{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:29:07Z","timestamp":1740137347192,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T00:00:00Z","timestamp":1574812800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T00:00:00Z","timestamp":1574812800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972017","61972018"],"award-info":[{"award-number":["61972017","61972018"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61932014"],"award-info":[{"award-number":["61932014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004826","name":"Beijing Natural Science Foundation","doi-asserted-by":"crossref","award":["4182033"],"award-info":[{"award-number":["4182033"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Cryptography Development Fund","award":["MMJJ20180215"],"award-info":[{"award-number":["MMJJ20180215"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s10207-019-00480-9","type":"journal-article","created":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T16:02:51Z","timestamp":1574870571000},"page":"639-656","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["FDCO: attribute-based fast data cloud-outsourcing scheme for mobile devices"],"prefix":"10.1007","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4608-9229","authenticated-orcid":false,"given":"Yanting","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1358-4933","authenticated-orcid":false,"given":"Zongyang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Weiran","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,27]]},"reference":[{"issue":"1","key":"480_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1\u201330 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"480_CR2","unstructured":"Bardou, R., Focardi, R., Kawamoto, Y., Simionato, L., Steel, G., Tsay, J.: Efficient padding oracle attacks on cryptographic hardware. In: Proceedings of the 32nd Annual Cryptology Conference, Advances in Cryptology\u2014CRYPTO 2012, Santa Barbara, CA, USA, August 19\u201323, 2012, pp. 608\u2013625 (2012)"},{"key":"480_CR3","unstructured":"Beimel, A.: Secure schemes for secret sharing and key distribution. Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel (1996)"},{"key":"480_CR4","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20\u201323 May 2007, Oakland, California, USA, pp. 321\u2013334 (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"480_CR5","unstructured":"Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encryption with efficient revocation. In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27\u201331, 2008, pp. 417\u2013426 (2008)"},{"key":"480_CR6","unstructured":"Boneh, D., Boyen, X.: Efficient selective-id secure identity-based encryption without random oracles. In: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Advances in Cryptology\u2014EUROCRYPT 2004, Interlaken, Switzerland, May 2\u20136, 2004, pp. 223\u2013238 (2004)"},{"key":"480_CR7","unstructured":"Caro, A.D., Iovino, V.: jpbc: Java pairing based cryptography. In: Proceedings of the 16th IEEE Symposium on Computers and Communications, ISCC 2011, Kerkyra, Corfu, Greece, June 28\u2013July 1, 2011, pp. 850\u2013855 (2011)"},{"key":"480_CR8","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30\u2013November 3, 2006, pp. 89\u201398 (2006)"},{"key":"480_CR9","unstructured":"Guo, F., Mu, Y., Chen, Z.: Identity-based online\/offline encryption. In: 12th International Conference on Financial Cryptography and Data Security, FC 2008, Cozumel, Mexico, January 28\u201331, 2008, pp. 247\u2013261 (2008)"},{"key":"480_CR10","unstructured":"Hohenberger, S., Waters, B.: Online\/offline attribute-based encryption. In: Proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, Public-Key Cryptography\u2014PKC 2014, Buenos Aires, Argentina, March 26\u201328, 2014, pp. 293\u2013310 (2014)"},{"key":"480_CR11","unstructured":"Jung, T., Li, X., Wan, Z., Wan, M.: Privacy preserving cloud data access with multi-authorities. In: Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14\u201319, 2013, pp. 2625\u20132633 (2013)"},{"key":"480_CR12","unstructured":"Kamara, S., Lauter, K.E.: Cryptographic cloud storage. In: Financial Cryptography and Data Security, FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25\u201328, 2010, Revised Selected Papers, pp. 136\u2013149 (2010)"},{"key":"480_CR13","unstructured":"Krawczyk, H., Rabin, T.: Chameleon signatures. In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2000, San Diego, California, USA (2000)"},{"key":"480_CR14","unstructured":"Lewko, A.B., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Advances in Cryptology\u2014EUROCRYPT 2010, Monaco\/French Riviera, May 30\u2013June 3, 2010, pp. 62\u201391 (2010)"},{"key":"480_CR15","unstructured":"Lewko, A.B., Waters, B.: Decentralizing attribute-based encryption. In: Proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Advances in Cryptology\u2014EUROCRYPT 2011, Tallinn, Estonia, May 15\u201319, 2011, pp. 568\u2013588 (2011)"},{"key":"480_CR16","unstructured":"Lewko, A.B., Waters, B.: Unbounded HIBE and attribute-based encryption. In: Proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Advances in Cryptology\u2014EUROCRYPT 2011, Tallinn, Estonia, May 15\u201319, 2011, pp. 547\u2013567 (2011)"},{"key":"480_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2017.08.007","volume":"72","author":"J Li","year":"2018","unstructured":"Li, J., Zhang, Y., Chen, X., Xiang, Y.: Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72, 1\u201312 (2018)","journal-title":"Comput. Secur."},{"issue":"6","key":"480_CR18","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/TDSC.2015.2499755","volume":"14","author":"H Ma","year":"2017","unstructured":"Ma, H., Zhang, R., Wan, Z., Lu, Y., Lin, S.: Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing. IEEE Trans. Dependable Secure Comput. 14(6), 679\u2013692 (2017)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"8","key":"480_CR19","doi-asserted-by":"publisher","first-page":"2561","DOI":"10.1007\/s00500-019-03790-1","volume":"23","author":"R Naresh","year":"2019","unstructured":"Naresh, R., Sayeekumar, M., Karthick, G.M., Supraja, P.: Attribute-based hierarchical file encryption for efficient retrieval of files by DV index tree from cloud using crossover genetic algorithm. Soft Comput. 23(8), 2561\u20132574 (2019)","journal-title":"Soft Comput."},{"issue":"1","key":"480_CR20","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/TIFS.2017.2738601","volume":"13","author":"J Ning","year":"2018","unstructured":"Ning, J., Cao, Z., Dong, X., Liang, K., Ma, H., Wei, L.: Auditable $$\\sigma $$-time outsourced attribute-based encryption for access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 13(1), 94\u2013105 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"480_CR21","unstructured":"Rouselakis, Y., Waters, B.: Practical constructions and new proof methods for large universe attribute-based encryption. In: 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS\u201913, Berlin, Germany, November 4\u20138, 2013, pp. 463\u2013474 (2013)"},{"key":"480_CR22","unstructured":"Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Proceedings of the 32nd Annual Cryptology Conference, Advances in Cryptology\u2014CRYPTO 2012, Santa Barbara, CA, USA, August 19\u201323, 2012, pp. 199\u2013217 (2012)"},{"key":"480_CR23","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Advances in Cryptology\u2014EUROCRYPT 2005, Aarhus, Denmark, May 22\u201326, 2005, pp. 457\u2013473 (2005)"},{"key":"480_CR24","unstructured":"Seo, J.H., Emura, K.: Revocable identity-based encryption revisited: Security model and construction. In: Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, Public-Key Cryptography\u2014PKC 2013, Nara, Japan, February 26\u2013March 1, 2013, pp. 216\u2013234 (2013)"},{"key":"480_CR25","first-page":"332","volume":"2004","author":"V Shoup","year":"2004","unstructured":"Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. IACR Cryptol. ePrint Arch. 2004, 332 (2004)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"480_CR26","first-page":"467","volume":"333","author":"O Uzunkol","year":"2018","unstructured":"Uzunkol, O., Kiraz, M.S.: Still wrong use of pairings in cryptography. Appl. Math. Comput. 333, 467\u2013479 (2018)","journal-title":"Appl. Math. Comput."},{"key":"480_CR27","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6\u20139, 2011, pp. 53\u201370 (2011)"},{"key":"480_CR28","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1016\/j.ins.2018.02.015","volume":"479","author":"L Xue","year":"2019","unstructured":"Xue, L., Yu, Y., Li, Y., Au, M.H., Du, X., Yang, B.: Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf. Sci. 479, 640\u2013650 (2019)","journal-title":"Inf. Sci."},{"key":"480_CR29","unstructured":"Yamada, S., Attrapadung, N., Hanaoka, G., Kunihiro, N.: Generic constructions for chosen-ciphertext secure attribute based encryption. In: Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, Public Key Cryptography\u2014PKC 2011, Taormina, Italy, March 6\u20139, 2011, pp. 71\u201389 (2011)"},{"key":"480_CR30","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.ins.2016.04.015","volume":"379","author":"Y Zhang","year":"2017","unstructured":"Zhang, Y., Chen, X., Li, J., Wong, D.S., Li, H., You, I.: Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf. Sci. 379, 42\u201361 (2017)","journal-title":"Inf. Sci."},{"key":"480_CR31","unstructured":"Zhang, Y., Liu, J., Zhang, Z., Hu, Y.: Multi-authority fast data cloud-outsourcing for mobile devices. In: Proceedings of the 21st International Conference, Information Security ISC 2018, Guildford, UK, September 9\u201312, 2018, pp. 231\u2013249 (2018)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-019-00480-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-019-00480-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-019-00480-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T00:40:34Z","timestamp":1606351234000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-019-00480-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,27]]},"references-count":31,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["480"],"URL":"https:\/\/doi.org\/10.1007\/s10207-019-00480-9","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2019,11,27]]},"assertion":[{"value":"27 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}