{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T02:55:29Z","timestamp":1769914529364,"version":"3.49.0"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"7-8","license":[{"start":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T00:00:00Z","timestamp":1546992000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No.61502248"],"award-info":[{"award-number":["No.61502248"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No. 61427801"],"award-info":[{"award-number":["No. 61427801"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"crossref","award":["No. 2018M632350"],"award-info":[{"award-number":["No. 2018M632350"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["u1405255"],"award-info":[{"award-number":["u1405255"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872192"],"award-info":[{"award-number":["61872192"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20181394"],"award-info":[{"award-number":["BK20181394"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s12243-018-00702-6","type":"journal-article","created":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T04:21:54Z","timestamp":1547007714000},"page":"389-400","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Fine-grained multi-authority access control in IoT-enabled mHealth"],"prefix":"10.1007","volume":"74","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7280-7378","authenticated-orcid":false,"given":"Qi","family":"Li","sequence":"first","affiliation":[]},{"given":"Hongbo","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Jinbo","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Ruo","family":"Mo","sequence":"additional","affiliation":[]},{"given":"Zuobin","family":"Ying","sequence":"additional","affiliation":[]},{"given":"Huaqun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,9]]},"reference":[{"key":"702_CR1","first-page":"13","volume":"2016","author":"C Hahn","year":"2016","unstructured":"Hahn C, Kwon H, Hur J (2016) Efficient attribute-based secure data sharing with hidden policies and traceability in mobile health networks. Mob Inf Syst 2016:13","journal-title":"Mob Inf Syst"},{"issue":"4","key":"702_CR2","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","volume":"10","author":"LD Xu","year":"2014","unstructured":"Xu LD, He W, Li S (2014) Internet of things in industries: a survey. IEEE Trans Ind Inf 10(4):2233\u20132243","journal-title":"IEEE Trans Ind Inf"},{"key":"702_CR3","doi-asserted-by":"publisher","unstructured":"Wu D, Shi H, Wang H, Wang R, Fang H (2018) A feature-based learning system for internet of things applications. IEEE Internet Things J 1\u20131. \n                    https:\/\/doi.org\/10.1109\/JIOT.2018.2884485","DOI":"10.1109\/JIOT.2018.2884485"},{"key":"702_CR4","doi-asserted-by":"publisher","unstructured":"Xiong J, Ren J, Chen L et al (2018) Enhancing privacy and availability for data clustering in intelligent electrical service of iot. IEEE Internet Things J 1\u201310. \n                    https:\/\/doi.org\/10.1109\/JIOT.2018.2842773","DOI":"10.1109\/JIOT.2018.2842773"},{"issue":"2","key":"702_CR5","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.eij.2016.11.001","volume":"18","author":"S Al-Janabi","year":"2017","unstructured":"Al-Janabi S, Al-Shourbaji I, Shojafar M, Shamshirband S (2017) Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egyptian Inf J 18(2):113\u2013122","journal-title":"Egyptian Inf J"},{"key":"702_CR6","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.ins.2018.06.018","volume":"462","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Deng RH, Liu X, Zheng D (2018) Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf Sci 462:262\u2013277","journal-title":"Inf Sci"},{"key":"702_CR7","doi-asserted-by":"publisher","first-page":"37644","DOI":"10.1109\/ACCESS.2018.2850050","volume":"7","author":"YL Yang","year":"2018","unstructured":"Yang YL, Liu R, Chen YL, Li T, Tang Y (2018) Normal cloud model-based algorithm for multi-attribute trusted cloud service selection. IEEE Access 7:37644\u201337652","journal-title":"IEEE Access"},{"key":"#cr-split#-702_CR8.1","doi-asserted-by":"crossref","unstructured":"Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer R","DOI":"10.1007\/11426639_27"},{"key":"#cr-split#-702_CR8.2","unstructured":"(ed) Advances in cryptology - EUROCRYPT 2005, Lecture Notes in Computer Science, vol 3494. Springer, Berlin, pp 457-473"},{"key":"702_CR9","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, CCS \u201906. ACM, New York, pp 89\u2013 98","DOI":"10.1145\/1180405.1180418"},{"key":"702_CR10","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy, 2007. SP \u201907, pp 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"key":"702_CR11","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.ins.2016.04.015","volume":"379","author":"Y Zhang","year":"2017","unstructured":"Zhang Y, Chen X, Li J, Wong DS, Li H, You I (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42\u2013 61","journal-title":"Inf Sci"},{"key":"702_CR12","doi-asserted-by":"crossref","unstructured":"Chase M (2007) Multi-authority attribute based encryption. In: Vadhan S (ed) Theory of cryptography. Lecture Notes in Computer Science, vol 4392. Springer, Berlin, pp 515\u2013534","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"702_CR13","doi-asserted-by":"crossref","unstructured":"Chase M, Chow SS (2009) Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM conference on computer and communications security, CCS \u201909. ACM, New York, pp 121\u2013130","DOI":"10.1145\/1653662.1653678"},{"key":"702_CR14","doi-asserted-by":"crossref","unstructured":"Liu Z, Cao Z, Huang Q, Wong D, Yuen T (2011) Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles. In: Atluri V, Diaz C (eds) Computer security \u2013 ESORICS 2011. Lecture Notes in Computer Science, vol 6879. Springer, Berlin, pp 278\u2013297","DOI":"10.1007\/978-3-642-23822-2_16"},{"issue":"3","key":"702_CR15","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1002\/sec.997","volume":"8","author":"Q Li","year":"2015","unstructured":"Li Q, Ma J, Li R, Xiong J, Liu X (2015) Large universe decentralized key-policy attribute-based encryption. Secur Commun Netw 8(3):501\u2013509","journal-title":"Secur Commun Netw"},{"issue":"18","key":"702_CR16","doi-asserted-by":"publisher","first-page":"4098","DOI":"10.1002\/sec.1326","volume":"8","author":"Q Li","year":"2015","unstructured":"Li Q, Ma J, Li R, Xiong J, Liu X (2015) Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption. Secur Commun Netw 8(18):4098\u20134109","journal-title":"Secur Commun Netw"},{"issue":"4","key":"702_CR17","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1109\/TIFS.2016.2647222","volume":"12","author":"K Xue","year":"2017","unstructured":"Xue K, Xue Y, Hong J, Li W, Yue H, Wei DSL, Hong P (2017) Raac: robust and auditable access control with multiple attribute authorities for public cloud storage. IEEE Trans Inf Forensics Secur 12(4):953\u2013967","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"702_CR18","unstructured":"Green M, Hohenberger S, Waters B (2011) Outsourcing the decryption of abe ciphertexts. In: Proceedings of the 20th USENIX conference on security, SEC\u201911. USENIX Association, Berkeley, pp 34\u201334"},{"issue":"8","key":"702_CR19","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1109\/TIFS.2013.2271848","volume":"8","author":"J Lai","year":"2013","unstructured":"Lai J, Deng R, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343\u20131354","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"99","key":"702_CR20","first-page":"1","volume":"PP","author":"J Li","year":"2017","unstructured":"Li J, Wang Y, Zhang Y, Han J (2017) Full verifiability for outsourced decryption in attribute based encryption. IEEE Trans Serv Comput PP(99):1\u20131","journal-title":"IEEE Trans Serv Comput"},{"issue":"1","key":"702_CR21","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/TIFS.2017.2738601","volume":"13","author":"J Ning","year":"2018","unstructured":"Ning J, Cao Z, Dong X, Liang K, Ma H, Wei L (2018) Auditable \u03c3 -time outsourced attribute-based encryption for access control in cloud computing. IEEE Trans Inf Forensics Secur 13(1):94\u2013 105","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"#cr-split#-702_CR22.1","doi-asserted-by":"crossref","unstructured":"Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert H","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"#cr-split#-702_CR22.2","unstructured":"(ed) Advances in cryptology - EUROCRYPT 2010. Lecture Notes in Computer Science, vol 6110. Springer, Berlin, pp 62-91"},{"key":"702_CR23","doi-asserted-by":"crossref","unstructured":"Lewko A, Waters B (2011) Decentralizing attribute-based encryption. Advances in Cryptology \u2013 EUROCRYPT 2011. Lecture Notes in Computer Science, vol 6632. In: Paterson K (ed). Springer, Berlin, pp 568\u2013588","DOI":"10.1007\/978-3-642-20465-4_31"},{"issue":"3","key":"702_CR24","doi-asserted-by":"publisher","first-page":"2130","DOI":"10.1109\/JIOT.2018.2825289","volume":"5","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Zheng D, Deng RH (2018) Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet Things J 5(3):2130\u20132145","journal-title":"IEEE Internet Things J"},{"key":"702_CR25","doi-asserted-by":"crossref","unstructured":"Li J, Huang Q, Chen X, Chow SSM, Wong DS, Xie D (2011) Multi-authority ciphertext-policy attribute-based encryption with accountability. In: Proceedings of the 6th ACM symposium on information, computer and communications security, ASIACCS \u201911. ACM, New York, pp 386\u2013390","DOI":"10.1145\/1966913.1966964"},{"issue":"7","key":"702_CR26","doi-asserted-by":"publisher","first-page":"1384","DOI":"10.1109\/TIFS.2015.2410137","volume":"10","author":"B Qin","year":"2015","unstructured":"Qin B, Deng RH, Liu S, Ma S (2015) Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 10(7):1384\u20131393","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"702_CR27","doi-asserted-by":"crossref","unstructured":"Gao C, Lv S, Wei Y, Wang Z, Liu Z, Cheng X (2018) M-sse: an effective searchable symmetric encryption with enhanced security for mobile devices. IEEE Access 1\u20131","DOI":"10.1109\/ACCESS.2018.2852329"},{"key":"702_CR28","unstructured":"Wang X, Zhang Y, Zhu H, Jiang L (2018) An identity-based signcryption on lattice without trapdoor. J Univ Comput Sci 1\u20131"},{"issue":"2","key":"702_CR29","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TC.2013.208","volume":"64","author":"J Li","year":"2015","unstructured":"Li J, Li J, Chen X, Jia C, Lou W (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425\u2013437","journal-title":"IEEE Trans Comput"},{"key":"702_CR30","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.ins.2018.02.058","volume":"444","author":"C Gao","year":"2018","unstructured":"Gao C, Cheng Q, He P, Susilo W, Li J (2018) Privacy-preserving naive bayes classifiers secure against the substitution-then-comparison attack. Inf Sci 444:72\u201388","journal-title":"Inf Sci"},{"key":"702_CR31","doi-asserted-by":"publisher","first-page":"31918","DOI":"10.1109\/ACCESS.2018.2840119","volume":"6","author":"Z Yu","year":"2018","unstructured":"Yu Z, Gao CZ, Jing Z, Gupta BB, Cai Q (2018) A practical public key encryption scheme based on learning parity with noise. IEEE Access 6:31918\u201331923","journal-title":"IEEE Access"},{"issue":"5","key":"702_CR32","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1109\/TPDS.2014.2318320","volume":"26","author":"J Li","year":"2015","unstructured":"Li J, Li YK, Chen X, Lee PPC, Lou W (2015) A hybrid cloud approach for secure authorized deduplication. IEEE Trans Parallel Distrib Syst 26(5):1206\u20131216","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"702_CR33","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.jnca.2017.12.017","volume":"106","author":"L Yang","year":"2018","unstructured":"Yang L, Han Z, Huang Z, Ma J (2018) A remotely keyed file encryption scheme under mobile cloud computing. J Netw Comput Appl 106:90\u201399","journal-title":"J Netw Comput Appl"},{"issue":"99","key":"702_CR34","first-page":"1","volume":"PP","author":"H Wang","year":"2017","unstructured":"Wang H, He D, Han J (2017) Vod-adac: anonymous distributed fine-grained access control protocol with verifiable outsourced decryption in public cloud. IEEE Trans Serv Comput PP(99):1\u20131","journal-title":"IEEE Trans Serv Comput"},{"key":"702_CR35","doi-asserted-by":"publisher","unstructured":"Wang H, He D, Yu J, Wang Z (2018) Incentive and unconditionally anonymous identity-based public provable data possession. IEEE Trans Serv Comput. \n                    https:\/\/doi.org\/10.1109\/TSC.2016.2633260","DOI":"10.1109\/TSC.2016.2633260"},{"key":"702_CR36","doi-asserted-by":"crossref","unstructured":"Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, pp 1\u20139","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"702_CR37","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.cose.2016.02.002","volume":"59","author":"Q Li","year":"2016","unstructured":"Li Q, Ma J, Li R, Liu X, Xiong J, Chen D (2016) Secure, efficient and revocable multi-authority access control system in cloud storage. Comput Secur 59:45\u201359","journal-title":"Comput Secur"},{"issue":"8","key":"702_CR38","doi-asserted-by":"publisher","first-page":"3610","DOI":"10.1109\/TII.2017.2751640","volume":"14","author":"Y Yang","year":"2017","unstructured":"Yang Y, Liu X, Deng RH (2017) Lightweight break-glass access control system for healthcare internet-of-things. IEEE Trans Ind Inf 14(8):3610\u20133617","journal-title":"IEEE Trans Ind Inf"},{"issue":"8","key":"702_CR39","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1109\/TPDS.2013.271","volume":"25","author":"J Li","year":"2014","unstructured":"Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201\u20132210","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"3","key":"702_CR40","doi-asserted-by":"publisher","first-page":"2385","DOI":"10.1007\/s10586-016-0701-7","volume":"20","author":"H Wang","year":"2017","unstructured":"Wang H, Zheng Z, Wu L, Li P (2017) New directly revocable attribute-based encryption scheme and its application in cloud storage environment. Clust Comput 20(3):2385\u2013 2392","journal-title":"Clust Comput"},{"key":"702_CR41","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.jnca.2018.03.006","volume":"112","author":"J Li","year":"2018","unstructured":"Li J, Chen X, Chow SS, Huang Q, Wong DS, Liu Z (2018) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89\u2013 96","journal-title":"J Netw Comput Appl"},{"key":"702_CR42","unstructured":"Beimel A (1996) Secure schemes for secret sharing and key distribution. DSc dissertation"},{"key":"702_CR43","first-page":"53","volume-title":"Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization","author":"B Waters","year":"2011","unstructured":"Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Springer, Berlin, pp 53\u201370"},{"issue":"9","key":"702_CR44","doi-asserted-by":"publisher","first-page":"2939","DOI":"10.1109\/TC.2015.2510646","volume":"65","author":"Y Rahulamathavan","year":"2016","unstructured":"Rahulamathavan Y, Veluru S, Han J, Li F, Rajarajan M, Lu R (2016) User collusion avoidance scheme for privacy-preserving decentralized key-policy attribute-based encryption. IEEE Trans Comput 65(9):2939\u20132946","journal-title":"IEEE Trans Comput"},{"key":"702_CR45","unstructured":"De Caro A, Iovino V (2011) jpbc: Java pairing based cryptography. In: Proceedings of the 16th IEEE symposium on computers and communications, ISCC 2011, Kerkyra, Corfu, Greece, June 28\u2013July 1, pp 850\u2013855"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-018-00702-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-018-00702-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-018-00702-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T19:12:28Z","timestamp":1578510748000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-018-00702-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,9]]},"references-count":47,"journal-issue":{"issue":"7-8","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["702"],"URL":"https:\/\/doi.org\/10.1007\/s12243-018-00702-6","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,9]]},"assertion":[{"value":"10 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}