{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T01:40:57Z","timestamp":1768527657438,"version":"3.49.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T00:00:00Z","timestamp":1735862400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T00:00:00Z","timestamp":1735862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100018542","name":"Natural Science Foundation of Sichuan Province","doi-asserted-by":"publisher","award":["2023NSFSC1400"],"award-info":[{"award-number":["2023NSFSC1400"]}],"id":[{"id":"10.13039\/501100018542","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018542","name":"Natural Science Foundation of Sichuan Province","doi-asserted-by":"publisher","award":["2023NSFSC1400"],"award-info":[{"award-number":["2023NSFSC1400"]}],"id":[{"id":"10.13039\/501100018542","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019014","name":"Chengdu Municipal Science and Technology Program","doi-asserted-by":"publisher","award":["2021-YF08-00151-GX"],"award-info":[{"award-number":["2021-YF08-00151-GX"]}],"id":[{"id":"10.13039\/501100019014","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019014","name":"Chengdu Municipal Science and Technology Program","doi-asserted-by":"publisher","award":["2021-YF08-00151-GX"],"award-info":[{"award-number":["2021-YF08-00151-GX"]}],"id":[{"id":"10.13039\/501100019014","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s12083-024-01863-z","type":"journal-article","created":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T12:41:35Z","timestamp":1735908095000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Deduplication-enabled CP-ABE with revocation"],"prefix":"10.1007","volume":"18","author":[{"given":"Tiantian","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Zehui","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Shengke","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Minfeng","family":"Shao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,3]]},"reference":[{"key":"1863_CR1","doi-asserted-by":"crossref","unstructured":"Sandhu R, Munawer Q (1998) How to do discretionary access control using roles. In: Proceedings of the Third ACM Workshop on Role-based Access Control, pp. 47\u201354","DOI":"10.1145\/286884.286893"},{"key":"1863_CR2","unstructured":"Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Advances in Cryptology\u2013EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings 24, pp. 457\u2013473. Springer"},{"key":"1863_CR3","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89\u201398","DOI":"10.1145\/1180405.1180418"},{"issue":"4","key":"1863_CR4","first-page":"1","volume":"53","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Deng RH, Xu S, Sun J, Li Q, Zheng D (2020) Attribute-based encryption for cloud computing access control: A survey. ACM Computing Surveys (CSUR) 53(4):1\u201341","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"1863_CR5","doi-asserted-by":"crossref","unstructured":"Tang Z, Zeng S, Han S, Feng Y, Li T, He M (2024) Fuzzy deduplication: Color-aware deduplication for multi-media data. IEEE Transactions on Services Computing 1\u201314","DOI":"10.1109\/TSC.2024.3418351"},{"key":"1863_CR6","doi-asserted-by":"publisher","unstructured":"Cheng S, Tang Z, Zeng S, Cui X, Li T (2024) Pfdup: Practical fuzzy deduplication for encrypted multimedia data. J Ind Inf Integr 40:100613. https:\/\/doi.org\/10.1016\/j.jii.2024.100613","DOI":"10.1016\/j.jii.2024.100613"},{"key":"1863_CR7","doi-asserted-by":"crossref","unstructured":"Zheng H, Zeng S, Li H, Li Z (2024) Secure batch deduplication without dual servers in backup system. IEEE Transactions on Dependable and Secure Computing 1\u201313","DOI":"10.1109\/TDSC.2024.3362796"},{"issue":"01","key":"1863_CR8","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1109\/TDSC.2020.2987793","volume":"19","author":"X Yang","year":"2022","unstructured":"Yang X, Lu R, Shao J, Tang X, Ghorbani AA (2022) Achieving efficient secure deduplication with user-defined access control in cloud. IEEE Trans Dependable Secure Comput 19(01):591\u2013606","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1863_CR9","doi-asserted-by":"publisher","first-page":"52062","DOI":"10.1109\/ACCESS.2020.2980627","volume":"8","author":"X Liu","year":"2020","unstructured":"Liu X, Lu T, He X, Yang X, Niu S (2020) Verifiable attribute-based keyword search over encrypted cloud data supporting data deduplication. IEEE Access 8:52062\u201352074","journal-title":"IEEE Access"},{"issue":"3","key":"1863_CR10","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1109\/TBDATA.2017.2656120","volume":"5","author":"H Cui","year":"2017","unstructured":"Cui H, Deng RH, Li Y, Wu G (2017) Attribute-based storage supporting secure deduplication of encrypted data in cloud. IEEE transactions on big data 5(3):330\u2013342","journal-title":"IEEE transactions on big data"},{"key":"1863_CR11","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/j.ins.2018.02.005","volume":"479","author":"Y Yang","year":"2019","unstructured":"Yang Y, Zheng X, Guo W, Liu X, Chang V (2019) Privacy-preserving smart iot-based healthcare big data storage and self-adaptive access control system. Inf Sci 479:567\u2013592","journal-title":"Inf Sci"},{"key":"1863_CR12","doi-asserted-by":"crossref","unstructured":"Li X, Yang G, Xiang T, Xu S, Zhao B, Pang H, Deng RH (2024) Make revocation cheaper: Hardware-based revocable attribute-based encryption. In: 2024 IEEE Symposium on Security and Privacy (SP), pp. 3109\u20133127. IEEE Computer Society","DOI":"10.1109\/SP54263.2024.00100"},{"key":"1863_CR13","doi-asserted-by":"crossref","unstructured":"Pe\u00f1uelas-Angulo A, Feregrino-Uribe C, Morales-Sandoval M (2023) Revocation in attribute-based encryption for fog-enabled internet of things: A systematic survey. Internet of Things 100827","DOI":"10.1016\/j.iot.2023.100827"},{"key":"1863_CR14","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.ins.2014.10.020","volume":"295","author":"Y Shi","year":"2015","unstructured":"Shi Y, Zheng Q, Liu J, Han Z (2015) Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation. Inf Sci 295:221\u2013231","journal-title":"Inf Sci"},{"key":"1863_CR15","doi-asserted-by":"crossref","unstructured":"Horv\u00e1th M (2015) Attribute-based encryption optimized for cloud computing. In: SOFSEM 2015: Theory and Practice of Computer Science: 41st International Conference on Current Trends in Theory and Practice of Computer Science, Pec Pod Sn\u011b\u017ekou, Czech Republic, January 24-29, 2015. Proceedings 41, pp. 566\u2013577 . Springer","DOI":"10.1007\/978-3-662-46078-8_47"},{"key":"1863_CR16","doi-asserted-by":"crossref","unstructured":"Attrapadung N, Imai H (2009) Conjunctive broadcast and attribute-based encryption. In: Pairing-based Cryptography-pairing, Third International Conference, Palo Alto, Ca, Usa","DOI":"10.1007\/978-3-642-03298-1_16"},{"key":"1863_CR17","doi-asserted-by":"crossref","unstructured":"Sahai A, Seyalioglu H, Waters B (2012) Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Advances in Cryptology\u2013CRYPTO 2012: 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, pp. 199\u2013217. Springer","DOI":"10.1007\/978-3-642-32009-5_13"},{"key":"1863_CR18","doi-asserted-by":"crossref","unstructured":"Dong\u00a0Cui QH (2019) (dual) server-aided revocable attribute-based encryption with decryption key exposure resistance. Information Sciences: An International Journal 490 (2019)","DOI":"10.1016\/j.ins.2019.03.053"},{"key":"1863_CR19","doi-asserted-by":"publisher","first-page":"4746","DOI":"10.1109\/TIFS.2021.3113516","volume":"16","author":"S Xu","year":"2021","unstructured":"Xu S, Ning J, Huang X, Zhou J, Deng RH (2021) Server-aided bilateral access control for secure data sharing with dynamic user groups. IEEE Trans Inf Forensics Secur 16:4746\u20134761","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1863_CR20","doi-asserted-by":"publisher","first-page":"5171","DOI":"10.1109\/TIFS.2023.3305870","volume":"18","author":"G Xu","year":"2023","unstructured":"Xu G, Xu S, Ma J, Ning J, Huang X (2023) An adaptively secure and efficient data sharing system for dynamic user groups in cloud. IEEE Trans Inf Forensics Secur 18:5171\u20135185","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"1863_CR21","doi-asserted-by":"publisher","first-page":"3759","DOI":"10.1109\/TDSC.2021.3106393","volume":"19","author":"S Xu","year":"2022","unstructured":"Xu S, Ning J, Huang X, Li Y, Xu G (2022) Untouchable once revoking: A practical and secure dynamic ehr sharing system via cloud. IEEE Trans Dependable Secure Comput 19(6):3759\u20133773","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1863_CR22","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP\u201907), pp. 321\u2013334 . IEEE","DOI":"10.1109\/SP.2007.11"},{"key":"1863_CR23","doi-asserted-by":"crossref","unstructured":"Huang WB, Su WT (2015) Identity-based access control for digital content based on ciphertext-policy attribute-based encryption. In: 2015 International Conference on Information Networking (ICOIN), pp. 87\u201391. IEEE","DOI":"10.1109\/ICOIN.2015.7057862"},{"issue":"4","key":"1863_CR24","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1109\/TNET.2022.3155110","volume":"30","author":"K Xue","year":"2022","unstructured":"Xue K, He P, Yang J, Xia Q, Wei DS (2022) Scd2: secure content delivery and deduplication with multiple content providers in information centric networking. IEEE\/ACM Trans Networking 30(4):1849\u20131864","journal-title":"IEEE\/ACM Trans Networking"},{"key":"1863_CR25","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.future.2017.10.014","volume":"84","author":"Y Zhou","year":"2018","unstructured":"Zhou Y, Feng D, Hua Y, Xia W, Fu M, Huang F, Zhang Y (2018) A similarity-aware encrypted deduplication scheme with flexible access control in the cloud. Futur Gener Comput Syst 84:177\u2013189","journal-title":"Futur Gener Comput Syst"},{"key":"1863_CR26","doi-asserted-by":"crossref","unstructured":"Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 296\u2013312. Springer","DOI":"10.1007\/978-3-642-38348-9_18"},{"key":"1863_CR27","doi-asserted-by":"crossref","unstructured":"Jahid S, Mittal P, Borisov N (2011) Easier: Encryption-based access control in social networks with efficient revocation. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 411\u2013415","DOI":"10.1145\/1966913.1966970"},{"key":"1863_CR28","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.comcom.2024.05.003","volume":"222","author":"X Tang","year":"2024","unstructured":"Tang X, Guo C, Choo K-KR, Jiang X, Liu Y (2024) A secure and lightweight cloud data deduplication scheme with efficient access control and key management. Comput Commun 222:209\u2013219","journal-title":"Comput Commun"},{"key":"1863_CR29","unstructured":"Beimel A (1996) Secure schemes for secret sharing and key distribution. phd thesis israel institute of technology technion"},{"key":"1863_CR30","doi-asserted-by":"crossref","unstructured":"Rouselakis Y, Waters B (2013) New constructions and proof methods for large universe attribute-based encryption. In: Proceedings of the 13th ACM Conference on Computer and Communications Security","DOI":"10.1145\/2508859.2516672"},{"key":"1863_CR31","unstructured":"Debian Popularity Contest. https:\/\/popcon.debian.org\/stable\/index.html"},{"key":"1863_CR32","unstructured":"Iview I (2010) The Digital Universe Decade - Are You Ready?. http:\/\/viewer.media.bitpipe.com\/938044859_264\/1287663101_75\/Digital-Universe.pdf Accessed May, 2010"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01863-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01863-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01863-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:35:13Z","timestamp":1747474513000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01863-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,3]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["1863"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01863-z","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,3]]},"assertion":[{"value":"15 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We confirm that there are no conflicts of interest associated with thsubmission of this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest\/Competing interests"}},{"value":"All authors read and approved the final manuscript.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"All authors consent to participate and publish.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate and publish"}}],"article-number":"9"}}