{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T23:32:30Z","timestamp":1719963150307},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,7,31]],"date-time":"2017-07-31T00:00:00Z","timestamp":1501459200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China (973 Program)","doi-asserted-by":"crossref","award":["NO. 2012CB315901"],"award-info":[{"award-number":["NO. 2012CB315901"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s10207-017-0387-8","type":"journal-article","created":{"date-parts":[[2017,7,31]],"date-time":"2017-07-31T12:51:44Z","timestamp":1501505504000},"page":"477-490","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Efficient revocable hierarchical identity-based encryption using cryptographic accumulators"],"prefix":"10.1007","volume":"17","author":[{"given":"Hongyong","family":"Jia","sequence":"first","affiliation":[]},{"given":"Yue","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Julong","family":"Lan","sequence":"additional","affiliation":[]},{"given":"Kaixiang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,31]]},"reference":[{"key":"387_CR1","doi-asserted-by":"crossref","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Advances in Cryptology\u2014Crypto 1984. Lecture Notes in Computer Science, vol. 196, pp. 47\u201353, Springer, Berlin (1984)","DOI":"10.1007\/3-540-39568-7_5"},{"key":"387_CR2","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Advances in Cryptology\u2014CRYPTO 2001, pp. 213\u2013229. Springer, Berlin (2001)","DOI":"10.1007\/3-540-44647-8_13"},{"key":"387_CR3","doi-asserted-by":"publisher","unstructured":"Li, J., Li, J., Chen, X., Jia, C., Lou, W.: Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans. Comput. (2015). doi: 10.1109\/TC.2013.208","DOI":"10.1109\/TC.2013.208"},{"key":"387_CR4","unstructured":"Lim, H.W., Paterson, K.G.: Identity-based cryptography for grid security. In: Proceedings of the e-Science, pp. 395\u2013404 (2005)"},{"key":"387_CR5","doi-asserted-by":"crossref","unstructured":"Su, L., Lim, H.W., Ling, S., et al.: Revocable IBE systems with almost constant-size key update. In: International Conference on Pairing-Based Cryptography Pairing 2013, pp. 168\u2013185. Springer, Berlin (2014)","DOI":"10.1007\/978-3-319-04873-4_10"},{"issue":"3","key":"387_CR6","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1049\/iet-ifs:20070124","volume":"2","author":"M Abdalla","year":"2008","unstructured":"Abdalla, M., Kiltz, E., Neven, G.: Generalised key delegation for hierarchical identity-based encryption. IET Inf. Secur. 2(3), 67\u201378 (2008)","journal-title":"IET Inf. Secur."},{"key":"387_CR7","first-page":"343","volume":"2013","author":"JH Seo","year":"2013","unstructured":"Seo, J.H., Emura, K.: Efficient delegation of key generation and revocation functionalities in identity-based encryption. CT-RSA 2013, 343\u2013358 (2013)","journal-title":"CT-RSA"},{"issue":"2","key":"387_CR8","doi-asserted-by":"crossref","first-page":"299","DOI":"10.15388\/Informatica.2014.16","volume":"25","author":"T-T Tsai","year":"2014","unstructured":"Tsai, T.-T., Tseng, Y.-M., Wu, T.-Y.: RHIBE: constructing revocable hierarchical ID-based encryption from HIBE. Informatica 25(2), 299\u2013326 (2014)","journal-title":"Informatica"},{"key":"387_CR9","doi-asserted-by":"crossref","unstructured":"Ryu, G., Lee, K., Park, S., Lee, D.H.: Unbounded hierarchical identity-based encryption with efficient revocation. https:\/\/eprint.iacr.org\/2015\/827.pdf","DOI":"10.1007\/978-3-319-31875-2_11"},{"key":"387_CR10","first-page":"235","volume":"2011","author":"M Bellare","year":"2011","unstructured":"Bellare, M., Waters, B., Yilek, S.: Identity-based encryption secure against selective opening attack. TCC 2011, 235\u2013252 (2011)","journal-title":"TCC"},{"key":"387_CR11","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X.: Efficient selective-id identity based encryption without random oracles. In: Advances in cryptology-EUROCRYPT 2004. LNCS, vol. 3027, pp. 223\u2013238. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"387_CR12","doi-asserted-by":"crossref","unstructured":"Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encryption with efficient revocation. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, ACM, pp. 417\u2013426 (2008)","DOI":"10.1145\/1455770.1455823"},{"key":"387_CR13","doi-asserted-by":"crossref","unstructured":"Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Advances in Cryptology\u2014CRYPTO 2001. LNCS, vol. 2139, pp. 41\u201362. Springer, Berlin (2001)","DOI":"10.1007\/3-540-44647-8_3"},{"key":"387_CR14","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Kohlweiss, M., Soriente, C.: An accumulator based on bilinear maps and efficient revocation for anonymous credentials. In: International Workshop on Public Key Cryptography\u2014PKC 2009, pp. 481\u2013500. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-00468-1_27"},{"key":"387_CR15","doi-asserted-by":"crossref","unstructured":"Waters, B.: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Advances in Cryptology\u2014Crypto09. LNCS, vol. 5677, pp. 619\u2013636 (2009)","DOI":"10.1007\/978-3-642-03356-8_36"},{"key":"387_CR16","doi-asserted-by":"crossref","unstructured":"Lewko, A., Waters, B.: Unbounded HIBE and attribute-based encryption. In Advances in Cryptology\u2014Eurocrypt11. LNCS, vol. 6632, pp. 547\u2013567 (2011)","DOI":"10.1007\/978-3-642-20465-4_30"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-017-0387-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-017-0387-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-017-0387-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,18]],"date-time":"2020-05-18T03:43:06Z","timestamp":1589773386000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-017-0387-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,31]]},"references-count":16,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["387"],"URL":"https:\/\/doi.org\/10.1007\/s10207-017-0387-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,31]]}}}