{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T09:24:40Z","timestamp":1761989080784},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"23","license":[{"start":{"date-parts":[[2017,8,3]],"date-time":"2017-08-03T00:00:00Z","timestamp":1501718400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Natural Science Foundation of China (CN)","award":["61672083","61370190"],"award-info":[{"award-number":["61672083","61370190"]}]},{"name":"National Natural Science Foundation of China (CN)","award":["61532021","61472429"],"award-info":[{"award-number":["61532021","61472429"]}]},{"name":"National Natural Science Foundation of China (CN)","award":["61402029"],"award-info":[{"award-number":["61402029"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s00500-017-2743-z","type":"journal-article","created":{"date-parts":[[2017,8,3]],"date-time":"2017-08-03T09:07:50Z","timestamp":1501751270000},"page":"7961-7976","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Efficient subtree-based encryption for fuzzy-entity data sharing"],"prefix":"10.1007","volume":"22","author":[{"given":"Weiran","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Qin","sequence":"additional","affiliation":[]},{"given":"David","family":"Naccache","sequence":"additional","affiliation":[]},{"given":"Houda","family":"Ferradi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,3]]},"reference":[{"key":"2743_CR1","doi-asserted-by":"crossref","unstructured":"Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H (2005) Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. In: CRYPTO 2005, vol 3621. LNCS. Springer, Berlin, pp 205\u2013222","DOI":"10.1007\/11535218_13"},{"key":"2743_CR2","doi-asserted-by":"crossref","unstructured":"Boneh D, Boyen X (2004a) Efficient selective-id secure identity-based encryption without random oracles. In: EUROCRYPT 2004, vol 3027. LNCS. Springer, Berlin, pp 223\u2013238","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"2743_CR3","doi-asserted-by":"crossref","unstructured":"Boneh D, Boyen X (2004b) Secure identity based encryption without random oracles. In: CRYPTO 2004, vol 3152. LNCS. Springer, Berlin, pp 443\u2013459","DOI":"10.1007\/978-3-540-28628-8_27"},{"key":"2743_CR4","doi-asserted-by":"crossref","unstructured":"Boneh D, Franklin M (2001) Identity-based encryption from the Weil pairing. In: CRYPTO 2001, vol 2139. LNCS. Springer, Berlin, pp 213\u2013229","DOI":"10.1007\/3-540-44647-8_13"},{"issue":"3","key":"2743_CR5","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D Boneh","year":"2003","unstructured":"Boneh D, Franklin M (2003) Identity-based encryption from the weil pairing. SIAM J Comput 32(3):586\u2013615","journal-title":"SIAM J Comput"},{"key":"2743_CR6","doi-asserted-by":"crossref","unstructured":"Boneh D, Hamburg M (2008) Generalized identity based and broadcast encryption schemes. In: ASIACRYPT 2008, vol 5350. LNCS. Springer, Berlin, pp 455\u2013470","DOI":"10.1007\/978-3-540-89255-7_28"},{"key":"2743_CR7","doi-asserted-by":"crossref","unstructured":"Boneh D, Katz J (2005) Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. In: CT-RSA 2005, vol 3376. LNCS. Springer, Berlin, pp 87\u2013103","DOI":"10.1007\/978-3-540-30574-3_8"},{"key":"2743_CR8","doi-asserted-by":"crossref","unstructured":"Boneh D, Boyen X, Goh EJ (2005a) Hierarchical identity based encryption with constant size ciphertext. In: EUROCRYPT 2005, vol 3494. LNCS. Springer, Berlin, pp 440\u2013456","DOI":"10.1007\/11426639_26"},{"key":"2743_CR9","doi-asserted-by":"crossref","unstructured":"Boneh D, Gentry C, Waters B (2005b) Collusion resistant broadcast encryption with short ciphertexts and private keys. In: CRYPTO 2005, vol 3621. LNCS. Springer, Berlin, pp 258\u2013275","DOI":"10.1007\/11535218_16"},{"key":"2743_CR10","doi-asserted-by":"crossref","unstructured":"Boyen X, Mei Q, Waters B (2005) Direct chosen ciphertext security from identity-based techniques. In: CCS 2005. ACM, pp 320\u2013329","DOI":"10.1145\/1102120.1102162"},{"key":"2743_CR11","doi-asserted-by":"crossref","unstructured":"Canetti R, Halevi S, Katz J (2003) A forward-secure public-key encryption scheme. In: EUROCRYPT 2003, vol 2656. LNCS. Springer, Berlin, pp 255\u2013271","DOI":"10.1007\/3-540-39200-9_16"},{"key":"2743_CR12","doi-asserted-by":"crossref","unstructured":"Canetti R, Halevi S, Katz J (2004) Chosen-ciphertext security from identity-based encryption. In: EUROCRYPT 2004, vol 3027. LNCS. Springer, Berlin, pp 207\u2013222","DOI":"10.1007\/978-3-540-24676-3_13"},{"issue":"5","key":"2743_CR13","doi-asserted-by":"crossref","first-page":"1721","DOI":"10.1007\/s00500-015-1715-4","volume":"20","author":"HC Chen","year":"2016","unstructured":"Chen HC (2016) A trusted user-to-role and role-to-key access control scheme. Soft Comput 20(5):1721\u20131733","journal-title":"Soft Comput"},{"key":"2743_CR14","doi-asserted-by":"crossref","unstructured":"Chen J, Wee H (2013) Fully, (almost) tightly secure IBE and dual system groups. In: CRYPTO 2013, vol 8043. LNCS. Springer, Berlin, pp 435\u2013460","DOI":"10.1007\/978-3-642-40084-1_25"},{"issue":"5","key":"2743_CR15","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1109\/TDSC.2014.2366471","volume":"12","author":"X Chen","year":"2015","unstructured":"Chen X, Li J, Huang X, Ma J, Lou W (2015) New publicly verifiable databases with efficient updates. IEEE Trans Dependable Secure Comput 12(5):546\u2013556","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"2743_CR16","doi-asserted-by":"crossref","unstructured":"Cocks C (2001) An identity based encryption scheme based on quadratic residues. In: Cryptography and coding 2001, vol 2260. LNCS. Springer, Berlin, pp 360\u2013363","DOI":"10.1007\/3-540-45325-3_32"},{"key":"2743_CR17","doi-asserted-by":"crossref","unstructured":"Delerabl\u00e9e C (2007) Identity-based broadcast encryption with constant size ciphertexts and private keys. In: ASIACRYPT 2007, vol 4833. LNCS. Springer, Berlin, pp 200\u2013215","DOI":"10.1007\/978-3-540-76900-2_12"},{"key":"2743_CR18","doi-asserted-by":"crossref","unstructured":"Delerabl\u00e9e C, Paillier P, Pointcheval D (2007) Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. In: Pairing 2007, vol 4575. LNCS. Springer, Berlin, pp 39\u201359","DOI":"10.1007\/978-3-540-73489-5_4"},{"key":"2743_CR19","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1016\/j.ins.2014.01.035","volume":"275","author":"H Deng","year":"2014","unstructured":"Deng H, Wu Q, Qin B, Domingo-Ferrer J, Zhang L, Liu J, Shi W (2014) Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inf Sci 275:370\u2013384","journal-title":"Inf Sci"},{"key":"2743_CR20","doi-asserted-by":"crossref","unstructured":"Fiat A, Naor M (1994) Broadcast encryption. In: CRYPTO 1993, vol 773. LNCS. Springer, Berlin, pp 480\u2013491","DOI":"10.1007\/3-540-48329-2_40"},{"key":"2743_CR21","doi-asserted-by":"crossref","unstructured":"Garg S, Gentry C, Halevi S (2013) Candidate multilinear maps from ideal lattices. In: EUROCRYPT 2013, vol 7881. LNCS. Springer, Berlin, pp 1\u201317","DOI":"10.1007\/978-3-642-38348-9_1"},{"key":"2743_CR22","doi-asserted-by":"crossref","unstructured":"Gentry C (2006) Practical identity-based encryption without random oracles. In: EUROCRYPT 2006, vol 4004. LNCS. Springer, Berlin, pp 445\u2013464","DOI":"10.1007\/11761679_27"},{"key":"2743_CR23","doi-asserted-by":"crossref","unstructured":"Gentry C, Halevi S (2009) Hierarchical identity based encryption with polynomially many levels. In: TCC 2009, vol 5444. LNCS. Springer, Berlin, pp 437\u2013456","DOI":"10.1007\/978-3-642-00457-5_26"},{"key":"2743_CR24","doi-asserted-by":"crossref","unstructured":"Gentry C, Silverberg A (2002) Hierarchical id-based cryptography. In: ASIACRYPT 2002, vol 2501. LNCS. Springer, Berlin, pp 548\u2013566","DOI":"10.1007\/3-540-36178-2_34"},{"key":"2743_CR25","doi-asserted-by":"crossref","unstructured":"Gentry C, Waters B (2009) Adaptive security in broadcast encryption systems (with short ciphertexts). In: EUROCRYPT 2009, vol 5479. LNCS. Springer, Berlin, pp 171\u2013188","DOI":"10.1007\/978-3-642-01001-9_10"},{"key":"2743_CR26","doi-asserted-by":"crossref","unstructured":"Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions. In: STOC 2008. ACM, pp 197\u2013206","DOI":"10.1145\/1374376.1374407"},{"key":"2743_CR27","doi-asserted-by":"crossref","unstructured":"Horwitz J, Lynn B (2002) Toward hierarchical identity-based encryption. In: EUROCRYPT 2002, vol 2332. LNCS. Springer, Berlin, pp 466\u2013481","DOI":"10.1007\/3-540-46035-7_31"},{"key":"2743_CR28","doi-asserted-by":"crossref","unstructured":"Hu Y, Jia H (2016) Cryptanalysis of GGH map. In: EUROCRYPT 2016, vol 9665. LNCS. Springer, Berlin, pp 537\u2013565","DOI":"10.1007\/978-3-662-49890-3_21"},{"key":"2743_CR29","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.ins.2016.01.045","volume":"345","author":"J Huan","year":"2016","unstructured":"Huan J, Yang Y, Huang X, Yuen TH, Li J, Cao J (2016) Accountable mobile e-commerce scheme via identity-based plaintext-checkable encryption. Inf Sci 345:143\u2013155","journal-title":"Inf Sci"},{"issue":"8","key":"2743_CR30","doi-asserted-by":"crossref","first-page":"1390","DOI":"10.1109\/TPDS.2010.206","volume":"22","author":"X Huang","year":"2011","unstructured":"Huang X, Xiang Y, Chonka A, Zhou J, Deng RH (2011) A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans Parallel Distrib Syst 22(8):1390\u20131397","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"4","key":"2743_CR31","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1109\/TC.2014.2315619","volume":"64","author":"X Huang","year":"2015","unstructured":"Huang X, Liu JK, Hua S, Xiang Y, Liang K, Zhou J (2015) Cost-effective authentic and anonymous data sharing with forward security. IEEE Trans Comput 64(4):971\u2013983","journal-title":"IEEE Trans Comput"},{"issue":"3","key":"2743_CR32","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1109\/TIFS.2014.2388156","volume":"10","author":"J Kim","year":"2015","unstructured":"Kim J, Susilo W, Au MH, Seberry J (2015) Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext. IEEE Trans Inf Forensics Secur 10(3):679\u2013693","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2743_CR33","doi-asserted-by":"crossref","unstructured":"Lewko A (2010) New techniques for dual system encryption and fully secure hibe with short ciphertexts. In: TCC 2010, vol 5978. LNCS. Springer, Berlin, pp 455\u2013479","DOI":"10.1007\/978-3-642-11799-2_27"},{"key":"2743_CR34","doi-asserted-by":"crossref","unstructured":"Lewko A, Waters B (2012) New proof methods for attribute-based encryption: Achieving full security through selective techniques. In: CRYPTO 2012, vol 7417. LNCS. Springer, Berlin, pp 180\u2013198","DOI":"10.1007\/978-3-642-32009-5_12"},{"key":"2743_CR35","doi-asserted-by":"crossref","unstructured":"Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: EUROCRYPT 2010, vol 6110. LNCS. Springer, Berlin, pp 62\u201391","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"2743_CR36","doi-asserted-by":"crossref","unstructured":"Libert B, Paterson KG, Quaglia EA (2012) Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model. In: PKC 2012, vol 7293. LNCS. Springer, Berlin, pp 206\u2013224","DOI":"10.1007\/978-3-642-30057-8_13"},{"key":"2743_CR37","doi-asserted-by":"crossref","unstructured":"Liu W, Liu J, Wu Q, Qin B (2014) Hierarchical identity-based broadcast encryption. In: ACISP 2014, vol 8544. LNCS. Springer, Berlin, pp 242\u2013257","DOI":"10.1007\/978-3-319-08344-5_16"},{"key":"2743_CR38","unstructured":"Liu W, Liu X, Liu J, Wu Q, Zhang J (2015a) Auditing and revocation enabled role-based access control over outsourced private ERHS. In: HPCC, pp 336\u2013341"},{"key":"2743_CR39","doi-asserted-by":"crossref","unstructured":"Liu Z, Weng J, Li J, Yang J, Fu C, Jia C (2015b) Cloud-based electronic health record system supporting fuzzy keyword search. Soft Comput 20(8):3243\u20133255","DOI":"10.1007\/s00500-015-1699-0"},{"issue":"1","key":"2743_CR40","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s10207-015-0287-8","volume":"15","author":"W Liu","year":"2016","unstructured":"Liu W, Liu J, Wu Q, Qin B, Li Y (2016) Practical chosen-ciphertext secure hierarchical identity-based broadcast encryption. Int J Inf Secur 15(1):35\u201350","journal-title":"Int J Inf Secur"},{"key":"2743_CR41","unstructured":"Maurer UM, Yacobi Y (1991) Non-interactive public-key cryptography. In: EUROCRYPT 1991, vol 547. LNCS. Springer, Berlin, pp 498\u2013507"},{"key":"2743_CR42","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.ins.2012.04.038","volume":"210","author":"B Qin","year":"2012","unstructured":"Qin B, Wu Q, Zhang L, Farr\u00e0s O, Domingo-Ferrer J (2012) Provably secure threshold public-key encryption with adaptive security and short ciphertexts. Inf Sci 210:67\u201380","journal-title":"Inf Sci"},{"issue":"11","key":"2743_CR43","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1016\/j.ipl.2009.01.017","volume":"109","author":"Y Ren","year":"2009","unstructured":"Ren Y, Gu D (2009) Fully CCA2 secure identity based broadcast encryption without random oracles. Inf Process Lett 109(11):527\u2013533","journal-title":"Inf Process Lett"},{"key":"2743_CR44","doi-asserted-by":"crossref","unstructured":"Seo JH, Kobayashi T, Ohkubo M, Suzuki K (2009) Anonymous hierarchical identity-based encryption with constant size ciphertexts. In: PKC 2009, vol 5443. LNCS. Springer, Berlin, pp 215\u2013234","DOI":"10.1007\/978-3-642-00468-1_13"},{"key":"2743_CR45","doi-asserted-by":"crossref","unstructured":"Shamir A (1985) Identity-based cryptosystems and signature schemes. In: CRYPTO 1984, vol 196. LNCS. Springer, Berlin, pp 47\u201353","DOI":"10.1007\/3-540-39568-7_5"},{"key":"2743_CR46","doi-asserted-by":"crossref","unstructured":"Wang J, Chen X, Huang X, You I, Xiang Y (2015) Verifiable auditing for outsourced database in cloud computing. IEEE Trans Comput 64(11):3293\u20133303","DOI":"10.1109\/TC.2015.2401036"},{"key":"2743_CR47","doi-asserted-by":"crossref","unstructured":"Waters B (2005) Efficient identity-based encryption without random oracles. In: EUROCRYPT 2005, vol 3494. LNCS. Springer, Berlin, pp 114\u2013127","DOI":"10.1007\/11426639_7"},{"key":"2743_CR48","doi-asserted-by":"crossref","unstructured":"Waters B (2009) Dual system encryption: realizing fully secure ibe and hibe under simple assumptions. In: CRYPTO 2009, vol 5677. LNCS. Springer, Berlin, pp 619\u2013636","DOI":"10.1007\/978-3-642-03356-8_36"},{"key":"2743_CR49","doi-asserted-by":"crossref","unstructured":"Wu Q, Qin B, Zhang L, Domingo-Ferrer J, Farr\u00e0s O, Manj\u00f3n J (2016) Contributory broadcast encryption with efficient encryption and short ciphertexts. IEEE Trans Comput 65(2):466\u2013479","DOI":"10.1109\/TC.2015.2419662"},{"key":"2743_CR50","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1016\/j.ins.2014.02.085","volume":"272","author":"L Zhang","year":"2014","unstructured":"Zhang L, Wu Q, Domingo-Ferrer J, Qin B, Zeng P (2014a) Signatures in hierarchical certificateless cryptography: efficient constructions and provable security. Inf Sci 272:223\u2013237","journal-title":"Inf Sci"},{"key":"2743_CR51","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1016\/j.ins.2014.03.012","volume":"277","author":"M Zhang","year":"2014","unstructured":"Zhang M, Yang B, Takagi T (2014b) Anonymous spatial encryption under affine space delegation functionality with full security. Inf Sci 277:715\u2013730","journal-title":"Inf Sci"},{"key":"2743_CR52","doi-asserted-by":"crossref","unstructured":"Zhou X, Liu J, Liu W, Wu Q (2016) Anonymous role-based access control on e-health records. In: ASIACCS 2016. ACM, pp 559\u2013570","DOI":"10.1145\/2897845.2897871"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-017-2743-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2743-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2743-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:16:11Z","timestamp":1569975371000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-017-2743-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,3]]},"references-count":52,"journal-issue":{"issue":"23","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["2743"],"URL":"https:\/\/doi.org\/10.1007\/s00500-017-2743-z","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,3]]}}}