{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:34:50Z","timestamp":1763642090347,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2016,7,13]],"date-time":"2016-07-13T00:00:00Z","timestamp":1468368000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572379"],"award-info":[{"award-number":["61572379"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s00500-016-2271-2","type":"journal-article","created":{"date-parts":[[2016,7,13]],"date-time":"2016-07-13T05:05:19Z","timestamp":1468386319000},"page":"7325-7335","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3472-3699","authenticated-orcid":false,"given":"Hao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Zhihua","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Chuan","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Minghao","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,13]]},"reference":[{"issue":"4","key":"2271_CR1","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s10207-005-0070-3","volume":"4","author":"MJ Atallah","year":"2005","unstructured":"Atallah MJ, Li J (2005) Secure outsourcing of sequence comparisons. Int J Inf Secur 4(4):277\u2013287. doi: 10.1007\/s10207-005-0070-3","journal-title":"Int J Inf Secur"},{"key":"2271_CR2","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/S0065-2458(01)80019-X","volume":"54","author":"MJ Atallah","year":"2001","unstructured":"Atallah MJ, Pantazopoulos KN, Rice JR, Spafford EH (2001) Secure outsourcing of scientific computations. Adv Comput 54:215\u2013272. doi: 10.1016\/S0065-2458(01)80019-X","journal-title":"Adv Comput"},{"key":"2271_CR3","unstructured":"Beimel A (1996) Secure schemes for secret sharing and key distribution. PhD thesis, Israel Institute of Technology, Technion, Haifa, Israel"},{"key":"2271_CR4","doi-asserted-by":"publisher","unstructured":"Benjamin D, Atallah MJ (2008) Private and cheating-free outsourcing of algebraic computations. In: Sixth annual conference on privacy, security and trust, PST 2008, October 1\u20133, 2008, Fredericton, New Brunswick, Canada, pp 240\u2013245. doi: 10.1109\/PST.2008.12","DOI":"10.1109\/PST.2008.12"},{"key":"2271_CR5","doi-asserted-by":"publisher","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (S&P 2007), 20\u201323 May 2007, Oakland, California, USA, pp 321\u2013334. doi: 10.1109\/SP.2007.11","DOI":"10.1109\/SP.2007.11"},{"key":"2271_CR6","doi-asserted-by":"publisher","unstructured":"Boneh D, Goh E-J, Nissim K (2005) Evaluating 2-dnf formulas on ciphertexts. In: Proceedings of Theory of cryptography, second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10\u201312, 2005, pp 325\u2013341. doi: 10.1007\/978-3-540-30576-7_18","DOI":"10.1007\/978-3-540-30576-7_18"},{"issue":"6","key":"2271_CR7","doi-asserted-by":"publisher","first-page":"1687","DOI":"10.1109\/TIFS.2012.2210880","volume":"7","author":"X Chen","year":"2012","unstructured":"Chen X, Li J, Susilo W (2012) Efficient fair conditional payments for outsourcing computations. IEEE Trans Inf Forensics Secur 7(6):1687\u20131694. doi: 10.1109\/TIFS.2012.2210880","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"9","key":"2271_CR8","doi-asserted-by":"publisher","first-page":"2386","DOI":"10.1109\/TPDS.2013.180","volume":"25","author":"X Chen","year":"2014","unstructured":"Chen X, Li J, Ma J, Tang Q, Lou W (2014) New algorithms for secure outsourcing of modular exponentiations. IEEE Trans Parallel Distrib Syst 25(9):2386\u20132396. doi: 10.1109\/TPDS.2013.180","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"1","key":"2271_CR9","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/TIFS.2014.2363765","volume":"10","author":"X Chen","year":"2015","unstructured":"Chen X, Huang X, Li J, Ma J, Lou W, Wong DS (2015) New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans Inf Forensics Secur 10(1):69\u201378. doi: 10.1109\/TIFS.2014.2363765","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2271_CR10","doi-asserted-by":"publisher","first-page":"112-","DOI":"10.1016\/j.tcs.2014.09.038","volume":"562","author":"X Chen","year":"2015","unstructured":"Chen X, Susilo W, Li J, Wong DS, Ma J, Tang S, Tang Q (2015) Efficient algorithms for secure outsourcing of bilinear pairings. Theor Comput Sci 562:112-\u2013121. doi: 10.1016\/j.tcs.2014.09.038","journal-title":"Theor Comput Sci"},{"key":"2271_CR11","doi-asserted-by":"publisher","unstructured":"Cheung L, Newport C (2007) Provably secure ciphertext policy ABE. In: Proceedings of the 2007 ACM conference on computer and communications security, CCS 2007, Alexandria, Virginia, USA, October 28\u201331, 2007, pp 456\u2013465. doi: 10.1145\/1315245.1315302","DOI":"10.1145\/1315245.1315302"},{"key":"2271_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2506573","author":"Z Fu","year":"2015","unstructured":"Fu Z, Kui R, Jiangang S, Xingming S, Fengxiao H (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEEE Trans Parallel Distrib Syst. doi: 10.1109\/TPDS.2015.2506573","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"2271_CR13","doi-asserted-by":"crossref","unstructured":"Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015b) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans 98-B(1): 190\u2013200. http:\/\/search.ieice.org\/bin\/summary.php?id=e98-b_1_190","DOI":"10.1587\/transcom.E98.B.190"},{"key":"2271_CR14","doi-asserted-by":"publisher","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, CCS 2006, Alexandria, VA, USA, October 30\u2013November 3, 2006, pp 89\u201398. doi: 10.1145\/1180405.1180418","DOI":"10.1145\/1180405.1180418"},{"key":"2271_CR15","unstructured":"Green M, Hohenberger S, Waters B (2011) Outsourcing the decryption of ABE ciphertexts. In: Proceedings of 20th USENIX security symposium, San Francisco, CA, USA, August 8\u201312, 2011. http:\/\/static.usenix.org\/events\/sec11\/tech\/full_papers\/Green.pdf"},{"key":"2271_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2428620","author":"D He","year":"2015","unstructured":"He D, Zeadally S, Wu L (2015) Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst J. doi: 10.1109\/JSYST.2015.2428620","journal-title":"IEEE Syst J"},{"key":"2271_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-5469-5","author":"D He","year":"2016","unstructured":"He D, Kumar N, Shen H, Lee J-H (2016) One-to-many authentication for access control in mobile pay-tv systems. Sci China Inf Sci. doi: 10.1007\/s11432-015-5469-5","journal-title":"Sci China Inf Sci"},{"key":"2271_CR18","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2016.2544805","author":"D He","year":"2016","unstructured":"He D, Zeadally S, Kumar N, Lee J-H (2016) Anonymous authentication for wireless body area networks with provable security. IEEE Syst J. doi: 10.1109\/JSYST.2016.2544805","journal-title":"IEEE Syst J"},{"issue":"6","key":"2271_CR19","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1109\/TDSC.2013.2297110","volume":"11","author":"X Huang","year":"2014","unstructured":"Huang X, Xiang Y, Bertino E, Zhou J (2014) Robust multi-factor authentication for fragile communications. IEEE Trans Dependable Secure Comput 11(6):568\u2013581. doi: 10.1109\/TDSC.2013.2297110","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"4","key":"2271_CR20","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/TC.2014.2315619","volume":"64","author":"X Huang","year":"2015","unstructured":"Huang X, Liu JK, Tang S, Xiang Y, Liang K, Xu L, Zhou J (2015) Cost-effective authentic and anonymous data sharing with forward security. IEEE Trans Comput 64(4):971\u2013983. doi: 10.1109\/TC.2014.2315619","journal-title":"IEEE Trans Comput"},{"issue":"8","key":"2271_CR21","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1109\/TIFS.2013.2271848","volume":"8","author":"J Lai","year":"2013","unstructured":"Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343\u20131354. doi: 10.1109\/TIFS.2013.2271848","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2271_CR22","doi-asserted-by":"publisher","unstructured":"Lewko A, Waters B (2010) New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Proceedings of 7th theory of cryptography conference on theory of cryptography, TCC 2010, Zurich, Switzerland, February 9\u201311, 2010, pp 455\u2013479. doi: 10.1007\/978-3-642-11799-2_27","DOI":"10.1007\/978-3-642-11799-2_27"},{"key":"2271_CR23","doi-asserted-by":"publisher","unstructured":"Lewko A, Waters B (2012) New proof methods for attribute-based encryption: achieving full security through selective techniques. In: Proceedings of 32nd annual cryptology conference on advances in cryptology-CRYPTO 2012, Santa Barbara, CA, USA, August 19\u201323, 2012, pp 180\u2013198. doi: 10.1007\/978-3-642-32009-5_12","DOI":"10.1007\/978-3-642-32009-5_12"},{"key":"2271_CR24","doi-asserted-by":"publisher","unstructured":"Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Proceedings of advances in cryptology-EUROCRYPT 2010, 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30\u2013June 3, 2010, pp 62\u201391. doi: 10.1007\/978-3-642-13190-5_4","DOI":"10.1007\/978-3-642-13190-5_4"},{"issue":"8","key":"2271_CR25","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1109\/TPDS.2013.271","volume":"25","author":"J Li","year":"2014","unstructured":"Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201\u20132210. doi: 10.1109\/TPDS.2013.271","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"2271_CR26","doi-asserted-by":"publisher","unstructured":"Li J, Jia C, Li J, Chen X (2012) Outsourcing encryption of attribute-based encryption with mapreduce. In: Proceedings of 14th international conference on information and communications security, ICICS 2012, Hong Kong, China, October 29\u201331, 2012, pp 191\u2013201. doi: 10.1007\/978-3-642-34129-8_17","DOI":"10.1007\/978-3-642-34129-8_17"},{"issue":"2","key":"2271_CR27","first-page":"317","volume":"16","author":"Y Ren","year":"2015","unstructured":"Ren Y, Shen J, Wang J, Han J, Lee S (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317\u2013324","journal-title":"J Internet Technol"},{"key":"2271_CR28","doi-asserted-by":"crossref","unstructured":"Rouselakis Y, Waters B (2015) Efficient statically-secure large-universe multi-authority attribute-based encryption. IACR Cryptol ePrint Arch 2015: 16. http:\/\/eprint.iacr.org\/2015\/016","DOI":"10.1007\/978-3-662-47854-7_19"},{"key":"2271_CR29","doi-asserted-by":"publisher","unstructured":"Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Proceedings of advances in cryptology-EUROCRYPT 2005, 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22\u201326, 2005, pp 457\u2013473. doi: 10.1007\/11426639_27","DOI":"10.1007\/11426639_27"},{"issue":"5","key":"2271_CR30","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1109\/JCN.2015.000083","volume":"17","author":"J Shen","year":"2015","unstructured":"Shen J, Tan H, Moh S, Chung I, Liu Q, Sun X (2015) Enhanced secure sensor association and key management in wireless body area networks. J Commun Netw 17(5):453\u2013462. doi: 10.1109\/JCN.2015.000083","journal-title":"J Commun Netw"},{"issue":"1","key":"2271_CR31","first-page":"171","volume":"16","author":"J Shen","year":"2015","unstructured":"Shen J, Tan H, Wang J, Wang J, Lee S (2015b) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Internet Technol 16(1):171\u2013178","journal-title":"J Internet Technol"},{"issue":"10","key":"2271_CR32","first-page":"2270","volume":"52","author":"H Wang","year":"2015","unstructured":"Wang H, Zheng Z, Lei W, Wang Y (2015) Adaptively secure outsourcing ciphertext-policy attribute-based encryption. J Comput Res Dev 52(10):2270\u20132280","journal-title":"J Comput Res Dev"},{"key":"2271_CR33","unstructured":"Waters B (2008) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. IACR Cryptol ePrint Arch 2008: 290. http:\/\/eprint.iacr.org\/2008\/290"},{"key":"2271_CR34","doi-asserted-by":"publisher","unstructured":"Waters Brent (2009) Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Proceedings of 29th annual international cryptology conference on advances in cryptology-CRYPTO 2009, Santa Barbara, CA, USA, August 16\u201320, 2009, pp 619\u2013636. doi: 10.1007\/978-3-642-03356-8_36","DOI":"10.1007\/978-3-642-03356-8_36"},{"key":"2271_CR35","doi-asserted-by":"publisher","unstructured":"Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In Proceedings of public key cryptography-PKC 2011-14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6\u20139, 2011, pp 53\u201370. doi: 10.1007\/978-3-642-19379-8_4","DOI":"10.1007\/978-3-642-19379-8_4"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-016-2271-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-016-2271-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-016-2271-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-016-2271-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T22:56:31Z","timestamp":1568156191000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-016-2271-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,13]]},"references-count":35,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["2271"],"URL":"https:\/\/doi.org\/10.1007\/s00500-016-2271-2","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2016,7,13]]}}}