{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:10:19Z","timestamp":1763017819190},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,12,14]],"date-time":"2017-12-14T00:00:00Z","timestamp":1513209600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"NUPTSF","award":["No. 215008"],"award-info":[{"award-number":["No. 215008"]}]},{"name":"National High Technology Research and Development Program (863 Program)","award":["No. 2015AA016007","No. 2015AA011704","No. 2015AA017203"],"award-info":[{"award-number":["No. 2015AA016007","No. 2015AA011704","No. 2015AA017203"]}]},{"name":"Key Program of NSFC","award":["No. U1405255","No. U1135002"],"award-info":[{"award-number":["No. U1405255","No. U1135002"]}]},{"name":"Shaanxi Science Technology Coordination Innovation Project","award":["No. 2016TZC-G-6-3"],"award-info":[{"award-number":["No. 2016TZC-G-6-3"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["No. BDZ011402"],"award-info":[{"award-number":["No. BDZ011402"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61502248"],"award-info":[{"award-number":["No. 61502248"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s12083-017-0626-9","type":"journal-article","created":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T23:58:07Z","timestamp":1513209487000},"page":"979-988","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["EOABS: expressive outsourced attribute-based signature"],"prefix":"10.1007","volume":"11","author":[{"given":"Ruo","family":"Mo","sequence":"first","affiliation":[]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Ximeng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,14]]},"reference":[{"issue":"3","key":"626_CR1","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1109\/TPDS.2012.146","volume":"24","author":"R Lu","year":"2013","unstructured":"Lu R, Lin X, Shen X (2013) SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Trans Parallel Distrib Syst 24(3):614\u2013624","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"1","key":"626_CR2","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1080\/10810730.2013.864735","volume":"20","author":"A Chib","year":"2015","unstructured":"Chib A, van Velthoven M H, Car J. (2015) mHealth adoption in low-resource environments: A review of the use of mobile healthcare in developing countries. J Health Commun 20(1):4\u201334","journal-title":"J Health Commun"},{"key":"626_CR3","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B. (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security (CCS)","DOI":"10.1145\/1180405.1180418"},{"key":"626_CR4","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B. (2007) Ciphertext-policy attribute-based encryption. In: Proceedings of the 28th IEEE symposium on security and privacy (SP)","DOI":"10.1109\/SP.2007.11"},{"key":"626_CR5","doi-asserted-by":"crossref","unstructured":"Maji H K, Prabhakaran M, Rosulek M. (2011) Attribute-based signatures. In: Proceedings of the 11th cryptographers track at the RSA conference (CT-RSA)","DOI":"10.1007\/978-3-642-19074-2_24"},{"key":"626_CR6","doi-asserted-by":"crossref","unstructured":"Li J, Au M H, Susilo W, Xie D, Ren K. (2010) Attribute-based signature and its applications. In: Proceedings of the 5th ACM Symposium on information, computer and communications security (ASIACCS)","DOI":"10.1145\/1755688.1755697"},{"key":"626_CR7","doi-asserted-by":"crossref","unstructured":"Okamoto T, Takashima K. (2011) Efficient attribute-based signatures for non-monotone predicates in the standard model. In: Proceedings of the 14th international conference on public key cryptography (PKC)","DOI":"10.1007\/978-3-642-19379-8_3"},{"key":"626_CR8","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.future.2013.10.016","volume":"33","author":"J Su","year":"2014","unstructured":"Su J, Cao D, Zhao B, Wang X, You I. (2014) ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things. Future Gener Comput Syst 33:11\u201318","journal-title":"Future Gener Comput Syst"},{"issue":"1","key":"626_CR9","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/s10207-015-0289-6","volume":"15","author":"YS Rao","year":"2016","unstructured":"Rao Y S, Dutta R. (2016) Efficient attribute-based signature and signcryption realizing expressive access structures. Int J Inf Secur 15(1):81\u2013109","journal-title":"Int J Inf Secur"},{"issue":"1","key":"626_CR10","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1504\/IJWGS.2015.067161","volume":"11","author":"J Li","year":"2015","unstructured":"Li J, Chen X, Huang X. (2015) New attributeCbased authentication and its application in anonymous cloud access service. Int J Web Grid Serv 11(1):125\u2013141","journal-title":"Int J Web Grid Serv"},{"issue":"4","key":"626_CR11","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust M, Fox A, Griffith R, Joseph A D, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M. (2010) A view of cloud computing. Commun the ACM 53(4):50\u201358","journal-title":"Commun the ACM"},{"issue":"1","key":"626_CR12","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s13174-010-0007-6","volume":"1","author":"Q Zhang","year":"2010","unstructured":"Zhang Q, Cheng L, Boutaba R. (2010) Cloud computing: state-of- the-art and research challenges. J Internet Serv Appl 1(1):7\u201318","journal-title":"J Internet Serv Appl"},{"key":"626_CR13","doi-asserted-by":"crossref","unstructured":"Jakobsson M, Wetzel S (2001) Secure server-aided signature generation. In: Proceedings of the 4th international conference on public key cryptography (PKC)","DOI":"10.1007\/3-540-44586-2_28"},{"issue":"3","key":"626_CR14","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.istr.2012.10.007","volume":"17","author":"SSM Chow","year":"2013","unstructured":"Chow S S M, Au M H, Susilo W (2013) Server-aided signatures verification secure against collusion attack. Inf Secur Tech Rep 17(3):46\u201357","journal-title":"Inf Secur Tech Rep"},{"key":"626_CR15","doi-asserted-by":"crossref","unstructured":"Gentry C. (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41th annual symposium on the theory of computing (STOC","DOI":"10.1145\/1536414.1536440"},{"key":"626_CR16","doi-asserted-by":"crossref","unstructured":"Gennaro R, Gentry C, Parno B. (2010) Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Proceedings of the 30th annual cryptology conference (CRYPTO)","DOI":"10.1007\/978-3-642-14623-7_25"},{"key":"626_CR17","doi-asserted-by":"crossref","unstructured":"Goldwasser S, Kalai Y T, Rothblum G N. (2008) Delegating computation: interactive proofs for muggles. In: Proceedings of the 40th annual ACM symposium on the theory of computing (STOC)","DOI":"10.1145\/1374376.1374396"},{"key":"626_CR18","doi-asserted-by":"crossref","unstructured":"Gentry C, Halevi S. (2011) Implementing Gentrys fully-homomorphic encryption scheme. In: Proceedings of the 30th annual international conference on the theory and applications of cryptographic techniques (EUROCRYPT)","DOI":"10.1007\/978-3-642-20465-4_9"},{"issue":"12","key":"626_CR19","doi-asserted-by":"crossref","first-page":"3285","DOI":"10.1109\/TPDS.2013.2295809","volume":"25","author":"X Chen","year":"2014","unstructured":"Chen X, Li J, Huang X, Li J, Xiang Y. (2014) Secure outsourced attribute-based signatures. IEEE Trans Parallel Distrib Syst 25(12):3285\u20133294","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"626_CR20","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.future.2014.12.001","volume":"52","author":"Z Liu","year":"2015","unstructured":"Liu Z, Yan H, Li Z. (2015) Server-aided anonymous attribute-based authentication in cloud computing. Future Gener Comput Syst 52:61\u201366","journal-title":"Future Gener Comput Syst"},{"key":"626_CR21","doi-asserted-by":"publisher","unstructured":"Li J, Li X, Wang L, He D, Ahmad H, Niu X (2017) Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption. Soft Comput, 1\u20138. https:\/\/doi.org\/10.1007\/s00500-017-2482-1","DOI":"10.1007\/s00500-017-2482-1"},{"key":"626_CR22","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.cose.2016.02.002","volume":"59","author":"Q Li","year":"2016","unstructured":"Li Q, Ma J, Li R, Liu X, Xiong J, Chen D. (2016) Secure, efficient and revocable multi-authority access control system in cloud storage. Comput Secur 59:45\u201359","journal-title":"Comput Secur"},{"key":"626_CR23","doi-asserted-by":"publisher","unstructured":"Jiang Q, Chen Z, Li B, Shen J, Yang L, Ma J (2017) Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. J Ambient Intell Humaniz Comput, 1\u201313. https:\/\/doi.org\/10.1007\/s12652-017-0516-2","DOI":"10.1007\/s12652-017-0516-2"},{"key":"626_CR24","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.compeleceng.2017.03.016","volume":"63","author":"Q Jiang","year":"2017","unstructured":"Jiang Q, Ma J, Yang C, Ma X, Shen J, Chaudhry S A (2017) Efficient end-to-end authentication protocol for wearable health monitoring systems. Comput Electr Eng 63:182\u2013195. https:\/\/doi.org\/10.1016\/j.compeleceng.2017.03.016","journal-title":"Comput Electr Eng"},{"key":"626_CR25","doi-asserted-by":"crossref","first-page":"3376","DOI":"10.1109\/ACCESS.2017.2673239","volume":"5","author":"Q Jiang","year":"2017","unstructured":"Jiang Q, Zeadally S, Ma J, He D. (2017) Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5:3376\u20133392","journal-title":"IEEE Access"},{"key":"626_CR26","unstructured":"Li X, Niu J, Kumari S, Wu F, Choo K K R. (2017) A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city. Future Gener Comput Syst, 1\u201312"},{"key":"626_CR27","doi-asserted-by":"crossref","unstructured":"Li X, Ibrahim M H, Kumari S, Sangaiah A K, Gupta V, Choo K K R. (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw, 1\u201315","DOI":"10.1016\/j.comnet.2017.03.013"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-017-0626-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-017-0626-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-017-0626-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,18]],"date-time":"2020-05-18T18:22:23Z","timestamp":1589826143000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-017-0626-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,14]]},"references-count":27,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["626"],"URL":"https:\/\/doi.org\/10.1007\/s12083-017-0626-9","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12,14]]}}}