{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T20:33:09Z","timestamp":1770237189663,"version":"3.49.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T00:00:00Z","timestamp":1476144000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Nature Science Foundation of China","award":["61472307"],"award-info":[{"award-number":["61472307"]}]},{"name":"Nature Science Foundation of China","award":["61100231"],"award-info":[{"award-number":["61100231"]}]},{"name":"Natural Science Basic Research Plan in Shaanxi Province of China","award":["2016JM6004"],"award-info":[{"award-number":["2016JM6004"]}]},{"name":"Nature Science Foundation of China","award":["61100165"],"award-info":[{"award-number":["61100165"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s10916-016-0595-1","type":"journal-article","created":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T10:36:13Z","timestamp":1476182173000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Privacy-Preserving and Secure Sharing of PHR in the Cloud"],"prefix":"10.1007","volume":"40","author":[{"given":"Leyou","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Qing","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]},{"given":"Jingxia","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,11]]},"reference":[{"issue":"6","key":"595_CR1","first-page":"754","volume":"21","author":"J Sun","year":"2009","unstructured":"Sun, J., and Fang, Y., Cross-domain data sharing in distributed electronic health record systems. IEEE Transactions on Parallel and Distributed System 21(6):754\u2013764, 2009.","journal-title":"IEEE Transactions on Parallel and Distributed System"},{"key":"595_CR2","doi-asserted-by":"crossref","unstructured":"Liu, C., Lin, F., Chiang, D., et al: Secure PHR access control scheme for healthcare application clouds. In: Proceeding of 42nd International Conference on Parallel Processing, pp. 1067\u20131076. IEEE Computer Society Washington (2013)","DOI":"10.1109\/ICPP.2013.127"},{"issue":"1","key":"595_CR3","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2013","unstructured":"Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W., Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed System 24(1): 131\u2013143, 2013.","journal-title":"IEEE Transactions on Parallel and Distributed System"},{"key":"595_CR4","doi-asserted-by":"crossref","unstructured":"Tang, P., Ash, J., Bates, D., et al, Personal health records: Definitions, Benefits, and strategies for overcoming barriers to adoption. Journal of the American Medical Informatics Association 13(2):121\u2013126, 2006.","DOI":"10.1197\/jamia.M2025"},{"key":"595_CR5","doi-asserted-by":"crossref","unstructured":"Sahai, A., and Waters, B., Fuzzy identity-based encryption, Advances in cryptology-EUROCRYPT 2005, pp. 457\u2013473. Berlin: Springer-Verlag, 2005.","DOI":"10.1007\/11426639_27"},{"key":"595_CR6","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B., Attribute-based encryption for fine-grained access control of encrypted data, pp. 89\u201398: ACM CCS, ACM press, 2006.","DOI":"10.1145\/1180405.1180418"},{"key":"595_CR7","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of Symposium on Security and Privacy, pp. 321\u2013334. IEEE press (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"595_CR8","doi-asserted-by":"crossref","unstructured":"Narayan, S., Gagne, M., Safavi-Naini, R.: Privacy preserving EHR system using attribute-based infrastructure. In: Proceedings ACM Cloud Computing Security Workshop (CCSW\u201910), pp. 47\u201352. ACM press (2010)","DOI":"10.1145\/1866835.1866845"},{"key":"595_CR9","unstructured":"Liang, X., Lu, R., Lin, X., Shen, X.S.: Patient self-controllable access policy on phi in Ehealthcare systems. In: Proceedings Advances in Health Informatics Conference (AHIC 10), pp. 1\u20135 (2010)"},{"key":"595_CR10","doi-asserted-by":"crossref","unstructured":"Akinyele, J.A., Lehmann, C.U., Green, M.D., Pagano, M.W., Peterson, Z.N.J., Rubin, A.D.: Self-Protecting Electronic Medical Records Using Attribute-Based Encryption, Cryptology ePrint Archive, Report 2010\/565, http:\/\/eprint.iacr.org\/ (2010)","DOI":"10.1145\/2046614.2046628"},{"key":"595_CR11","doi-asserted-by":"crossref","unstructured":"Gondkar, D.A., and Kadam, V.S.: Attribute Based Encryption for Securing Personal Health Record on Cloud, 2nd IEEE International Conference on Devices, Circuits and Systems (ICDCS), pp. 1\u20135, IEEE press (2014). Ibraimi, L., Asim, M., Petkovic, M., Secure management of personal health records by applying attribute-based encryption, In: Proceeding of the pHealth\u201909, IEEE, pp. 71\u201374 (2009)","DOI":"10.1109\/ICDCSyst.2014.6926174"},{"key":"595_CR12","doi-asserted-by":"crossref","unstructured":"Sangeetha, D., Vijayakumar, V., Thirunavukkarasu, V., Ramesh, A.: Enhanced security of PHR system in cloud using prioritized level based encryption. In: Proceeding SNDS, CCIS 420, pp. 57\u201369. Springer-Verlag, Berlin (2014)","DOI":"10.1007\/978-3-642-54525-2_5"},{"key":"595_CR13","doi-asserted-by":"crossref","first-page":"1607","DOI":"10.1007\/s11227-014-1253-3","volume":"71","author":"F Xhafa","year":"2015","unstructured":"Xhafa, F., Feng, J., Zhang, Y., Chen, X., Li, J., Privacy-aware attribute-based PHR sharing with user accountability in cloud computing. Journal of Supercomputing 71:1607\u20131619, 2015.","journal-title":"Journal of Supercomputing"},{"key":"595_CR14","doi-asserted-by":"crossref","unstructured":"Boneh, D., and Franklin, M.: Identity-based encryption from the weil pairing. In: Proceedings of Advance in Cryptology-CRYPTO, LNCS 2139, pp. 213\u2013229. Springer-Verlag, Berlin (2001)","DOI":"10.1007\/3-540-44647-8_13"},{"key":"595_CR15","doi-asserted-by":"crossref","unstructured":"Boneh, D., Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Proceedings of Advances in Cryptology-Eurocrypt, LNCS 3027, pp. 506\u2013522. Springer-Verlag, Berlin (2004)","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"595_CR16","doi-asserted-by":"crossref","unstructured":"Abdalla, M., Bellare, M., Catalano, D.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. In: Proceedings of Advances in Cryptology-CRYPTO, LNCS 3621, pp. 205\u2013222. Springer-Verlag, Berlin (2005)","DOI":"10.1007\/11535218_13"},{"key":"595_CR17","unstructured":"Kapadia, A., Tsang, P.P., Smith, S.W.: Attribute-based publishing with hidden credentials and hidden policies. In: Proceedings of IEEE Symposium of Network and Distributed System Security, pp. 179\u2013192. IEEE press (2007)"},{"key":"595_CR18","doi-asserted-by":"crossref","unstructured":"Yu, S., Ren, K., Lou, W.: Attribute-based content distribution with hidden policy. Proceedings of IEEE Workshop on Secure Network Protocols, pp. 39\u201344. IEEE press (2008)","DOI":"10.1109\/NPSEC.2008.4664879"},{"key":"595_CR19","doi-asserted-by":"crossref","unstructured":"Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: ACNS, LNCS 5037, pp. 111\u2013129. Springer-Verlag, Berlin (2008)","DOI":"10.1007\/978-3-540-68914-0_7"},{"key":"595_CR20","doi-asserted-by":"crossref","unstructured":"Li, J., Ren, K., Zhu, B., Wan, Z.: Privacy-aware attribute-based encryption with user accountability. In: ISC 2009, LNCS 5735, Vol. 347\u2013362. Springer-Verlag, Berlin (2009)","DOI":"10.1007\/978-3-642-04474-8_28"},{"key":"595_CR21","doi-asserted-by":"crossref","unstructured":"Chaudhari, P., Lal Das, M., Mathuria, A.: On anonymous attribute based encryption. In: ICISS 2015, LNCS 9478, pp. 378\u2013392. Springer-Verlag, Berlin (2015)","DOI":"10.1007\/978-3-319-26961-0_23"},{"key":"595_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Chen, X., Li, J., Wong, D.S., Li, H.: Anonymous attribute-based encryption supporting efficient decryption test. In: Proceedings of the ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 511\u2013516 (2013)","DOI":"10.1145\/2484313.2484381"},{"key":"595_CR23","doi-asserted-by":"crossref","unstructured":"Gentry, C., and Silverberg, A.: Hierarchical ID-Based cryptography. In: Proceedings of Advances in Cryptology-ASIACRYPT, LNCS 2501, pp. 548\u2013566. Springer-Verlag, Berlin (2002)","DOI":"10.1007\/3-540-36178-2_34"},{"key":"595_CR24","doi-asserted-by":"crossref","unstructured":"Boneh, D., and Boyen, X.: Efficient selective-ID secure identity based encryption without random oracles. In: Proceedings of Advances in Cryptology-EUROCRYPT, LNCS 3027, pp. 223\u2013238. Springer-Verlag, Berlin (2004)","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"595_CR25","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X., Shacham, H.: Short group signature. In: Proceedings of Advances in Cryptology-CRYPT, LNCS 3152, pp. 41\u201355. Springer-Verlag, Berlin (2004)","DOI":"10.1007\/978-3-540-28628-8_3"},{"issue":"4","key":"595_CR26","doi-asserted-by":"crossref","first-page":"2531","DOI":"10.1109\/TIT.2012.2236918","volume":"59","author":"JHP Lee","year":"2013","unstructured":"Lee, J.H.P., Anonymous HIBE: Compact construction over prime-order groups. IEEE Transactions on Information Theory 59(4):2531\u20132541, 2013.","journal-title":"IEEE Transactions on Information Theory"},{"key":"595_CR27","doi-asserted-by":"publisher","unstructured":"Xie, Y., Wen, H., Wu, B., Jiang, Y., Meng, J.: A modified hierarchical attribute-based encryption access control method for mobile cloud computing. IEEE Transactions on Cloud Computing, doi: 10.1109\/TCC.2015.2513388 , will apper (2016)","DOI":"10.1109\/TCC.2015.2513388"},{"key":"595_CR28","doi-asserted-by":"crossref","unstructured":"Abdalla, M., Catalano, D., Fiore, D.: Verifiable random functions from identity-based key encapsulation. In: Proceedings of Advances in Cryptology-Eurocrypt, LNCS 5479, pp. 554\u2013571. Springer-Verlag, Berlin (2009)","DOI":"10.1007\/978-3-642-01001-9_32"},{"key":"595_CR29","doi-asserted-by":"crossref","unstructured":"Boyen, X., and Waters, B.: Anonymous hierarchical identity-based encryption (without random oracles). In: Proceedings of Advances in Cryptology-CRYPTO 06, LNCS 5677, pp. 290\u2013317. Springer-Verlag, Berlin (2006)","DOI":"10.1007\/11818175_17"},{"key":"595_CR30","doi-asserted-by":"crossref","unstructured":"Liu, X., Liu, Q., Peng, T., Wu, J.: HCBE achieving fine-grained access control in cloud-based PHR systems. In: Proceedings of ICA3PP 2015, Part III, LNCS 9530, pp. 562\u2013576. Springer-Verlag, Berlin (2015)","DOI":"10.1007\/978-3-319-27137-8_41"},{"issue":"99","key":"595_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSYST.2016.2544805","volume":"PP","author":"D He","year":"2016","unstructured":"He, D., Zeadally, S., Kumar, N., Lee, J., Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal PP(99):1\u201312, 2016. doi: 10.1109\/JSYST.2016.2544805 .","journal-title":"IEEE Systems Journal"},{"issue":"99","key":"595_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSYST.2015.2428620","volume":"PP","author":"D He","year":"2015","unstructured":"He, D., Zeadally, S., Wu, L., Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Systems Journal PP(99):1\u201310, 2015. doi: 10.1109\/JSYST.2015.2428620 .","journal-title":"IEEE Systems Journal"},{"issue":"5","key":"595_CR33","first-page":"1","volume":"59","author":"D He","year":"2016","unstructured":"He, D., Kumar, N., Shen, H., Lee, J., One-to-many authentication for access control in mobile pay-TV systems. Science China-Information Sciences 59(5):1\u201314, 2016.","journal-title":"Science China-Information Sciences"},{"key":"595_CR34","volume-title":"Pairing-based cryptography","author":"F Li","year":"2014","unstructured":"Li, F., and Wu, W., Pairing-based cryptography. Beijing, China: Science Press, 2014."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0595-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0595-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0595-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T05:34:16Z","timestamp":1749620056000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0595-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,11]]},"references-count":34,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["595"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0595-1","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,11]]},"article-number":"267"}}