{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:00:16Z","timestamp":1753887616685,"version":"3.41.2"},"reference-count":37,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T00:00:00Z","timestamp":1618963200000},"content-version":"vor","delay-in-days":110,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100013223","name":"Chongqing Research Program of Basic Research and Frontier Technology","doi-asserted-by":"publisher","award":["cstc2018jcyjAX0334"],"award-info":[{"award-number":["cstc2018jcyjAX0334"]}],"id":[{"id":"10.13039\/501100013223","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2019CDQYRJ006"],"award-info":[{"award-number":["2019CDQYRJ006"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61373027","61771289","61672321","61832012","62072065"],"award-info":[{"award-number":["61373027","61771289","61672321","61832012","62072065"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Cloud\u2010assisted Internet of Things (IoT) significantly facilitate IoT devices to outsource their data for high efficient management. Unfortunately, some unsettled security issues dramatically impact the popularity of IoT, such as illegal access and key escrow problem. Traditional public\u2010key encryption can be used to guarantees data confidentiality, while it cannot achieve efficient data sharing. The attribute\u2010based encryption (ABE) is the most promising way to ensure data security and to realize one\u2010to\u2010many fine\u2010grained data sharing simultaneously. However, it cannot be well applied in the cloud\u2010assisted IoT due to the complexity of its decryption and the decryption key leakage problem. To prevent the abuse of decryption rights, we propose a multiauthority ABE scheme with white\u2010box traceability in this paper. Moreover, our scheme greatly lightens the overhead on devices by outsourcing the most decryption work to the cloud server. Besides, fully hidden policy is implemented to protect the privacy of the access policy. Our scheme is proved to be selectively secure against replayable chosen ciphertext attack (RCCA) under the random oracle model. Some theory analysis and simulation are described in the end.<\/jats:p>","DOI":"10.1155\/2021\/6682580","type":"journal-article","created":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T20:39:49Z","timestamp":1619037589000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Traceable Multiauthority Attribute\u2010Based Encryption with Outsourced Decryption and Hidden Policy for CIoT"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7698-8914","authenticated-orcid":false,"given":"Suhui","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6451-1158","authenticated-orcid":false,"given":"Jiguo","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5825-2241","authenticated-orcid":false,"given":"Chunqiang","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Mengmeng","family":"Li","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,4,21]]},"reference":[{"key":"e_1_2_12_1_2","first-page":"47","volume-title":"Workshop on the theory and application of cryptographic techniques","author":"Shamir A.","year":"1984"},{"key":"e_1_2_12_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"e_1_2_12_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"e_1_2_12_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"e_1_2_12_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2825231"},{"key":"e_1_2_12_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"e_1_2_12_7_2","doi-asserted-by":"crossref","unstructured":"ChaseM.andChowS. S. M. Improving privacy and security in multi-authority attribute-based encryption Proceedings of the 16th ACM conference on Computer and communications security - CCS \u203209 2009 Chicago Illinois USA 121\u2013130 https:\/\/doi.org\/10.1145\/1653662.1653678 2-s2.0-74049163235.","DOI":"10.1145\/1653662.1653678"},{"key":"e_1_2_12_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_31"},{"key":"e_1_2_12_9_2","unstructured":"GreenM. HohenbergerS. andWatersB. Outsourcing the decryption of abe ciphertexts 2011 Proc. 20th USENIX Security Symposium USENIX Association 2011 San Francisco CA 1\u201316."},{"key":"e_1_2_12_10_2","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3596205"},{"key":"e_1_2_12_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.036"},{"key":"e_1_2_12_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.045"},{"key":"e_1_2_12_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-016-9019-8"},{"key":"e_1_2_12_14_2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1701675"},{"key":"e_1_2_12_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2330-8"},{"key":"e_1_2_12_16_2","doi-asserted-by":"crossref","unstructured":"BelguithS. KaanicheN. JemaiA. LaurentM. andAttiaR. Pabac: a privacy preserving attribute based framework for fine grained access control in clouds 13th IEEE International Conference on Security and Cryptography(Secrypt) 2016 Portugal 133\u2013146.","DOI":"10.5220\/0005968201330146"},{"key":"e_1_2_12_17_2","first-page":"577","article-title":"Collective data-sanitization for preventing sensitive information inference attacks in social networks","volume":"15","author":"Cai Z.","year":"2018","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_2_12_18_2","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2011.555642"},{"key":"e_1_2_12_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2830307"},{"key":"e_1_2_12_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.SUP.0513004"},{"key":"e_1_2_12_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2679483"},{"key":"e_1_2_12_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2997389"},{"key":"e_1_2_12_23_2","doi-asserted-by":"crossref","unstructured":"CaiZ.andHeZ. Trading private range counting over big iot data 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS) July 2019 Dallas TX USA 144\u2013153 https:\/\/doi.org\/10.1109\/ICDCS.2019.00023.","DOI":"10.1109\/ICDCS.2019.00023"},{"key":"e_1_2_12_24_2","first-page":"211","article-title":"Multi-authority proxy re-encryption based on cpabe for cloud storage systems","volume":"27","author":"Xu X.","year":"2016","journal-title":"Journal of Systems Engineering and Electronics"},{"key":"e_1_2_12_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2015.06.017"},{"key":"e_1_2_12_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701245"},{"key":"e_1_2_12_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2013.2271848"},{"key":"e_1_2_12_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23597-0_7"},{"key":"e_1_2_12_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68914-0_7"},{"key":"e_1_2_12_30_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJACT.2012.045587"},{"key":"e_1_2_12_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"e_1_2_12_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2012.2223683"},{"key":"e_1_2_12_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2014.2363562"},{"key":"e_1_2_12_34_2","doi-asserted-by":"publisher","DOI":"10.1177\/1550147719841276"},{"key":"e_1_2_12_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.032"},{"key":"e_1_2_12_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_33"},{"key":"e_1_2_12_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0057-3"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/6682580.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/6682580.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/6682580","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T14:08:31Z","timestamp":1723039711000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/6682580"}},"subtitle":[],"editor":[{"given":"Yingjie","family":"Wang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/6682580"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6682580","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2020-10-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-07","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"6682580"}}