{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:23:08Z","timestamp":1740122588869,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["60973140, 61170276, 61373135","61170276","61373135"],"award-info":[{"award-number":["60973140, 61170276, 61373135","61170276","61373135"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s11277-016-3825-4","type":"journal-article","created":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T07:52:11Z","timestamp":1477295531000},"page":"1215-1228","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Key-Insulated Ciphertext Policy Attribute Based Signcryption for Mobile Networks"],"prefix":"10.1007","volume":"95","author":[{"given":"Hanshu","family":"Hong","sequence":"first","affiliation":[]},{"given":"Zhixin","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"3825_CR1","doi-asserted-by":"crossref","unstructured":"Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. In EUROCRYPT 2005, lecture notes in computer science (Vol. 3494, pp. 457\u2013473). Heidelberg: Springer.","DOI":"10.1007\/11426639_27"},{"key":"3825_CR2","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., & Sahai, A. (2006). Attribute based encryption for fine-grained access control of encrypted data. In ACM conference on computer and communications security (pp. 89\u201398). New York: ACM.","DOI":"10.1145\/1180405.1180418"},{"key":"3825_CR3","unstructured":"Waters, B. (2011). Ciphertext policy attribute based encryption: An expressive, efficient, and provably secure realization. In PKC 2011, lecture notes in computer science (Vol. 6571, pp. 53\u201370). Heidelberg: Springer."},{"key":"3825_CR4","unstructured":"Lewko, A., Okamoto, T., Sahai, A., & Takashima, K. (2010). Fully secure functional encryption: Attribute based encryption and (hierarchical) inner product encryption. In EUROCRYPT 2010, lecture notes in computer science (Vol. 6110, pp. 62\u201391). Heidelberg: Springer."},{"key":"3825_CR5","unstructured":"Goyal, V., Jain, A., Pandey, O., & Sahai, A. (2008). Bounded ciphertext policy attribute based encryption, In 35th international colloquium, lecture notes in computer science (Vol. 5126, pp. 579\u2013591). Heidelberg: Springer."},{"key":"3825_CR6","unstructured":"Dodis, Y., Katz, J., Xu, S., & Yung, M. (2002). Key-insulated public-key cryptosystems. In IACR ePrint archive. http:\/\/www.iacr.org\/cryptodb\/data\/paper.php?pubkey=11601 ."},{"key":"3825_CR7","unstructured":"Guo, S. Q., & Zeng, Y. P. (2008). Attribute based signature scheme. In International conference on information security and assurance 2008, IEEE, pp. 509\u2013511."},{"key":"3825_CR8","doi-asserted-by":"crossref","unstructured":"Maji, H., Prabhakaran, M., & Rosulek, M. (2011). Attribute based signatures. In CT-RSA 2011 (pp. 376\u2013392). Heidelberg: Springer.","DOI":"10.1007\/978-3-642-19074-2_24"},{"key":"3825_CR9","unstructured":"Zheng, Y. L. (1997). Digital signcryption or how to achieve cost (signature & encryption)\u00a0\u226acost (signature)\u00a0+\u00a0cost (encryption). In CRYPTO\u201997. Lecture notes in computer science (Vol. 1294, pp.165\u2013179). Heidelberg: Springer."},{"issue":"2","key":"3825_CR10","doi-asserted-by":"crossref","first-page":"1401","DOI":"10.1007\/s11277-014-1936-3","volume":"79","author":"G Zhu","year":"2014","unstructured":"Zhu, G., Xiong, H., & Qin, Z. (2014). Fully secure identity based key-insulated signcryption in the standard model. Wireless Personal Communications, 79(2), 1401\u20131416.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"3825_CR11","first-page":"324","volume":"57","author":"FG Li","year":"2013","unstructured":"Li, F. G., Shirase, M., & Takagi, T. (2013). Certificateless hybrid signcryption. Mathematical and Computer Modelling, 57(3), 324\u2013343.","journal-title":"Mathematical and Computer Modelling"},{"issue":"4","key":"3825_CR12","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1007\/s11704-014-3245-0","volume":"8","author":"WB Shi","year":"2014","unstructured":"Shi, W. B., Kumar, N., Gong, P., & Zhang, Z. Z. (2014). Cryptanalysis and improvement of a certificate less signcryption scheme without bilinear pairing. Frontiers of Computer Science, 8(4), 656\u2013666.","journal-title":"Frontiers of Computer Science"},{"key":"3825_CR13","doi-asserted-by":"crossref","unstructured":"Wang, C. J., & Huang, J. S. (2011). Attribute based signcryption with ciphertext policy and claim predicate mechanism. In CIS 2011, pp. 905\u2013909, IEEE.","DOI":"10.1109\/CIS.2011.204"},{"issue":"9","key":"3825_CR14","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/JSAC.2013.SUP.0513004","volume":"31","author":"CQ Hu","year":"2013","unstructured":"Hu, C. Q., & Zhang, N. (2013). Body area network security: A fuzzy attribute based signcryption scheme. IEEE Journal on Selected Areas in Communications, 31(9), 37\u201346.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"3","key":"3825_CR15","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1016\/j.ins.2009.10.011","volume":"180","author":"ZH Liu","year":"2010","unstructured":"Liu, Z. H., Hu, Y. P., Zhang, X. S., & Ma, H. (2010). Certificateless signcryption scheme in the standard model. Information Sciences, 180(3), 452\u2013464.","journal-title":"Information Sciences"},{"issue":"644","key":"3825_CR16","first-page":"1","volume":"5","author":"HS Hong","year":"2016","unstructured":"Hong, H. S., & Sun, Z. X. (2016). An efficient and secure attribute based signcryption scheme with LSSS access structure. Springerplus, 5(644), 1\u201310.","journal-title":"Springerplus"},{"key":"3825_CR17","unstructured":"Hu, C. Q., Cheng, X. Z., & Tian, Z. (2016). An attribute-based signcryption scheme to secure attribute-defined multicast communications. In 11th secureComm. Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering (Vol. 164, pp. 418\u2013437). Heidelberg: Springer."},{"issue":"4","key":"3825_CR18","doi-asserted-by":"crossref","first-page":"632","DOI":"10.1049\/cje.2016.07.007","volume":"25","author":"CG Peng","year":"2016","unstructured":"Peng, C. G., Wang, W. R., & Tian, Y. L. (2016). An attribute-based signcryption scheme and its application in information hiding. Chinese Journal of Electronics, 25(4), 632\u2013640.","journal-title":"Chinese Journal of Electronics"},{"key":"3825_CR19","doi-asserted-by":"crossref","first-page":"27","DOI":"10.15388\/Informatica.2012.347","volume":"23","author":"J Chen","year":"2012","unstructured":"Chen, J., Chen, K., & Wang, Y. (2012). Identity-based key-insulated signcryption. Informatica, 23, 27\u201345.","journal-title":"Informatica"},{"key":"3825_CR20","doi-asserted-by":"crossref","unstructured":"Attrapadung, N., Libert, B., & DePanafieu, E. (2011). Expressive key-policy attribute based encryption with constant-size ciphertexts. In PKC 2011, lecture notes in computer science (Vol. 6571, pp. 90\u2013108). Heidelberg: Springer.","DOI":"10.1007\/978-3-642-19379-8_6"},{"key":"3825_CR21","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., & Ren, K. (2010). Attribute based data sharing with attribute revocation. In Proceedings of the 5th symposium on information, computer and communications security, pp. 261\u2013270. New York: ACM.","DOI":"10.1145\/1755688.1755720"},{"issue":"10","key":"3825_CR22","doi-asserted-by":"crossref","first-page":"2271","DOI":"10.1109\/TKDE.2011.78","volume":"25","author":"H Junbeom","year":"2013","unstructured":"Junbeom, H. (2013). Improving security and efficiency in attribute based data sharing. IEEE Transactions on Knowledge and Data Engineering, 25(10), 2271\u20132282.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"3825_CR23","doi-asserted-by":"crossref","unstructured":"Zhu, G., Xiong, H., Wang, R., & Qin, Z. (2014). An improvement of an identity-based key-insulated signcryption. In Proceedings of international conference on computer science and information technology advances in intelligent systems and computing, Vol. 255, pp. 97\u2013104.","DOI":"10.1007\/978-81-322-1759-6_12"},{"issue":"131","key":"3825_CR24","first-page":"1","volume":"5","author":"HS Hong","year":"2016","unstructured":"Hong, H. S., & Sun, Z. X. (2016). High efficient key-insulated attribute based encryption scheme without bilinear pairing operations. Springerplus, 5(131), 1\u201312.","journal-title":"Springerplus"},{"issue":"4","key":"3825_CR25","doi-asserted-by":"crossref","first-page":"1727","DOI":"10.1007\/s11277-015-2864-6","volume":"85","author":"A Yin","year":"2015","unstructured":"Yin, A., & Liang, H. (2015). On security of a certificateless hybrid signcryption scheme. Wireless Personal Communications, 85(4), 1727\u20131739.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"3825_CR26","first-page":"1","volume":"5","author":"HS Hong","year":"2016","unstructured":"Hong, H. S., & Sun, Z. X. (2016). An efficient and traceable KP-ABS scheme with untrusted attribute authority in cloud computing. Journal of Cloud Computing, 5(2), 1\u20138.","journal-title":"Journal of Cloud Computing"},{"key":"3825_CR27","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.future.2014.10.010","volume":"49","author":"XX Yao","year":"2015","unstructured":"Yao, X.X., Chen, Z., & Ye, T. (2015). A lightweight attribute-based encryption scheme for the Internet of Things. Future Generation Computer Systems. 49, 104\u2013112.","journal-title":"Future Generation Computer Systems"},{"issue":"5","key":"3825_CR28","first-page":"2394","volume":"10","author":"HS Hong","year":"2016","unstructured":"Hong, H. S., Sun, Z. X., & Liu, X. M. (2016). A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud. KSII Transactions on Internet and Information Systems, 10(5), 2394\u20132406.","journal-title":"KSII Transactions on Internet and Information Systems"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-016-3825-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3825-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3825-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,26]],"date-time":"2020-09-26T21:56:44Z","timestamp":1601157404000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-016-3825-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["3825"],"URL":"https:\/\/doi.org\/10.1007\/s11277-016-3825-4","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2016,10,24]]}}}