{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T12:30:42Z","timestamp":1763037042539,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2017,1,17]],"date-time":"2017-01-17T00:00:00Z","timestamp":1484611200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602287"],"award-info":[{"award-number":["61602287"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1007\/s00500-017-2488-8","type":"journal-article","created":{"date-parts":[[2017,1,17]],"date-time":"2017-01-17T05:38:16Z","timestamp":1484631496000},"page":"2267-2274","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3472-3699","authenticated-orcid":false,"given":"Hao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Zhihua","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Xiaoyan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Man Ho","family":"Au","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,17]]},"reference":[{"key":"2488_CR1","doi-asserted-by":"publisher","unstructured":"Attrapadung N, Imai H (2009) Conjunctive broadcast and attribute-based encryption. In: Pairing-based cryptography-pairing 2009, third international conference, Palo Alto, CA, USA, August 12\u201314, Proceedings, pp 248\u2013265. doi:\n                        10.1007\/978-3-642-03298-1_16","DOI":"10.1007\/978-3-642-03298-1_16"},{"key":"2488_CR2","unstructured":"Beimel A (1996) Secure schemes for secret sharing and key distribution. Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel"},{"key":"2488_CR3","unstructured":"Boneh D, Silverberg A (2002) Applications of multilinear forms to cryptography. In: IACR Cryptology ePrint Archive, 2002: 80. \n                        http:\/\/eprint.iacr.org\/2002\/080"},{"key":"2488_CR4","doi-asserted-by":"crossref","unstructured":"Chase M (2007) Multi-authority attribute based encryption. In: Theory of cryptography, 4th theory of cryptography conference, TCC 2007, Amsterdam, The Netherlands, February 21\u201324, Proceedings , pp 515\u2013534","DOI":"10.1007\/978-3-540-70936-7_28"},{"issue":"9","key":"2488_CR5","doi-asserted-by":"crossref","first-page":"2386","DOI":"10.1109\/TPDS.2013.180","volume":"25","author":"X Chen","year":"2014","unstructured":"Chen X, Li J, Ma J, Tang Q, Lou W (2014) New algorithms for secure outsourcing of modular exponentiations. IEEE Trans Parallel Distrib Syst 25(9):2386\u20132396","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"1","key":"2488_CR6","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/TIFS.2014.2363765","volume":"10","author":"X Chen","year":"2015","unstructured":"Chen X, Huang X, Li J, Ma J, Lou W, Wong DS (2015) New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans Inf Forensics Secur 10(1):69\u201378. doi:\n                        10.1109\/TIFS.2014.2363765","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2488_CR7","doi-asserted-by":"publisher","unstructured":"Freire ESV, Hofheinz D, Paterson KG, Striecks C (2013) Programmable hash functions in the multilinear setting. In: Advances in cryptology-CRYPTO 2013\u201433rd annual cryptology conference, Santa Barbara, CA, USA, August 18\u201322, Proceedings, Part I, pp 513\u2013530. doi:\n                        10.1007\/978-3-642-40041-4_28","DOI":"10.1007\/978-3-642-40041-4_28"},{"key":"2488_CR8","doi-asserted-by":"publisher","unstructured":"Fu Z, Ren K, Shu J, Sun X, Huang F (2015a) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEEE Trans Parallel Distrib Syst. doi:\n                        10.1109\/TPDS.2015.2506573","DOI":"10.1109\/TPDS.2015.2506573"},{"issue":"1","key":"2488_CR9","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","volume":"98\u2013B","author":"Z Fu","year":"2015","unstructured":"Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015b) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans 98\u2013B(1):190\u2013200","journal-title":"IEICE Trans"},{"key":"2488_CR10","doi-asserted-by":"publisher","unstructured":"Garg S, Gentry C, Halevi S, Sahai A, Waters B (2013) Attribute-based encryption for circuits from multilinear maps. In: Advances in cryptology-CRYPTO 2013\u201433rd annual cryptology conference, Santa Barbara, CA, USA, August 18\u201322. Proceedings, Part II, pp 479\u2013499. doi:\n                        10.1007\/978-3-642-40084-1_27","DOI":"10.1007\/978-3-642-40084-1_27"},{"key":"2488_CR11","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, CCS 2006, Alexandria, VA, USA, October 30\u2013November 3, 2006, pp 89\u201398","DOI":"10.1145\/1180405.1180418"},{"key":"2488_CR12","doi-asserted-by":"crossref","unstructured":"Goyal V, Jain A, Pandey O, Sahai A (2008) Bounded ciphertext policy attribute based encryption. In: Automata, languages and programming, 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7\u201311, 2008, Proceedings, Part II\u2014Track B: logic, semantics, and theory of programming & track C: security and cryptography foundations, pp 579\u2013591","DOI":"10.1007\/978-3-540-70583-3_47"},{"key":"2488_CR13","unstructured":"Green M, Hohenberger S, Waters B (2011) Outsourcing the decryption of ABE ciphertexts. In: 20th USENIX Security Symposium, San Francisco, CA, USA, August 8\u201312, 2011, Proceedings"},{"issue":"3","key":"2488_CR14","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1109\/JSYST.2014.2301517","volume":"9","author":"D He","year":"2015","unstructured":"He D, Wang D (2015) Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst J 9(3):816\u2013823. doi:\n                        10.1109\/JSYST.2014.2301517","journal-title":"IEEE Syst J"},{"issue":"1","key":"2488_CR15","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/MCOM.2015.7010518","volume":"53","author":"D He","year":"2015","unstructured":"He D, Zeadally S (2015) Authentication protocol for an ambient assisted living system. IEEE Commun Mag 53(1):71\u201377. doi:\n                        10.1109\/MCOM.2015.7010518","journal-title":"IEEE Commun Mag"},{"key":"2488_CR16","doi-asserted-by":"publisher","unstructured":"He D, Kumar N, Chilamkurti NK (2015a) A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf Sci 321:263\u2013277. doi:\n                        10.1016\/j.ins.2015.02.010","DOI":"10.1016\/j.ins.2015.02.010"},{"key":"2488_CR17","doi-asserted-by":"publisher","unstructured":"He D, Zeadally S, Wu L (2015b) Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst J. doi:\n                        10.1109\/JSYST.2015.2428620","DOI":"10.1109\/JSYST.2015.2428620"},{"key":"2488_CR18","doi-asserted-by":"publisher","unstructured":"He D, Kumar N, Shen H, Lee J-H (2016a) One-to-many authentication for access control in mobile pay-tv systems. Sci China Inf Sci. doi:\n                        10.1007\/s11432-015-5469-5","DOI":"10.1007\/s11432-015-5469-5"},{"key":"2488_CR19","doi-asserted-by":"publisher","unstructured":"He D, Zeadally S, Kumar N, Lee J-H (2016b) Anonymous authentication for wireless body area networks with provable security. IEEE Syst J. doi:\n                        10.1109\/JSYST.2016.2544805","DOI":"10.1109\/JSYST.2016.2544805"},{"issue":"6","key":"2488_CR20","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1109\/TDSC.2013.2297110","volume":"11","author":"X Huang","year":"2014","unstructured":"Huang X, Xiang Y, Bertino E, Zhou J, Li X (2014) Robust multi-factor authentication for fragile communications. IEEE Trans Dependable Secure Comput 11(6):568\u2013581. doi:\n                        10.1109\/TDSC.2013.2297110","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"4","key":"2488_CR21","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/TC.2014.2315619","volume":"64","author":"X Huang","year":"2015","unstructured":"Huang X, Liu JK, Tang S, Xiang Y, Liang K, Li X, Zhou J (2015) Cost-effective authentic and anonymous data sharing with forward security. IEEE Trans Comput 64(4):971\u2013983. doi:\n                        10.1109\/TC.2014.2315619","journal-title":"IEEE Trans Comput"},{"key":"2488_CR22","doi-asserted-by":"crossref","unstructured":"Lewko AB, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Advances in cryptology\u2014EUROCRYPT 2010, 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30\u2013June 3, 2010. Proceedings, pp 62\u201391","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"2488_CR23","doi-asserted-by":"publisher","unstructured":"Li J, Huang Q, Chen X, Chow SSM, Wong DS, Xie D (2011) Multi-authority ciphertext-policy attribute-based encryption with accountability. In: Proceedings of the 6th ACM Symposium on information, computer and communications security, ASIACCS 2011, Hong Kong, China, March 22\u201324, 2011, pp 386\u2013390. doi:\n                        10.1145\/1966913.1966964","DOI":"10.1145\/1966913.1966964"},{"key":"2488_CR24","doi-asserted-by":"publisher","unstructured":"Naor D, Naor M, Lotspiech J (2001) Revocation and tracing schemes for stateless receivers. In: Advances in cryptology\u2014CRYPTO 2001, 21st annual international cryptology conference, Santa Barbara, California, USA, August 19\u201323, 2001, Proceedings, pp 41\u201362. doi:\n                        10.1007\/3-540-44647-8_3","DOI":"10.1007\/3-540-44647-8_3"},{"key":"2488_CR25","doi-asserted-by":"crossref","unstructured":"Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 2007 ACM conference on computer and communications security, CCS 2007, Alexandria, Virginia, USA, October 28\u201331, 2007, pp 195\u2013203","DOI":"10.1145\/1315245.1315270"},{"key":"2488_CR26","doi-asserted-by":"crossref","unstructured":"Pirretti M, Traynor P, McDaniel P, Waters B (2006) Secure attribute-based systems. In: Proceedings of the 13th ACM conference on computer and communications security, CCS 2006, Alexandria, VA, USA, October 30\u2013November 3, 2006, pp 99\u2013112","DOI":"10.1145\/1180405.1180419"},{"issue":"2","key":"2488_CR27","first-page":"317","volume":"16","author":"Y Ren","year":"2015","unstructured":"Ren Y, Shen J, Wang J, Han J, Lee S (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317\u2013324","journal-title":"J Internet Technol"},{"key":"2488_CR28","doi-asserted-by":"crossref","unstructured":"Sahai A ,Waters B (2005) Fuzzy identity-based encryption. In: Advances in cryptology\u2014EUROCRYPT 2005, 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22\u201326, 2005, Proceedings, pp 457\u2013473","DOI":"10.1007\/11426639_27"},{"key":"2488_CR29","doi-asserted-by":"publisher","unstructured":"Sahai A, Seyalioglu H, Waters B (2012) Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Advances in Cryptology-CRYPTO 2012\u201432nd annual cryptology conference, Santa Barbara, CA, USA, August 19\u201323, 2012. Proceedings, pp 199\u2013217. doi:\n                        10.1007\/978-3-642-32009-5_13","DOI":"10.1007\/978-3-642-32009-5_13"},{"issue":"5","key":"2488_CR30","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1109\/JCN.2015.000083","volume":"17","author":"J Shen","year":"2015","unstructured":"Shen J, Tan H, Moh S, Chung I, Liu Q, Sun X (2015) Enhanced secure sensor association and key management in wireless body area networks. J Commun Netw 17(5):453\u2013462. doi:\n                        10.1109\/JCN.2015.000083","journal-title":"J Commun Netw"},{"issue":"1","key":"2488_CR31","first-page":"171","volume":"16","author":"J Shen","year":"2015","unstructured":"Shen J, Tan H, Wang J, Wang J, Lee S (2015b) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Internet Technol 16(1):171\u2013178","journal-title":"J Internet Technol"},{"key":"2488_CR32","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.ins.2014.10.020","volume":"295","author":"Y Shi","year":"2015","unstructured":"Shi Y, Zheng Q, Liu J, Han Z (2015) Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation. Inf Sci 295:221\u2013231. doi:\n                        10.1016\/j.ins.2014.10.020","journal-title":"Inf Sci"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-017-2488-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2488-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2488-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,8]],"date-time":"2018-03-08T01:26:23Z","timestamp":1520472383000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-017-2488-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,17]]},"references-count":32,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2018,4]]}},"alternative-id":["2488"],"URL":"https:\/\/doi.org\/10.1007\/s00500-017-2488-8","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2017,1,17]]}}}