{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:38:50Z","timestamp":1763642330241,"version":"3.41.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,12,29]],"date-time":"2017-12-29T00:00:00Z","timestamp":1514505600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1007\/s12652-017-0658-2","type":"journal-article","created":{"date-parts":[[2017,12,29]],"date-time":"2017-12-29T08:05:05Z","timestamp":1514534705000},"page":"429-438","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation"],"prefix":"10.1007","volume":"10","author":[{"given":"Jindan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Baocang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Fatos","family":"Xhafa","sequence":"additional","affiliation":[]},{"given":"Xu An","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Cong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,29]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Angelo DC, Vincenz I (2011) jPBC: java pairing based cryptography. In: Proceeding of the 16th IEEE symposium on computers and communications, ISCC 2011, pp 850\u2013855 URL: http:\/\/gas.dia.unisa.it\/projects\/jpbc\/","key":"658_CR1","DOI":"10.1109\/ISCC.2011.5983948"},{"key":"658_CR2","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/978-3-642-55220-5_31","volume-title":"EUROCRYPT 2014","author":"N Attrapadung","year":"2014","unstructured":"Attrapadung N (2014) Dual system encryption via doubly selective security framework fully secure functional encryption for regular languages and more. In: Nguyen PQ, Oswald E (eds) EUROCRYPT 2014, vol 8441. Springer, LNCS, New York, pp 557\u2013577. https:\/\/doi.org\/10.1007\/978-3-642-55220-5_31"},{"key":"658_CR3","first-page":"248","volume-title":"PAIRING 2009","author":"N Attrapadung","year":"2009","unstructured":"Attrapadung N, Imai H (2009a) Conjunctive broadcast and attribute-based encryption. In: Shacham H, Waters B (eds) PAIRING 2009, vol 5671. Springer, LNCS, New York, pp 248\u2013265"},{"key":"658_CR4","first-page":"168","volume-title":"ACNS 09","author":"N Attrapadung","year":"2009","unstructured":"Attrapadung N, Imai H (2009b) Dual-policy attribute based encryption. In: Abdalla M, Pointcheval D, Fouque PA, Vergnaud D (eds) ACNS 09, vol 5536. Springer, LNCS, New York, pp 168\u2013185"},{"doi-asserted-by":"crossref","unstructured":"Attrapadung N, Libert B, de\u00a0Panafieu E (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: Catalano D, Fazio N, Gennaro R, Nicolosi A (eds) (2011), pp 90\u2013108","key":"658_CR5","DOI":"10.1007\/978-3-642-19379-8_6"},{"volume-title":"CRYPTO 2013, Part II","year":"2013","unstructured":"Canetti R, Garay JA (eds) (2013) CRYPTO 2013, Part II, vol 8043. Springer, LNCS, New York","key":"658_CR7"},{"volume-title":"PKC 2011","year":"2011","unstructured":"Catalano D, Fazio N, Gennaro R, Nicolosi A (eds) (2011) PKC 2011, vol 6571. Springer, LNCS, New York","key":"658_CR8"},{"key":"658_CR9","first-page":"515","volume-title":"TCC 2007","author":"M Chase","year":"2007","unstructured":"Chase M (2007) Multi-authority attribute based encryption. In: Vadhan SP (ed) TCC 2007, vol 4392. Springer, LNCS, New York, pp 515\u2013534"},{"key":"658_CR10","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1145\/1653662.1653678","volume-title":"ACM CCS 09","author":"M Chase","year":"2009","unstructured":"Chase M, Chow SSM (2009) Improving privacy and security in multi-authority attribute-based encryption. In: Al-Shaer E, Jha S, Keromytis AD (eds) ACM CCS 09. ACM Press, New York, pp 121\u2013130"},{"unstructured":"Chen J, Wee H (2013) Fully, (almost) tightly secure IBE and dual system groups. In: Canetti R, Garay JA (eds) (2013), pp 435\u2013460, DOI 10.1007\/978-3-642-40084-1_25","key":"658_CR11"},{"unstructured":"Chen J, Wee H (2014a) Doubly spatial encryption from DBDH. Cryptology ePrint Archive, Report 2014\/199, URL: http:\/\/eprint.iacr.org\/2014\/199","key":"658_CR12"},{"unstructured":"Chen J, Wee H (2014b) Dual system groups and its applications \u2014 compact HIBE and more. Cryptology ePrint Archive, Report 2014\/265, URL: http:\/\/eprint.iacr.org\/2014\/265","key":"658_CR13"},{"issue":"2","key":"658_CR14","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1504\/IJSSC.2014.062468","volume":"4","author":"D Cristina","year":"2014","unstructured":"Cristina D, Elena A, Catalin L, Valentin C (2014) A solution for the management of multimedia sessions in hybrid clouds. Int J Space Based Situat Comput 4(2):77\u201387","journal-title":"Int J Space Based Situat Comput"},{"doi-asserted-by":"crossref","unstructured":"Garg S, Gentry C, Halevi S, Sahai A, Waters B (2013) Attribute-based encryption for circuits from multilinear maps. In: Canetti R, Garay JA (eds) (2013), pp 479\u2013499, DOI 10.1007\/978-3-642-40084-1_27","key":"658_CR15","DOI":"10.1007\/978-3-642-40084-1_27"},{"unstructured":"Garg S, Gentry C, Halevi S, Zhandry M (2014) Fully secure functional encryption without obfuscation. Cryptology ePrint Archive, Report 2014\/666, URL: http:\/\/eprint.iacr.org\/2014\/666","key":"658_CR16"},{"key":"658_CR17","first-page":"545","volume-title":"45th ACM STOC","author":"S Gorbunov","year":"2013","unstructured":"Gorbunov S, Vaikuntanathan V, Wee H (2013) Attribute-based encryption for circuits. In: Boneh D, Roughgarden T, Feigenbaum J (eds) 45th ACM STOC. ACM Press, New York, pp 545\u2013554"},{"key":"658_CR18","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/1180405.1180418","volume-title":"ACM CCS 06","author":"V Goyal","year":"2006","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Juels A, Wright RN, Vimercati S (eds) ACM CCS 06. ACM Press, New York, pp 89\u201398 (available as Cryptology ePrint Archive Report 2006\/309)"},{"unstructured":"Green M, Hohenberger S, Waters B (2013) Outsourcing the decryption of abe ciphertexts. In: Proceedings of USENIX security symposim, San Francisco","key":"658_CR24"},{"issue":"8","key":"658_CR20","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1109\/TIFS.2013.2271848","volume":"8","author":"L Junzuo","year":"2013","unstructured":"Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343\u20131354","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"658_CR21","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1007\/978-3-642-20465-4_31","volume-title":"EUROCRYPT 2011","author":"AB Lewko","year":"2011","unstructured":"Lewko AB, Waters B (2011) Decentralizing attribute-based encryption. In: Paterson KG (ed) EUROCRYPT 2011, vol 6632. Springer, LNCS, New York, pp 568\u2013588"},{"key":"658_CR22","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/978-3-642-32009-5_12","volume-title":"CRYPTO 2012","author":"AB Lewko","year":"2012","unstructured":"Lewko AB, Waters B (2012) New proof methods for attribute-based encryption Achieving full security through selective techniques. In: Safavi-Naini R, Canetti R (eds) CRYPTO 2012, vol 7417. Springer, LNCS, New York, pp 180\u2013198"},{"key":"658_CR23","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-13190-5_4","volume-title":"EUROCRYPT 2010","author":"AB Lewko","year":"2010","unstructured":"Lewko AB, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert H (ed) EUROCRYPT 2010, vol 6110. Springer, LNCS, New York, pp 62\u201391"},{"doi-asserted-by":"publisher","unstructured":"Li J, Huang X, Li J, Chen X, Xiang Y (2013) Securely utsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst. https:\/\/doi.org\/10.1109\/TPDS.2013.27","key":"658_CR19","DOI":"10.1109\/TPDS.2013.27"},{"issue":"2","key":"658_CR25","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1504\/IJSSC.2014.062469","volume":"4","author":"T Meriem","year":"2014","unstructured":"Meriem T, Mahmoud B, Fabrice K (2014) An approach for developing an interoperability mechanism between cloud providers. Int J Space Based Situat Comput 4(2):88\u201399","journal-title":"Int J Space Based Situat Comput"},{"key":"658_CR26","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-642-14623-7_11","volume-title":"CRYPTO 2010","author":"T Okamoto","year":"2010","unstructured":"Okamoto T, Takashima K (2010) Fully secure functional encryption with general relations from the decisional linear assumption. In: Rabin T (ed) CRYPTO 2010, vol 6223. Springer, LNCS, New York, pp 191\u2013208"},{"key":"658_CR27","first-page":"422","volume-title":"TCC 2012","author":"B Parno","year":"2012","unstructured":"Parno B, Raykova M, Vaikuntanathan V (2012) How to delegate and verify in public: verifiable computation from attribute-based encryption. In: Cramer R (ed) TCC 2012, vol 7194. Springer, LNCS, New York, pp 422\u2013439"},{"issue":"7","key":"658_CR6","doi-asserted-by":"publisher","first-page":"1384","DOI":"10.1109\/TIFS.2015.2410137","volume":"10","author":"Q Baodong","year":"2015","unstructured":"Qin B, Deng RH, Liu S, Ma S (2015) Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 10(7):1384\u20131393","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"658_CR28","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"EUROCRYPT 2005","author":"A Sahai","year":"2005","unstructured":"Sahai A, Waters BR (2005) Fuzzy identity-based encryption. In: Cramer R (ed) EUROCRYPT 2005, vol 3494. Springer, LNCS, New York, pp 457\u2013473"},{"issue":"2","key":"658_CR29","first-page":"1","volume":"6","author":"G Shu","year":"2015","unstructured":"Shu G, Haixia X (2015) A secure delegation scheme of large polynomial computation in multi-party cloud. Int J Grid and Util Comput 6(2):1\u20137","journal-title":"Int J Grid and Util Comput"},{"key":"658_CR30","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/978-3-642-03356-8_36","volume-title":"CRYPTO 2009","author":"B Waters","year":"2009","unstructured":"Waters B (2009) Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Halevi S (ed) CRYPTO 2009, vol 5677. Springer, LNCS, New York, pp 619\u2013636"},{"doi-asserted-by":"crossref","unstructured":"Wang XA, Ma J, Xhafa F (2015) Outsourcing decryption of attribute based encryption with energy efficiency. In: Proceeding of the international conference on P2P, parallel, grid, cloud and internet computing 3PGCIC 2015, pp 444\u2013448","key":"658_CR32","DOI":"10.1109\/3PGCIC.2015.99"},{"issue":"1","key":"658_CR31","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1504\/IJGUC.2016.073773","volume":"7","author":"Y Wang","year":"2016","unstructured":"Wang Y, Du J, Cheng X, Liu Z, Lin K (2016) Degradation and encryption for outsourced png images in cloud storage. Int J Grid Util Comput 7(1):22\u201328","journal-title":"Int J Grid Util Comput"},{"doi-asserted-by":"crossref","unstructured":"Yamada S, Attrapadung N, Hanaoka G, Kunihiro N (2011) Generic constructions for chosen-ciphertext secure attribute based encryption. In: Catalano D, Fazio N, Gennaro R, Nicolosi A (eds) (2011), pp 71\u201389","key":"658_CR33","DOI":"10.1007\/978-3-642-19379-8_5"},{"key":"658_CR34","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/978-3-642-54631-0_16","volume-title":"PKC 2014","author":"S Yamada","year":"2014","unstructured":"Yamada S, Attrapadung N, Hanaoka G, Kunihiro N (2014) A framework and compact constructions for non-monotonic attribute-based encryption. In: Krawczyk H (ed) PKC 2014, vol 8383. Springer, LNCS, New York, pp 275\u2013292. https:\/\/doi.org\/10.1007\/978-3-642-54631-0_16"},{"issue":"2","key":"658_CR35","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1504\/IJGUC.2015.068824","volume":"6","author":"S Zhu","year":"2015","unstructured":"Zhu S, Yang X (2015) Protecting data in cloud environment with attribute-based encryption. Int J Grid Util Comput 6(2):91\u201397","journal-title":"Int J Grid Util Comput"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-017-0658-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-017-0658-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-017-0658-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T09:06:07Z","timestamp":1751187967000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-017-0658-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,29]]},"references-count":35,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,2]]}},"alternative-id":["658"],"URL":"https:\/\/doi.org\/10.1007\/s12652-017-0658-2","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"type":"print","value":"1868-5137"},{"type":"electronic","value":"1868-5145"}],"subject":[],"published":{"date-parts":[[2017,12,29]]},"assertion":[{"value":"14 September 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 December 2017","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}