{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T00:13:08Z","timestamp":1769731988196,"version":"3.49.0"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"National Key R&D Program of China","award":["2017YFB1400700"],"award-info":[{"award-number":["2017YFB1400700"]}]},{"DOI":"10.13039\/501100004826","name":"Beijing Natural Science Foundation","doi-asserted-by":"publisher","award":["4182033"],"award-info":[{"award-number":["4182033"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002367","name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences","doi-asserted-by":"publisher","award":["2017-MS-02"],"award-info":[{"award-number":["2017-MS-02"]}],"id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672083"],"award-info":[{"award-number":["61672083"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61370190"],"award-info":[{"award-number":["61370190"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61532021"],"award-info":[{"award-number":["61532021"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472429"],"award-info":[{"award-number":["61472429"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402029"],"award-info":[{"award-number":["61402029"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2810243","type":"journal-article","created":{"date-parts":[[2018,2,28]],"date-time":"2018-02-28T19:20:21Z","timestamp":1519845621000},"page":"14827-14841","source":"Crossref","is-referenced-by-count":15,"title":["Privacy Preservation for Outsourced Medical Data With Flexible Access Control"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0640-1326","authenticated-orcid":false,"given":"Xingguang","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Zongyang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"347","article-title":"Fully secure anonymous HIBE and secret-key anonymous IBE with short ciphertexts","author":"de caro","year":"2010","journal-title":"Proc Pairing Based Cryptography Conf"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506428"},{"key":"ref12","year":"1996","journal-title":"Health insurance portability and accountability act"},{"key":"ref13","year":"2001","journal-title":"Recommendations for the Interpretation and Application of the Personal Information Protection and Electronic Documents Act (SC2000 C5) in the Health Research Context"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2012.45"},{"key":"ref16","author":"sedayao","year":"2012","journal-title":"Enhancing Cloud Security Using Data Anonymization"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2368352"},{"key":"ref18","first-page":"146","article-title":"Anonymous-CPABE: Privacy preserved content disclosure for data sharing in cloud","author":"sabitha","year":"2015","journal-title":"Computer Systems Architecture"},{"key":"ref19","first-page":"559","article-title":"Anonymous role-based access control on e-health records","author":"zhou","year":"2016","journal-title":"Proc ACM ASIACCS"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046628"},{"key":"ref27","first-page":"247","article-title":"Identity-based online\/offline encryption","volume":"51","author":"wang","year":"2012","journal-title":"Computer Technology and Development"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2003.1232060"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866845"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-CSS-ICESS.2015.10"},{"key":"ref7","first-page":"443","article-title":"A view-based acces control model for EHR systems","author":"sicuranza","year":"2014","journal-title":"Intelligent Distributed Computing VI"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2012.42"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/978-3-540-30576-7_18","article-title":"Evaluating 2-DNF formulas on ciphertexts","author":"boneh","year":"2005","journal-title":"Theory Cryptography"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1455526.1455531"},{"key":"ref20","first-page":"215","article-title":"Anonymous hierarchical identity-based encryption with constant size ciphertexts","author":"seo","year":"2009","journal-title":"Proc Public Key Cryptography"},{"key":"ref22","first-page":"440","article-title":"Hierarchical identity based encryption with constant size ciphertext","author":"boneh","year":"2005","journal-title":"Adv Cryptology"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_12"},{"key":"ref24","first-page":"455","article-title":"New techniques for dual system encryption and fully secure HIBE with short ciphertexts","author":"lewko","year":"2010","journal-title":"Theory Cryptography"},{"key":"ref23","author":"ameri","year":"2016","journal-title":"Efficient and provable secure anonymous hierarchical identity-based broadcast encryption (HIBBE) scheme without random oracle"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/BF02254791"},{"key":"ref25","first-page":"293","article-title":"Online\/offline attribute-based encryption","author":"hohenberger","year":"2014","journal-title":"Proc Public Key Cryptography"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08304531.pdf?arnumber=8304531","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T05:16:19Z","timestamp":1643174179000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8304531\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2810243","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}