{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:54:46Z","timestamp":1760597686073,"version":"3.38.0"},"reference-count":34,"publisher":"SAGE Publications","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JHS"],"published-print":{"date-parts":[[2016,3,30]]},"DOI":"10.3233\/jhs-160536","type":"journal-article","created":{"date-parts":[[2016,4,6]],"date-time":"2016-04-06T16:24:04Z","timestamp":1459959844000},"page":"153-167","source":"Crossref","is-referenced-by-count":8,"title":["New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems"],"prefix":"10.1177","volume":"22","author":[{"given":"Hao","family":"Wang","sequence":"first","affiliation":[{"name":"School of Information Science and Engineering, Shandong Normal University, Jinan 250014, China"},{"name":"Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology, Jinan 250014, China"}]},{"given":"Zhihua","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Shandong Normal University, Jinan 250014, China"},{"name":"Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology, Jinan 250014, China"}]},{"given":"Lei","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Shandong Normal University, Jinan 250014, China"},{"name":"Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology, Jinan 250014, China"}]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[{"name":"School of Computer, Wuhan University, Wuhan 430072, China"}]}],"member":"179","reference":[{"key":"10.3233\/JHS-160536_ref2","doi-asserted-by":"crossref","unstructured":"[2]J.\u00a0Bethencourt, A.\u00a0Sahai and B.\u00a0Waters, Ciphertext-policy attribute-based encryption, in: S&P 2007, IEEE, 2007, pp.\u00a0321\u2013334.","DOI":"10.1109\/SP.2007.11"},{"key":"10.3233\/JHS-160536_ref3","doi-asserted-by":"crossref","unstructured":"[3]D.\u00a0Boneh, E.\u00a0Goh and K.\u00a0Nissim, Evaluating 2-dnf formulas on ciphertexts, in: TCC 2005, Springer, Heidelberg, 2005, pp.\u00a0325\u2013341.","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"10.3233\/JHS-160536_ref4","doi-asserted-by":"crossref","unstructured":"[4]A.\u00a0Castiglione, A.D.\u00a0Santis and B.\u00a0Masucci, Hierarchical and shared key assignment, in: NBiS 2014, IEEE, 2014, pp.\u00a0263\u2013270.","DOI":"10.1109\/NBiS.2014.106"},{"key":"10.3233\/JHS-160536_ref5","doi-asserted-by":"crossref","unstructured":"[5]A.\u00a0Castiglione, A.D.\u00a0Santis and B.\u00a0Masucci, Key indistinguishability vs. strong key indistinguishability for hierarchical key assignment schemes, IEEE Transactions on Dependable and Secure Computing (2015). doi:10.1109\/TDSC.2015.2413415.","DOI":"10.1109\/TDSC.2015.2413415"},{"key":"10.3233\/JHS-160536_ref6","doi-asserted-by":"crossref","unstructured":"[6]M.\u00a0Chase, Multi-authority attribute based encryption, in: TCC 2007, Springer, Heidelberg, 2007, pp.\u00a0515\u2013534.","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"10.3233\/JHS-160536_ref7","doi-asserted-by":"crossref","unstructured":"[7]M.\u00a0Chase and S.S.M.\u00a0Chow, Improving privacy and security in multi-authority attribute-based encryption, in: CCS 2009, ACM, New York, 2009, pp.\u00a0121\u2013130.","DOI":"10.1145\/1653662.1653678"},{"issue":"9","key":"10.3233\/JHS-160536_ref8","doi-asserted-by":"crossref","first-page":"2386","DOI":"10.1109\/TPDS.2013.180","article-title":"New algorithms for secure outsourcing of modular exponentiations","volume":"25","author":"Chen","year":"2014","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"10.3233\/JHS-160536_ref9","doi-asserted-by":"crossref","unstructured":"[9]L.\u00a0Cheung and C.C.\u00a0Newport, Provably secure ciphertext policy ABE, in: CCS 2007, ACM, New York, 2007, pp.\u00a0456\u2013465.","DOI":"10.1145\/1315245.1315302"},{"issue":"4","key":"10.3233\/JHS-160536_ref10","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1007\/s10586-013-0261-z","article-title":"Interconnecting federated clouds by using publish-subscribe service","volume":"16","author":"Esposito","year":"2013","journal-title":"Cluster Computing"},{"key":"10.3233\/JHS-160536_ref12","doi-asserted-by":"crossref","unstructured":"[12]V.\u00a0Goyal, A.\u00a0Jain, O.\u00a0Pandey and A.\u00a0Sahai, Bounded ciphertext policy attribute based encryption, in: ICALP 2008, Springer, Heidelberg, 2008, pp.\u00a0579\u2013591.","DOI":"10.1007\/978-3-540-70583-3_47"},{"key":"10.3233\/JHS-160536_ref13","doi-asserted-by":"crossref","unstructured":"[13]V.\u00a0Goyal, O.\u00a0Pandey, A.\u00a0Sahai and B.\u00a0Waters, Attribute-based encryption for fine-grained access control of encrypted data, in: CCS 2006, ACM, New York, 2006, pp.\u00a089\u201398.","DOI":"10.1145\/1180405.1180418"},{"key":"10.3233\/JHS-160536_ref14","unstructured":"[14]M.\u00a0Green, S.\u00a0Hohenberger and B.\u00a0Waters, Outsourcing the decryption of ABE ciphertexts, in: SEC 2011, ACM, New York, 2011, pp.\u00a034\u201349."},{"key":"10.3233\/JHS-160536_ref15","doi-asserted-by":"crossref","unstructured":"[15]S.\u00a0Hohenberger and B.\u00a0Waters, Online\/offline attribute-based encryption, in: PKC 2014, Springer, Heidelberg, 2014, pp.\u00a0293\u2013310.","DOI":"10.1007\/978-3-642-54631-0_17"},{"key":"10.3233\/JHS-160536_ref16","doi-asserted-by":"crossref","unstructured":"[16]T.\u00a0Jiang, X.\u00a0Chen, J.\u00a0Li, D.S.\u00a0Wong, J.\u00a0Ma and J.K.\u00a0Liu, TIMER: Secure and reliable cloud storage against data re-outsourcing, in: ISPEC 2014, Springer, Heidelberg, 2014, pp.\u00a0346\u2013358.","DOI":"10.1007\/978-3-319-06320-1_26"},{"issue":"8","key":"10.3233\/JHS-160536_ref17","doi-asserted-by":"crossref","first-page":"1343","DOI":"10.1109\/TIFS.2013.2271848","article-title":"Attribute-based encryption with verifiable outsourced decryption","volume":"8","author":"Lai","year":"2013","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.3233\/JHS-160536_ref18","doi-asserted-by":"crossref","unstructured":"[18]A.B.\u00a0Lewko, Tools for simulating features of composite order bilinear groups in the prime order setting, in: EUROCRYPT 2012, Springer, Heidelberg, 2012, pp.\u00a0318\u2013335.","DOI":"10.1007\/978-3-642-29011-4_20"},{"key":"10.3233\/JHS-160536_ref19","doi-asserted-by":"crossref","unstructured":"[19]A.B.\u00a0Lewko, T.\u00a0Okamoto, A.\u00a0Sahai, K.\u00a0Takashima and B.\u00a0Waters, Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption, in: EUROCRYPT 2010, Springer, Heidelberg, 2010, pp.\u00a062\u201391.","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"10.3233\/JHS-160536_ref20","doi-asserted-by":"crossref","unstructured":"[20]A.B.\u00a0Lewko and B.\u00a0Waters, Decentralizing attribute-based encryption, in: EUROCRYPT 2011, Springer, Heidelberg, 2011, pp.\u00a0568\u2013588.","DOI":"10.1007\/978-3-642-20465-4_31"},{"key":"10.3233\/JHS-160536_ref21","doi-asserted-by":"crossref","unstructured":"[21]A.B.\u00a0Lewko and B.\u00a0Waters, Unbounded HIBE and attribute-based encryption, in: EUROCRYPT 2011, Springer, Heidelberg, 2011, pp.\u00a0547\u2013567.","DOI":"10.1007\/978-3-642-20465-4_30"},{"key":"10.3233\/JHS-160536_ref22","doi-asserted-by":"crossref","unstructured":"[22]A.B.\u00a0Lewko and B.\u00a0Waters, New proof methods for attribute-based encryption: Achieving full security through selective techniques, in: CRYPTO 2012, Springer, Heidelberg, 2012, pp.\u00a0180\u2013198.","DOI":"10.1007\/978-3-642-32009-5_12"},{"key":"10.3233\/JHS-160536_ref23","doi-asserted-by":"crossref","unstructured":"[23]J.\u00a0Li, C.\u00a0Jia, J.\u00a0Li and X.\u00a0Chen, Outsourcing encryption of attribute-based encryption with MapReduce, in: ICICS 2012, Springer, Heidelberg, 2012, pp.\u00a0191\u2013201.","DOI":"10.1007\/978-3-642-34129-8_17"},{"issue":"8","key":"10.3233\/JHS-160536_ref24","doi-asserted-by":"crossref","first-page":"2201","DOI":"10.1109\/TPDS.2013.271","article-title":"Securely outsourcing attribute-based encryption with checkability","volume":"25","author":"Li","year":"2014","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"10.3233\/JHS-160536_ref25","doi-asserted-by":"crossref","unstructured":"[25]H.\u00a0Lin, Z.\u00a0Cao, X.\u00a0Liang and J.\u00a0Shao, Secure threshold multi authority attribute based encryption without a central authority, in: INDOCRYPT 2008, Springer, Heidelberg, 2008, pp.\u00a0426\u2013436.","DOI":"10.1007\/978-3-540-89754-5_33"},{"key":"10.3233\/JHS-160536_ref26","doi-asserted-by":"crossref","unstructured":"[26]T.\u00a0Okamoto and K.\u00a0Takashima, Homomorphic encryption and signatures from vector decomposition, in: Pairing 2008, Springer, Heidelberg, 2008, pp.\u00a057\u201374.","DOI":"10.1007\/978-3-540-85538-5_4"},{"key":"10.3233\/JHS-160536_ref27","doi-asserted-by":"crossref","unstructured":"[27]T.\u00a0Okamoto and K.\u00a0Takashima, Hierarchical predicate encryption for inner-products, in: ASIACRYPT 2009, Springer, Heidelberg, 2009, pp.\u00a0214\u2013231.","DOI":"10.1007\/978-3-642-10366-7_13"},{"key":"10.3233\/JHS-160536_ref28","doi-asserted-by":"crossref","unstructured":"[28]T.\u00a0Okamoto and K.\u00a0Takashima, Fully secure functional encryption with general relations from the decisional linear assumption, in: CRYPTO 2010, Springer, Heidelberg, 2010, pp.\u00a0191\u2013208.","DOI":"10.1007\/978-3-642-14623-7_11"},{"key":"10.3233\/JHS-160536_ref29","doi-asserted-by":"crossref","unstructured":"[29]R.\u00a0Ostrovsky, A.\u00a0Sahai and B.\u00a0Waters, Attribute-based encryption with non-monotonic access structures, in: CCS 2007, ACM, New York, 2007, pp.\u00a0195\u2013203.","DOI":"10.1145\/1315245.1315270"},{"key":"10.3233\/JHS-160536_ref30","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1016\/j.future.2015.01.017","article-title":"Grasp-based resource re-optimization for effective big data access in federated clouds","volume":"54","author":"Palmieri","year":"2016","journal-title":"Future Generation Computer Systems"},{"key":"10.3233\/JHS-160536_ref31","doi-asserted-by":"crossref","unstructured":"[31]Y.\u00a0Rouselakis and B.\u00a0Waters, Practical constructions and new proof methods for large universe attribute-based encryption, in: CCS 2013, ACM, New York, 2013, pp.\u00a0463\u2013474.","DOI":"10.1145\/2508859.2516672"},{"key":"10.3233\/JHS-160536_ref33","doi-asserted-by":"crossref","unstructured":"[33]A.\u00a0Sahai and B.\u00a0Waters, Fuzzy identity-based encryption, in: EUROCRYPT 2005, Springer, Heidelberg, 2005, pp.\u00a0457\u2013473.","DOI":"10.1007\/11426639_27"},{"key":"10.3233\/JHS-160536_ref34","doi-asserted-by":"crossref","unstructured":"[34]H.\u00a0Wang, B.\u00a0Yang and Y.\u00a0Wang, Server aided ciphertext-policy attribute-based encryption, in: WAINA 2015, IEEE, 2015, pp.\u00a0440\u2013444.","DOI":"10.1109\/WAINA.2015.11"},{"issue":"10","key":"10.3233\/JHS-160536_ref35","first-page":"2270","article-title":"Adaptively secure outsourcing ciphertext-policy attribute-based encryption","volume":"52","author":"Wang","year":"2015","journal-title":"Journal of Computer Research and Development"},{"key":"10.3233\/JHS-160536_ref36","doi-asserted-by":"crossref","unstructured":"[36]B.\u00a0Waters, Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, in: PKC 2011, Springer, Heidelberg, 2011, pp.\u00a053\u201370.","DOI":"10.1007\/978-3-642-19379-8_4"},{"issue":"11","key":"10.3233\/JHS-160536_ref37","doi-asserted-by":"crossref","first-page":"1790","DOI":"10.1109\/TIFS.2013.2279531","article-title":"DAC-MACS: Effective data access control for multiauthority cloud storage systems","volume":"8","author":"Yang","year":"2013","journal-title":"IEEE Transactions on Information Forensics and Security"}],"container-title":["Journal of High Speed Networks"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JHS-160536","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T00:35:57Z","timestamp":1741653357000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JHS-160536"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,30]]},"references-count":34,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.3233\/jhs-160536","relation":{},"ISSN":["1875-8940","0926-6801"],"issn-type":[{"type":"electronic","value":"1875-8940"},{"type":"print","value":"0926-6801"}],"subject":[],"published":{"date-parts":[[2016,3,30]]}}}