{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:41:41Z","timestamp":1765622501931,"version":"3.48.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s12083-025-02106-5","type":"journal-article","created":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T11:51:30Z","timestamp":1759578690000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Quantum-resistant traceable, revocable, and key escrow-free CP-ABE for cloud storage"],"prefix":"10.1007","volume":"18","author":[{"given":"Sravya","family":"Gudipati","sequence":"first","affiliation":[]},{"given":"Syam\u00a0kumar","family":"Pasupuleti","sequence":"additional","affiliation":[]},{"given":"Padmavathy","family":"R","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,4]]},"reference":[{"key":"2106_CR1","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In 2007 IEEE symposium on security and privacy (SP\u201907), IEEE, pp 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"key":"2106_CR2","doi-asserted-by":"crossref","unstructured":"Cheung L, Newport C (2007) Provably secure ciphertext policy abe. In Proceedings of the 14th ACM conference on cand communications security, pp 456\u2013465","DOI":"10.1145\/1315245.1315302"},{"key":"2106_CR3","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1007\/978-3-540-70583-3_47","volume":"5126","author":"V Goyal","year":"2008","unstructured":"Goyal V, Jain A, Pandey O, Sahai A (2008) Bounded ciphertext policy attribute based encryption. Lect Notes Comput Sci 5126:579\u2013591","journal-title":"Lect Notes Comput Sci"},{"key":"2106_CR4","doi-asserted-by":"crossref","unstructured":"Herranz J, Laguillaumie F, R\u00e0fols C (2010) Constant size ciphertexts in threshold attribute-based encryption. In Public key cryptography\u2013PKC 2010: 13th International conference on practice and theory in public key cryptography, Paris, France, May 26-28, 2010. Proceedings 13, Springer, pp 19\u201334","DOI":"10.1007\/978-3-642-13013-7_2"},{"issue":"1","key":"2106_CR5","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1007\/s11227-021-03867-5","volume":"78","author":"H Shengzhou","year":"2022","unstructured":"Shengzhou H, Wang X, He H, Zhong T (2022) Complex and flexible data access policy in attribute-based encryption. J Supercomput 78(1):1010\u20131029","journal-title":"J Supercomput"},{"key":"2106_CR6","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.compeleceng.2016.11.028","volume":"57","author":"R Ahuja","year":"2017","unstructured":"Ahuja R, Mohanty SK, Sakurai K (2017) A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing. Comput Electr Eng 57:241\u2013256","journal-title":"Comput Electr Eng"},{"key":"2106_CR7","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.csi.2016.05.002","volume":"54","author":"V Odelu","year":"2017","unstructured":"Odelu V, Das AK, Rao YS, Kumari S, Khan MK, Choo KKR (2017) Pairing-based cp-abe with constant-size ciphertexts and secret keys for cloud environment. Comput Stand Interfaces 54:3\u20139","journal-title":"Comput Stand Interfaces"},{"key":"2106_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2022.103696","volume":"84","author":"H Wang","year":"2023","unstructured":"Wang H, Liang J, Ding Y, Tang S, Wang Y (2023) Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health. Comput Stand Interfaces 84:103696","journal-title":"Comput Stand Interfaces"},{"issue":"1","key":"2106_CR9","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1109\/TC.2020.3043950","volume":"71","author":"N Chen","year":"2020","unstructured":"Chen N, Li J, Zhang Y, Guo Y (2020) Efficient cp-abe scheme with shared decryption in cloud storage. IEEE Trans Comput 71(1):175\u2013184","journal-title":"IEEE Trans Comput"},{"issue":"1","key":"2106_CR10","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/TIFS.2012.2223683","volume":"8","author":"Z Liu","year":"2012","unstructured":"Liu Z, Cao Z, Wong DS (2012) White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures. IEEE Trans Inf Forens Secur 8(1):76\u201388","journal-title":"IEEE Trans Inf Forens Secur"},{"issue":"5","key":"2106_CR11","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1109\/TDSC.2016.2608343","volume":"15","author":"J Ning","year":"2016","unstructured":"Ning J, Cao Z, Dong X, Wei L (2016) White-box traceable cp-abe for cloud storage service: how to catch people leaking their access credentials effectively. IEEE Trans Dependable Secure Comput 15(5):883\u2013897","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"2","key":"2106_CR12","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1109\/TCC.2020.2975184","volume":"10","author":"J Li","year":"2020","unstructured":"Li J, Zhang Y, Ning J, Huang X, Poh GS, Wang D (2020) Attribute based encryption with privacy protection and accountability for cloudiot. IEEE Trans Cloud Comput 10(2):762\u2013773","journal-title":"IEEE Trans Cloud Comput"},{"issue":"6","key":"2106_CR13","doi-asserted-by":"publisher","first-page":"10441","DOI":"10.1109\/JIOT.2023.3325996","volume":"11","author":"S Chen","year":"2023","unstructured":"Chen S, Li J, Zhang Y, Han J (2023) Efficient revocable attribute-based encryption with verifiable data integrity. IEEE Internet Things J 11(6):10441\u201310451","journal-title":"IEEE Internet Things J"},{"key":"2106_CR14","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.ins.2022.03.081","volume":"600","author":"R Zhang","year":"2022","unstructured":"Zhang R, Li J, Yang L, Han J, Zhang Y (2022) Key escrow-free attribute based encryption with user revocation. Inf Sci 600:59\u201372","journal-title":"Inf Sci"},{"key":"2106_CR15","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1016\/j.future.2017.09.045","volume":"93","author":"Z Liu","year":"2019","unstructured":"Liu Z, Duan S, Zhou P, Wang B (2019) Traceable-then-revocable ciphertext-policy attribute-based encryption scheme. Futur Gener Comput Syst 93:903\u2013913","journal-title":"Futur Gener Comput Syst"},{"issue":"1","key":"2106_CR16","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/TDSC.2020.2977646","volume":"19","author":"D Han","year":"2020","unstructured":"Han D, Pan N, Li KC (2020) A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection. IEEE Trans Dependable Secure Comput 19(1):316\u2013327","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"15","key":"2106_CR17","doi-asserted-by":"publisher","first-page":"16859","DOI":"10.1007\/s11227-023-05322-z","volume":"79","author":"H Huang","year":"2023","unstructured":"Huang H, Zhang H, Zhao Z, Zhang S (2023) A traceable and verifiable cp-abe scheme with blockchain in vanet. J Supercomput 79(15):16859\u201316883","journal-title":"J Supercomput"},{"key":"2106_CR18","volume":"61","author":"M Bouchaala","year":"2021","unstructured":"Bouchaala M, Ghazel C, Saidane LA (2021) Trak-cpabe: a novel traceable, revocable and accountable ciphertext-policy attribute-based encryption scheme in cloud computing. J Inf Secur Appl 61:102914","journal-title":"J Inf Secur Appl"},{"issue":"2","key":"2106_CR19","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor PW (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev 41(2):303\u2013332","journal-title":"SIAM Rev"},{"issue":"6","key":"2106_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1568318.1568324","volume":"56","author":"O Regev","year":"2009","unstructured":"Regev O (2009) On lattices, learning with errors, random linear codes, and cryptography. J ACM (JACM) 56(6):1\u201340","journal-title":"J ACM (JACM)"},{"issue":"6","key":"2106_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2535925","volume":"60","author":"V Lyubashevsky","year":"2013","unstructured":"Lyubashevsky V, Peikert C, Regev O (2013) On ideal lattices and learning with errors over rings. J ACM (JACM) 60(6):1\u201335","journal-title":"J ACM (JACM)"},{"key":"2106_CR22","unstructured":"Wang Y, Wang M (2019) Module-lwe versus ring-lwe, revisited. Cryptology ePrint Arch"},{"key":"2106_CR23","doi-asserted-by":"crossref","unstructured":"Zhang J, Zhang Z (2012) A ciphertext policy attribute-based encryption scheme without pairings. In Information Security and Cryptology: 7th International conference, Inscrypt 2011, Beijing, China, November 30\u2013December 3, 2011. Revised Selected Papers 7, Springer, pp 324\u2013340","DOI":"10.1007\/978-3-642-34704-7_23"},{"issue":"6","key":"2106_CR24","first-page":"444","volume":"16","author":"Y Wang","year":"2014","unstructured":"Wang Y (2014) Lattice ciphertext policy attribute-based encryption in the standard model. Int J Netw Secur 16(6):444\u2013451","journal-title":"Int J Netw Secur"},{"key":"2106_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102318","volume":"107","author":"E Chen","year":"2021","unstructured":"Chen E, Zhu Y, Zhu G, Liang K, Feng R (2021) How to implement secure cloud file sharing using optimized attribute-based access control with small policy matrix and minimized cumulative errors. Comput Secur 107:102318","journal-title":"Comput Secur"},{"issue":"3","key":"2106_CR26","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.1109\/TSC.2023.3321378","volume":"17","author":"M Yang","year":"2024","unstructured":"Yang M, Wang H, Wan Z (2024) Pul-abe: an efficient and quantum-resistant CP-ABE with policy update in cloud storage. IEEE Trans Serv Comput 17(3):1126\u20131139","journal-title":"IEEE Trans Serv Comput"},{"issue":"4","key":"2106_CR27","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1109\/TC.2018.2874479","volume":"68","author":"KD G\u00fcr","year":"2018","unstructured":"G\u00fcr KD, Polyakov Y, Rohloff K, Ryan GW, Sajjadpour H, Sava\u015f E (2018) Practical applications of improved gaussian sampling for trapdoor lattices. IEEE Trans Comput 68(4):570\u2013584","journal-title":"IEEE Trans Comput"},{"issue":"2","key":"2106_CR28","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1109\/TSC.2020.2973256","volume":"15","author":"S Zhao","year":"2020","unstructured":"Zhao S, Jiang R, Bhargava B (2020) Rl-abe: a revocable lattice attribute based encryption scheme based on r-lwe problem in cloud storage. IEEE Trans Serv Comput 15(2):1026\u20131035","journal-title":"IEEE Trans Serv Comput"},{"key":"2106_CR29","doi-asserted-by":"crossref","unstructured":"Bagchi P, Bera B, Maheshwari R, Das AK, Yau DKY, Sikdar B (2023) An efficient and secure post-quantum multi-authority ciphertext-policy attribute-based encryption method using lattice. In IEEE INFOCOM 2023 - IEEE conference on computer communications workshops (INFOCOM WKSHPS), pp 1\u20136","DOI":"10.1109\/INFOCOMWKSHPS57453.2023.10225757"},{"key":"2106_CR30","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2025.3552021","author":"P Bagchi","year":"2025","unstructured":"Bagchi P, Bisht A, Das AK, Saxena N, Hossain MS (2025) Designing quantum-safe lattice-based multi-authority cp-abe scheme for blockchain-enabled iot-based consumer healthcare electronics. IEEE Trans Consum Electron. https:\/\/doi.org\/10.1109\/TCE.2025.3552021","journal-title":"IEEE Trans Consum Electron"},{"issue":"1\u20132","key":"2106_CR31","first-page":"41","volume":"26","author":"M He","year":"2025","unstructured":"He M, Helil N (2025) A lattice-based CP-ABE scheme with immediate attribute revocation. Int J Inf Comput Secur 26(1\u20132):41\u201367","journal-title":"Int J Inf Comput Secur"},{"key":"2106_CR32","volume":"82","author":"YF Yao","year":"2024","unstructured":"Yao YF, Chen HY, Gao Y, Wang K, Hao-Yang Y (2024) A decentralized multi-authority cp-abe scheme from lwe. J Inf Secur Appl 82:103752","journal-title":"J Inf Secur Appl"},{"key":"2106_CR33","doi-asserted-by":"crossref","unstructured":"Sravya G, Kumar PS, Padmavathy R (2023) Secure lattice-based ciphertext-policy attribute-based encryption from module-lwe for cloud storage. In 2023 IEEE 16th international conference on cloud computing (CLOUD), IEEE, pp 554\u2013556","DOI":"10.1109\/CLOUD60044.2023.00074"},{"key":"2106_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2025.108092","author":"Y Pan","year":"2025","unstructured":"Pan Y, Jin R, Liu Y, Zhang L (2025) Efficient post-quantum attribute-based access control scheme for blockchain-empowered metaverse data management. Comput Commun. https:\/\/doi.org\/10.1016\/j.comcom.2025.108092","journal-title":"Comput Commun"},{"key":"2106_CR35","doi-asserted-by":"crossref","unstructured":"Meng F (2020) Directly revocable ciphertext-policy attribute-based encryption from lattices. Cryptology ePrint Archive","DOI":"10.1155\/2020\/1460531"},{"issue":"1","key":"2106_CR36","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1186\/s13677-023-00414-w","volume":"12","author":"B Huang","year":"2023","unstructured":"Huang B, Gao J, Li X (2023) Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing. J Cloud Comput 12(1):37","journal-title":"J Cloud Comput"},{"key":"2106_CR37","doi-asserted-by":"crossref","unstructured":"Pellet-Mary A, Hanrot G, Stehl\u00e9 D (2019) Approx-svp in ideal lattices with pre-processing. In Advances in Cryptology\u2013EUROCRYPT 2019: 38th Annual international conference on the theory and applications of cryptographic techniques, Darmstadt, Germany, May 19\u201323, 2019, Proceedings, Part II 38, Springer, pp 685\u2013716","DOI":"10.1007\/978-3-030-17656-3_24"},{"key":"2106_CR38","first-page":"411","volume-title":"How (not) to instantiate ring-lwe","author":"C Peikert","year":"2016","unstructured":"Peikert C (2016) How (not) to instantiate ring-lwe. Springer, In International conference on security and cryptography for networks, pp 411\u2013430"},{"key":"2106_CR39","first-page":"147","volume-title":"Lattice-based cryptography","author":"D Micciancio","year":"2009","unstructured":"Micciancio D, Regev O (2009) Lattice-based cryptography. Springer, In Post-quantum cryptography, pp 147\u2013191"},{"key":"2106_CR40","doi-asserted-by":"crossref","unstructured":"Bos J, Ducas L, Kiltz E, Lepoint T, Lyubashevsky V, Schanck JM, Schwabe P, Seiler G, Stehl\u00e9 D (2018) Crystals-kyber: A cca-secure module-lattice-based kem. In 2018 IEEE European symposium on security and privacy (EuroS &P), IEEE, pp 353\u2013367","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"2106_CR41","first-page":"213","volume-title":"Lattice reduction for modules, or how to reduce modulesvp to modulesvp","author":"T Mukherjee","year":"2020","unstructured":"Mukherjee T, Stephens-Davidowitz N (2020) Lattice reduction for modules, or how to reduce modulesvp to modulesvp. Springer, In annual international cryptology conference, pp 213\u2013242"},{"key":"2106_CR42","unstructured":"Beimel A et\u00a0al (1996) Secure schemes for secret sharing and key distribution"},{"key":"2106_CR43","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2024.i1.527-562","author":"A Mukherjee","year":"2023","unstructured":"Mukherjee A, Aikata A, Mert AC, Lee Y, Kwon S, Deryabin M, Roy SS (2023) Modhe: modular homomorphic encryption using module lattices: potentials and limitations. IACR Transactions on Cryptographic Hardware and Embedded Systems. https:\/\/doi.org\/10.46586\/tches.v2024.i1.527-562","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"2106_CR44","doi-asserted-by":"crossref","unstructured":"Ducas L, Kiltz E, Lepoint T, Lyubashevsky V, Schwabe P, Seiler G, Stehl\u00e9 D (2018) Crystals-dilithium: A lattice-based digital signature scheme. IACR Trans Cryptograph Hardw Embedded Sys 238\u2013268","DOI":"10.46586\/tches.v2018.i1.238-268"},{"key":"2106_CR45","doi-asserted-by":"crossref","unstructured":"Bert P, Eberhart G, Prabel L, Roux-Langlois A, Sabt M (2021) Implementation of lattice trapdoors on modules and applications. In Post-quantum cryptography: 12th International workshop, PQCrypto 2021, Daejeon, South Korea, July 20\u201322, 2021, Proceedings 12, Springer, pp 195\u2013214","DOI":"10.1007\/978-3-030-81293-5_11"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02106-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02106-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02106-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:37:22Z","timestamp":1765622242000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02106-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":45,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2106"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02106-5","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,10]]},"assertion":[{"value":"26 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Yes.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}],"article-number":"292"}}