{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:42:23Z","timestamp":1740123743883,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,3,11]],"date-time":"2023-03-11T00:00:00Z","timestamp":1678492800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,11]],"date-time":"2023-03-11T00:00:00Z","timestamp":1678492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1836205"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004001","name":"Guizhou Science and Technology Department","doi-asserted-by":"publisher","award":["[2018]3001"],"id":[{"id":"10.13039\/501100004001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"13th Five-Year National Cryptography Development Foundation of China","award":["MMJJ20170129"]},{"name":"Research Project of Guizhou University of China for Talent Introduction","award":["[2020]61"]},{"name":"the Cultivation Project of Guizhou University","award":["[2019]56"]},{"name":"the Open Fund of Key Laboratory of Advanced Manufacturing Technology, Ministry of Education of China","award":["GZUAMT2021KF[01]"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s11036-023-02102-0","type":"journal-article","created":{"date-parts":[[2023,3,11]],"date-time":"2023-03-11T09:03:05Z","timestamp":1678525385000},"page":"1625-1635","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Unbounded Attribute-Based Encryption Supporting Non-Monotonic Access Structure and Traceability without Key Escrow"],"prefix":"10.1007","volume":"28","author":[{"given":"Yan","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Changgen","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Youliang","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Zuolong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Weijie","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,11]]},"reference":[{"issue":"P3","key":"2102_CR1","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1016\/j.future.2017.09.020","volume":"79","author":"B Varghese","year":"2018","unstructured":"Varghese B, Buyya R (2018) Next generation cloud computing. Futur Gener Comput Syst 79(P3):849\u2013861","journal-title":"Futur Gener Comput Syst"},{"issue":"9","key":"2102_CR2","doi-asserted-by":"publisher","first-page":"5099","DOI":"10.1109\/TII.2019.2894108","volume":"15","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Deng RH, Zheng D, Li J, Wu P, Cao J (2019) Efficient and robust certificateless signature for data crowdsensing in cloud assisted industrial iot. IEEE Trans Industr Inf 15(9):5099\u20135108","journal-title":"IEEE Trans Industr Inf"},{"issue":"5","key":"2102_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3241737","volume":"51","author":"R Buyya","year":"2018","unstructured":"Buyya R, Srirama SN, Casale G, Calheiros R, Simmhan Y, Varghese B, Gelenbe E, Javadi B, Vaquero LM, Netto MA et al (2018) A manifesto for future generation cloud computing: Research directions for the next decade. ACM Comput Surveys (CSUR) 51(5):1\u201338","journal-title":"ACM Comput Surveys (CSUR)"},{"issue":"3","key":"2102_CR4","doi-asserted-by":"publisher","first-page":"1918","DOI":"10.1109\/TII.2021.3097131","volume":"18","author":"Y Tian","year":"2021","unstructured":"Tian Y, Li T, Xiong J, Bhuiyan MZA, Ma J, Peng C (2021) A blockchain-based machine learning framework for edge services in iiot. IEEE Trans Industr Inf 18(3):1918\u20131929","journal-title":"IEEE Trans Industr Inf"},{"key":"2102_CR5","doi-asserted-by":"crossref","unstructured":"Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 457\u2013473","DOI":"10.1007\/11426639_27"},{"issue":"1","key":"2102_CR6","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1587\/transfun.2019CIP0014","volume":"103","author":"J Hayata","year":"2020","unstructured":"Hayata J, Ishizaka M, Sakai Y, Hanaoka G, Matsuura K (2020) Generic construction of adaptively secure anonymous key-policy attribute-based encryption from public-key searchable encryption. IEICE Trans Fundam Electron Commun Comput Sci 103(1):107\u2013113","journal-title":"IEICE Trans Fundam Electron Commun Comput Sci"},{"key":"2102_CR7","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.ins.2018.07.077","volume":"470","author":"J Li","year":"2019","unstructured":"Li J, Yu Q, Zhang Y, Shen J (2019) Key-policy attribute-based encryption against continual auxiliary input leakage. Inf Sci 470:175\u2013188","journal-title":"Inf Sci"},{"issue":"01","key":"2102_CR8","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/TDSC.2020.2977646","volume":"19","author":"D Han","year":"2022","unstructured":"Han D, Pan N, Li K-C (2022) A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection. IEEE Trans Dependable Secure Comput 19(01):316\u2013327","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"3","key":"2102_CR9","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2019.01.003","volume":"129","author":"VKA Sandor","year":"2019","unstructured":"Sandor VKA, Lin Y, Li X, Lin F, Zhang S (2019) Efficient decentralized multi-authority attribute based encryption for mobile cloud data storage. J Netw Comput Appl 129(3):25\u201336","journal-title":"J Netw Comput Appl"},{"issue":"10","key":"2102_CR10","doi-asserted-by":"publisher","first-page":"2271","DOI":"10.1109\/TKDE.2011.78","volume":"25","author":"J Hur","year":"2011","unstructured":"Hur J (2011) Improving security and efficiency in attribute-based data sharing. IEEE Trans Knowl Data Eng 25(10):2271\u20132282","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"9","key":"2102_CR11","doi-asserted-by":"publisher","first-page":"1310","DOI":"10.1016\/j.camwa.2012.02.005","volume":"65","author":"J Hur","year":"2013","unstructured":"Hur J, Koo D, Hwang SO, Kang K (2013) Removing escrow from cipher-text policy attribute-based encryption. Comput Math Appl 65(9):1310\u20131317","journal-title":"Comput Math Appl"},{"key":"2102_CR12","doi-asserted-by":"crossref","unstructured":"Zhang G, Liu L, Liu Y (2012) An attribute-based encryption scheme secure against malicious kgc. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, pp 1376\u20131380","DOI":"10.1109\/TrustCom.2012.74"},{"key":"2102_CR13","doi-asserted-by":"crossref","unstructured":"Yamada S, Attrapadung N, Hanaoka G, Kunihiro N (2014) A framework and compact constructions for non-monotonic attribute-based encryption. In: International Workshop on Public Key Cryptography. Springer, pp 275\u2013292","DOI":"10.1007\/978-3-642-54631-0_16"},{"issue":"6","key":"2102_CR14","doi-asserted-by":"publisher","first-page":"1274","DOI":"10.1109\/TIFS.2015.2405905","volume":"10","author":"J Ning","year":"2015","unstructured":"Ning J, Dong X, Cao Z, Wei L, Lin X (2015) White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans Inf Forensics Secur 10(6):1274\u20131288","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2102_CR15","doi-asserted-by":"crossref","unstructured":"Waters B (2011) Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: International Workshop on Public Key Cryptography. Springer, pp 53\u201370","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"2102_CR16","doi-asserted-by":"crossref","unstructured":"Rouselakis Y, Waters B (2013) Practical constructions and new proof methods for large universe attribute-based encryption. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp 463\u2013474","DOI":"10.1145\/2508859.2516672"},{"key":"2102_CR17","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1016\/j.future.2017.09.045","volume":"93","author":"Z Liu","year":"2019","unstructured":"Liu Z, Duan S, Zhou P, Wang B (2019) Traceable-then-revocable ciphertext-policy attribute-based encryption scheme. Futur Gener Comput Syst 93:903\u2013913","journal-title":"Futur Gener Comput Syst"},{"issue":"4","key":"2102_CR18","first-page":"1","volume":"53","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Deng RH, Xu S, Sun J, Li Q, Zheng D (2020) Attribute-based encryption for cloud computing access control: A survey. ACM Comput Surveys (CSUR) 53(4):1\u201341","journal-title":"ACM Comput Surveys (CSUR)"},{"key":"2102_CR19","doi-asserted-by":"crossref","unstructured":"Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp 195\u2013203","DOI":"10.1145\/1315245.1315270"},{"key":"2102_CR20","doi-asserted-by":"crossref","unstructured":"Naor M, Pinkas B (2000) Efficient trace and revoke schemes. In: International Conference on Financial Cryptography. Springer, pp 1\u201320","DOI":"10.1007\/3-540-45472-1_1"},{"issue":"3","key":"2102_CR21","first-page":"1315","volume":"12","author":"D Yang","year":"2018","unstructured":"Yang D, Wang B, Ban X (2018) Fully secure non-monotonic access structure cp-abe scheme. KSII Trans Internet Inf Syst (TIIS) 12(3):1315\u20131329","journal-title":"KSII Trans Internet Inf Syst (TIIS)"},{"issue":"11","key":"2102_CR22","doi-asserted-by":"publisher","first-page":"2577","DOI":"10.1007\/s10623-021-00939-8","volume":"89","author":"J Tomida","year":"2021","unstructured":"Tomida J, Kawahara Y, Nishimaki R (2021) Fast, compact, and expressive attribute-based encryption. Des Codes Crypt 89(11):2577\u20132626","journal-title":"Des Codes Crypt"},{"issue":"4","key":"2102_CR23","doi-asserted-by":"publisher","first-page":"3097","DOI":"10.1109\/JIOT.2021.3094323","volume":"9","author":"H Xiong","year":"2022","unstructured":"Xiong H, Huang X, Yang M, Wang L, Yu S (2022) Unbounded and efficient revocable attribute-based encryption with adaptive security for cloud-assisted internet of things. IEEE Internet Things J 9(4):3097\u20133111","journal-title":"IEEE Internet Things J"},{"key":"2102_CR24","doi-asserted-by":"crossref","unstructured":"Okamoto T, Takashima K (2012) Fully secure unbounded inner-product and attribute-based encryption. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer, pp 349\u2013366","DOI":"10.1007\/978-3-642-34961-4_22"},{"key":"2102_CR25","doi-asserted-by":"crossref","unstructured":"Zhang X, Jin C, Wen Z, Shen Q, Fang Y, Wu Z (2015) Attribute-based encryption without key escrow. In: International Conference on Cloud Computing and Security. Springer, pp 74\u201387","DOI":"10.1007\/978-3-319-27051-7_7"},{"issue":"9","key":"2102_CR26","doi-asserted-by":"publisher","first-page":"6193","DOI":"10.1109\/TII.2020.2965975","volume":"16","author":"Y Tian","year":"2020","unstructured":"Tian Y, Wang Z, Xiong J, Ma J (2020) A blockchain-based secure key management scheme with trustworthiness in dwsns. IEEE Trans Industr Inf 16(9):6193\u20136202","journal-title":"IEEE Trans Industr Inf"},{"issue":"10","key":"2102_CR27","doi-asserted-by":"publisher","first-page":"2420","DOI":"10.1587\/transinf.2016OFP0004","volume":"100","author":"K Nomura","year":"2017","unstructured":"Nomura K, Mohri M, Shiraishi Y, Morii M (2017) Attribute revocable multi-authority attribute-based encryption with forward secrecy for cloud storage. IEICE Trans Inf Syst 100(10):2420\u20132431","journal-title":"IEICE Trans Inf Syst"},{"key":"2102_CR28","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.cose.2016.02.002","volume":"59","author":"Q Li","year":"2016","unstructured":"Li Q, Ma J, Li R, Liu X, Xiong J, Chen D (2016) Secure, efficient and revocable multi-authority access control system in cloud storage. Comput Secur 59:45\u201359","journal-title":"Comput Secur"},{"issue":"18","key":"2102_CR29","doi-asserted-by":"publisher","first-page":"4098","DOI":"10.1002\/sec.1326","volume":"8","author":"Q Li","year":"2015","unstructured":"Li Q, Ma J, Li R, Xiong J, Liu X (2015) Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption. Secur Commun Netw 8(18):4098\u20134109","journal-title":"Secur Commun Netw"},{"issue":"1","key":"2102_CR30","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/TIFS.2012.2223683","volume":"8","author":"Z Liu","year":"2012","unstructured":"Liu Z, Cao Z, Wong DS (2012) White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures. IEEE Trans Inf Forensics Secur 8(1):76\u201388","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"2102_CR31","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1109\/TDSC.2016.2608343","volume":"15","author":"J Ning","year":"2016","unstructured":"Ning J, Cao Z, Dong X, Wei L (2016) White-box traceable cp-abe for cloud storage service: how to catch people leaking their access credentials effectively. IEEE Trans Dependable Secure Comput 15(5):883\u2013897","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"13","key":"2102_CR32","doi-asserted-by":"publisher","first-page":"10963","DOI":"10.1109\/JIOT.2021.3051362","volume":"8","author":"P Zeng","year":"2021","unstructured":"Zeng P, Zhang Z, Lu R, Choo K-KR (2021) Efficient policy-hiding and large universe attribute-based encryption with public traceability for internet of medical things. IEEE Internet Things J 8(13):10963\u201310972","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"2102_CR33","doi-asserted-by":"publisher","first-page":"3437","DOI":"10.1109\/TII.2021.3109090","volume":"18","author":"Q Li","year":"2021","unstructured":"Li Q, Xia B, Huang H, Zhang Y, Zhang T (2021) Trac: traceable and revocable access control scheme for mhealth in 5g-enabled iiot. IEEE Trans Industr Inf 18(5):3437\u20133448","journal-title":"IEEE Trans Industr Inf"},{"key":"2102_CR34","unstructured":"Beimel A (1996) Secure schemes for secret sharing and key distribution. Ph. D. Thesis, Israel Institute of Technology"},{"key":"2102_CR35","doi-asserted-by":"crossref","unstructured":"Boneh D, Boyen X (2004) Short signatures without random oracles. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 56\u201373","DOI":"10.1007\/978-3-540-24676-3_4"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02102-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-023-02102-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-023-02102-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T11:13:48Z","timestamp":1725275628000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-023-02102-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,11]]},"references-count":35,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["2102"],"URL":"https:\/\/doi.org\/10.1007\/s11036-023-02102-0","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2023,3,11]]},"assertion":[{"value":"8 June 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}]}}