{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T13:00:10Z","timestamp":1740142810669,"version":"3.37.3"},"reference-count":29,"publisher":"Oxford University Press (OUP)","issue":"8","license":[{"start":{"date-parts":[[2018,6,27]],"date-time":"2018-06-27T00:00:00Z","timestamp":1530057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502400","61602378"],"award-info":[{"award-number":["61502400","61602378"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Basic Research Plan in Shaanxi Province of China","award":["2016JM6033"],"award-info":[{"award-number":["2016JM6033"]}]},{"name":"Science Foundation of Sichuan Educational Committee","award":["16ZB0140"],"award-info":[{"award-number":["16ZB0140"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8,1]]},"DOI":"10.1093\/comjnl\/bxy063","type":"journal-article","created":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T07:17:53Z","timestamp":1529306273000},"page":"1259-1268","source":"Crossref","is-referenced-by-count":3,"title":["Bounded Revocable and Outsourceable ABE for Secure Data Sharing"],"prefix":"10.1093","volume":"61","author":[{"given":"Baodong","family":"Qin","sequence":"first","affiliation":[{"name":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, PR China"},{"name":"State Key Laboratory of Cryptology, Beijing, PR China"}]},{"given":"Qinglan","family":"Zhao","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, PR China"}]},{"given":"Dong","family":"Zheng","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, PR China"},{"name":"Westone Cryptologic Research Center, Beijing, PR China"}]}],"member":"286","published-online":{"date-parts":[[2018,6,27]]},"reference":[{"year":"2005","author":"Sahai","key":"key\n\t\t\t\t2018121408135889500_bxy063C1"},{"year":"2006","author":"Goyal","key":"key\n\t\t\t\t2018121408135889500_bxy063C2"},{"year":"2007","author":"Bethencourt","key":"key\n\t\t\t\t2018121408135889500_bxy063C3"},{"key":"key\n\t\t\t\t2018121408135889500_bxy063C4","first-page":"561","article-title":"Certificate revocation and certificate update","volume":"18","author":"Naor","year":"2000","journal-title":"IEEE J. Sel. Areas in Commun."},{"year":"2011","author":"Waters","key":"key\n\t\t\t\t2018121408135889500_bxy063C5"},{"year":"1984","author":"Shamir","key":"key\n\t\t\t\t2018121408135889500_bxy063C6"},{"key":"key\n\t\t\t\t2018121408135889500_bxy063C7","first-page":"45:1","article-title":"Attribute-based encryption for circuits","volume":"62","author":"Gorbunov","year":"2015","journal-title":"J. ACM"},{"year":"2010","author":"Herranz","key":"key\n\t\t\t\t2018121408135889500_bxy063C8"},{"key":"key\n\t\t\t\t2018121408135889500_bxy063C9","first-page":"15","article-title":"Attribute-based encryption schemes with constant-size ciphertexts","volume":"422","author":"Attrapadung","year":"2012","journal-title":"Theor. Comput. Sci."},{"year":"2013","author":"Hohenberger","key":"key\n\t\t\t\t2018121408135889500_bxy063C10"},{"year":"2011","author":"Green","key":"key\n\t\t\t\t2018121408135889500_bxy063C11"},{"year":"2013","author":"Li","key":"key\n\t\t\t\t2018121408135889500_bxy063C12"},{"key":"key\n\t\t\t\t2018121408135889500_bxy063C13","first-page":"344","article-title":"Fine-grained access control system based on fully outsourced attribute-based encryption","volume":"125","author":"Zhang","year":"2017","journal-title":"J. Syst. Softw."},{"key":"key\n\t\t\t\t2018121408135889500_bxy063C14","first-page":"1362","article-title":"Enabling cloud storage auditing with verifiable outsourcing of key updates","volume":"11","author":"Yu","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"key\n\t\t\t\t2018121408135889500_bxy063C15","first-page":"1167","article-title":"Enabling cloud storage auditing with key-exposure resistance","volume":"10","author":"Yu","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"year":"2008","author":"Boldyreva","key":"key\n\t\t\t\t2018121408135889500_bxy063C16"},{"year":"2009","author":"Libert","key":"key\n\t\t\t\t2018121408135889500_bxy063C17"},{"year":"2012","author":"Sahai","key":"key\n\t\t\t\t2018121408135889500_bxy063C18"},{"key":"key\n\t\t\t\t2018121408135889500_bxy063C19","first-page":"1193","article-title":"Revocable identity-based cryptosystem revisited: Security models and constructions","volume":"9","author":"Seo","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"key\n\t\t\t\t2018121408135889500_bxy063C20","first-page":"1220","article-title":"Revocable and decentralized attribute-based encryption","volume":"59","author":"Cui","year":"2016","journal-title":"Comput. J."},{"key":"key\n\t\t\t\t2018121408135889500_bxy063C21","first-page":"1564","article-title":"New constructions of revocable identity-based encryption from multilinear maps","volume":"10","author":"Park","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"key\n\t\t\t\t2018121408135889500_bxy063C22","first-page":"39","article-title":"Efficient revocable identity-based encryption via subset difference methods","volume":"85","author":"Lee","year":"2017","journal-title":"Des. Codes Cryptogr."},{"key":"key\n\t\t\t\t2018121408135889500_bxy063C23","first-page":"1214","article-title":"Attribute-based access control with efficient revocation in data outsourcing systems","volume":"22","author":"Hur","year":"2011","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"year":"2016","author":"Jiang","key":"key\n\t\t\t\t2018121408135889500_bxy063C24"},{"year":"2016","author":"Cui","key":"key\n\t\t\t\t2018121408135889500_bxy063C25"},{"key":"key\n\t\t\t\t2018121408135889500_bxy063C26","first-page":"79","article-title":"Families of finite sets in which no set is covered by the union of others","volume":"51","author":"Erd\u00f6s","year":"1985","journal-title":"Isr. J. Math."},{"year":"2007","author":"Cramer","key":"key\n\t\t\t\t2018121408135889500_bxy063C27"},{"year":"2012","author":"Goldwasser","key":"key\n\t\t\t\t2018121408135889500_bxy063C28"},{"year":"2014","author":"Tessaro","key":"key\n\t\t\t\t2018121408135889500_bxy063C29"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/8\/1259\/27150936\/bxy063.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,14]],"date-time":"2018-12-14T08:14:33Z","timestamp":1544775273000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/8\/1259\/5045945"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,27]]},"references-count":29,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2018,6,27]]},"published-print":{"date-parts":[[2018,8,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy063","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2018,8]]},"published":{"date-parts":[[2018,6,27]]}}}