{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T17:06:16Z","timestamp":1767719176010,"version":"3.48.0"},"reference-count":76,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T00:00:00Z","timestamp":1767657600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T00:00:00Z","timestamp":1767657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s10586-025-05800-4","type":"journal-article","created":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T15:31:38Z","timestamp":1767713498000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SMART-CPABE: secured multi-authority attribute revocable and traceable ciphertext-policy attribute-based encryption"],"prefix":"10.1007","volume":"29","author":[{"given":"Kamalakanta","family":"Sethi","sequence":"first","affiliation":[]},{"given":"Kasturi","family":"Dhal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,6]]},"reference":[{"key":"5800_CR1","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s13389-013-0057-3","volume":"3","author":"JA Akinyele","year":"2013","unstructured":"Akinyele, J.A., Garman, C., Miers, I., Pagano, M.W., Rushanan, M., Green, M., Rubin, A.D.: Charm: a framework for rapidly prototyping cryptosystems. J. Cryptogr. Eng. 3, 111\u2013128 (2013)","journal-title":"J. Cryptogr. Eng."},{"key":"5800_CR2","unstructured":"Beimel, A.: Secure Schemes for Secret Sharing and Key Distribution. PhD thesis, Israel Institute of Technology, Technion (1996)"},{"key":"5800_CR3","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE symposium on security and privacy (SP\u201907), pp. 321\u2013334. IEEE (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"5800_CR4","doi-asserted-by":"crossref","unstructured":"Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encryption with efficient revocation. In: Proceedings of the 15th ACM conference on Computer and communications security, pp. 417\u2013426 (2008)","DOI":"10.1145\/1455770.1455823"},{"key":"5800_CR5","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Annual international cryptology conference, pp. 56\u201372. Springer (2004)","DOI":"10.1007\/978-3-540-28628-8_4"},{"key":"5800_CR6","doi-asserted-by":"crossref","unstructured":"Chase, M.: Multi-authority attribute based encryption. In: Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, the Netherlands, February 21-24, 2007. Proceedings 4, pp. 515\u2013534. Springer (2007)","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"5800_CR7","doi-asserted-by":"crossref","unstructured":"Chen, J., Ma, H.: Efficient decentralized attribute-based access control for cloud storage with user revocation. In: 2014 IEEE International Conference on Communications (ICC), pp. 3782\u20133787. IEEE (2014)","DOI":"10.1109\/ICC.2014.6883910"},{"key":"5800_CR8","doi-asserted-by":"crossref","unstructured":"Chen, Y., Jiang, Z.L., Yiu, S.M., Liu, J.K., Au, M.H., Wang, X.: Fully secure ciphertext-policy attribute based encryption with security mediator. In: Information and Communications Security: 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers 16, pp. 274\u2013289. Springer (2015)","DOI":"10.1007\/978-3-319-21966-0_20"},{"key":"5800_CR9","doi-asserted-by":"crossref","unstructured":"Chow, S.S.: A framework of multi-authority attribute-based encryption with outsourcing and revocation. In: Proceedings of the 21st ACM on symposium on access control models and technologies, pp. 215\u2013226 (2016)","DOI":"10.1145\/2914642.2914659"},{"key":"5800_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2024.103936","volume":"92","author":"Y Dai","year":"2025","unstructured":"Dai, Y., Xue, L., Yang, B., Wang, T., Zhang, K.: A traceable and revocable decentralized attribute-based encryption scheme with fully hidden access policy for cloud-based smart healthcare. Computer Standards & Interfaces 92, 103936 (2025)","journal-title":"Computer Standards & Interfaces"},{"key":"5800_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110992","volume":"257","author":"Y Ding","year":"2025","unstructured":"Ding, Y., Wu, Z., Miao, Y., Ding, M.: SharAcc: enhancing scalability and security in Attribute-Based Access Control with sharding-based blockchain and full decentralization. Computer Networks 257, 110992 (2025)","journal-title":"Computer Networks"},{"issue":"2","key":"5800_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-023-09445-7","volume":"36","author":"P Datta","year":"2023","unstructured":"Datta, P., Komargodski, I., Waters, B.: Decentralized multi-authority abe for nc 1 from bdh. J. Cryptol. 36(2), 6 (2023)","journal-title":"J. Cryptol."},{"issue":"7","key":"5800_CR13","doi-asserted-by":"publisher","DOI":"10.3390\/s17071695","volume":"17","author":"K Fan","year":"2017","unstructured":"Fan, K., Wang, J., Wang, X., Li, H., Yang, Y.: A secure and verifiable outsourced access control scheme in fog-cloud computing. Sensors 17(7), 1695 (2017)","journal-title":"Sensors"},{"issue":"11","key":"5800_CR14","first-page":"15723","volume":"12","author":"D Ghopur","year":"2025","unstructured":"Ghopur, D., Ma, J., Ma, X., He, F., Liu, K., Jiang, T., Wang, X.: Decentralized multi-authority attribute-based searchable encryption for e-health cloud. IEEE Int. Things J. 12(11), 15723\u201315735 (2025)","journal-title":"IEEE Int. Things J."},{"key":"5800_CR15","doi-asserted-by":"crossref","unstructured":"Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: Automata, Languages and Programming: 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II 35, pp. 579\u2013591. Springer (2008)","DOI":"10.1007\/978-3-540-70583-3_47"},{"key":"5800_CR16","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security, pp. 89\u201398 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"5800_CR17","unstructured":"Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of $$\\{$$ABE$$\\}$$ ciphertexts. In: 20th USENIX security symposium (USENIX Security 11) (2011)"},{"issue":"7","key":"5800_CR18","doi-asserted-by":"publisher","first-page":"1901","DOI":"10.1109\/TC.2023.3234210","volume":"72","author":"Y Guo","year":"2023","unstructured":"Guo, Y., Lu, Z., Ge, H., Li, J.: Revocable blockchain-aided attribute-based encryption with escrow-free in cloud storage. IEEE Trans. Comput. 72(7), 1901\u20131912 (2023)","journal-title":"IEEE Trans. Comput."},{"issue":"1","key":"5800_CR19","volume":"2017","author":"N Helil","year":"2017","unstructured":"Helil, N., Rahman, K.: Cp-abe access control scheme for sensitive data set constraint with hidden access policy and constraint policy. Secur. Commun. Netw. 2017(1), 2713595 (2017)","journal-title":"Secur. Commun. Netw."},{"key":"5800_CR20","unstructured":"Hinek, M., Jiang, S., Safavi-Naini, R., Shahandashti, S.: Attribute based encryption with key cloning protection. report 2008\/478 (2008)"},{"key":"5800_CR21","doi-asserted-by":"crossref","unstructured":"Hohenberger, S., Waters, B.: Attribute-based encryption with fast decryption. In: Public-Key Cryptography\u2013PKC 2013: 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26\u2013March 1, 2013. Proceedings 16, pp. 162\u2013179. Springer (2013)","DOI":"10.1007\/978-3-642-36362-7_11"},{"issue":"10","key":"5800_CR22","doi-asserted-by":"publisher","first-page":"2271","DOI":"10.1109\/TKDE.2011.78","volume":"25","author":"J Hur","year":"2011","unstructured":"Hur, J.: Improving security and efficiency in attribute-based data sharing. IEEE Trans. Knowl. Data Eng. 25(10), 2271\u20132282 (2011)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"11","key":"5800_CR23","doi-asserted-by":"publisher","first-page":"2171","DOI":"10.1109\/TPDS.2012.61","volume":"24","author":"J Hur","year":"2013","unstructured":"Hur, J.: Attribute-based secure data sharing with hidden policies in smart grid. IEEE Trans. Parallel Distrib. Syst. 24(11), 2171\u20132180 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"7","key":"5800_CR24","doi-asserted-by":"publisher","first-page":"1214","DOI":"10.1109\/TPDS.2010.203","volume":"22","author":"J Hur","year":"2010","unstructured":"Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214\u20131221 (2010)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"S2","key":"5800_CR25","doi-asserted-by":"publisher","first-page":"3783","DOI":"10.1007\/s10586-018-2346-1","volume":"22","author":"A Kalaivani","year":"2019","unstructured":"Kalaivani, A., Ananthi, B., Sangeetha, S.: Enhanced hierarchical attribute based encryption with modular padding for improved public auditing in cloud computing using semantic ontology. Cluster Computing 22(S2), 3783\u20133790 (2019)","journal-title":"Cluster Computing"},{"key":"5800_CR26","doi-asserted-by":"crossref","unstructured":"Kate, A., Zaverucha, G., Goldberg, I.: Pairing-based onion routing. In: Privacy Enhancing Technologies: 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papers 7, pp. 95\u2013112. Springer (2007)","DOI":"10.1007\/978-3-540-75551-7_7"},{"issue":"8","key":"5800_CR27","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1109\/TIFS.2013.2271848","volume":"8","author":"J Lai","year":"2013","unstructured":"Lai, J., Deng, R.H., Guan, C., Weng, J.: Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 8(8), 1343\u20131354 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5800_CR28","doi-asserted-by":"crossref","unstructured":"Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques, pp. 568\u2013588. Springer (2011)","DOI":"10.1007\/978-3-642-20465-4_31"},{"key":"5800_CR29","doi-asserted-by":"crossref","unstructured":"Lewko, A., Waters, B.: New proof methods for attribute-based encryption: Achieving full security through selective techniques. In: Annual Cryptology Conference, pp. 180\u2013198. Springer (2012)","DOI":"10.1007\/978-3-642-32009-5_12"},{"key":"5800_CR30","doi-asserted-by":"crossref","unstructured":"Li, J., Huang, Q., Chen, X., Chow, S.S., Wong, D.S., Xie, D.: Multi-authority ciphertext-policy attribute-based encryption with accountability. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 386\u2013390 (2011)","DOI":"10.1145\/1966913.1966964"},{"issue":"1","key":"5800_CR31","volume":"2017","author":"J Li","year":"2017","unstructured":"Li, J., Sha, F., Zhang, Y., Huang, X., Shen, J.: Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length. Secur. Commun. Netw. 2017(1), 3596205 (2017)","journal-title":"Secur. Commun. Netw."},{"issue":"1","key":"5800_CR32","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1701675","volume":"2018","author":"Q Li","year":"2018","unstructured":"Li, Q., Zhu, H., Ying, Z., Zhang, T.: Traceable ciphertext-policy attribute-based encryption with verifiable outsourced decryption in ehealth cloud. Wireless Communications and Mobile Computing 2018(1), 1701675 (2018)","journal-title":"Wireless Communications and Mobile Computing"},{"key":"5800_CR33","doi-asserted-by":"crossref","unstructured":"Liang, X., Li, X., Lu, R., Lin, X., Shen, X.: An efficient and secure user revocation scheme in mobile social networks. In: 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, pp. 1\u20135. IEEE (2011)","DOI":"10.1109\/GLOCOM.2011.6134273"},{"key":"5800_CR34","doi-asserted-by":"crossref","unstructured":"Liu, J.K., Yuen, T.H., Zhang, P., Liang, K.: Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list. In: Applied Cryptography and Network Security: 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings 16, pp. 516\u2013534. Springer (2018)","DOI":"10.1007\/978-3-319-93387-0_27"},{"issue":"1","key":"5800_CR35","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/TIFS.2012.2223683","volume":"8","author":"Z Liu","year":"2012","unstructured":"Liu, Z., Cao, Z., Wong, D.S.: White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures. IEEE Trans. Inf. Forensics Secur. 8(1), 76\u201388 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5800_CR36","doi-asserted-by":"crossref","unstructured":"Liu, Z., Cao, Z., Wong, D.S.: Blackbox traceable cp-abe: how to catch people leaking their keys by selling decryption devices on ebay. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 475\u2013486 (2013)","DOI":"10.1145\/2508859.2516683"},{"issue":"1","key":"5800_CR37","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/TIFS.2014.2363562","volume":"10","author":"Z Liu","year":"2014","unstructured":"Liu, Z., Cao, Z., Wong, D.S.: Traceable cp-abe: How to trace decryption devices found in the wild. IEEE Trans. Inf. Forensics Secur. 10(1), 55\u201368 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5800_CR38","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.jnca.2018.01.016","volume":"108","author":"Z Liu","year":"2018","unstructured":"Liu, Z., Jiang, Z.L., Wang, X., Yiu, S.M.: Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating. Journal of Network and Computer Applications 108, 112\u2013123 (2018)","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"5800_CR39","volume":"2020","author":"Z Liu","year":"2020","unstructured":"Liu, Z., Wang, F., Chen, K., Tang, F.: A new user revocable ciphertext-policy attribute-based encryption with ciphertext update. Secur. Commun. Netw. 2020(1), 8856592 (2020)","journal-title":"Secur. Commun. Netw."},{"issue":"7","key":"5800_CR40","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1093\/comjnl\/bxv101","volume":"59","author":"Z Liu","year":"2016","unstructured":"Liu, Z., Wong, D.S.: Practical attribute-based encryption: traitor tracing, revocation and large universe. The Computer Journal 59(7), 983\u20131004 (2016)","journal-title":"The Computer Journal"},{"key":"5800_CR41","doi-asserted-by":"crossref","unstructured":"Miao, Y.: Multi-authority and decentralized attribute-based encryption. In: Encyclopedia of Cryptography, Security and Privacy, pp. 1583\u20131586. Springer (2025)","DOI":"10.1007\/978-3-030-71522-9_1458"},{"key":"5800_CR42","first-page":"1","volume":"40","author":"PP Nayudu","year":"2021","unstructured":"Nayudu, P.P., Sekhar, K.R.: Enhancement of attribute-based encryption schemes through machine learning techniques: research challenges and opportunities. J Jilin University 40, 1\u201318 (2021)","journal-title":"J Jilin University"},{"key":"5800_CR43","doi-asserted-by":"crossref","unstructured":"Nayudu, P.P., Sekhar, K.R.: Accountable specific attribute-based encryption scheme for cloud access control. Int. J. Syst. Assurance Eng. Manag. pp. 1\u201310 (2022)","DOI":"10.1007\/s13198-022-01689-z"},{"key":"5800_CR44","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2023.032267","author":"PP Nayudu","year":"2023","unstructured":"Nayudu, P.P., Sekhar, K.R.: Dynamic time and location information in ciphertext-policy attribute-based encryption with multi-authorization. Intelligent Automation & Soft Computing (2023). https:\/\/doi.org\/10.32604\/iasc.2023.032267","journal-title":"Intelligent Automation & Soft Computing"},{"issue":"4","key":"5800_CR45","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1504\/IJSSE.2023.134428","volume":"13","author":"PP Nayudu","year":"2023","unstructured":"Nayudu, P.P., Sekhar, K.R.: An efficient ciphertext-policy attribute-based encryption with attribute and user revocation scheme in cloud environment. International Journal of System of Systems Engineering 13(4), 371\u2013385 (2023)","journal-title":"International Journal of System of Systems Engineering"},{"issue":"1","key":"5800_CR46","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.32604\/csse.2023.033961","volume":"46","author":"PP Nayudu","year":"2023","unstructured":"Nayudu, P.P., Sekhar, K.R.: Secured access policy in ciphertext-policy attribute-based encryption for cloud environment. Computer Systems Science and Engineering 46(1), 1079\u20131092 (2023)","journal-title":"Computer Systems Science and Engineering"},{"issue":"5","key":"5800_CR47","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1109\/TDSC.2016.2608343","volume":"15","author":"J Ning","year":"2016","unstructured":"Ning, J., Cao, Z., Dong, X., Wei, L.: White-box traceable cp-abe for cloud storage service: How to catch people leaking their access credentials effectively. IEEE Trans. Dependable Secure Comput. 15(5), 883\u2013897 (2016)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"5800_CR48","doi-asserted-by":"crossref","unstructured":"Ning, J., Dong, X., Cao, Z., Wei, L.: Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud. In: Computer Security\u2013ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II 20, pp. 270\u2013289. Springer (2015)","DOI":"10.1007\/978-3-319-24177-7_14"},{"issue":"6","key":"5800_CR49","doi-asserted-by":"publisher","first-page":"1274","DOI":"10.1109\/TIFS.2015.2405905","volume":"10","author":"J Ning","year":"2015","unstructured":"Ning, J., Dong, X., Cao, Z., Wei, L., Lin, X.: White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans. Inf. Forensics Secur. 10(6), 1274\u20131288 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5800_CR50","doi-asserted-by":"crossref","unstructured":"Pirretti, M., Traynor, P., McDaniel, P., Waters, B.: Secure attribute-based systems. In: Proceedings of the 13th ACM conference on Computer and communications security, pp. 99\u2013112 (2006)","DOI":"10.1145\/1180405.1180419"},{"key":"5800_CR51","doi-asserted-by":"crossref","unstructured":"Pradhan, A., Sethi, K., Bera, P., et\u00a0al.: Smart grid data security using practical cp-abe with obfuscated policy and outsourcing decryption. In: 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pp. 1\u20138. IEEE (2020)","DOI":"10.1109\/CyberSA49311.2020.9139628"},{"key":"5800_CR52","doi-asserted-by":"crossref","unstructured":"Rouselakis, Y., Waters, B.: Practical constructions and new proof methods for large universe attribute-based encryption. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 463\u2013474 (2013)","DOI":"10.1145\/2508859.2516672"},{"key":"5800_CR53","doi-asserted-by":"crossref","unstructured":"Rouselakis, Y., Waters, B.: Efficient statically-secure large-universe multi-authority attribute-based encryption. In: International Conference on Financial Cryptography and Data Security, pp. 315\u2013332. Springer (2015)","DOI":"10.1007\/978-3-662-47854-7_19"},{"issue":"1","key":"5800_CR54","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10586-024-04696-w","volume":"28","author":"K Routray","year":"2025","unstructured":"Routray, K., Bera, P.: Privacy preserving spatio-temporal attribute-based encryption for cloud applications. Clust. Comput. 28(1), 1\u201326 (2025)","journal-title":"Clust. Comput."},{"key":"5800_CR55","doi-asserted-by":"publisher","DOI":"10.1145\/3699967","volume-title":"Secure Blockchain Assisted Attribute-based Keyword Search for Collaborative E-healthcare","author":"K Routray","year":"2024","unstructured":"Routray, K., Manikonda, A., Bera, P.: Secure Blockchain Assisted Attribute-based Keyword Search for Collaborative E-healthcare. Research and Practice, Distributed Ledger Technologies (2024)"},{"key":"5800_CR56","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3377107","author":"C Ruan","year":"2024","unstructured":"Ruan, C., Hu, C., Li, X., Deng, S., Liu, Z., Yu, J.: A revocable and fair outsourcing attribute-based access control scheme in metaverse. IEEE Transactions on Consumer Electronics (2024). https:\/\/doi.org\/10.1109\/TCE.2024.3377107","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"5800_CR57","doi-asserted-by":"crossref","unstructured":"Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Advances in Cryptology\u2013CRYPTO 2012: 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, pp. 199\u2013217. Springer (2012)","DOI":"10.1007\/978-3-642-32009-5_13"},{"key":"5800_CR58","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology\u2013EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings 24, pp. 457\u2013473. Springer (2005)"},{"key":"5800_CR59","unstructured":"Sakai, R.: Cryptosystems based on pairing. SCIS 2000 (2000)"},{"key":"5800_CR60","doi-asserted-by":"crossref","unstructured":"Sethi, K., Agrawal, A., Bera, P.: Secure smart grid data aggregation based on fog computing and blockchain technology. In: International Conference on Information Systems Security, pp. 431\u2013448. Springer (2023)","DOI":"10.1007\/978-3-031-49099-6_26"},{"key":"5800_CR61","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102435","volume":"51","author":"K Sethi","year":"2020","unstructured":"Sethi, K., Pradhan, A., Bera, P.: Practical traceable multi-authority cp-abe with outsourcing decryption and access policy updation. Journal of Information Security and Applications 51, 102435 (2020)","journal-title":"Journal of Information Security and Applications"},{"key":"5800_CR62","doi-asserted-by":"publisher","first-page":"1525","DOI":"10.1007\/s10586-020-03202-2","volume":"24","author":"K Sethi","year":"2021","unstructured":"Sethi, K., Pradhan, A., Bera, P.: Pmter-abe: a practical multi-authority cp-abe with traceability, revocation and outsourcing decryption for secure access control in cloud systems. Cluster Computing 24, 1525\u20131550 (2021)","journal-title":"Cluster Computing"},{"key":"5800_CR63","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1016\/j.future.2024.07.040","volume":"161","author":"Yu. Tao","year":"2024","unstructured":"Tao, Yu.., Zhu, Y., Ge, C., Zhou, L., Zhou, S., Zhang, Y., Liu, J., Fang, L.: ORR-CP-ABE: a secure and efficient outsourced attribute-based encryption scheme with decryption results reuse. Future Generation Computer Systems 161, 559\u2013571 (2024)","journal-title":"Future Generation Computer Systems"},{"key":"5800_CR64","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102654","volume":"130","author":"L Zhang","year":"2022","unstructured":"Zhang, L., Zhao, C., Wu, Q., Mu, Y., Rezaeibagha, F.: A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth. Journal of Systems Architecture 130, 102654 (2022)","journal-title":"Journal of Systems Architecture"},{"key":"5800_CR65","doi-asserted-by":"crossref","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: International workshop on public key cryptography, pp. 53\u201370. Springer (2011)","DOI":"10.1007\/978-3-642-19379-8_4"},{"issue":"2","key":"5800_CR66","doi-asserted-by":"publisher","first-page":"1731","DOI":"10.1109\/JSYST.2016.2633559","volume":"12","author":"J Wei","year":"2016","unstructured":"Wei, J., Liu, W., Hu, X.: Secure and efficient attribute-based access control for multiauthority cloud storage. IEEE Syst. J. 12(2), 1731\u20131742 (2016)","journal-title":"IEEE Syst. J."},{"key":"5800_CR67","doi-asserted-by":"publisher","first-page":"128298","DOI":"10.1109\/ACCESS.2019.2939413","volume":"7","author":"X Yan","year":"2019","unstructured":"Yan, X., He, X., Yu, J., Tang, Y.: White-box traceable ciphertext-policy attribute-based encryption in multi-domain environment. IEEE Access 7, 128298\u2013128312 (2019)","journal-title":"IEEE Access"},{"issue":"7","key":"5800_CR68","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1109\/TPDS.2013.253","volume":"25","author":"K Yang","year":"2013","unstructured":"Yang, K., Jia, X.: Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Trans. Parallel Distrib. Syst. 25(7), 1735\u20131744 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"12","key":"5800_CR69","doi-asserted-by":"publisher","first-page":"3461","DOI":"10.1109\/TPDS.2014.2380373","volume":"26","author":"K Yang","year":"2014","unstructured":"Yang, K., Jia, X., Ren, K.: Secure and verifiable policy update outsourcing for big data access control in the cloud. IEEE Trans. Parallel Distrib. Syst. 26(12), 3461\u20133470 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"11","key":"5800_CR70","doi-asserted-by":"publisher","first-page":"1790","DOI":"10.1109\/TIFS.2013.2279531","volume":"8","author":"K Yang","year":"2013","unstructured":"Yang, K., Jia, X., Ren, K., Zhang, B., Xie, R.: Dac-macs: effective data access control for multiauthority cloud storage systems. IEEE Transactions on Information Forensics and Security 8(11), 1790\u20131801 (2013)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"5800_CR71","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11431-017-9187-y","volume":"61","author":"K Zhang","year":"2018","unstructured":"Zhang, K., Li, H., Ma, J., Liu, X.: Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability. SCIENCE CHINA Inf. Sci. 61, 1\u201313 (2018)","journal-title":"SCIENCE CHINA Inf. Sci."},{"issue":"1","key":"5800_CR72","volume":"2020","author":"K Zhang","year":"2020","unstructured":"Zhang, K., Li, Y., Song, Y., Lu, L., Zhang, T., Jiang, Q.: A traceable and revocable multiauthority attribute-based encryption scheme with fast access. Secur. Commun. Netw. 2020(1), 6661243 (2020)","journal-title":"Secur. Commun. Netw."},{"issue":"1","key":"5800_CR73","first-page":"526","volume":"11","author":"L Zhang","year":"2023","unstructured":"Zhang, L., Li, X., Wu, Q., Rezaeibagha, F.: Blockchain-aided anonymous traceable and revocable access control scheme with dynamic policy updating for the cloud iot. IEEE Int. Things J. 11(1), 526\u2013542 (2023)","journal-title":"IEEE Int. Things J."},{"key":"5800_CR74","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102589","volume":"129","author":"Z Zhang","year":"2022","unstructured":"Zhang, Z., Huang, W., Zhou, S., Liao, Y.: A revocable multi-authority fine-grained access control architecture against ciphertext rollback attack for mobile edge computing. Journal of Systems Architecture 129, 102589 (2022)","journal-title":"Journal of Systems Architecture"},{"key":"5800_CR75","doi-asserted-by":"crossref","unstructured":"Zhou, J., Cao, Z., Dong, X., Lin, X.: Tr-mabe: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 2398\u20132406. IEEE (2015)","DOI":"10.1109\/INFOCOM.2015.7218628"},{"issue":"1","key":"5800_CR76","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/TC.2013.200","volume":"64","author":"Z Zhou","year":"2013","unstructured":"Zhou, Z., Huang, D., Wang, Z.: Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption. IEEE Trans. Comput. 64(1), 126\u2013138 (2013)","journal-title":"IEEE Trans. Comput."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05800-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05800-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05800-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T17:02:58Z","timestamp":1767718978000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05800-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,6]]},"references-count":76,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["5800"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05800-4","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2026,1,6]]},"assertion":[{"value":"10 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 October 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics declaration"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"78"}}