchable encryption for flexible data sharing. In: Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing, pp. 146\u2013155 (2019)","DOI":"10.1145\/3297280.3297297"},{"key":"30_CR25","doi-asserted-by":"crossref","unstructured":"Michalas, A., Bakas, A., Dang, H.V., Zalitko, A.: Microscope: enabling access control in searchable encryption with the use of attribute-based encryption and sgx. In: Nordic conference on secure IT systems, pp. 254\u2013270. Springer (2019)","DOI":"10.1007\/978-3-030-35055-0_16"},{"issue":"5","key":"30_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-015-5449-9","volume":"60","author":"S Qiu","year":"2016","unstructured":"Qiu, S., Liu, J., Shi, Y., Zhang, R.: SCIENCE CHINA Inf. Sci. 60(5), 1\u201312 (2016). https:\/\/doi.org\/10.1007\/s11432-015-5449-9","journal-title":"SCIENCE CHINA Inf. Sci."},{"key":"30_CR27","doi-asserted-by":"crossref","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques, p. 457473. Springer (2005)","DOI":"10.1007\/11426639_27"},{"issue":"2","key":"30_CR28","first-page":"2456","volume":"5","author":"G Sakarkar","year":"2019","unstructured":"Sakarkar, G., Rohad, M.P., Gupta, R.A.: Attribute-based encryption with equality test in cloud computing using key-policy. Inf. Technol. J. 5(2), 2456\u20133307 (2019)","journal-title":"Inf. Technol. J."},{"issue":"16","key":"30_CR29","doi-asserted-by":"publisher","first-page":"22065","DOI":"10.1007\/s11042-021-10817-z","volume":"81","author":"D Sangeetha","year":"2022","unstructured":"Sangeetha, D., Chakkaravarthy, S.S., Satapathy, S.C., Vaidehi, V., Cruz, M.V.: Multi keyword searchable attribute based encryption for efficient retrieval of health records in cloud. Multimedia Tools and Applications 81(16), 22065\u201322085 (2022)","journal-title":"Multimedia Tools and Applications"},{"issue":"21","key":"30_CR30","doi-asserted-by":"publisher","first-page":"2685","DOI":"10.3390\/electronics10212685","volume":"10","author":"Y Shi","year":"2021","unstructured":"Shi, Y., Qiu, S.: Ciphertext-policy attribute-based encryption with outsourced set intersection in multimedia cloud computing. Electronics 10(21), 2685 (2021)","journal-title":"Electronics"},{"key":"30_CR31","doi-asserted-by":"crossref","unstructured":"Shi, Y., Qiu, S.: Delegated key-policy attribute-based set intersection over outsourced encrypted data sets for cloudiot. Security and Communication Networks 2021 (2021)","DOI":"10.1155\/2021\/5595243"},{"key":"30_CR32","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, pp. 44\u201355. IEEE (2000)"},{"issue":"4","key":"30_CR33","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1109\/TPDS.2014.2355202","volume":"27","author":"W Sun","year":"2014","unstructured":"Sun, W., Yu, S., Lou, W., Hou, Y.T., Li, H.: Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans. Parallel Distrib. Syst. 27(4), 1187\u20131198 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"30_CR34","doi-asserted-by":"crossref","unstructured":"Thenmozhi, R., et al.: Attribute-based adaptive homomorphic encryption for big data security. Big Data (2021)","DOI":"10.1089\/big.2021.0176"},{"key":"30_CR35","doi-asserted-by":"crossref","unstructured":"Wang, C., Li, W., Li, Y., Xu, X.: A ciphertext-policy attribute-based encryption scheme supporting keyword search function. In: International Symposium on Cyberspace Safety and Security, pp. 377\u2013386. Springer (2013)","DOI":"10.1007\/978-3-319-03584-0_28"},{"key":"30_CR36","doi-asserted-by":"crossref","unstructured":"Wang, M., Miao, Y., Guo, Y., Wang, C., Huang, H., Jia, X.: Attribute-based encrypted search for multi-owner and multi-user model. In: ICC 2021-IEEE International Conference on Communications, pp. 1\u20137. IEEE (2021)","DOI":"10.1109\/ICC42927.2021.9500525"},{"key":"30_CR37","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/ACCESS.2017.2775741","volume":"6","author":"Q Wang","year":"2017","unstructured":"Wang, Q., Peng, L., Xiong, H., Sun, J., Qin, Z.: Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing. IEEE Access 6, 760\u2013771 (2017)","journal-title":"IEEE Access"},{"key":"30_CR38","doi-asserted-by":"publisher","first-page":"80675","DOI":"10.1109\/ACCESS.2019.2922646","volume":"7","author":"S Wang","year":"2019","unstructured":"Wang, S., Yao, L., Chen, J., Zhang, Y.: Ks-abeswet: A keyword searchable attribute-based encryption scheme with equality test in the internet of things. IEEE Access 7, 80675\u201380696 (2019)","journal-title":"IEEE Access"},{"key":"30_CR39","doi-asserted-by":"publisher","first-page":"32891","DOI":"10.1109\/ACCESS.2020.2973459","volume":"8","author":"Y Wang","year":"2020","unstructured":"Wang, Y., Cui, Y., Huang, Q., Li, H., Huang, J., Yang, G.: Attribute-based equality test over encrypted data without random oracles. IEEE Access 8, 32891\u201332903 (2020)","journal-title":"IEEE Access"},{"key":"30_CR40","unstructured":"Yang, G.: Outsourced ciphertext-policy attribute-based encryption with equality test. In: Information Security and Cryptology: 14th International Conference, In- scrypt 2018, Fuzhou, China, December 14\u201317, 2018, Revised Selected Papers, vol. 11449, p. 448. Springer (2019)"},{"issue":"1","key":"30_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-015-0034-8","volume":"4","author":"Y Yang","year":"2015","unstructured":"Yang, Y.: Attribute-based data retrieval with semantic keyword search for e-health cloud. Journal of Cloud Computing 4(1), 1\u20136 (2015). https:\/\/doi.org\/10.1186\/s13677-015-0034-8","journal-title":"Journal of Cloud Computing"},{"issue":"8","key":"30_CR42","first-page":"2326","volume":"39","author":"Q Yu","year":"2019","unstructured":"Yu, Q., Tu, G., Li, N., Zhou, T.: Multi-hop multi-policy attributed-based fully homomorphic encryption scheme. Journal of Computer Applications 39(8), 2326 (2019)","journal-title":"Journal of Computer Applications"},{"issue":"6","key":"30_CR43","doi-asserted-by":"publisher","first-page":"1242","DOI":"10.1109\/JSAC.2020.2986620","volume":"38","author":"Y Yu","year":"2020","unstructured":"Yu, Y., Shi, J., Li, H., Li, Y., Du, X., Guizani, M.: Key-policy attribute-based encryption with keyword search in virtualized environments. IEEE J. Sel. Areas Commun. 38(6), 1242\u20131251 (2020)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"6","key":"30_CR44","doi-asserted-by":"publisher","first-page":"978","DOI":"10.1109\/TSC.2017.2762296","volume":"11","author":"R Zhang","year":"2017","unstructured":"Zhang, R., Xue, R., Liu, L.: Searchable encryption for healthcare clouds: a survey. IEEE Trans. Serv. Comput. 11(6), 978\u2013996 (2017)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"30_CR45","unstructured":"Zhang, Y., Zhu, T., Guo, R., Xu, S., Cui, H., Cao, J.: Multi-keyword searchable and verifiable attribute-based encryption over cloud data. IEEE Transactions on Cloud Computing (2021)"},{"key":"30_CR46","doi-asserted-by":"crossref","unstructured":"Zheng, Q., Xu, S., Ateniese, G.: Vabks: Verifiable attribute-based keyword search over outsourced encrypted data. In: IEEE INFOCOM 2014-IEEE conference on computer communications, pp. 522\u2013530. IEEE (2014)","DOI":"10.1109\/INFOCOM.2014.6847976"},{"key":"30_CR47","doi-asserted-by":"publisher","first-page":"20428","DOI":"10.1109\/ACCESS.2017.2756070","volume":"5","author":"H Zhu","year":"2017","unstructured":"Zhu, H., Wang, L., Ahmad, H., Niu, X.: Key-policy attribute-based encryption with equality test in cloud computing. IEEE Access 5, 20428\u201320439 (2017)","journal-title":"IEEE Access"}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-3300-6_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:10:00Z","timestamp":1685459400000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-3300-6_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819932993","9789819933006"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-3300-6_30","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xiamen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}