{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T01:27:54Z","timestamp":1772760474615,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2015,1,13]],"date-time":"2015-01-13T00:00:00Z","timestamp":1421107200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s10207-014-0272-7","type":"journal-article","created":{"date-parts":[[2015,1,12]],"date-time":"2015-01-12T12:49:17Z","timestamp":1421066957000},"page":"499-511","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":40,"title":["Flexible attribute-based encryption applicable to secure e-healthcare records"],"prefix":"10.1007","volume":"14","author":[{"given":"Bo","family":"Qin","sequence":"first","affiliation":[]},{"given":"Hua","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Josep","family":"Domingo-Ferrer","sequence":"additional","affiliation":[]},{"given":"David","family":"Naccache","sequence":"additional","affiliation":[]},{"given":"Yunya","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,1,13]]},"reference":[{"key":"272_CR1","doi-asserted-by":"crossref","unstructured":"Attrapadung, N., Libert, B., De Panafieu, E.: Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. PKC 2011. LNCS 6571, pp. 90\u2013108. Springer (2011)","DOI":"10.1007\/978-3-642-19379-8_6"},{"key":"272_CR2","unstructured":"Beimel, A.: Secure Schemes for Secret Sharing and Key Distribution. Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel (1996)"},{"key":"272_CR3","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy, 2007, pp. 321\u2013334. IEEE Press (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"272_CR4","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X., Goh, E.: Hierarchical Identity Based Encryption with Constant Size Ciphertex. EUROCRYPT 2005. LNCS 3493, pp. 440-456. Springer (2005)","DOI":"10.1007\/11426639_26"},{"key":"272_CR5","doi-asserted-by":"crossref","unstructured":"Boneh, D., Goh E., Nissim, K.: Evaluating 2-DNF Formulas on Ciphertexts. TCC 2005. LNCS 3378, pp. 325\u2013341. Springer (2005)","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"272_CR6","unstructured":"Boneh, D., Nikolaenko, V., Segev G.: Attribute-Based Encryption for Arithmetic Circuits. Cryptology ePrint Archive, Report 2013\/669. https:\/\/eprint.iacr.org\/2013\/669 (2013)"},{"key":"272_CR7","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1016\/j.ins.2014.01.035","volume":"275","author":"H Deng","year":"2014","unstructured":"Deng, H., Wu, Q., Qin, B., Domingo-Ferrer, J., Zhang, L., Liu, J., Shi, W.: Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inf. Sci. 275, 370\u2013384 (2014)","journal-title":"Inf. Sci."},{"key":"272_CR8","doi-asserted-by":"crossref","unstructured":"Deng, H., Wu, Q., Qin, B., Mao, J., Liu, X., Zhang, L., Shi, W.: Who is Touching my Cloud. ESORICS 2014, LNCS 8712, pp. 362\u2013379. Springer (2014)","DOI":"10.1007\/978-3-319-11203-9_21"},{"key":"272_CR9","doi-asserted-by":"crossref","unstructured":"Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded Ciphertext Policy Attribute Based Encryption. ICALP 2008. LNCS 5126, pp. 579\u2013591. Springer (2008)","DOI":"10.1007\/978-3-540-70583-3_47"},{"key":"272_CR10","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. ACM CCS 2006, pp. 89\u201398. ACM Press (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"272_CR11","doi-asserted-by":"crossref","unstructured":"Hohenberger, S., Waters, B.: Attribute-Based Encryption with Fast Decryption. PKC 2013. LNCS 7778, pp. 162\u2013179. Springer (2013)","DOI":"10.1007\/978-3-642-36362-7_11"},{"issue":"5","key":"272_CR12","doi-asserted-by":"crossref","first-page":"1235","DOI":"10.1007\/s11276-011-0345-8","volume":"17","author":"J Hur","year":"2011","unstructured":"Hur, J.: Fine-grained data access control for distributed sensor networks. Wirel. Netw. 17(5), 1235\u20131249 (2011)","journal-title":"Wirel. Netw."},{"key":"272_CR13","doi-asserted-by":"crossref","unstructured":"Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. EUROCRYPT 2010. LNCS 6110, pp. 62\u201391. Springer (2010)","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"272_CR14","doi-asserted-by":"crossref","unstructured":"Lewko, A., Waters, B.: New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts. TCC 2010. LNCS 5978, pp. 455\u2013479. Springer (2010)","DOI":"10.1007\/978-3-642-11799-2_27"},{"key":"272_CR15","doi-asserted-by":"crossref","unstructured":"Lewko, A., Waters, B.: Unbounded HIBE and Attribute-Based Encryption. EUROCRYPT 2011. LNCS 6632, pp. 547\u2013567. Springer (2011)","DOI":"10.1007\/978-3-642-20465-4_30"},{"key":"272_CR16","doi-asserted-by":"crossref","unstructured":"Li, J., Wang, Q., Wang, C., Ren, K.: Enhancing Attribute-Based Encryption with Attribute Hierarchy. ChinaCom 2009, pp. 1\u20135. IEEE Press (2009)","DOI":"10.1109\/CHINACOM.2009.5339938"},{"issue":"1","key":"272_CR17","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2013","unstructured":"Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131\u2013143 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"15","key":"272_CR18","doi-asserted-by":"crossref","first-page":"1910","DOI":"10.1016\/j.comcom.2012.01.009","volume":"35","author":"X Liang","year":"2012","unstructured":"Liang, X., Barua, M., Lu, R., Lin, X., Shen, X.S.: HealthShare: achieving secure and privacy-preserving health information sharing through health social networks. Comput. Commun. 35(15), 1910\u20131920 (2012)","journal-title":"Comput. Commun."},{"key":"272_CR19","doi-asserted-by":"crossref","unstructured":"Liu, W., Liu, J., Wu, Q., Qin, B., Zhou, Y.: Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test. ESORICS 2014, LNCS 8713, pp. 91\u2013108. Springer (2014)","DOI":"10.1007\/978-3-319-11212-1_6"},{"key":"272_CR20","doi-asserted-by":"crossref","unstructured":"Rouselakis, Y., Waters, B.: Practical Constructions and New Proof Methods for Large Universe Attribute-based Encryption. ACM CCS 2013, pp. 463\u2013474. ACM Press (2013)","DOI":"10.1145\/2508859.2516672"},{"key":"272_CR21","doi-asserted-by":"crossref","unstructured":"Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. EUROCRYPT 2005. LNCS 3494, pp. 457\u2013473. Springer (2005)","DOI":"10.1007\/11426639_27"},{"key":"272_CR22","doi-asserted-by":"crossref","unstructured":"Wang, Y., Wu, Q., Wong, D.S., Qin, B., Chow, S.S.M., Liu, Z., Tan., X.: Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage. ESORICS 2014, LNCS 8712, pp. 326\u2013343. Springer (2014)","DOI":"10.1007\/978-3-319-11203-9_19"},{"key":"272_CR23","doi-asserted-by":"crossref","unstructured":"Waters, B.: Dual System Encryption: Realizing Fully Secure IBE and HIBE Under Simple Assumptions. CRYPTO 2009. LNCS 5677, pp. 619\u2013636. Springer (2009)","DOI":"10.1007\/978-3-642-03356-8_36"},{"key":"272_CR24","doi-asserted-by":"crossref","unstructured":"Waters, B.: Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. PKC 2011. LNCS 6571, pp. 53\u201370. Springer (2011)","DOI":"10.1007\/978-3-642-19379-8_4"},{"issue":"2","key":"272_CR25","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1109\/TIFS.2011.2172209","volume":"7","author":"Z Wan","year":"2012","unstructured":"Wan, Z., Liu, J., Deng, R.H.: HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 7(2), 743\u2013754 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"272_CR26","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1109\/TPDS.2010.130","volume":"22","author":"S Yu","year":"2011","unstructured":"Yu, S., Ren, K., Lou, W.: FDAC: toward fine-grained distributed data access control in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 22(4), 673\u2013686 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-014-0272-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-014-0272-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-014-0272-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T15:21:17Z","timestamp":1566228077000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-014-0272-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,13]]},"references-count":26,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["272"],"URL":"https:\/\/doi.org\/10.1007\/s10207-014-0272-7","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1,13]]}}}