{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T10:17:27Z","timestamp":1743157047778,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319694702"},{"type":"electronic","value":"9783319694719"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69471-9_30","type":"book-chapter","created":{"date-parts":[[2017,10,20]],"date-time":"2017-10-20T10:03:44Z","timestamp":1508493824000},"page":"411-426","source":"Crossref","is-referenced-by-count":0,"title":["Secure Role-Based Access Control over Outsourced EMRs Against Unwanted Leakage"],"prefix":"10.1007","author":[{"given":"Xingguang","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Jie","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zongyang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,21]]},"reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encryption with efficient revocation. In: CCS 2008, pp. 417\u2013426. ACM (2008)","DOI":"10.1145\/1455770.1455823"},{"issue":"1","key":"30_CR2","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2013","unstructured":"Li, M., Yu, S., Zheng, Y.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131\u2013143 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"10","key":"30_CR3","doi-asserted-by":"crossref","first-page":"3693","DOI":"10.1109\/JSEN.2013.2266116","volume":"13","author":"X Yao","year":"2013","unstructured":"Yao, X., Han, X., Du, X.: A lightweight multicast authentication mechanism for small scale iot applications. IEEE Sens. J. 13(10), 3693\u20133701 (2013)","journal-title":"IEEE Sens. J."},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Mont, M.C., Bramhall, P., Harrison, K.: A flexible role-based secure messaging service: exploiting IBE technology for privacy in health care. In: International Workshop on Database and Expert Systems Applications, pp. 432\u2013437. IEEE Computer Society (2003)","DOI":"10.1109\/DEXA.2003.1232060"},{"key":"30_CR5","unstructured":"Akinyele, J.A., Lehmann, C.U., Green, M.D.: Self-protecting electronic medical records using attribute-based encryption (2010). https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/ia.cr\/2010\/565"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Narayan, S., Gagn\u00e9, M., Safavi-Naini, R.: Privacy preserving EHR system using attribute-based infrastructure. In: CCSW 2010, pp. 47\u201352. ACM (2010)","DOI":"10.1145\/1866835.1866845"},{"issue":"1","key":"30_CR7","first-page":"121","volume":"30","author":"BB Mao","year":"2003","unstructured":"Mao, B.B., Sun, Y.F.: Role based access control model. Comput. Sci. 30(1), 121\u2013123 (2003)","journal-title":"Comput. Sci."},{"issue":"3","key":"30_CR8","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1109\/TITB.2003.816562","volume":"7","author":"GHMB Motta","year":"2003","unstructured":"Motta, G.H.M.B., Furuie, S.S.: A contextual role-based access control authorization model for electronic patient record. IEEE Trans. Inf. Technol. Biomed. 7(3), 202\u2013207 (2003)","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"key":"30_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-54631-0_2","volume-title":"Public-Key Cryptography \u2013 PKC 2014","author":"B Qin","year":"2014","unstructured":"Qin, B., Liu, S.: Leakage-flexible CCA-secure public-key encryption: simple construction and free of pairing. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 19\u201336. Springer, Heidelberg (2014). doi: 10.1007\/978-3-642-54631-0_2"},{"key":"30_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-642-54631-0_27","volume-title":"Public-Key Cryptography \u2013 PKC 2014","author":"KG Paterson","year":"2014","unstructured":"Paterson, K.G., Schuldt, J.C.N., Sibborn, D.L.: Related randomness attacks for public key encryption. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 465\u2013482. Springer, Heidelberg (2014). doi: 10.1007\/978-3-642-54631-0_27"},{"key":"30_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-662-53890-6_10","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2016","author":"VT Hoang","year":"2016","unstructured":"Hoang, V.T., Katz, J., O\u2019Neill, A., Zaheri, M.: Selective-opening security in the presence of randomness failures. In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT 2016. LNCS, vol. 10032, pp. 278\u2013306. Springer, Heidelberg (2016). doi: 10.1007\/978-3-662-53890-6_10"},{"key":"30_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1007\/978-3-662-49890-3_28","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"M Bellare","year":"2016","unstructured":"Bellare, M., Tackmann, B.: Nonce-based cryptography: retaining security when randomness fails. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9665, pp. 729\u2013757. Springer, Heidelberg (2016). doi: 10.1007\/978-3-662-49890-3_28"},{"key":"30_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1007\/978-3-662-49890-3_24","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"MR Albrecht","year":"2016","unstructured":"Albrecht, M.R., Paterson, K.G.: Lucky microseconds: a timing attack on Amazon\u2019s s2n implementation of TLS. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9665, pp. 622\u2013643. Springer, Heidelberg (2016). doi: 10.1007\/978-3-662-49890-3_24"},{"key":"30_CR14","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: CCS, CCS 2006, pp. 89\u201398 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Nabeel, M., Bertino, E.: Privacy preserving delegated access control in the storage as a service model. In: International Conference on Information Reuse and Integration 2012, pp. 645\u2013652. IEEE (2012)","DOI":"10.1109\/IRI.2012.6303070"},{"issue":"2","key":"30_CR16","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1109\/TIFS.2011.2172209","volume":"7","author":"Z Wan","year":"2012","unstructured":"Wan, Z., e Liu, J., Deng, R.H.: Hasbe: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 7(2), 743\u2013754 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Wang, H., He, D., Shen, J., Zheng, Z., Zhao, C., Zhao, M.: Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing. Soft Comput. 1\u201311 (2016)","DOI":"10.1016\/j.asoc.2015.09.041"},{"key":"30_CR18","doi-asserted-by":"crossref","unstructured":"Barua, M., Liang, X., Lu, R., Shen, X.: Peace: an efficient and secure patient-centric access control scheme for ehealth care system. In: INFOCOM WKSHPS 2011, pp. 970\u2013975. IEEE (2011)","DOI":"10.1109\/INFCOMW.2011.5928953"},{"key":"30_CR19","unstructured":"Yeh, L.Y., Chiang, P.Y., Tsai, Y.L., Huang, J.L.: Cloud-based fine-grained health information access control framework for lightweight IOT devices with dynamic auditing and attribute revocation. IEEE Trans. Cloud Comput. 1(1) (2015)"},{"key":"30_CR20","doi-asserted-by":"crossref","unstructured":"Guo, L., Zhang, C., Sun, J., Fang, Y.: Paas: a privacy-preserving attribute-based authentication system for ehealth networks. In: ICDCS 2012, pp. 224\u2013233. IEEE (2012)","DOI":"10.1109\/ICDCS.2012.45"},{"key":"30_CR21","doi-asserted-by":"crossref","unstructured":"Liu, W., Liu, X., Liu, J., Wu, Q., Zhang, J., Li, Y.: Auditing and revocation enabled role-based access control over outsourced private ehrs. In: HPCC 2015, pp. 336\u2013341. IEEE (2015)","DOI":"10.1109\/HPCC-CSS-ICESS.2015.10"},{"key":"30_CR22","doi-asserted-by":"crossref","unstructured":"Zhou, X., Liu, J., Liu, W., Wu, Q.: Anonymous role-based access control on e-health records. In: AsiaCCS 2016, pp. 559\u2013570. ACM (2016)","DOI":"10.1145\/2897845.2897871"},{"key":"30_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/978-3-319-08344-5_16","volume-title":"Information Security and Privacy","author":"W Liu","year":"2014","unstructured":"Liu, W., Liu, J., Wu, Q., Qin, B.: Hierarchical identity-based broadcast encryption. In: Susilo, W., Mu, Y. (eds.) ACISP 2014. LNCS, vol. 8544, pp. 242\u2013257. Springer, Cham (2014). doi: 10.1007\/978-3-319-08344-5_16"},{"key":"30_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/978-3-642-42045-0_20","volume-title":"Advances in Cryptology - ASIACRYPT 2013","author":"B Qin","year":"2013","unstructured":"Qin, B., Liu, S.: Leakage-resilient chosen-ciphertext secure public-key encryption from hash proof system and one-time lossy filter. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013. LNCS, vol. 8270, pp. 381\u2013400. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-42045-0_20"},{"key":"30_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-642-11925-5_4","volume-title":"Topics in Cryptology - CT-RSA 2010","author":"S Yilek","year":"2010","unstructured":"Yilek, S.: Resettable public-key encryption: how to encrypt on a virtual machine. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol. 5985, pp. 41\u201356. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-11925-5_4"},{"key":"30_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/978-3-642-13190-5_20","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"S Fehr","year":"2010","unstructured":"Fehr, S., Hofheinz, D., Kiltz, E., Wee, H.: Encryption schemes secure against chosen-ciphertext selective opening attacks. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 381\u2013402. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-13190-5_20"},{"key":"30_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-642-25385-0_4","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2011","author":"B Hemenway","year":"2011","unstructured":"Hemenway, B., Libert, B., Ostrovsky, R., Vergnaud, D.: Lossy encryption: constructions from general assumptions and efficient selective opening chosen ciphertext security. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 70\u201388. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-25385-0_4"},{"key":"30_CR28","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.tcs.2015.01.010","volume":"572","author":"Z Zhang","year":"2015","unstructured":"Zhang, Z., Chow, S.S.M., Cao, Z.: Post-challenge leakage in public-key encryption. Theor. Comput. Sci. 572, 25\u201349 (2015)","journal-title":"Theor. Comput. Sci."},{"key":"30_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-642-19571-6_15","volume-title":"Theory of Cryptography","author":"M Bellare","year":"2011","unstructured":"Bellare, M., Waters, B., Yilek, S.: Identity-based encryption secure against selective opening attack. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 235\u2013252. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-19571-6_15"},{"key":"30_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-642-55220-5_5","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2014","author":"J Lai","year":"2014","unstructured":"Lai, J., Deng, R.H., Liu, S., Weng, J., Zhao, Y.: Identity-based encryption secure against selective opening chosen-ciphertext attack. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 77\u201392. Springer, Heidelberg (2014). doi: 10.1007\/978-3-642-55220-5_5"},{"issue":"12","key":"30_CR31","doi-asserted-by":"crossref","first-page":"1698","DOI":"10.1002\/sec.827","volume":"9","author":"Y Chen","year":"2016","unstructured":"Chen, Y., Zhang, Z., Lin, D., Cao, Z.: Generalized (identity-based) hash proof system and its applications. Secur. Commun. Netw. 9(12), 1698\u20131716 (2016)","journal-title":"Secur. Commun. Netw."},{"key":"30_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/11761679_27","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"C Gentry","year":"2006","unstructured":"Gentry, C.: Practical identity-based encryption without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445\u2013464. Springer, Heidelberg (2006). doi: 10.1007\/11761679_27"},{"key":"30_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/978-3-642-00457-5_26","volume-title":"Theory of Cryptography","author":"C Gentry","year":"2009","unstructured":"Gentry, C., Halevi, S.: Hierarchical identity based encryption with polynomially many levels. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 437\u2013456. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-00457-5_26"},{"key":"30_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/BFb0052229","volume-title":"Advances in Cryptology \u2014 CRYPTO 1997","author":"R Canetti","year":"1997","unstructured":"Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable encryption. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 90\u2013104. Springer, Heidelberg (1997). doi: 10.1007\/BFb0052229"},{"issue":"1","key":"30_CR35","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.adhoc.2006.05.012","volume":"5","author":"X Du","year":"2007","unstructured":"Du, X., Xiao, Y., Guizani, M., Chen, H.H.: An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw. 5(1), 24\u201334 (2007)","journal-title":"Ad Hoc Netw."},{"issue":"5","key":"30_CR36","first-page":"1223","volume":"2","author":"X Du","year":"2011","unstructured":"Du, X., Guizani, M., Xiao, Y., Chen, H.H.: A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. IEEE Trans. Wireless Commun. 2(5), 1223\u20131229 (2011)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"30_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-642-54631-0_17","volume-title":"Public-Key Cryptography \u2013 PKC 2014","author":"S Hohenberger","year":"2014","unstructured":"Hohenberger, S., Waters, B.: Online\/offline attribute-based encryption. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 293\u2013310. Springer, Heidelberg (2014). doi: 10.1007\/978-3-642-54631-0_17"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69471-9_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T19:37:26Z","timestamp":1570217846000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/link.springer.com\/10.1007\/978-3-319-69471-9_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319694702","9783319694719"],"references-count":37,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/978-3-319-69471-9_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}