{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:30:15Z","timestamp":1766068215008,"version":"3.41.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Syst Sci Complex"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s11424-025-4490-z","type":"journal-article","created":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T10:45:22Z","timestamp":1749465922000},"page":"1351-1369","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Lightweight Dynamic Broadcast Proxy Re-Encryption for Data Sharing in Clouds"],"prefix":"10.1007","volume":"38","author":[{"given":"Huidan","family":"Hu","sequence":"first","affiliation":[]},{"given":"Zhenfu","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Xiaolei","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Changlu","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Penghao","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,9]]},"reference":[{"key":"4490_CR1","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BFb0054122","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 98","author":"M Blaze","year":"1998","unstructured":"Blaze M, Bleumer G, and Strauss M, Divertible protocols and atomic proxy cryptography, Advances in Cryptology-EUROCRYPT\u2019 98, Springer Berlin, Heidelberg, 1998, 127\u2013144."},{"issue":"1","key":"4490_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese G, Fu K, Green M, et al., Improved proxy re-encryption schemes with applications to secure distributed storage, ACM Transactions on Information and System Security (TISSEC), 2006, 9(1): 1\u201330.","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"4490_CR3","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-540-72738-5_19","volume-title":"Applied Cryptography and Network Security: 5th International Conference","author":"M Green","year":"2007","unstructured":"Green M and Ateniese G, Identity-based proxy re-encryption, Applied Cryptography and Network Security: 5th International Conference, Springer Berlin, Heidelberg, 2007, 288\u2013306."},{"key":"4490_CR4","first-page":"332","volume-title":"Information Security and Cryptology-Inscrypt 2008","author":"Q Tang","year":"2008","unstructured":"Tang Q, Hartel P, and Jonker W, Inter-domain identity-based proxy re-encryption, Information Security and Cryptology-Inscrypt 2008, Springer Berlin Heidelberg, 2008, 332\u2013347."},{"key":"4490_CR5","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-540-73489-5_13","volume-title":"Pairing-Based Cryptography-Pairing 2007: First International Conference","author":"T Matsuo","year":"2007","unstructured":"Matsuo T, Proxy re-encryption systems for identity-based encryption, Pairing-Based Cryptography-Pairing 2007: First International Conference, Springer Berlin, Heidelberg, 2007, 247\u2013267."},{"key":"4490_CR6","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-319-11203-9_15","volume-title":"Computer Security-ESORICS 2014: 19th European Symposium on Research in Computer Security","author":"K Liang","year":"2014","unstructured":"Liang K, Liu J K, Wong D S, et al., An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing, Computer Security-ESORICS 2014: 19th European Symposium on Research in Computer Security, Springer International Publishing, Cham, 2014, 257\u2013272."},{"issue":"8","key":"4490_CR7","doi-asserted-by":"publisher","first-page":"1578","DOI":"10.1109\/TIFS.2015.2419186","volume":"10","author":"K Liang","year":"2015","unstructured":"Liang K, Susilo W, and Liu J K, Privacy-preserving ciphertext multi-sharing control for big data storage, IEEE Transactions on Information Forensics and Security, 2015, 10(8): 1578\u20131589.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"5","key":"4490_CR8","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1109\/TDSC.2017.2714166","volume":"16","author":"Z Cao","year":"2017","unstructured":"Cao Z, Wang H, and Zhao Y, AP-PRE: Autonomous path proxy re-encryption and its applications, IEEE Transactions on Dependable and Secure Computing, 2017, 16(5): 833\u2013842.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"4490_CR9","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-030-01446-9_7","volume-title":"Provable Security: 12th International Conference, ProvSec","author":"A Paul","year":"2018","unstructured":"Paul A, Srinivasavaradhan V, Sharmila Deva Selvi S, et al., A CCA-secure collusion-resistant identity-based proxy re-encryption scheme, Provable Security: 12th International Conference, ProvSec, Springer International Publishing, Cham, 2018, 111\u2013128."},{"issue":"1","key":"4490_CR10","first-page":"1","volume":"16","author":"P S Chung","year":"2014","unstructured":"Chung P S, Liu C W, and Hwang M S, A study of attribute-based proxy re-encryption scheme in cloud environments, International Journal of Network Security, 2014, 16(1): 1\u201313.","journal-title":"International Journal of Network Security"},{"key":"4490_CR11","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1145\/1533057.1533094","volume-title":"Proceedings of the 4th International Symposium on Information, Computer, and Communications Security","author":"X Liang","year":"2009","unstructured":"Liang X, Cao Z, Lin H, et al., Attribute based proxy re-encryption with delegating capabilities, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, 2009, 276\u2013286."},{"key":"4490_CR12","first-page":"46","volume-title":"5th International Conference on Intelligent Networking and Collaborative Systems","author":"K Li","year":"2013","unstructured":"Li K, Zhang Y, and Ma H, Key policy attribute-based proxy re-encryption with matrix access structure, 5th International Conference on Intelligent Networking and Collaborative Systems, IEEE, 2013, 46\u201350."},{"issue":"2","key":"4490_CR13","first-page":"70","volume":"4","author":"K Li","year":"2014","unstructured":"Li K, Wang J, Zhang Y, et al., Key policy attribute-based proxy re-encryption and RCCA secure scheme, Journal of Internet Services and Information Security, 2014, 4(2): 70\u201382.","journal-title":"Journal of Internet Services and Information Security"},{"issue":"7","key":"4490_CR14","doi-asserted-by":"publisher","first-page":"970","DOI":"10.1093\/comjnl\/bxv100","volume":"59","author":"C Ge","year":"2016","unstructured":"Ge C, Susilo W, Wang J, et al., A key-policy attribute-based proxy re-encryption without random oracles, The Computer Journal, 2016, 59(7): 970\u2013982.","journal-title":"The Computer Journal"},{"key":"4490_CR15","doi-asserted-by":"publisher","first-page":"2587","DOI":"10.1007\/s10623-018-0462-9","volume":"86","author":"C Ge","year":"2018","unstructured":"Ge C, Susilo W, Fang L, et al., A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system, Designs, Codes and Cryptography, 2018, 86: 2587\u20132603.","journal-title":"Designs, Codes and Cryptography"},{"key":"4490_CR16","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1007\/978-3-030-65277-7_29","volume-title":"Progress in Cryptology-INDOCRYPT 2020: 21st International Conference on Cryptology","author":"A Paul","year":"2020","unstructured":"Paul A, Selvi S S D, and Rangan C P, Efficient attribute-based proxy re-encryption with constant size ciphertexts, Progress in Cryptology-INDOCRYPT 2020: 21st International Conference on Cryptology, Springer International Publishing, Cham, 2020, 644\u2013665."},{"key":"4490_CR17","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-02620-1_23","volume-title":"14th Australasian Conference on Information Security and Privacy","author":"C K Chu","year":"2009","unstructured":"Chu C K, Weng J, Chow S S M, et al., Conditional proxy broadcast re-encryption, 14th Australasian Conference on Information Security and Privacy, Springer Berlin, Heidelberg, 2009, 327\u2013342."},{"issue":"1","key":"4490_CR18","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/TC.2015.2417544","volume":"65","author":"P Xu","year":"2015","unstructured":"Xu P, Jiao T, Wu Q, et al., Conditional identity-based broadcast proxy re-encryption and its application to cloud email, IEEE Transactions on Computers, 2015, 65(1): 66\u201379.","journal-title":"IEEE Transactions on Computers"},{"key":"4490_CR19","doi-asserted-by":"publisher","first-page":"10455","DOI":"10.1007\/s11042-017-4448-9","volume":"77","author":"M Sun","year":"2018","unstructured":"Sun M, Ge C, Fang L, et al., A proxy broadcast re-encryption for cloud data sharing, Multimedia Tools and Applications, 2018, 77): 10455\u201310469.","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"4490_CR20","doi-asserted-by":"publisher","first-page":"1214","DOI":"10.1109\/TDSC.2019.2899300","volume":"18","author":"C Ge","year":"2019","unstructured":"Ge C, Liu Z, Xia J, et al., Revocable identity-based broadcast proxy re-encryption for data sharing in clouds, IEEE Transactions on Dependable and Secure Computing, 2019, 18(3): 1214\u20131226.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"5","key":"4490_CR21","doi-asserted-by":"publisher","first-page":"5610","DOI":"10.1109\/TVT.2020.2982422","volume":"69","author":"S Maiti","year":"2020","unstructured":"Maiti S and Misra S, P2B: Privacy preserving identity-based broadcast proxy re-encryption, IEEE Transactions on Vehicular Technology, 2020, 69(5): 5610\u20135617.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"1","key":"4490_CR22","first-page":"54","volume":"80","author":"M Mambo","year":"1997","unstructured":"Mambo M and Okamoto E, Proxy cryptosystems: Delegation of the power to decrypt ciphertexts, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 1997, 80(1): 54\u201363.","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"4490_CR23","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-981-99-8736-8_7","volume-title":"Advances in Cryptology-ASIACRYPT 2023","author":"Y Zhou","year":"2023","unstructured":"Zhou Y, Liu S, Han S, et al., Fine-grained proxy re-encryption: Definitions and constructions from LWE, Advances in Cryptology-ASIACRYPT 2023, Springer Nature, Singapore, 2023, 199\u2013231."},{"key":"4490_CR24","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-031-57728-4_6","volume-title":"Public-Key Cryptography-PKC 2024","author":"Y Zhou","year":"2024","unstructured":"Zhou Y, Liu S, and Han S, Multi-hop fine-grained proxy re-encryption, Public-Key Cryptography-PKC 2024, Springer Nature, Switzerland, 2024, 161\u2013192."},{"key":"4490_CR25","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/3-540-48329-2_40","volume-title":"Advances in Cryptology-CRYPTO\u2019 93","author":"A Fiat","year":"1994","unstructured":"Fiat A and Naor M, Broadcast encryption, Advances in Cryptology-CRYPTO\u2019 93, Springer Berlin, Heidelberg, 1994, 480\u2013491."},{"key":"4490_CR26","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/11535218_16","volume-title":"Advances in Cryptology-CRYPTO 2005","author":"D Boneh","year":"2005","unstructured":"Boneh D, Gentry C, and Waters B, Collusion resistant broadcast encryption with short ciphertexts and private keys, Advances in Cryptology-CRYPTO 2005, Springer Berlin, Heidelberg, 2005, 258\u2013275."},{"key":"4490_CR27","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-540-76900-2_12","volume-title":"Advances in Cryptology-ASIACRYPT 2007","author":"C Delerabk\u00e9e","year":"2007","unstructured":"Delerabk\u00e9e C, Identity-based broadcast encryption with constant size ciphertexts and private keys, Advances in Cryptology-ASIACRYPT 2007, Springer Berlin, Heidelberg, 2007, 200\u2013215."},{"key":"4490_CR28","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology-CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"Boneh D and Franklin M, Identity-based encryption from the Weil pairing, Advances in Cryptology-CRYPTO 2001, Springer Berlin, Heidelberg, 2001, 213\u2013229."},{"key":"4490_CR29","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1007\/s00145-010-9078-6","volume":"24","author":"D Boneh","year":"2011","unstructured":"Boneh D and Boyen X, Efficient selective identity-based encryption without random oracles, Journal of Cryptology, 2011, 24): 659\u2013693.","journal-title":"Journal of Cryptology"},{"key":"4490_CR30","volume-title":"On the implementation of pairing-based cryptosystems","author":"B Lynn","year":"2014","unstructured":"Lynn B, On the implementation of pairing-based cryptosystems, Available: http:\/\/crypto.stanford.edu\/pbc, Accessed on: May 7, 2014."}],"container-title":["Journal of Systems Science and Complexity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-025-4490-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11424-025-4490-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-025-4490-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T10:45:25Z","timestamp":1749465925000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11424-025-4490-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["4490"],"URL":"https:\/\/doi.org\/10.1007\/s11424-025-4490-z","relation":{},"ISSN":["1009-6124","1559-7067"],"issn-type":[{"value":"1009-6124","type":"print"},{"value":"1559-7067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6]]},"assertion":[{"value":"9 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}