{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:12:17Z","timestamp":1774631537612,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,3,11]],"date-time":"2023-03-11T00:00:00Z","timestamp":1678492800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,3,11]],"date-time":"2023-03-11T00:00:00Z","timestamp":1678492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100015401","name":"Key Research and Development Program of Shaanxi","doi-asserted-by":"crossref","award":["No. 2021ZDLGY06-04"],"award-info":[{"award-number":["No. 2021ZDLGY06-04"]}],"id":[{"id":"10.13039\/501100015401","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100015401","name":"Key Research and Development Program of Shaanxi","doi-asserted-by":"crossref","award":["No. 2021ZDLGY06-04"],"award-info":[{"award-number":["No. 2021ZDLGY06-04"]}],"id":[{"id":"10.13039\/501100015401","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Guangxi Key Laboratory of Cryptography and Information Security","award":["No. GCIS201802"],"award-info":[{"award-number":["No. GCIS201802"]}]},{"name":"Guangxi Key Laboratory of Cryptography and Information Security","award":["No. GCIS201802"],"award-info":[{"award-number":["No. GCIS201802"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Cloud file sharing (CFS) has become one of the important tools for enterprises to reduce technology operating costs and improve their competitiveness. Due to the untrustworthy cloud service provider, access control and security issues for sensitive data have been key problems to be addressed. Current solutions to these issues are largely related to the traditional public key cryptography, access control encryption or attribute-based encryption based on the bilinear mapping. The rapid technological advances in quantum algorithms and quantum computers make us consider the transition from the tradtional cryptographic primitives to the post-quantum counterparts. In response to these problems, we propose a lattice-based Ciphertext-Policy Attribute-Based Encryption(CP-ABE) scheme, which is designed based on the ring learing with error problem, so it is more efficient than that designed based on the learing with error problem. In our scheme, the indirect revocation and binary tree-based data structure are introduced to achieve efficient user revocation and dynamic management of user groups. At the same time, in order to further improve the efficiency of the scheme and realize file sharing across enterprises, the scheme also allows multiple authorities to jointly set up system parameters and manage distribute keys. Furthermore, by re-randomizing the user\u2019s private key and update key, we achieve decryption key exposure resistance(DKER) in the scheme. We provide a formal security model and a series of security experiments, which show that our scheme is secure under chosen-plaintext attacks. Experimental simulations and evaluation analyses demonstrate the high efficiency and practicality of our scheme.<\/jats:p>","DOI":"10.1186\/s13677-023-00414-w","type":"journal-article","created":{"date-parts":[[2023,3,26]],"date-time":"2023-03-26T20:26:05Z","timestamp":1679862365000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing"],"prefix":"10.1186","volume":"12","author":[{"given":"Boxue","family":"Huang","sequence":"first","affiliation":[]},{"given":"Juntao","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Xuelian","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,11]]},"reference":[{"key":"414_CR1","doi-asserted-by":"crossref","unstructured":"Backendal M, Haller M, Paterson KG (2023) Mega: malleable encryption goes awry. 44th IEEE Symposium on Security and Privacy (SP 2023). San Francisco","DOI":"10.1109\/SP46215.2023.10179290"},{"key":"414_CR2","doi-asserted-by":"publisher","unstructured":"Chen E, Zhu Y, Liang\u00a0K, Yin H (2023) Secure remote cloud file sharing with attribute-based access control and performance optimization. In: IEEE Transactions on Cloud Computing, vol. 11, no. 1, pp 579\u2013594. https:\/\/doi.org\/10.1109\/TCC.2021.3104323","DOI":"10.1109\/TCC.2021.3104323"},{"issue":"12","key":"414_CR3","doi-asserted-by":"publisher","first-page":"6500","DOI":"10.1109\/TII.2019.2931156","volume":"15","author":"J Li","year":"2019","unstructured":"Li J, Wang S, Li Y, Wang H, Wang H, Wang H, Chen J, You Z (2019) An efficient attribute-based encryption scheme with policy update and file update in cloud computing. IEEE Trans Ind Inf 15(12):6500\u20136509","journal-title":"IEEE Trans Ind Inf"},{"key":"414_CR4","doi-asserted-by":"publisher","unstructured":"Deng H, Qin Z, Wu Q, Guan\u00a0Z, Yin H (2022) Revocable attribute-based data storage in mobile clouds. In: IEEE Transactions on Services Computing, vol. 15, no. 2, pp 1130\u20131142. https:\/\/doi.org\/10.1109\/TSC.2020.2984757","DOI":"10.1109\/TSC.2020.2984757"},{"issue":"8","key":"414_CR5","doi-asserted-by":"publisher","first-page":"2062","DOI":"10.1109\/TIFS.2018.2809679","volume":"13","author":"K Xue","year":"2018","unstructured":"Xue K, Chen W, Li W, Hong J, Hong P (2018) Combining data owner-side and cloud-side access control for encrypted cloud storage. IEEE Trans Inf Forensic Secur 13(8):2062\u20132074","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"6","key":"414_CR6","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1109\/TIFS.2016.2523941","volume":"11","author":"S Wang","year":"2016","unstructured":"Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensic Secur 11(6):1265\u20131277","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"7909","key":"414_CR7","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1038\/s41586-022-04623-2","volume":"605","author":"D Joseph","year":"2022","unstructured":"Joseph D, Misoczki R, Manzano M, Tricot J, Pinuaga FD, Lacombe O, Leichenauer S, Hidary J, Venables P, Hansen R (2022) Transitioning organizations to post-quantum cryptography. Nature 605(7909):237\u2013243","journal-title":"Nature"},{"key":"414_CR8","first-page":"103108","volume":"65","author":"Y Yang","year":"2022","unstructured":"Yang Y, Sun J, Liu Z, Qiao Y (2022) Practical revocable and multi-authority cp-abe scheme from rlwe for cloud computing. J Inf Secur Appl 65:103108","journal-title":"J Inf Secur Appl"},{"issue":"2","key":"414_CR9","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1049\/iet-ifs.2017.0225","volume":"12","author":"S Wang","year":"2018","unstructured":"Wang S, Zhang X, Zhang Y (2018) Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control. IET Inf Secur 12(2):141\u2013149","journal-title":"IET Inf Secur"},{"key":"414_CR10","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.ins.2018.11.031","volume":"479","author":"S Xu","year":"2019","unstructured":"Xu S, Yang G, Mu Y (2019) Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation. Inf Sci 479:116\u2013134","journal-title":"Inf Sci"},{"key":"414_CR11","doi-asserted-by":"publisher","unstructured":"Xu S et al (2023) A secure EMR sharing system with tamper resistance and expressive access control. In: IEEE Transactions on Dependable and Secure Computing, vol. 20, no. 1, pp 53\u201367. https:\/\/doi.org\/10.1109\/TDSC.2021.3126532","DOI":"10.1109\/TDSC.2021.3126532"},{"key":"414_CR12","doi-asserted-by":"publisher","unstructured":"Datta P, Komargodski I, Waters B (2021) Decentralized multi-authority ABE for DNFs from LWE. In: Canteaut A, Standaert FX (eds) Advances in Cryptology \u2013 EUROCRYPT\u00a02021. EUROCRYPT 2021. Lecture Notes in Computer Science, vol 12696. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-77870-5_7","DOI":"10.1007\/978-3-030-77870-5_7"},{"issue":"3","key":"414_CR13","doi-asserted-by":"publisher","first-page":"483","DOI":"10.3217\/jucs-021-03-0483","volume":"21","author":"G Zhang","year":"2015","unstructured":"Zhang G, Qin J, Qazi S (2015) Multi-authority attribute-based encryption scheme from lattices[J]. J Univers Comput Sci 21(3):483\u2013501. https:\/\/doi.org\/10.3217\/jucs-021-03-0483","journal-title":"J Univers Comput Sci"},{"key":"414_CR14","doi-asserted-by":"publisher","unstructured":"Zhu Y, Hu H, Ahn GJ, Huang\u00a0D, Wang S (2012) Towards temporal access control in cloud computing. Proceedings IEEE INFOCOM, Orlando, pp 2576\u20132580. https:\/\/doi.org\/10.1109\/INFCOM.2012.6195656","DOI":"10.1109\/INFCOM.2012.6195656"},{"key":"414_CR15","doi-asserted-by":"publisher","unstructured":"Zhu S, Yang X, Wu X (2013) Secure cloud file system with attribute based encryption.\u00a02013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an, pp 99\u2013102. https:\/\/doi.org\/10.1109\/INCoS.2013.22","DOI":"10.1109\/INCoS.2013.22"},{"issue":"4","key":"414_CR16","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1109\/TCC.2014.2338324","volume":"2","author":"S Zhu","year":"2014","unstructured":"Zhu S, Gong G (2014) Fuzzy authorization for cloud storage. IEEE Trans Cloud Comput 2(4):422\u2013435","journal-title":"IEEE Trans Cloud Comput"},{"key":"414_CR17","doi-asserted-by":"publisher","unstructured":"Zhang J, Zhang Z, Ge A (2012) Ciphertext policy attribute-based encryption from lattices. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. ASIACCS \u201912. Association for Computing Machinery, New York, pp 16\u201317. https:\/\/doi.org\/10.1145\/2414456.2414464","DOI":"10.1145\/2414456.2414464"},{"issue":"4","key":"414_CR18","first-page":"2292","volume":"11","author":"Z Chen","year":"2017","unstructured":"Chen Z, Zhang P, Zhang F, Huang J (2017) Ciphertext policy attribute-based encryption supporting unbounded attribute space from r-lwe. KSII Trans Internet Inf Syst (TIIS) 11(4):2292\u20132309","journal-title":"KSII Trans Internet Inf Syst (TIIS)"},{"issue":"4","key":"414_CR19","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1109\/TC.2018.2874479","volume":"68","author":"KD G\u00fcr","year":"2018","unstructured":"G\u00fcr KD, Polyakov Y, Rohloff K, Ryan GW, Sajjadpour H, Sava\u015f E (2018) Practical applications of improved gaussian sampling for trapdoor lattices. IEEE Trans Comput 68(4):570\u2013584","journal-title":"IEEE Trans Comput"},{"key":"414_CR20","doi-asserted-by":"publisher","unstructured":"Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W (2009) Mediated ciphertext-policy attribute-based encryption and its application. In: Youm HY, Yung M (eds) Information Security Applications. WISA 2009. Lecture Notes in Computer Science, vol 5932. Springer, Berlin,\u00a0Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-10838-9_23","DOI":"10.1007\/978-3-642-10838-9_23"},{"key":"414_CR21","doi-asserted-by":"publisher","unstructured":"Sahai A, Seyalioglu H, Waters B (2012) Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini R, Canetti R (eds) Advances in Cryptology \u2013 CRYPTO 2012. CRYPTO 2012. Lecture Notes in Computer Science, vol 7417. Springer, Berlin,\u00a0Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-32009-5_13","DOI":"10.1007\/978-3-642-32009-5_13"},{"key":"414_CR22","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1016\/j.future.2019.02.051","volume":"97","author":"S Xu","year":"2019","unstructured":"Xu S, Yang G, Mu Y, Liu X (2019) A secure iot cloud storage system with fine-grained access control and decryption key exposure resistance. Futur Gener Comput Syst 97:284\u2013294","journal-title":"Futur Gener Comput Syst"},{"issue":"1","key":"414_CR23","first-page":"161","volume":"22","author":"K Yang","year":"2020","unstructured":"Yang K, Wu G, Dong C, Fu X, Li F, Wu T (2020) Attribute based encryption with efficient revocation from lattices. Int J Netw Secur 22(1):161\u2013170","journal-title":"Int J Netw Secur"},{"key":"414_CR24","doi-asserted-by":"publisher","unstructured":"Takayasu A, Watanabe Y (2017) Lattice-based revocable identity-based encryption with bounded decryption key exposure resistance. In: Pieprzyk J, Suriadi S (eds) Information Security and Privacy. ACISP 2017. Lecture Notes in Computer Science, vol 10342. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-60055-0_10","DOI":"10.1007\/978-3-319-60055-0_10"},{"issue":"6","key":"414_CR25","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1049\/ise2.12033","volume":"15","author":"X Dong","year":"2021","unstructured":"Dong X, Hu Y, Wang B, Liu M, Gao W (2021) Lattice-based revocable attribute-based encryption with decryption key exposure resistance. IET Inf Secur 15(6):428\u2013441","journal-title":"IET Inf Secur"},{"key":"414_CR26","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/978-3-540-70936-7_28","volume-title":"Theory of cryptography conference","author":"M Chase","year":"2007","unstructured":"Chase M (2007) Multi-authority attribute based encryption. In: Vadhan SP (ed) Theory of cryptography conference. Springer Berlin Heidelberg, Berlin, Heidelberg, pp 515\u2013534"},{"key":"414_CR27","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/978-3-662-47854-7_19","volume-title":"International Conference on Financial Cryptography and Data Security","author":"Y Rouselakis","year":"2015","unstructured":"Rouselakis Y, Waters B (2015) Efficient statically-secure large-universe multi-authority attribute-based encryption. International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, Berlin, Heidelberg, pp 315\u2013332"},{"key":"414_CR28","doi-asserted-by":"publisher","unstructured":"Agrawal S, Boneh D, Boyen X (2010) Efficient lattice (H)IBE in the standard model. In: Gilbert H (ed) Advances in Cryptology \u2013 EUROCRYPT 2010. EUROCRYPT 2010. Lecture Notes in Computer Science, vol 6110. Springer, Berlin,\u00a0Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-13190-5_28","DOI":"10.1007\/978-3-642-13190-5_28"},{"issue":"5","key":"414_CR29","doi-asserted-by":"publisher","first-page":"1169","DOI":"10.1109\/TIFS.2017.2779427","volume":"13","author":"W Dai","year":"2017","unstructured":"Dai W, Dor\u00f6z Y, Polyakov Y, Rohloff K, Sajjadpour H, Sava\u015f E, Sunar B (2017) Implementation and evaluation of a lattice-based key-policy abe scheme. IEEE Trans Inf Forensic Secur 13(5):1169\u20131184","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"414_CR30","first-page":"41","volume-title":"Annual International Cryptology Conference","author":"D Naor","year":"2001","unstructured":"Naor D, Naor M, Lotspiech J (2001) Revocation and tracing schemes for stateless receivers. In: Kilian J (ed) Annual International Cryptology Conference, vol 2139. Springer Berlin Heidelberg, Berlin, Heidelberg, pp 41\u201362"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00414-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-023-00414-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00414-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,9]],"date-time":"2023-12-09T16:52:49Z","timestamp":1702140769000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-023-00414-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,11]]},"references-count":30,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["414"],"URL":"https:\/\/doi.org\/10.1186\/s13677-023-00414-w","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,11]]},"assertion":[{"value":"17 November 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"37"}}