{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T17:53:02Z","timestamp":1774806782143,"version":"3.50.1"},"reference-count":41,"publisher":"Oxford University Press (OUP)","issue":"2","license":[{"start":{"date-parts":[[2023,2,24]],"date-time":"2023-02-24T00:00:00Z","timestamp":1677196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61962011"],"award-info":[{"award-number":["61962011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,2,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Cloud medical treatment provides real-time data sharing in a cost-effective method, making it more practical to create, collect and manage vast amounts of personal health records (PHR) of patients. However, health information is considered highly sensitive. How to securely store and dynamically process massive patients\u2019 PHR data in a public cloud environment has become one of the most important challenges. Therefore, we introduce a novel solution to the problems of privacy exposure, data security and flexible access of storage modules in medical systems. In this paper, we present a privacy-preserving certificateless broadcast encryption with authorization for the PHR system, which is the best approach to effectively solve the above problems and avoid key escrow. In our work, users (patients) outsource their encrypted data to the cloud server and reallocate data accessing rights of recipients through an authorization set, sharing with a group of authorized receivers (doctors) in a secure and efficient manner. In addition, it is shown to be capable of achieving both plaintext confidentiality and receiver anonymity under the random oracle model. Moreover, the experimental evaluation shows that the proposed scheme enjoys low computational and communication overhead, indicating the feasibility and practicality of the scheme.<\/jats:p>","DOI":"10.1093\/comjnl\/bxad004","type":"journal-article","created":{"date-parts":[[2023,2,24]],"date-time":"2023-02-24T13:34:34Z","timestamp":1677245674000},"page":"617-631","source":"Crossref","is-referenced-by-count":5,"title":["Certificateless Broadcast Encryption with Authorization Suitable for Storing Personal Health Records"],"prefix":"10.1093","volume":"67","author":[{"given":"Zhiwei","family":"Chen","sequence":"first","affiliation":[{"name":"School of Mathematical Sciences, Guizhou Normal University , Guiyang 550001 , China"}]},{"given":"Lunzhi","family":"Deng","sequence":"additional","affiliation":[{"name":"School of Mathematical Sciences, Guizhou Normal University , Guiyang 550001 , China"}]},{"given":"Yu","family":"Ruan","sequence":"additional","affiliation":[{"name":"School of Mathematical Sciences, Guizhou Normal University , Guiyang 550001 , China"}]},{"given":"Shuai","family":"Feng","sequence":"additional","affiliation":[{"name":"School of Mathematical Sciences, Guizhou Normal University , Guiyang 550001 , China"}]},{"given":"Tao","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Mathematical Sciences, Guizhou Normal University , Guiyang 550001 , China"}]},{"given":"Bo","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Mathematical Sciences, Guizhou Normal University , Guiyang 550001 , China"}]}],"member":"286","published-online":{"date-parts":[[2023,2,24]]},"reference":[{"key":"2024021913330092800_ref1","first-page":"1","article-title":"Secure and privacy-preserving data sharing and collaboration in mobile healthcare social networks of smart cities","volume":"2017","author":"Huang","year":"2017","journal-title":"Secur. Commun. Net."},{"key":"2024021913330092800_ref2","first-page":"3319","article-title":"Survey on secured health care data sharing on cloud using revocable attribute based encryption schemes","volume":"12","author":"Pavani","year":"2021","journal-title":"Turkish Journal of Computer and Mathematics Education (TURCOMAT)"},{"key":"2024021913330092800_ref3","doi-asserted-by":"crossref","first-page":"120950","DOI":"10.1109\/ACCESS.2019.2933636","article-title":"Revocable cloud-assisted attribute-based signcryption in personal health system","volume":"7","author":"Deng","year":"2019","journal-title":"IEEE Access"},{"key":"2024021913330092800_ref4","first-page":"480","article-title":"Broadcast encryption","volume-title":"Annual International Cryptology Conference","author":"Fiat","year":"1993"},{"key":"2024021913330092800_ref5","doi-asserted-by":"crossref","first-page":"1041","DOI":"10.1109\/TCC.2016.2541138","article-title":"Identity-based encryption with cloud revocation authority and its applications","volume":"6","author":"Tseng","year":"2016","journal-title":"IEEE Trans. Cloud Comput"},{"key":"2024021913330092800_ref6","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1109\/TC.2013.208","article-title":"Identity-based encryption with outsourced revocation in cloud computing","volume":"64","author":"Li","year":"2013","journal-title":"IEEE Trans. Comput."},{"key":"2024021913330092800_ref7","doi-asserted-by":"crossref","first-page":"56977","DOI":"10.1109\/ACCESS.2018.2873019","article-title":"CCA-secure revocable identity-based encryption with ciphertext evolution in the cloud","volume":"6","author":"Sun","year":"2018","journal-title":"IEEE Access"},{"key":"2024021913330092800_ref8","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1093\/comjnl\/bxr098","article-title":"Efficient revocable ID-based encryption with a public channel","volume":"55","author":"Tseng","year":"2012","journal-title":"Comput. J."},{"key":"2024021913330092800_ref9","doi-asserted-by":"crossref","first-page":"e3386","DOI":"10.1002\/dac.3386","article-title":"Efficient revocable ID-based encryption with cloud revocation server","volume":"31","author":"Jia","year":"2018","journal-title":"Int. J. Commun. Syst."},{"key":"2024021913330092800_ref10","doi-asserted-by":"crossref","first-page":"824","DOI":"10.1109\/JSYST.2013.2289271","article-title":"Revocable certificateless public key encryption","volume":"9","author":"Tsai","year":"2013","journal-title":"IEEE Syst. J."},{"key":"2024021913330092800_ref11","doi-asserted-by":"crossref","first-page":"148157","DOI":"10.1109\/ACCESS.2020.3015893","article-title":"Revocable certificateless public key encryption with outsourced semi-trusted cloud revocation agent","volume":"8","author":"Ma","year":"2020","journal-title":"IEEE Access"},{"key":"2024021913330092800_ref12","first-page":"201","article-title":"Recipient revocable identity-based broadcast encryption: how to revoke some recipients in IBBE without knowledge of the plaintext","volume-title":"Proc. of the 11th ACM on Asia Conf. on Computer and Communications Security","author":"Susilo","year":"2016"},{"key":"2024021913330092800_ref13","article-title":"Adaptively secure recipient revocable broadcast encryption with constant size ciphertext","author":"Acharya","year":"2017"},{"key":"2024021913330092800_ref14","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.tcs.2020.02.031","article-title":"Revocable identity-based encryption with server-aided ciphertext evolution","volume":"815","author":"Sun","year":"2020","journal-title":"Theor. Comput. Sci."},{"key":"2024021913330092800_ref15","doi-asserted-by":"crossref","first-page":"1809","DOI":"10.1093\/comjnl\/bxx060","article-title":"Fully privacy-preserving ID-based broadcast encryption with authorization","volume":"60","author":"Lai","year":"2017","journal-title":"Comput. J."},{"key":"2024021913330092800_ref16","article-title":"Identity-based broadcast encryption","author":"Sakai","year":"2007"},{"key":"2024021913330092800_ref17","first-page":"200","article-title":"Identity-based broadcast encryption with constant size ciphertexts and private keys","volume-title":"Int. Conf. on the Theory and Application of Cryptology and Information Security","author":"Delerabl\u00e9e","year":"2007"},{"key":"2024021913330092800_ref18","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1007\/11889663_4","article-title":"Privacy in encrypted content distribution using private broadcast encryption","volume-title":"Int. Conf. on Financial Cryptography and Data Security","author":"Barth","year":"2006"},{"key":"2024021913330092800_ref19","doi-asserted-by":"crossref","first-page":"1239","DOI":"10.1109\/TC.2010.23","article-title":"Anonymous multireceiver identity-based encryption","volume":"59","author":"Fan","year":"2010","journal-title":"IEEE Trans. Comput."},{"key":"2024021913330092800_ref20","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1049\/iet-ifs.2010.0252","article-title":"Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme","volume":"6","author":"Wang","year":"2012","journal-title":"IET Inf. Secur."},{"key":"2024021913330092800_ref21","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1093\/comjnl\/bxr086","article-title":"Improved anonymous multi-receiver identity-based encryption","volume":"55","author":"Chien","year":"2012","journal-title":"Comput. J."},{"key":"2024021913330092800_ref22","first-page":"400","article-title":"Comment on Wang et al.\u2019s anonymous multi-receiver ID-based encryption scheme and its improved schemes","volume":"7","author":"Zhang","year":"2013","journal-title":"Int. J. Intell. Inf. Database Syst."},{"key":"2024021913330092800_ref23","first-page":"225","article-title":"Outsider-anonymous broadcast encryption with sublinear ciphertexts","volume-title":"Int. Workshop on Public Key Cryptography","author":"Fazio","year":"2012"},{"key":"2024021913330092800_ref24","first-page":"206","article-title":"Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model","volume-title":"Int. Workshop on Public Key Cryptography","author":"Libert","year":"2012"},{"key":"2024021913330092800_ref25","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1016\/j.inffus.2011.03.003","article-title":"Privacy-preserving identity-based broadcast encryption","volume":"13","author":"Hur","year":"2012","journal-title":"Inf. Fusion"},{"key":"2024021913330092800_ref26","first-page":"452","article-title":"Certificateless public key cryptography","volume-title":"Int. Conf. on the Theory and Application of Cryptology and Information Security","author":"Al-Riyami","year":"2003"},{"key":"2024021913330092800_ref27","first-page":"802","article-title":"Generic construction of certificateless encryption","volume-title":"Int. Conf. on Computational Science and Its Applications","author":"Yum","year":"2004"},{"key":"2024021913330092800_ref28","first-page":"474","article-title":"On constructing certificateless cryptosystems from identity based encryption","volume-title":"Int. Workshop on Public Key Cryptography","author":"Libert","year":"2006"},{"key":"2024021913330092800_ref29","first-page":"344","article-title":"Certificateless encryption schemes strongly secure in the standard model","volume-title":"Int. Workshop on Public Key Cryptography","author":"Dent","year":"2008"},{"key":"2024021913330092800_ref30","doi-asserted-by":"crossref","first-page":"2214","DOI":"10.1002\/sec.1165","article-title":"Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing","volume":"8","author":"Islam","year":"2015","journal-title":"Secur Commun. Netw."},{"key":"2024021913330092800_ref31","doi-asserted-by":"crossref","first-page":"1034","DOI":"10.1002\/dac.2395","article-title":"Privacy-preserving multireceiver ID-based encryption with provable security","volume":"27","author":"Tseng","year":"2014","journal-title":"Int. J. Commun. Syst."},{"key":"2024021913330092800_ref32","doi-asserted-by":"crossref","first-page":"2602","DOI":"10.1109\/JSYST.2015.2451193","article-title":"Efficient anonymous multireceiver certificateless encryption","volume":"11","author":"Hung","year":"2015","journal-title":"IEEE Syst. J."},{"key":"2024021913330092800_ref33","doi-asserted-by":"crossref","first-page":"6801","DOI":"10.1007\/s00500-016-2231-x","article-title":"Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices","volume":"21","author":"He","year":"2017","journal-title":"Soft Comput."},{"key":"2024021913330092800_ref34","first-page":"1","article-title":"Efficient certificateless anonymous multi-receiver encryption scheme without bilinear parings","volume":"2018","author":"Gao","year":"2018","journal-title":"Math. Probl. Eng."},{"key":"2024021913330092800_ref35","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/s00500-019-04375-8","article-title":"Anonymous certificateless multi-receiver encryption scheme for smart community management systems","volume":"24","author":"Deng","year":"2020","journal-title":"Soft Comput."},{"key":"2024021913330092800_ref36","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-3-319-40367-0_14","article-title":"Anonymous identity-based broadcast encryption with revocation for file sharing","volume-title":"Australasian Conf. on Information Security and Privacy","author":"Lai","year":"2016"},{"key":"2024021913330092800_ref37","doi-asserted-by":"crossref","first-page":"855","DOI":"10.1007\/s00779-017-1045-x","article-title":"Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city","volume":"21","author":"Lai","year":"2017","journal-title":"Pers. Ubiquitous Comput."},{"key":"2024021913330092800_ref38","first-page":"3365","article-title":"An ID-based broadcast encryption scheme for cloud-network integration in smart grid","volume":"15","author":"Niu","year":"2021","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"2024021913330092800_ref39","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic curve cryptosystems","volume":"48","author":"Koblitz","year":"1987","journal-title":"Math. Comput."},{"key":"2024021913330092800_ref40","first-page":"417","article-title":"Use of elliptic curves in cryptography","volume-title":"Conf. on the Theory and Application of Cryptographic Techniques","author":"Miller","year":"1985"},{"key":"2024021913330092800_ref41","doi-asserted-by":"crossref","first-page":"3370","DOI":"10.3390\/s19153370","article-title":"Privacy-preserving multi-receiver certificateless broadcast encryption scheme with de-duplication","volume":"19","author":"Zhang","year":"2019","journal-title":"Sensors"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/67\/2\/617\/56701308\/bxad004.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/67\/2\/617\/56701308\/bxad004.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,19]],"date-time":"2024-02-19T13:39:15Z","timestamp":1708349955000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/67\/2\/617\/7024504"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,24]]},"references-count":41,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2023,2,24]]},"published-print":{"date-parts":[[2024,2,17]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxad004","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2024,2]]},"published":{"date-parts":[[2023,2,24]]}}}