{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T19:11:59Z","timestamp":1760987519368,"version":"3.37.3"},"reference-count":35,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T00:00:00Z","timestamp":1608595200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802243","11801345","62072352","2019JQ-273","2020JM-288","2019JQ-472","2020CGXNG-002","2019ZDLGY13-03-01","2019GY-013","2018M633456","LZC0020","KX202035","GK201903011"],"award-info":[{"award-number":["61802243","11801345","62072352","2019JQ-273","2020JM-288","2019JQ-472","2020CGXNG-002","2019ZDLGY13-03-01","2019GY-013","2018M633456","LZC0020","KX202035","GK201903011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007128","name":"Natural Science Foundation of Shaanxi Province","doi-asserted-by":"publisher","award":["61802243","11801345","62072352","2019JQ-273","2020JM-288","2019JQ-472","2020CGXNG-002","2019ZDLGY13-03-01","2019GY-013","2018M633456","LZC0020","KX202035","GK201903011"],"award-info":[{"award-number":["61802243","11801345","62072352","2019JQ-273","2020JM-288","2019JQ-472","2020CGXNG-002","2019ZDLGY13-03-01","2019GY-013","2018M633456","LZC0020","KX202035","GK201903011"]}],"id":[{"id":"10.13039\/501100007128","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Program in Industry Field of Shaanxi Province","award":["61802243","11801345","62072352","2019JQ-273","2020JM-288","2019JQ-472","2020CGXNG-002","2019ZDLGY13-03-01","2019GY-013","2018M633456","LZC0020","KX202035","GK201903011"],"award-info":[{"award-number":["61802243","11801345","62072352","2019JQ-273","2020JM-288","2019JQ-472","2020CGXNG-002","2019ZDLGY13-03-01","2019GY-013","2018M633456","LZC0020","KX202035","GK201903011"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["61802243","11801345","62072352","2019JQ-273","2020JM-288","2019JQ-472","2020CGXNG-002","2019ZDLGY13-03-01","2019GY-013","2018M633456","LZC0020","KX202035","GK201903011"],"award-info":[{"award-number":["61802243","11801345","62072352","2019JQ-273","2020JM-288","2019JQ-472","2020CGXNG-002","2019ZDLGY13-03-01","2019GY-013","2018M633456","LZC0020","KX202035","GK201903011"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"The Verification Platform of Multi-tier Coverage Communication Network for Oceans","award":["61802243","11801345","62072352","2019JQ-273","2020JM-288","2019JQ-472","2020CGXNG-002","2019ZDLGY13-03-01","2019GY-013","2018M633456","LZC0020","KX202035","GK201903011"],"award-info":[{"award-number":["61802243","11801345","62072352","2019JQ-273","2020JM-288","2019JQ-472","2020CGXNG-002","2019ZDLGY13-03-01","2019GY-013","2018M633456","LZC0020","KX202035","GK201903011"]}]},{"name":"Guangxi Key Laboratory of Trusted Software","award":["61802243","11801345","62072352","2019JQ-273","2020JM-288","2019JQ-472","2020CGXNG-002","2019ZDLGY13-03-01","2019GY-013","2018M633456","LZC0020","KX202035","GK201903011"],"award-info":[{"award-number":["61802243","11801345","62072352","2019JQ-273","2020JM-288","2019JQ-472","2020CGXNG-002","2019ZDLGY13-03-01","2019GY-013","2018M633456","LZC0020","KX202035","GK201903011"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["61802243","11801345","62072352","2019JQ-273","2020JM-288","2019JQ-472","2020CGXNG-002","2019ZDLGY13-03-01","2019GY-013","2018M633456","LZC0020","KX202035","GK201903011"],"award-info":[{"award-number":["61802243","11801345","62072352","2019JQ-273","2020JM-288","2019JQ-472","2020CGXNG-002","2019ZDLGY13-03-01","2019GY-013","2018M633456","LZC0020","KX202035","GK201903011"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,12,22]]},"abstract":"<jats:p>Multiauthority ciphertext-policy attribute-based encryption (MA-CP-ABE) is a promising technique for secure data sharing in cloud storage. As multiple users with same attributes have same decryption privilege in MA-CP-ABE, the identity of the decryption key owner cannot be accurately traced by the exposed decryption key. This will lead to the key abuse problem, for example, the malicious users may sell their decryption keys to others. In this paper, we first present a traceable MA-CP-ABE scheme supporting fast access and malicious users\u2019 accountability. Then, we prove that the proposed scheme is adaptively secure under the symmetric external Diffie\u2013Hellman assumption and fully traceable under the <jats:inline-formula>\n                     <a:math xmlns:a=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M1\">\n                        <a:mi>q<\/a:mi>\n                     <\/a:math>\n                  <\/jats:inline-formula>-Strong Diffie\u2013Hellman assumption. Finally, we design a traceable and revocable MA-CP-ABE system for secure and efficient cloud storage from the proposed scheme. When a malicious user leaks his decryption key, our proposed system can not only confirm his identity but also revoke his decryption privilege. Extensive efficiency analysis results indicate that our system requires only constant number of pairing operations for ciphertext data access.<\/jats:p>","DOI":"10.1155\/2020\/6661243","type":"journal-article","created":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T19:05:06Z","timestamp":1608663906000},"page":"1-14","source":"Crossref","is-referenced-by-count":9,"title":["A Traceable and Revocable Multiauthority Attribute-Based Encryption Scheme with Fast Access"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5141-4364","authenticated-orcid":true,"given":"Kai","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Mathematics and Information Science, Shaanxi Normal University, Xi\u2019an 710119, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2395-6000","authenticated-orcid":true,"given":"Yanping","family":"Li","sequence":"additional","affiliation":[{"name":"School of Mathematics and Information Science, Shaanxi Normal University, Xi\u2019an 710119, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8396-6606","authenticated-orcid":true,"given":"Yun","family":"Song","sequence":"additional","affiliation":[{"name":"School of Computer Science, Shaanxi Normal University, Xi\u2019an 710119, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9472-8913","authenticated-orcid":true,"given":"Laifeng","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Mathematics and Information Science, Shaanxi Normal University, Xi\u2019an 710119, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5739-8038","authenticated-orcid":true,"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xidian University, Xi\u2019an, Shaanxi 710071, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0894-4992","authenticated-orcid":true,"given":"Qi","family":"Jiang","sequence":"additional","affiliation":[{"name":"Network Communication Research Centre, Peng Cheng Laboratory, Shenzhen 518055, Guangdong, China"},{"name":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/tsmc.2017.2698457"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/GPC.WORKSHOPS.2008.18"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2016.0115"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2011.6069707"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14992-4_13"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.3390\/sym7031176"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2503399"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"first-page":"457","article-title":"Fuzzy identity-based encryption","author":"A. Sahai","key":"10"},{"first-page":"321","article-title":"Ciphertext-policy attribute based encryption","author":"J. Bethencourt","key":"11"},{"first-page":"515","article-title":"Multi-authority attribute based encryption","author":"M. Chase","key":"12"},{"first-page":"386","article-title":"Multi-authority ciphertext-policy attribute-based encryption with accountability","author":"J. Li","key":"13"},{"first-page":"2398","article-title":"TR-MA-CP-ABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems","author":"J. Zhou","key":"14"},{"first-page":"337","article-title":"Accountable multi-authority ciphertext-policy attribute-based encryption without key escrow and key abuse","author":"G. Yu","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-016-9019-8"},{"first-page":"121","article-title":"Improving privacy and security in multi-authority attribute-based encryption","author":"M. Chase","key":"17"},{"first-page":"568","article-title":"Decentralizing attribute-based encryption","author":"A. Lewko","key":"18"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxw007"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/7323158"},{"first-page":"97","article-title":"Fe for inner products and its application to decentralized abe","author":"Z. Wang","key":"21"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.2963899"},{"article-title":"Attribute-based encryption with key cloning protection","year":"2008","author":"M. J. Hinek","key":"23"},{"issue":"1","key":"24","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/TIFS.2012.2223683","article-title":"White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures","volume":"8","author":"Z. Liu","year":"2013","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"25","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/TIFS.2014.2363562","article-title":"Traceable CP-ABE: How to trace decryption devices found in the wild","volume":"10","author":"Z. Liu","year":"2015","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2791538"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxv101"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.05.115"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2977646"},{"key":"30","unstructured":"BeimelA.Secure schemes for secret sharing and key distribution1996Haifa, IsraelTechnion-Israel Institute of technologyDissertation for Ph.D. Degree"},{"key":"31","unstructured":"BallardL.GreenM.de MedeirosB.Correlation-resistant storage via keyword-searchable encryption2005IACR Cryptology ePrint Archivehttps:\/\/eprint.iacr.org\/2005\/417Report 2005\/417"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9005-7"},{"first-page":"357","article-title":"Comparing the pairing efficiency over compositeorder and prime-order elliptic curves","author":"A. Guillevic","key":"33"},{"author":"B. Lynn","key":"34","article-title":"The stanford pairing based crypto library"},{"first-page":"315","article-title":"Efficient statically-secure large-universe multi-authority attribute-based encryption","author":"Y. Rouselakis","key":"35"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/6661243.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/6661243.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/6661243.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T19:05:17Z","timestamp":1608663917000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/6661243\/"}},"subtitle":[],"editor":[{"given":"Athanasios V.","family":"Vasilakos","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,12,22]]},"references-count":35,"alternative-id":["6661243","6661243"],"URL":"https:\/\/doi.org\/10.1155\/2020\/6661243","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2020,12,22]]}}}