{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:06:04Z","timestamp":1774541164505,"version":"3.50.1"},"reference-count":42,"publisher":"Informa UK Limited","issue":"4","funder":[{"name":"National Key Research and Development Program of China","award":["2019YFB2102000"],"award-info":[{"award-number":["2019YFB2102000"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672283"],"award-info":[{"award-number":["61672283"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Postgraduate Research & Practice Innovation Program of Jiangsu Province","award":["KYCX18_0308"],"award-info":[{"award-number":["KYCX18_0308"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Connection Science"],"published-print":{"date-parts":[[2021,10,2]]},"DOI":"10.1080\/09540091.2020.1841096","type":"journal-article","created":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T23:03:26Z","timestamp":1606172606000},"page":"1060-1076","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":28,"title":["OAC-HAS: outsourced access control with hidden access structures in fog-enhanced IoT systems"],"prefix":"10.1080","volume":"33","author":[{"given":"Jiale","family":"Zhang","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, People's Republic of China"}]},{"given":"Zhen","family":"Cheng","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, People's Republic of China"}]},{"given":"Xiang","family":"Cheng","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, People's Republic of China"}]},{"given":"Bing","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, People's Republic of China"},{"name":"Collaborative Innovation Center of Novel Software Technology and Industrialization, Nanjing, People's Republic of China"}]}],"member":"301","published-online":{"date-parts":[[2020,11,23]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0057-3"},{"key":"CIT0002","doi-asserted-by":"crossref","unstructured":"Alderman, J., Janson, C., Cid, C. & Crampton, J. (2015). Access control in publicly verifiable outsourced computation. In Proceedings of the 10th ACM symposium on information, Computer and Communications Security (ASIA CCS) (pp. 657\u2013662). Denver, CO, USA: ACM Press.","DOI":"10.1145\/2714576.2714636"},{"key":"CIT0003","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Bohli, J., Karame, G. O., Liu, Z. & Reuter, C. A. (2014). Outsourced proofs of retrievability. In Proceedings of the 21st ACM SIGSAC conference on Computer and Communications Security (ACM CCS) (pp. 831\u2013843). Scottsdale, AZ, USA: ACM Press.","DOI":"10.1145\/2660267.2660310"},{"key":"CIT0004","unstructured":"Bellare, M., Garay, J. A. & Rabin, T. (2007). Fast batch verification for modular exponentiation and digital signatures. In Proceedings of the 27th annual cryptology conference (CRYPTO) (pp. 74\u201390). Santa Barbara, CA, USA: Springer."},{"key":"CIT0005","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A. & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In Proceedings of the 28th IEEE symposium on security and privacy (S&P) (pp. 321\u2013334). Oakland, CA, USA: IEEE.","DOI":"10.1109\/SP.2007.11"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2015.1080226"},{"key":"CIT0007","unstructured":"CISCO. (2015). Cisco IoT system security: Mitigate risk, simplify compliance, and build trust. White Paper."},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1145\/3292674"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2787700"},{"key":"CIT0010","unstructured":"Green, M., Hohenberger, S. & Waters, B. (2011). Outsourcing the decryption of ABE ciphertexts. In Proceedings of the 20th USENIX security symposium (USENIX security). San Francisco, CA, USA: USENIX Association."},{"key":"CIT0011","doi-asserted-by":"crossref","unstructured":"Hohenberger, S. & Waters, B. (2014). Online\/offline attribute-based encryption. In Proceedings of the 17th international conference on practice and theory in public-key cryptography (PKC) (pp. 293\u2013310). Buenos Aires, Argentina: Springer.","DOI":"10.1007\/978-3-642-54631-0_17"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2545559"},{"key":"CIT0013","doi-asserted-by":"crossref","unstructured":"Krawczyk, H. (2010). Cryptographic extraction and key derivation: The HKDF scheme. In Proceedings of the 30th annual cryptology conference (CRYPTO) (pp. 631\u2013648). Santa Barbara, CA, USA: Springer.","DOI":"10.1007\/978-3-642-14623-7_34"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2271848"},{"key":"CIT0015","doi-asserted-by":"crossref","unstructured":"Lewko, A., Okamoto, T., Sahai, A., Takashima, K. & Waters, B. (2010). Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In Proceedings of the 29th annual international conference on the theory and applications of cryptographic techniques (EUROCRYPT) (pp. 62\u201391). Monaco\/French Riviera: Springer.","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3957"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.271"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2017.2710190"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2449264"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2018.1512557"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2499755"},{"key":"CIT0024","volume":"17","author":"Ma H.","year":"2018","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7721750"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2814571"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2907364"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.009"},{"key":"CIT0029","doi-asserted-by":"crossref","unstructured":"Rouselakis, Y. & Waters, B. (2013). Practical constructions and new proof methods for large universe attribute-based encryption. In Proceedings of the 20th ACM SIGSAC conference on Computer and Communications Security (CCS) (pp. 463\u2013474). Berlin, Germany: ACM Press.","DOI":"10.1145\/2508859.2516672"},{"key":"CIT0030","doi-asserted-by":"crossref","unstructured":"Sahai, A. & Waters, B. (2005). Fuzzy identity-based encryption. In Proceedings of the 24th annual international conference on the theory and applications of cryptographic techniques (EUROCRYPT) (pp. 457\u2013473). Aarhus, Denmark: Springer.","DOI":"10.1007\/11426639_27"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2017.1318826"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2019.1650330"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2018.07.013"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2018.1512556"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700341"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2571718"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.278"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2820162"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2978286"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2668838"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700333"},{"key":"CIT0043","doi-asserted-by":"crossref","unstructured":"Zhou, J., Cao, Z., Dong, X. & Lin, X. (2015). TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems. In Proceedings of the 34th IEEE conference on computer communications (INFOCOM) (pp. 2398\u20132406). Hong Kong, China: IEEE.","DOI":"10.1109\/INFOCOM.2015.7218628"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.200"}],"container-title":["Connection Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/09540091.2020.1841096","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T12:05:40Z","timestamp":1672833940000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/09540091.2020.1841096"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,23]]},"references-count":42,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,10,2]]}},"alternative-id":["10.1080\/09540091.2020.1841096"],"URL":"https:\/\/doi.org\/10.1080\/09540091.2020.1841096","relation":{},"ISSN":["0954-0091","1360-0494"],"issn-type":[{"value":"0954-0091","type":"print"},{"value":"1360-0494","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,23]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ccos20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ccos20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-06-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-10-04","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-11-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}