{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T04:29:28Z","timestamp":1772166568483,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T00:00:00Z","timestamp":1612310400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T00:00:00Z","timestamp":1612310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"National Cryptography Development fund","award":["MMJJ20180210"],"award-info":[{"award-number":["MMJJ20180210"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61832012"],"award-info":[{"award-number":["61832012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672019"],"award-info":[{"award-number":["61672019"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2021,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>\n                    Countless data generated in Smart city may contain private and sensitive information and should be protected from unauthorized users. The data can be encrypted by Attribute-based encryption (CP-ABE), which allows encrypter to specify access policies in the ciphertext. But, traditional CP-ABE schemes are limited because of two shortages: the access policy is public i.e., privacy exposed; the decryption time is linear with the complexity of policy, i.e., huge computational overheads. In this work, we introduce a novel method to protect the privacy of CP-ABE scheme by keyword search (KS) techniques. In detail, we define a new security model called\n                    <jats:italic>chosen sensitive policy security<\/jats:italic>\n                    : two access policies embedded in the ciphertext, one is public and the other is sensitive and hidden. If user's attributes don't satisfy the public policy, he\/she cannot get any information (attribute name and its values) of the hidden one. Previous CP-ABE schemes with hidden policy only work on the \u201cAND-gate\u201d access structure or their ciphertext size or decryption time maybe super-polynomial. Our scheme is more expressive and compact. Since, IoT devices spread all over the smart city, so the computational overhead of encryption and decryption can be shifted to third parties. Therefore, our scheme is more applicable to resource-constrained users. We prove our scheme to be selective secure under the decisional bilinear Diffie-Hellman (DBDH) assumption.\n                  <\/jats:p>","DOI":"10.1186\/s13638-020-01875-2","type":"journal-article","created":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T12:03:13Z","timestamp":1612353793000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Ciphertext-policy attribute-based encryption with hidden sensitive policy from keyword search techniques in smart city"],"prefix":"10.1186","volume":"2021","author":[{"given":"Fei","family":"Meng","sequence":"first","affiliation":[]},{"given":"Leixiao","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Mingqiang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,3]]},"reference":[{"key":"1875_CR1","unstructured":"F. Bonomi, R.A. Milito, J. Zhu, S. Addepalli, Fog computing and its role in the internet of things, in MCC@SIGCOMM 2012 (2012), pp. 13\u201316"},{"key":"1875_CR2","unstructured":"A. Sahai, B. Waters, Fuzzy identity-based encryption, in EUROCRYPT 2005 (2005), pp. 457\u2013473"},{"key":"1875_CR3","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1145\/1180405.1180418","volume":"2006","author":"V Goyal","year":"2006","unstructured":"V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data. CCS 2006, 89\u201398 (2006)","journal-title":"CCS"},{"key":"1875_CR4","unstructured":"J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encryption, in S&P 2007 (2007), pp. 321\u2013334"},{"key":"1875_CR5","doi-asserted-by":"crossref","unstructured":"B. Waters, Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization, in PKC 2011, Lecture Notes in Computer Science, vol. 6571 (Springer, Taormina, 2011), pp. 53\u201370","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"1875_CR6","first-page":"111","volume-title":"ACNS 2008. Lecture Notes in Computer Science","author":"T Nishide","year":"2008","unstructured":"T. Nishide, K. Yoneyama, K. Ohta, Attribute-based encryption with partially hidden encryptor-specified access structures, in ACNS 2008. Lecture Notes in Computer Science, vol. 5037, ed. by S.M. Bellovin, R. Gennaro, A.D. Keromytis, M. Yung (Springer, New York, 2008), pp. 111\u2013129"},{"key":"1875_CR7","first-page":"146","volume-title":"EUROCRYPT 2008. Lecture Notes in Computer Science","author":"J Katz","year":"2008","unstructured":"J. Katz, A. Sahai, B. Waters, Predicate encryption supporting disjunctions, polynomial equations, and inner products, in EUROCRYPT 2008. Lecture Notes in Computer Science, vol. 4965, ed. by N.P. Smart (Springer, Istanbul, 2008), pp. 146\u2013162"},{"key":"1875_CR8","doi-asserted-by":"crossref","unstructured":"S. Yu, C. Wang, K. Ren, W. Lou, Achieving secure, scalable, and fine-grained data access control in cloud computing, in INFOCOM 2010 (IEEE, San Diego, USA, 2010), pp. 534\u2013542","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"1875_CR9","unstructured":"M. Green, S. Hohenberger, B. Waters, Outsourcing the decryption of ABE ciphertexts, in USENIX 2011 (2011)"},{"key":"1875_CR10","first-page":"557","volume-title":"EUROCRYPT 2014. Lecture Notes in Computer Science","author":"N Attrapadung","year":"2014","unstructured":"N. Attrapadung, Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more, in EUROCRYPT 2014. Lecture Notes in Computer Science, vol. 8441, ed. by P.Q. Nguyen, E. Oswald (Springer, Copenhagen, 2014), pp. 557\u2013577"},{"key":"1875_CR11","first-page":"218","volume-title":"CRYPTO 2012. Lecture Notes in Computer Science","author":"B Waters","year":"2012","unstructured":"B. Waters, Functional encryption for regular languages, in CRYPTO 2012. Lecture Notes in Computer Science, vol. 7417, ed. by R. Safavi-Naini, R. Canetti (Springer, Santa Barbara, 2012), pp. 218\u2013235"},{"key":"1875_CR12","first-page":"547","volume-title":"EUROCRYPT 2011. Lecture Notes in Computer Science","author":"AB Lewko","year":"2011","unstructured":"A.B. Lewko, B. Waters, Unbounded HIBE and attribute-based encryption, in EUROCRYPT 2011. Lecture Notes in Computer Science, vol. 6632, ed. by K.G. Paterson (Springer, Tallinn, 2011), pp. 547\u2013567"},{"key":"1875_CR13","first-page":"463","volume-title":"CCS 2013","author":"Y Rouselakis","year":"2013","unstructured":"Y. Rouselakis, B. Waters, Practical constructions and new proof methods for large universe attribute-based encryption, in CCS 2013, ed. by A. Sadeghi, V.D. Gligor, M. Yung (ACM, Berlin, 2013), pp. 463\u2013474"},{"key":"1875_CR14","first-page":"90","volume-title":"PKC 2011. Lecture Notes in Computer Science","author":"N Attrapadung","year":"2011","unstructured":"N. Attrapadung, B. Libert, E. de Panafieu, Expressive key-policy attribute-based encryption with constant-size ciphertexts, in PKC 2011. Lecture Notes in Computer Science, vol. 6571, ed. by D. Catalano, N. Fazio, R. Gennaro, A. Nicolosi (Springer, Taormina, 2011), pp. 90\u2013108"},{"key":"1875_CR15","first-page":"515","volume-title":"TCC 2007. Lecture Notes in Computer Science","author":"M Chase","year":"2007","unstructured":"M. Chase, Multi-authority attribute based encryption, in TCC 2007. Lecture Notes in Computer Science, vol. 4392, ed. by S.P. Vadhan (Springer, Amsterdam, 2007), pp. 515\u2013534"},{"key":"1875_CR16","first-page":"121","volume-title":"CCS 2009","author":"M Chase","year":"2009","unstructured":"M. Chase, S.S.M. Chow, Improving privacy and security in multi-authority attribute-based encryption, in CCS 2009, ed. by E. Al-Shaer, S. Jha, A.D. Keromytis (ACM, Chicago, 2009), pp. 121\u2013130"},{"key":"1875_CR17","first-page":"568","volume-title":"EUROCRYPT 2011. Lecture Notes in Computer Science","author":"AB Lewko","year":"2011","unstructured":"A.B. Lewko, B. Waters, Decentralizing attribute-based encryption, in EUROCRYPT 2011. Lecture Notes in Computer Science, vol. 6632, ed. by K.G. Paterson (Springer, Tallinn, 2011), pp. 568\u2013588"},{"key":"1875_CR18","first-page":"62","volume-title":"EUROCRYPT 2010. Lecture Notes in Computer Science","author":"AB Lewko","year":"2010","unstructured":"A.B. Lewko, T. Okamoto, A. Sahai, K. Takashima, B. Waters, Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption, in EUROCRYPT 2010. Lecture Notes in Computer Science, vol. 6110, ed. by H. Gilbert (Springer, Monaco, 2010), pp. 62\u201391"},{"key":"1875_CR19","first-page":"349","volume-title":"ASIACRYPT 2012. Lecture Notes in Computer Science","author":"T Okamoto","year":"2012","unstructured":"T. Okamoto, K. Takashima, Fully secure unbounded inner-product and attribute-based encryption, in ASIACRYPT 2012. Lecture Notes in Computer Science, vol. 7658, ed. by X. Wang, K. Sako (Springer, Beijing, 2012), pp. 349\u2013366"},{"key":"1875_CR20","first-page":"180","volume-title":"CRYPTO 2012. Lecture Notes in Computer Science","author":"AB Lewko","year":"2012","unstructured":"A.B. Lewko, B. Waters, New proof methods for attribute-based encryption: achieving full security through selective techniques, in CRYPTO 2012. Lecture Notes in Computer Science, vol. 7417, ed. by R. Safavi-Naini, R. Canetti (Springer, Santa Barbara, 2012), pp. 180\u2013198"},{"key":"1875_CR21","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1007\/978-3-642-40203-6_33","volume-title":"ESORICS 2013. Lecture Notes in Computer Science","author":"J Li","year":"2013","unstructured":"J. Li, X. Chen, J. Li, C. Jia, J. Ma, W. Lou, Fine-grained access control system based on outsourced attribute-based encryption, in ESORICS 2013. Lecture Notes in Computer Science, vol. 8134, ed. by J. Crampton, S. Jajodia, K. Mayes (Springer, Egham, 2013), pp. 592\u2013609"},{"key":"1875_CR22","doi-asserted-by":"publisher","first-page":"730","DOI":"10.1016\/j.future.2016.10.028","volume":"78","author":"C Zuo","year":"2018","unstructured":"C. Zuo, J. Shao, G. Wei, M. Xie, M. Ji, CCA-secure ABE with outsourced decryption for fog computing. Future Gener. Comput. Syst. 78, 730\u2013738 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"1875_CR23","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1016\/j.future.2016.12.015","volume":"78","author":"P Zhang","year":"2018","unstructured":"P. Zhang, Z. Chen, J.K. Liu, K. Liang, H. Liu, An efficient access control scheme with outsourcing capability and attribute update for fog computing. Future Gener. Comput. Syst. 78, 753\u2013762 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"1875_CR24","first-page":"347","volume-title":"ISC 2009. Lecture Notes in Computer Science","author":"J Li","year":"2009","unstructured":"J. Li, K. Ren, B. Zhu, Z. Wan, Privacy-aware attribute-based encryption with user accountability, in ISC 2009. Lecture Notes in Computer Science, vol. 5735, ed. by P. Samarati, M. Yung, F. Martinelli, C.A. Ardagna (Springer, Pisa, 2009), pp. 347\u2013362"},{"key":"1875_CR25","first-page":"24","volume-title":"ISPEC 2011. Lecture Notes in Computer Science","author":"J Lai","year":"2011","unstructured":"J. Lai, R.H. Deng, Y. Li, Fully secure cipertext-policy hiding CP-ABE, in ISPEC 2011. Lecture Notes in Computer Science, vol. 6672, ed. by F. Bao, J. Weng (Springer, Guangzhou, 2011), pp. 24\u201339"},{"key":"1875_CR26","first-page":"511","volume-title":"ASIACCS 2013","author":"Y Zhang","year":"2013","unstructured":"Y. Zhang, X. Chen, J. Li, D.S. Wong, H. Li, Anonymous attribute-based encryption supporting efficient decryption test, in ASIACCS 2013, ed. by K. Chen, Q. Xie, W. Qiu, N. Li, W. Tzeng (ACM, Hangzhou, 2013), pp. 511\u2013516"},{"key":"1875_CR27","first-page":"18","volume-title":"ASIACCS 2012","author":"J Lai","year":"2012","unstructured":"J. Lai, R.H. Deng, Y. Li, Expressive CP-ABE with partially hidden access structures, in ASIACCS 2012, ed. by H.Y. Youm, Y. Won (ACM, Seoul, 2012), pp. 18\u201319"},{"key":"1875_CR28","first-page":"19","volume-title":"ProvSec 2016. Lecture Notes in Computer Science","author":"H Cui","year":"2016","unstructured":"H. Cui, R.H. Deng, G. Wu, J. Lai, An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, in ProvSec 2016. Lecture Notes in Computer Science, vol. 10005, ed. by L. Chen, J. Han (Springer, New York, 2016), pp. 19\u201338"},{"key":"1875_CR29","first-page":"548","volume-title":"ESORICS 2018. Lecture Notes in Computer Science","author":"Y Michalevsky","year":"2018","unstructured":"Y. Michalevsky, M. Joye, Decentralized policy-hiding ABE with receiver privacy, in ESORICS 2018. Lecture Notes in Computer Science, vol. 11099, ed. by J. L\u00f3pez, J. Zhou, M. Soriano (Springer, Barcelona, 2018), pp. 548\u2013567"},{"key":"1875_CR30","doi-asserted-by":"crossref","unstructured":"F. Khan, H. Li, L. Zhang, J. Shen, An expressive hidden access policy CP-ABE, in DSC 2017 (IEEE Computer Society, Shenzhen, China, 2017), pp. 178\u2013186","DOI":"10.1109\/DSC.2017.29"},{"key":"1875_CR31","unstructured":"D.X. Song, D.A. Wagner, A. Perrig, Practical techniques for searches on encrypted data, in 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 14\u201317 2000 (2000), pp. 44\u201355"},{"key":"1875_CR32","unstructured":"D. Boneh, G.D. Crescenzo, R. Ostrovsky, G. Persiano, Public key encryption with keyword search, in Proceedings of the Advances in Cryptology\u2014EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2\u20136, 2004 (2004), pp. 506\u2013522"},{"key":"1875_CR33","unstructured":"Q. Zheng, S. Xu, G. Ateniese, VABKS: verifiable attribute-based keyword search over outsourced encrypted data, in 2014 IEEE Conference on Computer Communications, INFOCOM 2014, Toronto, Canada, April 27\u2013May 2, 2014 (2014), pp. 522\u2013530"},{"issue":"4","key":"1875_CR34","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1109\/TPDS.2014.2355202","volume":"27","author":"W Sun","year":"2016","unstructured":"W. Sun, S. Yu, W. Lou, Y.T. Hou, H. Li, Protecting your right: verifiable attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. IEEE Trans. Parallel Distrib. Syst. 27(4), 1187\u20131198 (2016)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"5","key":"1875_CR35","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1109\/TSC.2018.2823309","volume":"12","author":"Y Miao","year":"2019","unstructured":"Y. Miao, J. Ma, X. Liu, J. Weng, H. Li, H. Li, Lightweight fine-grained search over encrypted data in fog computing. IEEE Trans. Serv. Comput. 12(5), 772\u2013785 (2019)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"1875_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-020-9472-7","author":"F Meng","year":"2020","unstructured":"F. Meng, M.W.L. Cheng, ABDKS: attribute-based encryption with dynamic keyword search in fog computing. Front. Comput. Sci. (2020). https:\/\/doi.org\/10.1007\/s11704-020-9472-7","journal-title":"Front. Comput. Sci."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-01875-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-020-01875-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-01875-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T01:36:33Z","timestamp":1697765793000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-020-01875-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,3]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["1875"],"URL":"https:\/\/doi.org\/10.1186\/s13638-020-01875-2","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-53313\/v1","asserted-by":"object"},{"id-type":"doi","id":"10.21203\/rs.3.rs-53313\/v2","asserted-by":"object"}]},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,3]]},"assertion":[{"value":"12 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"20"}}