{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:51:25Z","timestamp":1762005085857,"version":"3.37.3"},"reference-count":28,"publisher":"Oxford University Press (OUP)","issue":"12","license":[{"start":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T00:00:00Z","timestamp":1561680000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502044"],"award-info":[{"award-number":["61502044"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Online data sharing has become a research hotspot while cloud computing is getting more and more popular. As a promising encryption technique to guarantee the security shared data and to realize flexible fine-grained access control, ciphertext-policy attribute-based encryption (CP-ABE) has drawn wide attentions. However, there is a drawback preventing CP-ABE from being applied to cloud applications. In CP-ABE, the access structure is included in the ciphertext, and it may disclose user\u2019s privacy. In this paper, we find a more efficient method to connect ABE with inner product encryption and adopt several techniques to ensure the expressiveness of access structure, the efficiency and security of our scheme. We are the first to present a secure, efficient fine-grained access control scheme with hidden access structure, the access structure can be expressed as AND-gates on multi-valued attributes with wildcard. We conceal the entire attribute instead of only its values in the access structure. Besides, our scheme has obvious advantages in efficiency compared with related schemes. Our scheme can make data sharing secure and efficient, which can be verified from the analysis of security and performance.<\/jats:p>","DOI":"10.1093\/comjnl\/bxz052","type":"journal-article","created":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T21:48:48Z","timestamp":1557265728000},"page":"1748-1760","source":"Crossref","is-referenced-by-count":9,"title":["Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures"],"prefix":"10.1093","volume":"62","author":[{"given":"Yang","family":"Chen","sequence":"first","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Wenmin","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Fei","family":"Gao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Wei","family":"Yin","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Kaitai","family":"Liang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Surrey, UK"}]},{"given":"Hua","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"286","published-online":{"date-parts":[[2019,6,28]]},"reference":[{"key":"2019121909072486700_ref1","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/1314466.1314477","article-title":"A Data Outsourcing Architecture Combining Cryptography and Access Control","volume-title":"Proceedings of the 2007 ACM Workshop on Computer Security Srchitecture","author":"Di Vimercati","year":"2007"},{"key":"2019121909072486700_ref2","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1109\/SP.2007.11","article-title":"Ciphertext-Policy Attribute-Based Encryption","volume-title":"2007 IEEE Symposium on Security and Privacy (SP\u201907)","author":"Bethencourt","year":"2007"},{"key":"2019121909072486700_ref3","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1145\/1315245.1315302","article-title":"Provably Secure Ciphertext Policy ABE","volume-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security","author":"Cheung","year":"2007"},{"key":"2019121909072486700_ref4","first-page":"457","article-title":"Fuzzy Identity-Based Encryption","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Sahai","year":"2005"},{"key":"2019121909072486700_ref5","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1145\/1180405.1180418","article-title":"Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data","volume-title":"Proceedings of the 13th ACM Conference on Computer and Communications Security","author":"Goyal","year":"2006"},{"key":"2019121909072486700_ref6","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1145\/1315245.1315270","article-title":"Attribute-Based Encryption with Non-Monotonic Access Structures","volume-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security","author":"Ostrovsky","year":"2007"},{"key":"2019121909072486700_ref7","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/TIFS.2017.2738601","volume":"13","author":"Ning","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2019121909072486700_ref8","doi-asserted-by":"crossref","first-page":"1274","DOI":"10.1109\/TIFS.2015.2405905","article-title":"White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes","volume":"10","author":"Ning","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2019121909072486700_ref9","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1109\/TDSC.2016.2608343","article-title":"White-box traceable CP-ABE for cloud storage service: how to catch people leaking their access credentials effectively","volume":"15","author":"Ning","year":"2018","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"2019121909072486700_ref10","doi-asserted-by":"crossref","DOI":"10.1109\/TSC.2017.2757467","article-title":"Attribute-based keyword search over hierarchical data in cloud computing","author":"Miao","year":"2017","journal-title":"IEEE Trans. Serv. Comput."},{"key":"2019121909072486700_ref11","doi-asserted-by":"crossref","first-page":"3008","DOI":"10.1109\/JIOT.2017.2779124","article-title":"Practical attribute-based multi-keyword search scheme in mobile crowdsourcing","volume":"5","author":"Miao","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"2019121909072486700_ref12","article-title":"Lightweight fine-grained search over encrypted data in fog computing","author":"Miao","year":"2018","journal-title":"IEEE Trans. Serv. Comput."},{"key":"2019121909072486700_ref13","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-3-540-68914-0_7","article-title":"Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures","volume-title":"International Conference on Applied Cryptography and Network Security","author":"Nishide","year":"2008"},{"key":"2019121909072486700_ref14","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/978-3-642-04474-8_28","article-title":"Privacy-Aware Attribute-Based Encryption with User Accountability","volume-title":"International Conference on Information Security","author":"Li","year":"2009"},{"key":"2019121909072486700_ref15","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/978-3-642-21031-0_3","volume-title":"Fully Secure Cipertext-Policy Hiding CP-ABE. International Conference on Information Security Practice and Experience","author":"Lai","year":"2011"},{"key":"2019121909072486700_ref16","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/j.comnet.2018.01.034","article-title":"An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited","volume":"133","author":"Cui","year":"2018","journal-title":"Computer Networks"},{"key":"2019121909072486700_ref17","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/2414456.2414465","article-title":"Expressive CP-ABE with Partially Hidden Access Structures","volume-title":"Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security","author":"Lai","year":"2012"},{"key":"2019121909072486700_ref18","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1109\/JIOT.2016.2571718","article-title":"An efficient and fine-grained big data access control scheme with privacy-preserving policy","volume":"4","author":"Yang","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"2019121909072486700_ref19","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/TIFS.2015.2475723","article-title":"Hidden ciphertext policy attribute-based encryption under standard assumptions","volume":"11","author":"Phuong","year":"2016","journal-title":"IEEE Trans. on Inf. Forensics Secur."},{"key":"2019121909072486700_ref20","first-page":"138","volume-title":"Searching Keywords with Wildcards on Encrypted Data. International Conference on Security and Cryptography for Networks","author":"Sedghi","year":"2010"},{"key":"2019121909072486700_ref21","article-title":"Outsourcing the Decryption of Abe Ciphertexts","volume-title":"3rd USENIX Security Symposium","author":"Green","year":"2011"},{"key":"2019121909072486700_ref22","first-page":"290","article-title":"Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles","volume-title":"Annual International Cryptology Conference","author":"Boyen","year":"2006"},{"key":"2019121909072486700_ref23","first-page":"256","article-title":"Lower Bounds for Discrete Logarithms and Related Problems","volume-title":"International Conference on the Theory and Applications of Cryptographic Techniques","author":"Shoup","year":"1997"},{"key":"2019121909072486700_ref24","doi-asserted-by":"crossref","first-page":"2119","DOI":"10.1109\/TIFS.2015.2449264","article-title":"Revisiting attribute-based encryption with verifiable outsourced decryption","volume":"10","author":"Lin","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2019121909072486700_ref25","first-page":"200","article-title":"Probabilistic Algorithms for Verification of Polynomial Identities","volume-title":"International Symposium on Symbolic and Algebraic Manipulation","author":"Schwartz","year":"1979"},{"key":"2019121909072486700_ref26","first-page":"216","article-title":"Probabilistic Algorithms for Sparse Polynomials","volume-title":"International Symposium on Symbolic and Algebraic Manipulation","author":"Zippel","year":"1979"},{"key":"2019121909072486700_ref27","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s13389-013-0057-3","article-title":"Charm: a framework for rapidly prototyping cryptosystems","volume":"3","author":"Akinyele","year":"2013","journal-title":"J. Cryptograph. Eng."},{"key":"2019121909072486700_ref28","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1145\/2508859.2516672","article-title":"Practical Constructions and New Proof Methods for Large Universe Attribute-Based Encryption","volume-title":"Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security","author":"Rouselakis","year":"2013"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/62\/12\/1748\/31568485\/bxz052.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/62\/12\/1748\/31568485\/bxz052.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T10:01:39Z","timestamp":1694858499000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/62\/12\/1748\/5518308"}},"subtitle":[],"editor":[{"given":"Albert","family":"Levi","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2019,6,28]]},"references-count":28,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2019,6,28]]},"published-print":{"date-parts":[[2019,12,10]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxz052","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2019,12]]},"published":{"date-parts":[[2019,6,28]]}}}