{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:54:02Z","timestamp":1740174842915,"version":"3.37.3"},"reference-count":25,"publisher":"Wiley","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402171","61271512","61300177","2016MS29"],"award-info":[{"award-number":["61402171","61271512","61300177","2016MS29"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402171","61271512","61300177","2016MS29"],"award-info":[{"award-number":["61402171","61271512","61300177","2016MS29"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402171","61271512","61300177","2016MS29"],"award-info":[{"award-number":["61402171","61271512","61300177","2016MS29"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["61402171","61271512","61300177","2016MS29"],"award-info":[{"award-number":["61402171","61271512","61300177","2016MS29"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2016]]},"abstract":"<jats:p>VCC (Vehicular Cloud Computing) is an emerging and promising paradigm, due to its significance in traffic management and road safety. However, it is difficult to maintain both data security and system efficiency in Vehicular Cloud, because the traffic and vehicular related data is large and complicated. In this paper, we propose a conditional ciphertext-policy attribute-based encryption (C-CP-ABE) scheme to solve this problem. Comparing with CP-ABE, this scheme enables data owner to add extra access trees and the corresponding conditions. Experimental analysis shows that our system brings a trivial amount of storage overhead and a lower amount of computation compared with CP-ABE.<\/jats:p>","DOI":"10.1155\/2016\/1493290","type":"journal-article","created":{"date-parts":[[2016,11,15]],"date-time":"2016-11-15T23:31:19Z","timestamp":1479252679000},"page":"1-10","source":"Crossref","is-referenced-by-count":5,"title":["Conditional Ciphertext-Policy Attribute-Based Encryption Scheme in Vehicular Cloud Computing"],"prefix":"10.1155","volume":"2016","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0901-8621","authenticated-orcid":true,"given":"Zhitao","family":"Guan","sequence":"first","affiliation":[{"name":"School of Control and Computer Engineering, North China Electric Power University, Beijing 102206, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0075-9573","authenticated-orcid":true,"given":"Jing","family":"Li","sequence":"additional","affiliation":[{"name":"School of Control and Computer Engineering, North China Electric Power University, Beijing 102206, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6313-4407","authenticated-orcid":true,"given":"Zijian","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer, Beijing Institute of Technology, Beijing 100081, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3277-3887","authenticated-orcid":true,"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Computer, Beijing Institute of Technology, Beijing 100081, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2335201"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2015.2405853"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2590944"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2596138"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.08.004"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2014.6736756"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2401003"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2601065"},{"first-page":"47","volume-title":"Identity-based cryptosystems and signature schemes","year":"1984","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13013-7_2"},{"key":"18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/978-3-642-13190-5_4","volume-title":"Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption","volume":"6110","year":"2010"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_6"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2011.12.004"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00843-6_2"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12475-9_18"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24316-5_8"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10838-9_23"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23822-2_16"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.3233\/JHS-160536"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2012.97"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223683"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2014.2363562"},{"first-page":"579","volume-title":"Bounded ciphertext policy attribute based encryption","year":"2008","key":"35"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2016\/1493290.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2016\/1493290.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2016\/1493290.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T09:34:15Z","timestamp":1589708055000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/misy\/2016\/1493290\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":25,"alternative-id":["1493290","1493290"],"URL":"https:\/\/doi.org\/10.1155\/2016\/1493290","relation":{},"ISSN":["1574-017X","1875-905X"],"issn-type":[{"type":"print","value":"1574-017X"},{"type":"electronic","value":"1875-905X"}],"subject":[],"published":{"date-parts":[[2016]]}}}