{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:44:04Z","timestamp":1740149044319,"version":"3.37.3"},"reference-count":0,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702548","61601515","162300410192"],"award-info":[{"award-number":["61702548","61601515","162300410192"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702548","61601515","162300410192"],"award-info":[{"award-number":["61702548","61601515","162300410192"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental and Frontier Technology Research of Henan Province","award":["61702548","61601515","162300410192"],"award-info":[{"award-number":["61702548","61601515","162300410192"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,3,16]]},"abstract":"<jats:p>Attribute-based encryption achieves fine-grained access control, especially in a cloud computing environment. In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, the ciphertexts are associated with the access policies, while the secret keys are determined by the attributes. In recent years, people have tried to find more effective access structures to improve the efficiency of encryption systems. This paper presents a ciphertext-policy attribute-based encryption scheme that supports arithmetic span programs. On the composite-order bilinear group, the security of the scheme is proven by experimental sequence based on the combination of composite-order bilinear entropy expansion lemma and subgroup decision (SD) assumption. And, it is an adaptively secure scheme with constant-size public parameters.<\/jats:p>","DOI":"10.1155\/2020\/3265871","type":"journal-article","created":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T23:31:02Z","timestamp":1584401462000},"page":"1-16","source":"Crossref","is-referenced-by-count":3,"title":["A CP-ABE Scheme Supporting Arithmetic Span Programs"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3716-0660","authenticated-orcid":true,"given":"Chao","family":"Ma","sequence":"first","affiliation":[{"name":"PLA SSF Information Engineering University, Zhengzhou, Henan, China"}]},{"given":"Haiying","family":"Gao","sequence":"additional","affiliation":[{"name":"PLA SSF Information Engineering University, Zhengzhou, Henan, China"}]},{"given":"Duo","family":"Wei","sequence":"additional","affiliation":[{"name":"PLA SSF Information Engineering University, Zhengzhou, Henan, China"}]}],"member":"311","container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/3265871.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/3265871.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/3265871.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T23:31:04Z","timestamp":1584401464000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/3265871\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":0,"alternative-id":["3265871","3265871"],"URL":"https:\/\/doi.org\/10.1155\/2020\/3265871","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2020,3,16]]}}}