{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:14:54Z","timestamp":1730276094186,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/ispa\/iucc.2017.00097","type":"proceedings-article","created":{"date-parts":[[2018,5,28]],"date-time":"2018-05-28T20:28:31Z","timestamp":1527539311000},"page":"607-613","source":"Crossref","is-referenced-by-count":3,"title":["A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy"],"prefix":"10.1109","author":[{"given":"Fang","family":"Qi","sequence":"first","affiliation":[]},{"given":"Ke","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Tang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1007\/s11036-010-0233-y","article-title":"Enhancing Attribute-Based Encryption with Attribute Hierarchy","volume":"16","author":"jin","year":"2011","journal-title":"Mobile Networks and Applications"},{"key":"ref11","first-page":"426","article-title":"Secure Threshold Multi-Authority Attribute-Based Encryption without a Central Authority","author":"huang","year":"2008","journal-title":"International Conference on Cryptology in India Springer Berlin Heidelberg"},{"key":"ref12","first-page":"44","article-title":"Ciphertext-Policy Weighted Attribute Based Encryption Scheme","volume":"47","author":"ximeng","year":"2013","journal-title":"Journal of Sichuan University"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1007\/s11859-013-0925-9","article-title":"A Hierarchical Attribute-Based Encryption Scheme","volume":"18","author":"xiubin","year":"2013","journal-title":"Wuhan University Journal of Natural Sciences"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"journal-title":"Secure schemes for secret sharing and key distribution","year":"1996","author":"beimel","key":"ref15"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1080\/00207160.2011.555642","article-title":"Multi-authority attribute-based encryption with honest-but-curious central authority","volume":"89","author":"vladimir","year":"2012","journal-title":"International Journal of Computer Mathematics"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1299","DOI":"10.3724\/SP.J.1001.2011.03993","article-title":"Attribute-Based Encryption Schemes","volume":"22","author":"jin shu","year":"2011","journal-title":"Journal of Software"},{"key":"ref18","article-title":"Multi-Authority Ciphertext-Policy Attribute-Based Encryption Scheme","author":"qi","year":"2015","journal-title":"Journal of Wuhan University"},{"key":"ref19","first-page":"386","article-title":"Multi-authority ciphertext-policy attribute-based encryption with accountability","author":"jin","year":"2011","journal-title":"ACM Symposium on Information Computer and Communications Security ASIACCS 2011"},{"key":"ref4","first-page":"121","article-title":"Improving Privacy and Sin Mutil-Authority Attribute-Based Encryption","author":"chase","year":"2009","journal-title":"ACM Conference on Computer and Communications Security ACM"},{"key":"ref3","first-page":"321","article-title":"Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization","author":"brent","year":"2011","journal-title":"Lecture Notes in Computer Science 2008"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2008.00048"},{"key":"ref5","first-page":"1263","article-title":"Hierarchical Ciphertext-policy Attribute-based Encryption Scheme","volume":"37","author":"wang","year":"2016","journal-title":"Journal of Chinese Computer Systems"},{"key":"ref8","first-page":"1","article-title":"A Modified Hierarchical Attribute-based Encryption Access Control Method for Mobile Cloud Computing","volume":"pp","author":"yuanpeng","year":"2015","journal-title":"IEEE Transactions on Cloud Computing"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.cose.2011.05.006","article-title":"Hierarchical Attribute-Based Encryption and Scalable User Revocation for Sharing Data in Cloud Servers","volume":"30","author":"guojun","year":"2011","journal-title":"Computers & Security"},{"key":"ref2","first-page":"457","article-title":"Fuzzy Identity-Based Encryption","author":"amit","year":"2005","journal-title":"International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref1","first-page":"515","article-title":"Multi-authority Attribute Based Encryption","author":"melissa","year":"2007","journal-title":"Theory of Cryptography"},{"key":"ref9","article-title":"Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing","author":"huang","year":"2016","journal-title":"Future Generation Computer Systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.09.013"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2330298"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2584614"},{"key":"ref23","article-title":"SocialVoD: a Social Feature-based P2P System","author":"chang","year":"2015","journal-title":"Proc of The 44th International Conference on Parallel Processing (ICPP)"}],"event":{"name":"2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA\/IUCC)","start":{"date-parts":[[2017,12,12]]},"location":"Guangzhou","end":{"date-parts":[[2017,12,15]]}},"container-title":["2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA\/IUCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8360389\/8366890\/08367327.pdf?arnumber=8367327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T19:27:02Z","timestamp":1529350022000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8367327\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ispa\/iucc.2017.00097","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}