{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T05:20:07Z","timestamp":1769750407145,"version":"3.49.0"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2018,6,26]],"date-time":"2018-06-26T00:00:00Z","timestamp":1529971200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61370026"],"award-info":[{"award-number":["No. 61370026"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. U1401257"],"award-info":[{"award-number":["No. U1401257"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s00607-018-0637-2","type":"journal-article","created":{"date-parts":[[2018,6,26]],"date-time":"2018-06-26T08:12:07Z","timestamp":1530000727000},"page":"1041-1065","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["An efficient and revocable storage CP-ABE scheme in the cloud computing"],"prefix":"10.1007","volume":"101","author":[{"given":"Yang","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Mao","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Songquan","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Guobin","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Hu","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,26]]},"reference":[{"issue":"4","key":"637_CR1","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I et al (2010) A view of cloud computing. Commun ACM 53(4):50\u201358","journal-title":"Commun ACM"},{"key":"637_CR2","doi-asserted-by":"crossref","unstructured":"Attrapadung N, Imai H (2009) Attribute-based encryption supporting direct\/indirect revocation modes. In: Proceedings of the 12th IMA international conference, cryptography and coding 2009, pp 278\u2013300","DOI":"10.1007\/978-3-642-10868-6_17"},{"key":"637_CR3","first-page":"248","volume":"5671","author":"N Attrapadung","year":"2009","unstructured":"Attrapadung N, Imai H (2009) Conjunctive broadcast and attribute-based encryption. Pairing 5671:248\u2013265","journal-title":"Conjunctive broadcast and attribute-based encryption. Pairing"},{"key":"637_CR4","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy, 2007. SP\u201907. IEEE, pp 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"key":"637_CR5","doi-asserted-by":"crossref","unstructured":"Boldyreva A, Goyal V, Kumar V (2008) Identity-based encryption with efficient revocation. In: Proceedings of the 15th ACM conference on computer and communications security. ACM, pp 417\u2013426","DOI":"10.1145\/1455770.1455823"},{"key":"637_CR6","doi-asserted-by":"crossref","unstructured":"Boneh D, Gentry C, Waters B (2005) Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Crypto, vol 3621. Springer, pp. 258\u2013275","DOI":"10.1007\/11535218_16"},{"key":"637_CR7","doi-asserted-by":"crossref","unstructured":"Chen C, Chen J, Lim HW, Zhang Z, Feng D, Ling S, Wang H (2013) Fully secure attribute-based systems with short ciphertexts\/signatures and threshold access structures. In: CT-RSA. Springer, pp 50\u201367","DOI":"10.1007\/978-3-642-36095-4_4"},{"issue":"11","key":"637_CR8","doi-asserted-by":"publisher","first-page":"1988","DOI":"10.1002\/sec.913","volume":"7","author":"N Doshi","year":"2014","unstructured":"Doshi N, Jinwala DC (2014) Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption. Secur Commun Netw 7(11):1988\u20132002","journal-title":"Secur Commun Netw"},{"key":"637_CR9","doi-asserted-by":"crossref","unstructured":"Emura K, Miyaji A, Nomura A, Omote K, Soshi M (2009) A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: ISPEC, vol\u00a09. Springer, pp 13\u201323","DOI":"10.1007\/978-3-642-00843-6_2"},{"key":"637_CR10","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, pp 89\u201398","DOI":"10.1145\/1180405.1180418"},{"key":"637_CR11","unstructured":"Green M, Hohenberger S, Waters B et\u00a0al (2011) Outsourcing the decryption of ABE ciphertexts. In: USENIX security symposium, vol 2011"},{"issue":"5","key":"637_CR12","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1109\/TIFS.2014.2309858","volume":"9","author":"F Guo","year":"2014","unstructured":"Guo F, Mu Y, Susilo W, Wong DS, Varadharajan V (2014) CP-ABE with constant-size keys for lightweight devices. IEEE Trans Inf Forensics Secur 9(5):763\u2013771","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"7","key":"637_CR13","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/1364782.1364786","volume":"51","author":"B Hayes","year":"2008","unstructured":"Hayes B (2008) Cloud computing. Commun ACM 51(7):9\u201311","journal-title":"Commun ACM"},{"key":"637_CR14","first-page":"19","volume":"2010","author":"J Herranz","year":"2010","unstructured":"Herranz J, Laguillaumie F, R\u00e0fols C (2010) Constant size ciphertexts in threshold attribute-based encryption. Public Key Cryptogr PKC 2010:19\u201334","journal-title":"Public Key Cryptogr PKC"},{"key":"637_CR15","doi-asserted-by":"crossref","unstructured":"Kamara S, Lauter KE et\u00a0al (2010) Cryptographic cloud storage. In: Financial cryptography workshops, vol 6054. Springer, pp 136\u2013149","DOI":"10.1007\/978-3-642-14992-4_13"},{"issue":"8","key":"637_CR16","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1109\/TIFS.2013.2271848","volume":"8","author":"J Lai","year":"2013","unstructured":"Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343\u20131354","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"8","key":"637_CR17","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1109\/TPDS.2013.271","volume":"25","author":"J Li","year":"2014","unstructured":"Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201\u20132210","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"637_CR18","doi-asserted-by":"crossref","unstructured":"Li J, Jia C, Li J, Chen X (2012) Outsourcing encryption of attribute-based encryption with mapreduce. In: Information and communications security, pp. 191\u2013201","DOI":"10.1007\/978-3-642-34129-8_17"},{"issue":"4","key":"637_CR19","first-page":"286","volume":"16","author":"K Li","year":"2014","unstructured":"Li K, Ma H (2014) Outsourcing decryption of multi-authority abe ciphertexts. IJ Netw Secur 16(4):286\u2013294","journal-title":"IJ Netw Secur"},{"issue":"1","key":"637_CR20","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2013","unstructured":"Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131\u2013143","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"637_CR21","unstructured":"Lyuu YD, Wu ML (2002) A fully public-key traitor-tracing scheme. In: 6th WSEAS international multiconference CSCC"},{"issue":"6","key":"637_CR22","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/TDSC.2015.2499755","volume":"14","author":"H Ma","year":"2015","unstructured":"Ma H, Zhang R, Wan Z, Lu Y, Lin S (2015) Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing. IEEE Trans Dependable Secure Comput 14(6):679\u2013692. \n                    https:\/\/doi.org\/10.1109\/TDSC.2015.2499755","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"5","key":"637_CR23","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1109\/TDSC.2015.2423669","volume":"13","author":"X Mao","year":"2016","unstructured":"Mao X, Lai J, Mei Q, Chen K, Weng J (2016) Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans Dependable Secure Comput 13(5):533\u2013546","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"5","key":"637_CR24","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1109\/TDSC.2015.2423669","volume":"13","author":"X Mao","year":"2016","unstructured":"Mao X, Lai J, Mei Q, Chen K, Weng J (2016) Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans Dependable Secure Comput 13(5):533\u2013546","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"637_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2762345","author":"J Ni","year":"2017","unstructured":"Ni J, Zhang K, Lin X, Shen X (2017) Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun Surv Tutor. \n                    https:\/\/doi.org\/10.1109\/COMST.2017.2762345","journal-title":"IEEE Commun Surv Tutor"},{"key":"637_CR26","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.csi.2016.05.002","volume":"54","author":"V Odelu","year":"2017","unstructured":"Odelu V, Das AK, Rao YS, Kumari S, Khan MK, Choo KKR (2017) Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Comput Stand Interfaces 54:3\u20139","journal-title":"Comput Stand Interfaces"},{"issue":"7","key":"637_CR27","doi-asserted-by":"publisher","first-page":"1384","DOI":"10.1109\/TIFS.2015.2410137","volume":"10","author":"B Qin","year":"2015","unstructured":"Qin B, Deng RH, Liu S, Ma S (2015) Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 10(7):1384\u20131393","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"637_CR28","doi-asserted-by":"crossref","unstructured":"Rolim CO, Koch FL, Westphall CB, Werner J, Fracalossi A, Salvador GS (2010) A cloud computing solution for patient\u2019s data collection in health care institutions. In: Second international conference on eHealth, telemedicine, and social medicine, 2010. ETELEMED\u201910. IEEE, pp 95\u201399","DOI":"10.1109\/eTELEMED.2010.19"},{"key":"637_CR29","doi-asserted-by":"crossref","unstructured":"Sahai A, Seyalioglu H, Waters B (2012) Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Advances in cryptology\u2014CRYPTO 2012. Springer, pp 199\u2013217","DOI":"10.1007\/978-3-642-32009-5_13"},{"key":"637_CR30","doi-asserted-by":"crossref","unstructured":"Sahai A, Waters B et\u00a0al (2005) Fuzzy identity-based encryption. In: Eurocrypt, vol 3494. Springer, pp 457\u2013473","DOI":"10.1007\/11426639_27"},{"key":"637_CR31","unstructured":"Shen J, Zhou T, Chen X, Li J, Susilo W (2017) Anonymous and traceable group data sharing in cloud computing. IEEE Trans Inf Forensics Secur PP(99):1\u20131"},{"key":"637_CR32","doi-asserted-by":"crossref","unstructured":"Teng CC, Mitchell J, Walker C, Swan A, Davila C, Howard D, Needham T (2010) A medical image archive solution in the cloud. In: 2010 IEEE international conference on software engineering and service sciences (ICSESS). IEEE, pp 431\u2013434","DOI":"10.1109\/ICSESS.2010.5552343"},{"issue":"10","key":"637_CR33","first-page":"2270","volume":"52","author":"H Wang","year":"2015","unstructured":"Wang H, Zheng Z, Lei W, Wang Y (2015) Adaptively secure outsourcing ciphertext-policy attribute-based encryption. J Comput Res Dev 52(10):2270\u20132280","journal-title":"J Comput Res Dev"},{"issue":"4","key":"637_CR34","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1109\/TDSC.2017.2710119","volume":"14","author":"H Xiong","year":"2017","unstructured":"Xiong H, Sun J (2017) Comments on verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing. IEEE Trans Dependable Secure Comput 14(4):461\u2013462","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"637_CR35","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.ipl.2017.07.008","volume":"127","author":"H Xiong","year":"2017","unstructured":"Xiong H, Wang Q, Sun J (2017) Comments on \u201cCircuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation\u201d. Inf Process Lett 127:67\u201370. \n                    https:\/\/doi.org\/10.1016\/j.ipl.2017.07.008","journal-title":"Inf Process Lett"},{"key":"637_CR36","doi-asserted-by":"crossref","unstructured":"Xu Z, Martin KM (2012) Dynamic user revocation and key refreshing for attribute-based encryption in cloud storage. In: 2012 IEEE 11th international conference on trust, security and privacy in computing and communications (TrustCom). IEEE, pp 844\u2013849","DOI":"10.1109\/TrustCom.2012.136"},{"issue":"1","key":"637_CR37","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1109\/TPDS.2015.2392752","volume":"27","author":"J Xu","year":"2016","unstructured":"Xu J, Wen Q, Li W, Jin Z (2016) Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation in cloud computing. IEEE Trans Parallel Distrib Syst 27(1):119\u2013129","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"637_CR38","doi-asserted-by":"crossref","unstructured":"Yang CT, Chen LT, Chou WL, Wang KC (2010) Implementation of a medical image file accessing system on cloud computing. In: 2010 IEEE 13th international conference on computational science and engineering (CSE). IEEE, pp 321\u2013326","DOI":"10.1109\/CSE.2010.48"},{"key":"637_CR39","doi-asserted-by":"crossref","unstructured":"Yu S, Wang C, Ren K, Lou W (2010) Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM symposium on information, computer and communications security. ACM, pp 261\u2013270","DOI":"10.1145\/1755688.1755720"},{"key":"637_CR40","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1016\/j.jss.2016.12.018","volume":"125","author":"R Zhang","year":"2017","unstructured":"Zhang R, Ma H, Lu Y (2017) Fine-grained access control system based on fully outsourced attribute-based encryption. J Syst Softw 125:344\u2013353","journal-title":"J Syst Softw"},{"key":"637_CR41","doi-asserted-by":"crossref","unstructured":"Zhang Y, Zheng D, Chen X, Li J, Li H (2014) Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts. In: International conference on provable security. Springer, pp 259\u2013273","DOI":"10.1007\/978-3-319-12475-9_18"},{"key":"637_CR42","doi-asserted-by":"crossref","unstructured":"Zhou Z, Huang D (2010) On efficient ciphertext-policy attribute based encryption and broadcast encryption. In: Proceedings of the 17th ACM conference on computer and communications security. ACM, pp 753\u2013755","DOI":"10.1145\/1866307.1866420"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-018-0637-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-018-0637-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-018-0637-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T00:38:16Z","timestamp":1568939896000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-018-0637-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,26]]},"references-count":42,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["637"],"URL":"https:\/\/doi.org\/10.1007\/s00607-018-0637-2","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,26]]},"assertion":[{"value":"25 January 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 June 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}