{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T09:53:27Z","timestamp":1775210007000,"version":"3.50.1"},"reference-count":17,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":88,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.059969","type":"journal-article","created":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T03:00:41Z","timestamp":1739329241000},"page":"1399-1414","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":2,"title":["Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud"],"prefix":"10.32604","volume":"83","author":[{"given":"Xixi","family":"Yan","sequence":"first","affiliation":[]},{"given":"Jing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Pengyu","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"Proceedings of the 4th International Symposium on Information, Computer, and Communications Security","first-page":"322","article-title":"Conditional proxy re-encryption secure against chosen-ciphertext attack","author":"Weng","year":"2009"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/BFb0054122","author":"Blaze","year":"1998","journal-title":"Advances in cryptology-EUROCRYPT\u201998"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"31","author":"Elgamal","year":"1985","journal-title":"IEEE Trans Inf Theory"},{"key":"ref4","series-title":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","first-page":"1","article-title":"Attribute-based conditional proxy re-encryption with chosen-ciphertext security","author":"Zhao","year":"2010 Dec 6\u201310"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.pmcj.2015.06.017","article-title":"Cloud based data sharing with fine-grained proxy re-encryption","volume":"28","author":"Yang","year":"2016","journal-title":"Pervasive Mob Comput"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"42801","DOI":"10.1109\/ACCESS.2021.3064863","article-title":"A novel revocable and identity-based conditional proxy re-encryption scheme with ciphertext evolution for secure cloud data sharing","volume":"9","author":"Yao","year":"2021","journal-title":"IEEE Access"},{"key":"ref7","series-title":"2022 IEEE 10th Joint International Information Technology and Artificial Intelligence Conference (ITAIC)","first-page":"1414","article-title":"A fine-grained certificateless conditional proxy broadcast re-encryption scheme without pairing","author":"Yang","year":"2022 Jun 17\u201319"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"822","DOI":"10.3390\/e25050822","article-title":"Attribute-based verifiable conditional proxy re-encryption scheme","volume":"25","author":"Tang","year":"2023","journal-title":"Entropy"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"4333883","DOI":"10.1049\/2024\/4333883","article-title":"Improved AB-CPREs with revocability and HRA security under LWE","volume":"2024","author":"Wang","year":"2024","journal-title":"IET Inf Secur"},{"key":"ref10","series-title":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","first-page":"51","article-title":"Ciphertext-policy weighted attribute based encryption for fine-grained access control","author":"Liu","year":"2013 Sep 9\u201311"},{"key":"ref11","series-title":"Annual International Cryptology Conference","first-page":"218","article-title":"Functional encryption for regular languages","author":"Waters","year":"2012"},{"key":"ref12","series-title":"2007 IEEE Symposium on Security and Privacy (SP \u201807)","first-page":"321","article-title":"Ciphertext-policy attribute-based encryption","author":"Bethencourt","year":"2007 May 20\u201323"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1145\/322217.322225","article-title":"Fast probabilistic algorithms for verification of polynomial identities","volume":"27","author":"Schwartz","year":"1980","journal-title":"J ACM"},{"key":"ref14","series-title":"Proceedings of the International Symposiumon on Symbolic and Algebraic Computation","first-page":"216","article-title":"Probabilistic algorithms for sparse polynomials","author":"Zippel","year":"1979"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"3833","DOI":"10.1109\/TIFS.2023.3282577","article-title":"An identity-based proxy re-encryption scheme with single-hop conditional delegation and multi-hop ciphertext evolution for secure cloud data sharing","volume":"18","author":"Yao","year":"2023","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3318212","article-title":"Flexible, efficient, and secure access delegation in cloud computing","volume":"10","author":"Xiong","year":"2019","journal-title":"ACM Trans Manage Inf Syst"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"8833693","DOI":"10.1155\/2020\/8833693","article-title":"A collusion-resistant identity-based proxy reencryption scheme with ciphertext evolution for secure cloud sharing","volume":"2020","author":"Yao","year":"2020","journal-title":"Secur Commun Netw"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-1\/TSP_CMC_59969\/TSP_CMC_59969.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T06:35:29Z","timestamp":1763102129000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n1\/60086"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":17,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.059969","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-10-21","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-21","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-26","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}