{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T22:50:17Z","timestamp":1767826217274,"version":"3.49.0"},"reference-count":45,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/100007219","name":"Natural Science Foundation of Shanghai Municipality","doi-asserted-by":"publisher","award":["23ZR1417700"],"award-info":[{"award-number":["23ZR1417700"]}],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007219","name":"Natural Science Foundation of Shanghai Municipality","doi-asserted-by":"publisher","award":["23ZR1417800"],"award-info":[{"award-number":["23ZR1417800"]}],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010868","name":"Ministry of Public Security of the People's Republic of China","doi-asserted-by":"publisher","award":["C22600"],"award-info":[{"award-number":["C22600"]}],"id":[{"id":"10.13039\/501100010868","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["12071138"],"award-info":[{"award-number":["12071138"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072184"],"award-info":[{"award-number":["62072184"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Standards &amp; Interfaces"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1016\/j.csi.2025.103991","type":"journal-article","created":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T12:02:53Z","timestamp":1741348973000},"page":"103991","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Verifiable and auditable multi-authority attribute-based encryption"],"prefix":"10.1016","volume":"94","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-5234-1002","authenticated-orcid":false,"given":"Xingwang","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3904-9245","authenticated-orcid":false,"given":"Peng","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Jiaying","family":"Luo","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.csi.2025.103991_b1","series-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","first-page":"457","article-title":"Fuzzy identity-based encryption","author":"Sahai","year":"2005"},{"key":"10.1016\/j.csi.2025.103991_b2","series-title":"Proceedings of the 13th ACM Conference on Computer and Communications Security","first-page":"89","article-title":"Attribute-based encryption for fine-grained access control of encrypted data","author":"Goyal","year":"2006"},{"key":"10.1016\/j.csi.2025.103991_b3","series-title":"2007 IEEE Symposium on Security and Privacy","first-page":"321","article-title":"Ciphertext-policy attribute-based encryption","author":"Bethencourt","year":"2007"},{"key":"10.1016\/j.csi.2025.103991_b4","series-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security","first-page":"456","article-title":"Provably secure ciphertext policy ABE","author":"Cheung","year":"2007"},{"key":"10.1016\/j.csi.2025.103991_b5","series-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security","first-page":"195","article-title":"Attribute-based encryption with non-monotonic access structures","author":"Ostrovsky","year":"2007"},{"key":"10.1016\/j.csi.2025.103991_b6","series-title":"Advances in Cryptology\u2013EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30\u2013June 3, 2010. Proceedings 29","first-page":"62","article-title":"Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption","author":"Lewko","year":"2010"},{"key":"10.1016\/j.csi.2025.103991_b7","series-title":"Public Key Cryptography \u2013 PKC 2011","first-page":"53","article-title":"Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization","author":"Waters","year":"2011"},{"key":"10.1016\/j.csi.2025.103991_b8","doi-asserted-by":"crossref","unstructured":"D. Riepel, H. Wee, FABEO: Fast attribute-based encryption with optimal security, in: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022, pp. 2491\u20132504.","DOI":"10.1145\/3548606.3560699"},{"issue":"3","key":"10.1016\/j.csi.2025.103991_b9","doi-asserted-by":"crossref","first-page":"2459","DOI":"10.1109\/TCC.2022.3210137","article-title":"Optimal black-box traceability in decentralized attribute-based encryption","volume":"11","author":"Nasiraee","year":"2023","journal-title":"IEEE Trans. Cloud Comput."},{"key":"10.1016\/j.csi.2025.103991_b10","series-title":"Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, the Netherlands, February 21-24, 2007. Proceedings 4","first-page":"515","article-title":"Multi-authority attribute based encryption","author":"Chase","year":"2007"},{"key":"10.1016\/j.csi.2025.103991_b11","series-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","first-page":"568","article-title":"Decentralizing attribute-based encryption","author":"Lewko","year":"2011"},{"key":"10.1016\/j.csi.2025.103991_b12","series-title":"Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL, USA, November 7\u201310, 2022, Proceedings, Part I","first-page":"651","article-title":"Multi-authority ABE from lattices without random oracles","author":"Waters","year":"2022"},{"key":"10.1016\/j.csi.2025.103991_b13","series-title":"Advances in Cryptology \u2013 EUROCRYPT 2023","first-page":"447","article-title":"Fully adaptive decentralized multi-authority ABE","author":"Datta","year":"2023"},{"key":"10.1016\/j.csi.2025.103991_b14","series-title":"IACR International Conference on Public-Key Cryptography","first-page":"306","article-title":"Multi-authority ABE for non-monotonic access structures","author":"Ambrona","year":"2023"},{"issue":"2","key":"10.1016\/j.csi.2025.103991_b15","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1007\/s00145-023-09445-7","article-title":"Decentralized multi-authority ABE for NC 1 from BDH","volume":"36","author":"Datta","year":"2023","journal-title":"J. Cryptology"},{"issue":"10","key":"10.1016\/j.csi.2025.103991_b16","doi-asserted-by":"crossref","first-page":"10314","DOI":"10.1109\/JIOT.2020.2986303","article-title":"Large-universe attribute-based encryption with public traceability for cloud storage","volume":"7","author":"Zhang","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"9","key":"10.1016\/j.csi.2025.103991_b17","doi-asserted-by":"crossref","first-page":"99105","DOI":"10.1007\/s11432-016-0012-9","article-title":"Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption.","volume":"59","author":"Zhang","year":"2016","journal-title":"Sci. China Inf. Sci."},{"key":"10.1016\/j.csi.2025.103991_b18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11431-017-9187-y","article-title":"Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability","volume":"61","author":"Zhang","year":"2018","journal-title":"Sci. China Inf. Sci."},{"issue":"1","key":"10.1016\/j.csi.2025.103991_b19","first-page":"76","article-title":"White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures","volume":"8","author":"Liu","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"10.1016\/j.csi.2025.103991_b20","doi-asserted-by":"crossref","first-page":"1274","DOI":"10.1109\/TIFS.2015.2405905","article-title":"White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes","volume":"10","author":"Ning","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.csi.2025.103991_b21","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2024.110559","article-title":"Lattice-based multi-authority ciphertext-policy attribute-based searchable encryption with attribute revocation for cloud storage","volume":"250","author":"Shen","year":"2024","journal-title":"Comput. Netw.","ISSN":"https:\/\/id.crossref.org\/issn\/1389-1286","issn-type":"print"},{"issue":"10","key":"10.1016\/j.csi.2025.103991_b22","doi-asserted-by":"crossref","first-page":"17727","DOI":"10.1109\/JIOT.2024.3358745","article-title":"CR-fh-CPABE: Secure file hierarchy attribute-based encryption scheme supporting user collusion resistance in cloud computing","volume":"11","author":"Bai","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.csi.2025.103991_b23","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1109\/TIFS.2022.3220030","article-title":"AADEC: Anonymous and auditable distributed access control for edge computing services","volume":"18","author":"Zhou","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.csi.2025.103991_b24","series-title":"Proceedings of the 16th ACM Conference on Computer and Communications Security","first-page":"121","article-title":"Improving privacy and security in multi-authority attribute-based encryption","author":"Chase","year":"2009"},{"key":"10.1016\/j.csi.2025.103991_b25","series-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"511","article-title":"Registered attribute-based encryption","author":"Hohenberger","year":"2023"},{"key":"10.1016\/j.csi.2025.103991_b26","series-title":"Annual International Cryptology Conference","first-page":"143","article-title":"Reducing the CRS size in registered ABE systems","author":"Garg","year":"2024"},{"key":"10.1016\/j.csi.2025.103991_b27","series-title":"European Symposium on Research in Computer Security 2016","first-page":"570","article-title":"Server-aided revocable attribute-based encryption","author":"Cui","year":"2016"},{"issue":"5","key":"10.1016\/j.csi.2025.103991_b28","first-page":"2301","article-title":"RS-HABE: Revocable-storage and hierarchical attribute-based access scheme for secure sharing of e-health records in public cloud","volume":"18","author":"Wei","year":"2021","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"2","key":"10.1016\/j.csi.2025.103991_b29","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1109\/TPDS.2022.3225274","article-title":"Securing fine-grained data sharing and erasure in outsourced storage systems","volume":"34","author":"Wei","year":"2022","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"5","key":"10.1016\/j.csi.2025.103991_b30","doi-asserted-by":"crossref","first-page":"2854","DOI":"10.1109\/TSC.2021.3071859","article-title":"Indirect revocable kp-abe with revocation undoing resistance","volume":"15","author":"Rasori","year":"2021","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"2","key":"10.1016\/j.csi.2025.103991_b31","doi-asserted-by":"crossref","first-page":"1273","DOI":"10.1109\/TCC.2021.3131686","article-title":"Efficient revocable storage attribute-based encryption with arithmetic span programs in cloud-assisted internet of things","volume":"11","author":"Huang","year":"2021","journal-title":"IEEE Trans. Cloud Comput."},{"key":"10.1016\/j.csi.2025.103991_b32","unstructured":"M. Green, S. Hohenberger, B. Waters, Outsourcing the decryption of ABE ciphertexts, in: Proceedings of the 20th USENIX Conference on Security, 2011, pp. 34\u201334."},{"issue":"8","key":"10.1016\/j.csi.2025.103991_b33","doi-asserted-by":"crossref","first-page":"2201","DOI":"10.1109\/TPDS.2013.271","article-title":"Securely outsourcing attribute-based encryption with checkability","volume":"25","author":"Li","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"7","key":"10.1016\/j.csi.2025.103991_b34","doi-asserted-by":"crossref","first-page":"1384","DOI":"10.1109\/TIFS.2015.2410137","article-title":"Attribute-based encryption with efficient verifiable outsourced decryption","volume":"10","author":"Qin","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"10.1016\/j.csi.2025.103991_b35","doi-asserted-by":"crossref","first-page":"3285","DOI":"10.1109\/TPDS.2013.2295809","article-title":"Secure outsourced attribute-based signatures","volume":"25","author":"Chen","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10.1016\/j.csi.2025.103991_b36","series-title":"Advances in Cryptology\u2013EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings 33","first-page":"533","article-title":"Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits","author":"Boneh","year":"2014"},{"issue":"6","key":"10.1016\/j.csi.2025.103991_b37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2824233","article-title":"Attribute-based encryption for circuits","volume":"62","author":"Gorbunov","year":"2015","journal-title":"J. ACM"},{"key":"10.1016\/j.csi.2025.103991_b38","series-title":"2023 IEEE 64th Annual Symposium on Foundations of Computer Science","first-page":"415","article-title":"Attribute-based encryption for circuits of unbounded depth from lattices","author":"Hsieh","year":"2023"},{"key":"10.1016\/j.csi.2025.103991_b39","series-title":"2015 IEEE Symposium on Security and Privacy","first-page":"305","article-title":"Forward secure asynchronous messaging from puncturable encryption","author":"Green","year":"2015"},{"issue":"4","key":"10.1016\/j.csi.2025.103991_b40","doi-asserted-by":"crossref","first-page":"2318","DOI":"10.1109\/TDSC.2021.3055495","article-title":"Enabling (end-to-end) encrypted cloud emails with practical forward secrecy","volume":"19","author":"Wei","year":"2021","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"10.1016\/j.csi.2025.103991_b41","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/TIFS.2024.3497796","article-title":"Lightweight 0-RTT session resumption protocol for constrained devices","volume":"20","author":"Wei","year":"2025","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.csi.2025.103991_b42","series-title":"Efficient generation of linear secret sharing scheme matrices from threshold access trees","author":"Liu","year":"2010"},{"key":"10.1016\/j.csi.2025.103991_b43","series-title":"Advances in Cryptology \u2014 CRYPTO\u2019 86","first-page":"186","article-title":"How to prove yourself: Practical solutions to identification and signature problems","author":"Fiat","year":"1987"},{"issue":"1","key":"10.1016\/j.csi.2025.103991_b44","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/TIFS.2017.2738601","article-title":"Auditable \u03c3 -time outsourced attribute-based encryption for access control in cloud computing","volume":"13","author":"Ning","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.csi.2025.103991_b45","series-title":"2011 IEEE Symposium on Computers and Communications","first-page":"850","article-title":"jPBC: Java pairing based cryptography","author":"De Caro","year":"2011"}],"container-title":["Computer Standards &amp; Interfaces"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548925000200?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548925000200?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T04:36:00Z","timestamp":1762317360000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0920548925000200"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8]]},"references-count":45,"alternative-id":["S0920548925000200"],"URL":"https:\/\/doi.org\/10.1016\/j.csi.2025.103991","relation":{},"ISSN":["0920-5489"],"issn-type":[{"value":"0920-5489","type":"print"}],"subject":[],"published":{"date-parts":[[2025,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Verifiable and auditable multi-authority attribute-based encryption","name":"articletitle","label":"Article Title"},{"value":"Computer Standards & Interfaces","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.csi.2025.103991","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"103991"}}