{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:55:15Z","timestamp":1763348115715,"version":"3.37.3"},"reference-count":14,"publisher":"World Scientific Pub Co Pte Ltd","issue":"07","funder":[{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["61502527"],"award-info":[{"award-number":["61502527"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["U1405255"],"award-info":[{"award-number":["U1405255"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["61379150"],"award-info":[{"award-number":["61379150"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Found. Comput. Sci."],"published-print":{"date-parts":[[2017,11]]},"abstract":"<jats:p> Cloud storage greatly facilitates both individuals and organizations to share data over the Internet. However, there are several security issues that impede to outsource their data. Among various approaches introduced to overcome these issues, attribute-based encryption (ABE) provides secure and flexible access control on shared data, and thus is rather promising. But the original ABE is not adaptable to some special circumstances, where attributes are organized in a hierarchical structure, such as enterprises and official institutions. On the other hand, although the wide use of mobile devices enables users to conveniently access shared data anywhere and anytime, this also increases the risk of key exposure, which will result into unwanted exposure of the shared data. In this paper, we extend the functionality of the original ABE and enhance its security by providing key generation delegation and forward security. Consequently, the enhanced ABE meets applications of large organizations with hierarchies and minimizes the damage in the case of unexpected key exposures. Specifically speaking, we present a forward-secure ciphertext-policy hierarchical attribute-based encryption scheme in prime order bilinear groups, as a core building of attribute-based data sharing scheme. The security of the proposed scheme is proven in the standard model. We conduct experiments to demonstrate its efficiency and practicability. <\/jats:p>","DOI":"10.1142\/s0129054117500289","type":"journal-article","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T03:50:52Z","timestamp":1519357852000},"page":"843-868","source":"Crossref","is-referenced-by-count":11,"title":["Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security"],"prefix":"10.1142","volume":"28","author":[{"given":"Jianghong","family":"Wei","sequence":"first","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, P. R. China"},{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100088, P. R. China"}]},{"given":"Xinyi","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350108, P. R. China"}]},{"given":"Wenfen","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, P. R. China"}]},{"given":"Xuexian","family":"Hu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450002, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2018,2,23]]},"reference":[{"key":"S0129054117500289BIB002","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0057-3"},{"volume-title":"Secure Schemes for Secret Sharing and Key Distribution","year":"1996","author":"Beimel A.","key":"S0129054117500289BIB006"},{"key":"S0129054117500289BIB013","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-007-0038-1"},{"key":"S0129054117500289BIB016","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2004.09.015"},{"key":"S0129054117500289BIB017","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.01.035"},{"key":"S0129054117500289BIB021","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.203"},{"key":"S0129054117500289BIB025","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-011-4520-4"},{"key":"S0129054117500289BIB026","first-page":"bxt029","author":"Nieto J. M. G.","year":"2013","journal-title":"The Computer Journal"},{"key":"S0129054117500289BIB028","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.38"},{"key":"S0129054117500289BIB032","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2172209"},{"key":"S0129054117500289BIB033","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.05.006"},{"key":"S0129054117500289BIB037","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxu095"},{"key":"S0129054117500289BIB038","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2279531"},{"key":"S0129054117500289BIB040","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.09.034"}],"container-title":["International Journal of Foundations of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0129054117500289","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T17:39:56Z","timestamp":1565113196000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0129054117500289"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":14,"journal-issue":{"issue":"07","published-online":{"date-parts":[[2018,2,23]]},"published-print":{"date-parts":[[2017,11]]}},"alternative-id":["10.1142\/S0129054117500289"],"URL":"https:\/\/doi.org\/10.1142\/s0129054117500289","relation":{},"ISSN":["0129-0541","1793-6373"],"issn-type":[{"type":"print","value":"0129-0541"},{"type":"electronic","value":"1793-6373"}],"subject":[],"published":{"date-parts":[[2017,11]]}}}