{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T12:36:33Z","timestamp":1774874193675,"version":"3.50.1"},"reference-count":27,"publisher":"World Scientific Pub Co Pte Ltd","issue":"11","funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61802183"],"award-info":[{"award-number":["61802183"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61472189"],"award-info":[{"award-number":["61472189"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61572255"],"award-info":[{"award-number":["61572255"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100010242","name":"Jiangsu Planned Projects for Postdoctoral Research Funds","doi-asserted-by":"publisher","award":["1701146B"],"award-info":[{"award-number":["1701146B"]}],"id":[{"id":"10.13039\/501100010242","id-type":"DOI","asserted-by":"publisher"}]},{"name":"State Key Laboratory of Air Traffic Management System and Technology","award":["SKLATM201703"],"award-info":[{"award-number":["SKLATM201703"]}]},{"name":"CERNET Next Generation IT Innovation Project","award":["NGII20160105"],"award-info":[{"award-number":["NGII20160105"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J CIRCUIT SYST COMP"],"published-print":{"date-parts":[[2019,10]]},"abstract":"<jats:p> Cloud storage is one of the most widely-used storage services, because it can provide users with unlimited, scalable, low-cost and convenient resource services. When data is outsourced to cloud for storage, data security and access control are the two essential issues that need to be addressed. Attribute-based encryption (ABE) scheme can provide sufficient data security and fine-grained access control for cloud data. As more and more attention is drawn to privacy protection, privacy preservation becomes another urgent issue for cloud storage. In ABE, since the access policies are generally stored in clear text, it will lead to the disclosure of users\u2019 privacy. Some works sacrifice computational efficiency, key length or ciphertext size for privacy concerns. To solve these problems, this paper proposes an efficient privacy-preserving attribute-based encryption scheme with hidden policy for outsourced data. Using the idea of Boolean equivalent transformation, the proposed scheme achieves fast encryption and privacy protection for both data owner and legitimate visitors. In addition, the proposed scheme can satisfy constant secret key length and reasonable size of ciphertext requirements. We also conduct theoretical security analysis, and carry out experiments to prove that the proposed scheme has good performance in terms of computation, communication and storage overheads. <\/jats:p>","DOI":"10.1142\/s021812661950186x","type":"journal-article","created":{"date-parts":[[2018,10,31]],"date-time":"2018-10-31T02:20:04Z","timestamp":1540952404000},"page":"1950186","source":"Crossref","is-referenced-by-count":15,"title":["An Efficient Privacy-Preserving Attribute-Based Encryption with Hidden Policy for Cloud Storage"],"prefix":"10.1142","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1314-4949","authenticated-orcid":false,"given":"Chanying","family":"Huang","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology, No. 200, Xiaolingwei Street, Xuanwu District, Nanjing, Jiangsu 210094, P. R. China"}]},{"given":"Songjie","family":"Wei","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology, No. 200, Xiaolingwei Street, Xuanwu District, Nanjing, Jiangsu 210094, P. R. China"}]},{"given":"Anmin","family":"Fu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology, No. 200, Xiaolingwei Street, Xuanwu District, Nanjing, Jiangsu 210094, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2019,10,23]]},"reference":[{"key":"S021812661950186XBIB002","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.12.025"},{"key":"S021812661950186XBIB004","first-page":"562","volume-title":"IEEE Int. Conf. Computational Science and Engineering","author":"Wu Y."},{"key":"S021812661950186XBIB005","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.01.025"},{"key":"S021812661950186XBIB006","first-page":"1750072","volume":"26","author":"Shiang H. M.","year":"2016","journal-title":"J. Circuits Syst. Comput."},{"key":"S021812661950186XBIB007","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.04.015"},{"key":"S021812661950186XBIB008","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126618501797"},{"key":"S021812661950186XBIB009","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2401003"},{"key":"S021812661950186XBIB010","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.146"},{"key":"S021812661950186XBIB011","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126618501815"},{"key":"S021812661950186XBIB012","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"},{"key":"S021812661950186XBIB013","first-page":"38","volume-title":"2016 Int. Conf. Internet of Things and Cloud Computing","author":"Pise P. D."},{"key":"S021812661950186XBIB014","first-page":"457","volume":"3494","author":"Sahai A.","year":"2005","journal-title":"Eurocrypt."},{"key":"S021812661950186XBIB015","first-page":"89","volume-title":"Proc. 13th ACM Conf. Computer and Communications Security","author":"Goyal V."},{"key":"S021812661950186XBIB016","first-page":"321","volume-title":"Security and Privacy, 2007. SP\u201907, IEEE Symp.","author":"John B."},{"key":"S021812661950186XBIB017","first-page":"456","volume-title":"ACM Conference on Computer and Communications Security ACM","author":"Cheung L."},{"key":"S021812661950186XBIB018","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-014-1253-3"},{"key":"S021812661950186XBIB019","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2442215"},{"key":"S021812661950186XBIB020","first-page":"213","volume-title":"Int. Conf. Information Science and Cloud Computing Companion (ISCC-C)","author":"Zhongma Z."},{"key":"S021812661950186XBIB021","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.200"},{"key":"S021812661950186XBIB022","first-page":"47","volume-title":"Proc. 2010 ACM Workshop on Cloud Computing Security Workshop","author":"Narayan S."},{"key":"S021812661950186XBIB023","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"S021812661950186XBIB024","author":"Roy S.","year":"2010","journal-title":"Tech. Rep."},{"key":"S021812661950186XBIB025","first-page":"24","volume-title":"International Conference on Information Security Practice and Experience","author":"Lai J."},{"key":"S021812661950186XBIB026","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2368352"},{"key":"S021812661950186XBIB027","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2315619"},{"key":"S021812661950186XBIB028","first-page":"19","volume":"18","author":"Zeng F.","year":"2014","journal-title":"Comput. Model. New Technol."},{"key":"S021812661950186XBIB029","first-page":"266","volume-title":"2017 IEEE Int. Conf. Progress in Informatics and Computing (PIC)","author":"Huang C."}],"container-title":["Journal of Circuits, Systems and Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S021812661950186X","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T21:17:21Z","timestamp":1571865441000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S021812661950186X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":27,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["10.1142\/S021812661950186X"],"URL":"https:\/\/doi.org\/10.1142\/s021812661950186x","relation":{},"ISSN":["0218-1266","1793-6454"],"issn-type":[{"value":"0218-1266","type":"print"},{"value":"1793-6454","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10]]}}}