{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T22:30:35Z","timestamp":1770330635108,"version":"3.49.0"},"reference-count":31,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T00:00:00Z","timestamp":1608595200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&D Program of China","award":["2017YFB0802000"],"award-info":[{"award-number":["2017YFB0802000"]}]},{"name":"National Key R&D Program of China","award":["U1705264"],"award-info":[{"award-number":["U1705264"]}]},{"name":"National Key R&D Program of China","award":["61972124"],"award-info":[{"award-number":["61972124"]}]},{"name":"National Key R&D Program of China","award":["61672030"],"award-info":[{"award-number":["61672030"]}]},{"name":"National Key R&D Program of China","award":["11974096"],"award-info":[{"award-number":["11974096"]}]},{"name":"National Key R&D Program of China","award":["61702067"],"award-info":[{"award-number":["61702067"]}]},{"name":"National Key R&D Program of China","award":["LY19F020019"],"award-info":[{"award-number":["LY19F020019"]}]},{"name":"National Key R&D Program of China","award":["2017QDL002"],"award-info":[{"award-number":["2017QDL002"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2017YFB0802000"],"award-info":[{"award-number":["2017YFB0802000"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1705264"],"award-info":[{"award-number":["U1705264"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972124"],"award-info":[{"award-number":["61972124"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672030"],"award-info":[{"award-number":["61672030"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11974096"],"award-info":[{"award-number":["11974096"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702067"],"award-info":[{"award-number":["61702067"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["LY19F020019"],"award-info":[{"award-number":["LY19F020019"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2017QDL002"],"award-info":[{"award-number":["2017QDL002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["2017YFB0802000"],"award-info":[{"award-number":["2017YFB0802000"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["U1705264"],"award-info":[{"award-number":["U1705264"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["61972124"],"award-info":[{"award-number":["61972124"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["61672030"],"award-info":[{"award-number":["61672030"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["11974096"],"award-info":[{"award-number":["11974096"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["61702067"],"award-info":[{"award-number":["61702067"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LY19F020019"],"award-info":[{"award-number":["LY19F020019"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["2017QDL002"],"award-info":[{"award-number":["2017QDL002"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007820","name":"Hangzhou Normal University","doi-asserted-by":"publisher","award":["2017YFB0802000"],"award-info":[{"award-number":["2017YFB0802000"]}],"id":[{"id":"10.13039\/501100007820","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007820","name":"Hangzhou Normal University","doi-asserted-by":"publisher","award":["U1705264"],"award-info":[{"award-number":["U1705264"]}],"id":[{"id":"10.13039\/501100007820","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007820","name":"Hangzhou Normal University","doi-asserted-by":"publisher","award":["61972124"],"award-info":[{"award-number":["61972124"]}],"id":[{"id":"10.13039\/501100007820","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007820","name":"Hangzhou Normal University","doi-asserted-by":"publisher","award":["61672030"],"award-info":[{"award-number":["61672030"]}],"id":[{"id":"10.13039\/501100007820","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007820","name":"Hangzhou Normal University","doi-asserted-by":"publisher","award":["11974096"],"award-info":[{"award-number":["11974096"]}],"id":[{"id":"10.13039\/501100007820","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007820","name":"Hangzhou Normal University","doi-asserted-by":"publisher","award":["61702067"],"award-info":[{"award-number":["61702067"]}],"id":[{"id":"10.13039\/501100007820","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007820","name":"Hangzhou Normal University","doi-asserted-by":"publisher","award":["LY19F020019"],"award-info":[{"award-number":["LY19F020019"]}],"id":[{"id":"10.13039\/501100007820","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007820","name":"Hangzhou Normal University","doi-asserted-by":"publisher","award":["2017QDL002"],"award-info":[{"award-number":["2017QDL002"]}],"id":[{"id":"10.13039\/501100007820","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,12,22]]},"abstract":"<jats:p>The revocable ciphertext-policy attribute-based encryption (R-CP-ABE) is an extension of ciphertext-policy attribute-based encryption (CP-ABE), which can realize user direct revocation and maintain a short revocation list. However, the revoked users can still decrypt the previously authorized encrypted data with their old key. The R-CP-ABE scheme should provide a mechanism to protect the encrypted data confidentiality by disqualifying the revoked users from accessing the previously encrypted data. Motivated by practical needs, we propose a new user R-CP-ABE scheme that simultaneously supports user direct revocation, short revocation list, and ciphertext update by incorporating the identity-based and time-based revocable technique. The scheme provides a strongly selective security proof under the modified decisional <jats:inline-formula>\n                     <a:math xmlns:a=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M1\">\n                        <a:mi>q<\/a:mi>\n                     <\/a:math>\n                  <\/jats:inline-formula>-parallel bilinear Diffie\u2013Hellman Exponent problem, where \u201cstrongly\u201d means that the adversary can query the secret key of a user whose attribute set satisfies the challenge ciphertext access structure and whose identity is in the revocation list.<\/jats:p>","DOI":"10.1155\/2020\/8856592","type":"journal-article","created":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T18:35:48Z","timestamp":1608662148000},"page":"1-11","source":"Crossref","is-referenced-by-count":16,"title":["A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6721-3612","authenticated-orcid":true,"given":"Zhe","family":"Liu","sequence":"first","affiliation":[{"name":"Department of Mathematics, Hangzhou Normal University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6178-3630","authenticated-orcid":true,"given":"Fuqun","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Hangzhou Normal University, Hangzhou, China"},{"name":"Westone Cryptologic Research Center, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1961-5614","authenticated-orcid":true,"given":"Kefei","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Hangzhou Normal University, Hangzhou, China"},{"name":"Westone Cryptologic Research Center, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0048-9876","authenticated-orcid":true,"given":"Fei","family":"Tang","sequence":"additional","affiliation":[{"name":"School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing, China"}]}],"member":"311","reference":[{"key":"1","first-page":"89","article-title":"Attribute-based encryption for fine-grained access control of encrypted data","author":"V. Goyal"},{"key":"2","first-page":"195","article-title":"Attribute-based encryption with non-monotonoc access structures","author":"R. Ostrovsky"},{"key":"3","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1007\/11426639_27","article-title":"Fuzzy identity-based encryption","volume-title":"EUROCRYPT 2005","author":"A. Sahai","year":"2005"},{"key":"4","doi-asserted-by":"crossref","article-title":"Expressive key-policy attribute-based encryption with constant-size ciphertexts","author":"N. Attrapadung","DOI":"10.1007\/978-3-642-19379-8_6"},{"key":"5","first-page":"321","article-title":"Ciphertext-policy attribute-based encryption","author":"J. Bethencourt"},{"key":"6","first-page":"456","article-title":"Provably secure ciphertext policy ABE","author":"L. Cheung"},{"key":"7","first-page":"53","volume-title":"Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, And Provably Secure Realization","author":"B. Waters","year":"2011"},{"key":"8","article-title":"Ciphertext-policy attribute-based encryption with non-monotonic access structure","author":"J. Hong-Yong"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2014.2346023"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.11.016"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2549004"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2017.2746000"},{"issue":"6","key":"13","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1007\/s10207-014-0270-9","article-title":"Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation","volume":"14","author":"Q. Huiling","year":"2015","journal-title":"International Journal of Information Security"},{"key":"14","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.jcss.2017.03.002","article-title":"A general framework for secure sharing of personal health records in cloud system","volume":"90","author":"M. H. Au","year":"2017","journal-title":"Journal of Computer and System Sciences"},{"key":"15","first-page":"65","article-title":"Efficient fine-grained access control for secure personal health records in cloud computing","author":"K. He"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.10.014"},{"issue":"5","key":"17","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1109\/TSC.2016.2520932","article-title":"Flexible and fine-grained attribute-based data storage in cloud computing","volume":"10","author":"L Jiguo","year":"2017","journal-title":"Services Computing IEEE Transactions on"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-013-1202-8"},{"key":"19","first-page":"417","article-title":"Identity-based encryption with efficient revocation","author":"A. Boldyreva"},{"key":"20","first-page":"199","article-title":"Dynamic credentials and ciphertext delegation for attribute-based encryption","author":"A. Sahai"},{"key":"21","first-page":"248","article-title":"Conjunctive broadcast and attribute-based encryption","author":"N. Attrapadung"},{"issue":"7","key":"22","first-page":"127","article-title":"Practical ciphertext-policy attribute-based encryption: traitor tracing, revocation and large universe","volume":"59","author":"Z. Liu","year":"2015","journal-title":"The Computer Journal"},{"key":"23","first-page":"2017","article-title":"IR-CP-ABE: identity revocable ciphertext-policy attribute-based encryption for flexible secure group-based communication","volume":"1100","author":"W. Weijia","year":"2017","journal-title":"IACR Cryptology ePrint Archive"},{"key":"24","first-page":"586","article-title":"Attribute-based fine-grained access control with user revocation","author":"J. Ye"},{"key":"25","first-page":"261","article-title":"Attribute based data sharing with attribute revocation","author":"S. Yu"},{"key":"26","first-page":"696","article-title":"Ciphertext-policy attribute-based encryption with user revocation support","author":"A. Balu"},{"key":"27","unstructured":"LiangX.LuR.LinX.ShenX.Ciphertext policy attribute based encryption with efficient revocation2011Waterloo, CanadaUniversity of WaterlooTechnical Report"},{"key":"28","first-page":"373","article-title":"New ciphertext-policy attribute-based access control with efficient revocation","author":"X. Xie"},{"key":"29","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-93387-0_27","article-title":"Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation list","volume-title":"Applied Cryptography and Network Security","author":"J. K. Liu","year":"2018"},{"key":"30","article-title":"Schemes for secret sharing and key distribution","author":"A. Beimel"},{"key":"31","first-page":"273","article-title":"Security and privacy (SP)","author":"A. Lewko"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8856592.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8856592.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8856592.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T18:35:58Z","timestamp":1608662158000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8856592\/"}},"subtitle":[],"editor":[{"given":"Kaitai","family":"Liang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,12,22]]},"references-count":31,"alternative-id":["8856592","8856592"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8856592","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2020,12,22]]}}}