{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T00:10:38Z","timestamp":1768349438101,"version":"3.49.0"},"reference-count":25,"publisher":"Wiley","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272415"],"award-info":[{"award-number":["61272415"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61070164"],"award-info":[{"award-number":["61070164"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["S2012010008767"],"award-info":[{"award-number":["S2012010008767"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2013B010401015"],"award-info":[{"award-number":["2013B010401015"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272415"],"award-info":[{"award-number":["61272415"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61070164"],"award-info":[{"award-number":["61070164"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["S2012010008767"],"award-info":[{"award-number":["S2012010008767"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2013B010401015"],"award-info":[{"award-number":["2013B010401015"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["61272415"],"award-info":[{"award-number":["61272415"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["61070164"],"award-info":[{"award-number":["61070164"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["S2012010008767"],"award-info":[{"award-number":["S2012010008767"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2013B010401015"],"award-info":[{"award-number":["2013B010401015"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012245","name":"Science and Technology Planning Project of Guangdong Province","doi-asserted-by":"crossref","award":["61272415"],"award-info":[{"award-number":["61272415"]}],"id":[{"id":"10.13039\/501100012245","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012245","name":"Science and Technology Planning Project of Guangdong Province","doi-asserted-by":"crossref","award":["61070164"],"award-info":[{"award-number":["61070164"]}],"id":[{"id":"10.13039\/501100012245","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012245","name":"Science and Technology Planning Project of Guangdong Province","doi-asserted-by":"crossref","award":["S2012010008767"],"award-info":[{"award-number":["S2012010008767"]}],"id":[{"id":"10.13039\/501100012245","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012245","name":"Science and Technology Planning Project of Guangdong Province","doi-asserted-by":"crossref","award":["2013B010401015"],"award-info":[{"award-number":["2013B010401015"]}],"id":[{"id":"10.13039\/501100012245","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2017]]},"abstract":"<jats:p>With the rapid development of network and storage technology, cloud storage has become a new service mode, while data sharing and user revocation are important functions in the cloud storage. Therefore, according to the characteristics of cloud storage, a revocable key-aggregate encryption scheme is put forward based on subset-cover framework. The proposed scheme not only has the key-aggregate characteristics, which greatly simplifies the user\u2019s key management, but also can revoke user access permissions, realizing the flexible and effective access control. When user revocation occurs, it allows cloud server to update the ciphertext so that revoked users can not have access to the new ciphertext, while nonrevoked users do not need to update their private keys. In addition, a verification mechanism is provided in the proposed scheme, which can verify the updated ciphertext and ensure that the user revocation is performed correctly. Compared with the existing schemes, this scheme can not only reduce the cost of key management and storage, but also realize user revocation and achieve user\u2019s access control efficiently. Finally, the proposed scheme can be proved to be selective chosen-plaintext security in the standard model.<\/jats:p>","DOI":"10.1155\/2017\/2508693","type":"journal-article","created":{"date-parts":[[2017,3,12]],"date-time":"2017-03-12T21:00:35Z","timestamp":1489352435000},"page":"1-11","source":"Crossref","is-referenced-by-count":16,"title":["Revocable Key-Aggregate Cryptosystem for Data Sharing in Cloud"],"prefix":"10.1155","volume":"2017","author":[{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0003-0463-3801","authenticated-orcid":true,"given":"Qingqing","family":"Gan","sequence":"first","affiliation":[{"name":"Department of Computer Science, Jinan University, Guangzhou 510632, China"}]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-8109-3020","authenticated-orcid":true,"given":"Xiaoming","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Jinan University, Guangzhou 510632, China"}]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-2411-9597","authenticated-orcid":true,"given":"Daini","family":"Wu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Jinan University, Guangzhou 510632, China"}]}],"member":"311","reference":[{"issue":"3","key":"2","first-page":"1","volume":"1","year":"2011","journal-title":"Cloud Computing Advancements in Design Implementation & Technologies"},{"key":"25","first-page":"923","volume":"2015","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_3"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2015.2419180"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.10.020"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/357369.357372"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1455526.1455531"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-010-0108-z"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9094-6"},{"issue":"15","key":"9","first-page":"2937","volume":"15","year":"2009","journal-title":"Journal of Universal Computer Science"},{"key":"10","first-page":"47","volume-title":"Identity-based cryptosystems and signature schemes","year":"1984"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79499-8_30"},{"issue":"3","key":"14","first-page":"73","volume":"37","year":"2010","journal-title":"Computer Science"},{"key":"15","first-page":"457","volume-title":"Fuzzy identity-based encryption","year":"2005"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1504\/IJICT.2015.068375"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.112"},{"issue":"6","key":"21","first-page":"882","volume":"2","year":"2014","journal-title":"International Journal of Engineering Research and General Science"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2015.2389959"},{"key":"23","first-page":"739","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"issue":"2","key":"24","first-page":"33","volume":"42","year":"2016","journal-title":"Computer Engineering"},{"key":"26","first-page":"71","volume-title":"Applications of multilinear forms to cryptography","volume":"324","year":"2003"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_12"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_13"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/downloads.hindawi.com\/journals\/scn\/2017\/2508693.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/downloads.hindawi.com\/journals\/scn\/2017\/2508693.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/downloads.hindawi.com\/journals\/scn\/2017\/2508693.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T17:51:39Z","timestamp":1589737899000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.hindawi.com\/journals\/scn\/2017\/2508693\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":25,"alternative-id":["2508693","2508693"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1155\/2017\/2508693","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}