{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T08:05:00Z","timestamp":1767773100706,"version":"3.45.0"},"reference-count":33,"publisher":"Tech Science Press","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064486","type":"journal-article","created":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T03:22:27Z","timestamp":1745896947000},"page":"4741-4756","source":"Crossref","is-referenced-by-count":1,"title":["Several Attacks on Attribute-Based Encryption Schemes"],"prefix":"10.32604","volume":"83","author":[{"given":"Phi Thuong","family":"Le","sequence":"first","affiliation":[]},{"given":"Huy Quoc","family":"Le","sequence":"additional","affiliation":[]},{"given":"Viet Cuong","family":"Trinh","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"Advances in cryptology\u2013EUROCRYPT 2005","article-title":"Fuzzy identity-based encryption","volume":"3494","author":"Sahai","year":"2005"},{"key":"ref2","series-title":"2007 IEEE Symposium on Security and Privacy (SP \u201907)","article-title":"Ciphertext-policy attribute-based encryption","author":"Bethencourt","year":"2007"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"3113","DOI":"10.1016\/j.dam.2007.12.010","article-title":"Pairings for cryptographers","volume":"156","author":"Galbraith","year":"2008","journal-title":"Discrete Appl Math"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.future.2014.10.010","article-title":"A lightweight attribute-based encryption scheme for the Internet of Things","volume":"49","author":"Yao","year":"2015","journal-title":"Future Gener Comput Syst"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"27336","DOI":"10.1109\/ACCESS.2018.2836350","article-title":"A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT","volume":"6","author":"Ding","year":"2018","journal-title":"IEEE Access"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"40704","DOI":"10.1109\/ACCESS.2020.2976746","article-title":"Efficient and secure ciphertext-policy attribute-based encryption without pairing for cloud-assisted smart grid","volume":"8","author":"Wang","year":"2020","journal-title":"IEEE Access"},{"key":"ref7","first-page":"102559","article-title":"A ciphertext-policy attribute based encryption scheme for wireless body area networks based on ECC","volume":"54","author":"Sowjanya","year":"2020","journal-title":"J Inf Secur Appl"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1049\/iet-ifs.2016.0490","article-title":"Attribute-based encryption implies identity-based encryption","volume":"11","author":"Herranz","year":"2017","journal-title":"IET Inf Secur"},{"key":"ref9","series-title":"2008 49th Annual IEEE Symposium on Foundations of Computer Science","article-title":"On the impossibility of basing identity based encryption on trapdoor permutations","author":"Boneh","year":"2008"},{"key":"ref10","first-page":"1","article-title":"How powerful are the DDH hard groups?","volume":"2012\/653","author":"Papakonstantinou","year":"2012","journal-title":"Cryptology eprint Archive"},{"key":"ref11","volume":"10403","author":"Gaborit","year":"2017","journal-title":"Advances in cryptology\u2013CRYPTO 2017"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1145\/3422370","article-title":"Identity-based encryption from the diffie-hellman assumption","volume":"68","author":"D\u00f6ttling","year":"2021","journal-title":"J ACM"},{"key":"ref13","volume":"13915","author":"Izabach\u00e8ne","year":"2023","journal-title":"Information security and privacy"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"222226","DOI":"10.1109\/ACCESS.2020.3044143","article-title":"Attacking pairing-free attribute-based encryption schemes","volume":"8","author":"Herranz","year":"2020","journal-title":"IEEE Access"},{"key":"ref15","series-title":"Public key cryptography\u2013PKC 2011","article-title":"Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization","volume":"6571","author":"Waters","year":"2011"},{"key":"ref16","series-title":"Proceedings of the ACM Conference on Computer and Communications Security","article-title":"Practical constructions and new proof methods for large universe attribute-based encryption","author":"Rouselakis","year":"2013"},{"key":"ref17","series-title":"Public-key cryptography\u2013PKC 2013","article-title":"Attribute-based encryption with fast decryption","volume":"7778","author":"Hohenberger","year":"2013"},{"key":"ref18","series-title":"Advances in cryptology\u2013EUROCRYPT 2014","article-title":"Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more","volume":"8441","author":"Attrapadung","year":"2014"},{"key":"ref19","series-title":"Theory of cryptography","article-title":"Dual system encryption via predicate encodings","volume":"8349","author":"Wee","year":"2014"},{"key":"ref20","series-title":"Proceedings of the ACM Conference on Computer and Communications Security","article-title":"FAME: fast attribute-based message encryption","author":"Agrawal","year":"2017"},{"key":"ref21","series-title":"Advances in cryptology\u2013EUROCRYPT 2017","article-title":"Simplifying design and analysis of complex predicate encryption schemes","volume":"10210","author":"Agrawal","year":"2017"},{"key":"ref22","series-title":"Proceedings of the ACM Conference on Computer and Communications Security","article-title":"FABEO: fast attribute-based encryption with optimal security","author":"Riepel","year":"2022"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"139715","DOI":"10.1109\/ACCESS.2023.3334733","article-title":"Multi-keywords searchable attribute-based encryption with verification and attribute revocation over cloud data","volume":"11","author":"Shen","year":"2023","journal-title":"IEEE Access"},{"key":"ref24","volume":"13940","author":"Venema","year":"2023","journal-title":"Public-key cryptography\u2013PKC 2023"},{"key":"ref25","first-page":"2637","article-title":"Adaptive attribute-based honey encryption: a novel solution for cloud data security","volume":"82","author":"Siyal","year":"2025","journal-title":"Comput Mater Contin"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"942","DOI":"10.1109\/TCC.2021.3121684","article-title":"Generic construction of black-box traceable attribute-based encryption","volume":"11","author":"Luo","year":"2023","journal-title":"IEEE Trans Cloud Comput"},{"key":"ref27","series-title":"Financial cryptography and data security","article-title":"Efficient statically-secure large-universe multi-authority attribute-based encryption","volume":"8975","author":"Rouselakis","year":"2015"},{"key":"ref28","series-title":"ASIA CCS, 2017\u2014Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security","article-title":"A ciphertext-policy attribute-based encryption scheme with optimized ciphertext size and fast decryption","author":"Malluhi","year":"2017"},{"key":"ref29","series-title":"Advances in cryptology\u2013EUROCRYPT 2015","article-title":"Improved dual system ABE in prime-order groups via predicate encodings","volume":"9057","author":"Chen","year":"2015"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1049\/iet-ifs.2017.0157","article-title":"Attribute-based broadcast encryption scheme for lightweight devices","volume":"12","author":"Canard","year":"2018","journal-title":"IET Inf Secur"},{"key":"ref31","series-title":"Advances in cryptology\u2013ASIACRYPT 2015","article-title":"Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs","volume":"9452","author":"Attrapadung","year":"2015"},{"key":"ref32","series-title":"Advances in cryptology\u2013ASIACRYPT 2016","article-title":"Dual system encryption framework in prime-order groups via computational pair encodings","volume":"10032","author":"Attrapadung","year":"2016"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"103957","DOI":"10.1016\/j.csi.2024.103957","article-title":"Levelled attribute-based encryption for hierarchical access control","volume":"93","author":"Le","year":"2025","journal-title":"Comput Stand Interfaces"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-3\/TSP_CMC_64486\/TSP_CMC_64486.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:32:04Z","timestamp":1763343124000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n3\/61068"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":33,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064486","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}