{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T07:34:27Z","timestamp":1776497667883,"version":"3.51.2"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T00:00:00Z","timestamp":1680739200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T00:00:00Z","timestamp":1680739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s10207-023-00690-2","type":"journal-article","created":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T13:05:29Z","timestamp":1680786329000},"page":"1261-1276","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Secure access privilege delegation using attribute-based encryption"],"prefix":"10.1007","volume":"22","author":[{"given":"Suryakanta","family":"Panda","sequence":"first","affiliation":[]},{"given":"Samrat","family":"Mondal","sequence":"additional","affiliation":[]},{"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,6]]},"reference":[{"key":"690_CR1","doi-asserted-by":"crossref","unstructured":"Tian, G., Hu, Y., Wei, J., Liu, Z., Huang, X., Chen, X., Susilo, W.: \u201cBlockchain-based secure deduplication and shared auditing in decentralized storage,\u201d IEEE Trans. Dependable Secure Comput., 2021","DOI":"10.1109\/TDSC.2021.3114160"},{"issue":"2","key":"690_CR2","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1109\/TETC.2017.2759329","volume":"8","author":"Y Yu","year":"2017","unstructured":"Yu, Y., Li, Y., Yang, B., Susilo, W., Yang, G., Bai, J.: Attribute-based cloud data integrity auditing for secure outsourced storage. IEEE Trans. Emerg. Top. Comput. 8(2), 377\u2013390 (2017)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"690_CR3","doi-asserted-by":"crossref","unstructured":"Panda, S., Mukherjee, A., Halder, R., Mondal, S.: \u201cBlockchain-enabled emergency detection and response in mobile healthcare system,\u201d in 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 2022, pp. 1\u20135","DOI":"10.1109\/ICBC54727.2022.9805544"},{"key":"690_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107669","volume":"98","author":"S Panda","year":"2022","unstructured":"Panda, S., Mondal, S., Kumar, N.: Slap: A secure and lightweight authentication protocol for machine-to-machine communication in industry 4.0. Comput. Electr. Eng. 98, 107669 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"690_CR5","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W., \u201cAchieving secure, scalable, and fine-grained data access control in cloud computing\u201d in,: Proceedings IEEE INFOCOM. Ieee 2010, 1\u20139 (2010)","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"690_CR6","doi-asserted-by":"crossref","unstructured":"Sahai, A., Waters, B.: \u201cFuzzy identity-based encryption,\u201d in Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 2005, pp. 457\u2013473","DOI":"10.1007\/11426639_27"},{"key":"690_CR7","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: \u201cAttribute-based encryption for fine-grained access control of encrypted data,\u201d in Proceedings of the 13th ACM conference on Computer and communications security, 2006, pp. 89\u201398","DOI":"10.1145\/1180405.1180418"},{"key":"690_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.csi.2016.05.002","volume":"54","author":"V Odelu","year":"2017","unstructured":"Odelu, V., Das, A.K., Rao, Y.S., Kumari, S., Khan, M.K., Choo, K.-K.R.: Pairing-based cp-abe with constant-size ciphertexts and secret keys for cloud environment. Comput. Stand. Interfaces 54, 3\u20139 (2017)","journal-title":"Comput. Stand. Interfaces"},{"issue":"12","key":"690_CR9","doi-asserted-by":"publisher","first-page":"3110","DOI":"10.1109\/TIFS.2017.2737960","volume":"12","author":"W Susilo","year":"2017","unstructured":"Susilo, W., Jiang, P., Guo, F., Yang, G., Yu, Y., Mu, Y.: Eacsip: Extendable access control system with integrity protection for enhancing collaboration in the cloud. IEEE Trans. Inf. Forensics Secur. 12(12), 3110\u20133122 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"690_CR10","doi-asserted-by":"crossref","unstructured":"Huang, Q., Li, N., Yang, Y., \u201cDacsc: Dynamic and fine-grained access control for secure data collaboration in cloud computing,\u201d in,: IEEE Global Communications Conference (GLOBECOM). IEEE 2018, 1\u20137 (2018)","DOI":"10.1109\/GLOCOM.2018.8648113"},{"key":"690_CR11","doi-asserted-by":"crossref","unstructured":"Ahuja,R., Mohanty, S.\u00a0K.: \u201cA scalable attribute-based access control scheme with flexible delegation cum sharing of access privileges for cloud storage,\u201d IEEE Transactions on Cloud Computing, 2017","DOI":"10.1016\/j.compeleceng.2016.11.028"},{"key":"690_CR12","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.ins.2019.09.052","volume":"511","author":"H Deng","year":"2020","unstructured":"Deng, H., Qin, Z., Wu, Q., Guan, Z., Zhou, Y.: Flexible attribute-based proxy re-encryption for efficient data sharing. Inf. Sci. 511, 94\u2013113 (2020)","journal-title":"Inf. Sci."},{"key":"690_CR13","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/s11280-017-0475-8","volume":"21","author":"H Hong","year":"2018","unstructured":"Hong, H., Sun, Z.: Sharing your privileges securely: A key-insulated attribute based proxy re-encryption scheme for iot. World Wide Web 21, 595\u2013607 (2018)","journal-title":"World Wide Web"},{"key":"690_CR14","doi-asserted-by":"crossref","unstructured":"Kawai, Y.: \u201cOutsourcing the re-encryption key generation: Flexible ciphertext-policy attribute-based proxy re-encryption,\u201d in Information Security Practice and Experience: 11th International Conference, ISPEC: Beijing, China, May 5\u20138, 2015. Proceedings. Springer 2015, 301\u2013315 (2015)","DOI":"10.1007\/978-3-319-17533-1_21"},{"issue":"1","key":"690_CR15","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2012","unstructured":"Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131\u2013143 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"690_CR16","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.ins.2016.06.035","volume":"379","author":"X Liu","year":"2017","unstructured":"Liu, X., Liu, Q., Peng, T., Wu, J.: Dynamic access policy in cloud-based personal health record (phr) systems. Inf. Sci. 379, 62\u201381 (2017)","journal-title":"Inf. Sci."},{"key":"690_CR17","doi-asserted-by":"crossref","unstructured":"Shamir, A.: \u201cIdentity-based cryptosystems and signature schemes,\u201d in Workshop on the theory and application of cryptographic techniques. Springer, 1984, pp. 47\u201353","DOI":"10.1007\/3-540-39568-7_5"},{"issue":"9","key":"690_CR18","doi-asserted-by":"publisher","first-page":"1239","DOI":"10.1109\/TC.2010.23","volume":"59","author":"C-I Fan","year":"2010","unstructured":"Fan, C.-I., Huang, L.-Y., Ho, P.-H.: Anonymous multireceiver identity-based encryption. IEEE Trans. Comput. 59(9), 1239\u20131249 (2010)","journal-title":"IEEE Trans. Comput."},{"key":"690_CR19","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Tang, Q.: \u201cMaking any identity-based encryption accountable, efficiently,\u201d in European Symposium on Research in Computer Security. Springer, 2015, pp. 326\u2013346","DOI":"10.1007\/978-3-319-24174-6_17"},{"key":"690_CR20","doi-asserted-by":"crossref","unstructured":"Boyen, X., Waters, B.: \u201cAnonymous hierarchical identity-based encryption (without random oracles),\u201d in Annual International Cryptology Conference. Springer, 2006, pp. 290\u2013307","DOI":"10.1007\/11818175_17"},{"key":"690_CR21","unstructured":"De, S.\u00a0J., Ruj, S.: \u201cEfficient decentralized attribute based access control for mobile clouds,\u201d IEEE transactions on cloud computing, 2017"},{"key":"690_CR22","doi-asserted-by":"crossref","unstructured":"Ge, C., Susilo, W., Baek, J., Liu, Z., Xia, J., Fang, L.: \u201cRevocable attribute-based encryption with data integrity in clouds,\u201d IEEE Transactions on Dependable and Secure Computing, 2021","DOI":"10.1109\/TDSC.2021.3065999"},{"issue":"5","key":"690_CR23","doi-asserted-by":"publisher","first-page":"2854","DOI":"10.1109\/TSC.2021.3071859","volume":"15","author":"M Rasori","year":"2021","unstructured":"Rasori, M., Perazzo, P., Dini, G., Yu, S.: Indirect revocable kp-abe with revocation undoing resistance. IEEE Trans. Serv. Comput. 15(5), 2854\u20132868 (2021)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"690_CR24","doi-asserted-by":"crossref","unstructured":"Hong, H., Sun, Z.: A flexible attribute based data access management scheme for sensor-cloud system. J. Syst. Architect. 119, 102234 (2021)","DOI":"10.1016\/j.sysarc.2021.102234"},{"key":"690_CR25","doi-asserted-by":"crossref","unstructured":"Blaze, M., Bleumer, G., Strauss, M.: \u201cDivertible protocols and atomic proxy cryptography,\u201d in International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 1998, pp. 127\u2013144","DOI":"10.1007\/BFb0054122"},{"key":"690_CR26","doi-asserted-by":"crossref","unstructured":"Canetti, R., Hohenberger, S.: \u201cChosen-ciphertext secure proxy re-encryption,\u201d in Proceedings of the 14th ACM conference on Computer and communications security, 2007, pp. 185\u2013194","DOI":"10.1145\/1315245.1315269"},{"key":"690_CR27","doi-asserted-by":"crossref","unstructured":"Taban, G., C\u00e1rdenas, A.\u00a0A., Gligor, V.\u00a0D.: \u201cTowards a secure and interoperable drm architecture,\u201d in Proceedings of the ACM workshop on Digital rights management, 2006, pp. 69\u201378","DOI":"10.1145\/1179509.1179524"},{"issue":"11","key":"690_CR28","doi-asserted-by":"publisher","first-page":"3222","DOI":"10.1109\/TMC.2017.2687931","volume":"16","author":"J Zhang","year":"2017","unstructured":"Zhang, J., Zhang, Z., Guo, H.: Towards secure data distribution systems in mobile cloud computing. IEEE Trans. Mob. Comput. 16(11), 3222\u20133235 (2017)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"690_CR29","doi-asserted-by":"crossref","unstructured":"Mizuno, T., Doi, H.: Hybrid proxy re-encryption scheme for attribute-based encryption, in Information Security and Cryptology: 5th International Conference, Inscrypt: Beijing, China, December 12\u201315, 2009. Revised Selected Papers 5. Springer 2010, 288\u2013302 (2009)","DOI":"10.1007\/978-3-642-16342-5_21"},{"key":"690_CR30","doi-asserted-by":"crossref","unstructured":"Panda, S., Mondal, S., Dewri, R., Das, A.\u00a0K.: \u201cTowards achieving efficient access control of medical data with both forward and backward secrecy,\u201d Comput. Commun., 2022","DOI":"10.1016\/j.comcom.2022.03.001"},{"issue":"6","key":"690_CR31","first-page":"2787","volume":"18","author":"C Ge","year":"2020","unstructured":"Ge, C., Susilo, W., Liu, Z., Xia, J., Szalachowski, P., Fang, L.: Secure keyword search and data sharing mechanism for cloud computing. IEEE Trans. Dependable Secure Comput. 18(6), 2787\u20132800 (2020)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"690_CR32","doi-asserted-by":"crossref","unstructured":"Beimel, A.: \u201cSecret-sharing schemes: A survey,\u201d in International conference on coding and cryptology. Springer, 2011, pp. 11\u201346","DOI":"10.1007\/978-3-642-20901-7_2"},{"key":"690_CR33","doi-asserted-by":"crossref","unstructured":"Kiltz, E.: \u201cChosen-ciphertext security from tag-based encryption,\u201d in Theory of Cryptography Conference. Springer, 2006, pp. 581\u2013600","DOI":"10.1007\/11681878_30"},{"key":"690_CR34","unstructured":"Rogaway, P.: \u201cEvaluation of some blockcipher modes of operation,\u201d Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan, 2011"},{"key":"690_CR35","doi-asserted-by":"crossref","unstructured":"Katz, J., Lindell, Y.: Introduction to modern cryptography. CRC press, 2014","DOI":"10.1201\/b17668"},{"issue":"2","key":"690_CR36","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s13389-013-0057-3","volume":"3","author":"JA Akinyele","year":"2013","unstructured":"Akinyele, J.A., Garman, C., Miers, I., Pagano, M.W., Rushanan, M., Green, M., Rubin, A.D.: Charm: A framework for rapidly prototyping cryptosystems. J. Cryptogr. Eng. 3(2), 111\u2013128 (2013)","journal-title":"J. Cryptogr. Eng."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00690-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00690-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00690-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T02:05:51Z","timestamp":1695693951000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00690-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,6]]},"references-count":36,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["690"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00690-2","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,6]]},"assertion":[{"value":"6 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}