{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T04:06:12Z","timestamp":1769313972912,"version":"3.49.0"},"reference-count":50,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1736112"],"award-info":[{"award-number":["U1736112"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772009"],"award-info":[{"award-number":["61772009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672207"],"award-info":[{"award-number":["61672207"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Jiangsu Provincial Natural Science Foundation of China","award":["BK20161511"],"award-info":[{"award-number":["BK20161511"]}]},{"name":"the Fundamental Research Funds for the Central Universities","award":["2016B10114"],"award-info":[{"award-number":["2016B10114"]}]},{"name":"the Natural Science Foundation of the Jiangsu Higher Education Institutions of China","award":["17KJB520042"],"award-info":[{"award-number":["17KJB520042"]}]},{"name":"Foundation of Suqian college","award":["2016KY04"],"award-info":[{"award-number":["2016KY04"]}]},{"DOI":"10.13039\/501100009558","name":"Anhui University of Natural Science Research Project","doi-asserted-by":"publisher","award":["KJ2018A0398"],"award-info":[{"award-number":["KJ2018A0398"]}],"id":[{"id":"10.13039\/501100009558","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1016\/j.ins.2018.07.077","type":"journal-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T22:11:03Z","timestamp":1534803063000},"page":"175-188","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":108,"special_numbering":"C","title":["Key-policy attribute-based encryption against continual auxiliary input leakage"],"prefix":"10.1016","volume":"470","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6532-2081","authenticated-orcid":false,"given":"Jiguo","family":"Li","sequence":"first","affiliation":[]},{"given":"Qihong","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Yichen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Shen","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ins.2018.07.077_bib0001","first-page":"474","article-title":"Simultaneous hardcore bits and cryptography against memory attacks","volume":"5444","author":"Akavia","year":"2009"},{"key":"10.1016\/j.ins.2018.07.077_bib0002","first-page":"325","article-title":"Evaluating 2-dnf formulas on ciphertexts","volume":"3378","author":"Boneh","year":"2005"},{"key":"10.1016\/j.ins.2018.07.077_bib0003","series-title":"FOCS 2010, IEEE Computer Society","first-page":"501","article-title":"Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage","author":"Brakerski","year":"2010"},{"key":"10.1016\/j.ins.2018.07.077_bib0004","first-page":"515","article-title":"Multi-authority attribute based encryption","volume":"4392","author":"Chase","year":"2007"},{"key":"10.1016\/j.ins.2018.07.077_bib0005","series-title":"CCS 2007","first-page":"456","article-title":"Provably secure ciphertext policy ABE","author":"Cheung","year":"2007"},{"key":"10.1016\/j.ins.2018.07.077_bib0006","first-page":"361","article-title":"Public-key encryption schemes with auxiliary inputs","volume":"5978","author":"Dodis","year":"2010"},{"key":"10.1016\/j.ins.2018.07.077_bib0007","series-title":"FOCS","first-page":"511","article-title":"Cryptography against continuous memory attacks","author":"Dodis","year":"2010"},{"key":"10.1016\/j.ins.2018.07.077_bib0008","series-title":"FOCS 2008, IEEE Computer Society","first-page":"293","article-title":"Leakage-resilient cryptography","author":"Dziembowski","year":"2008"},{"key":"10.1016\/j.ins.2018.07.077_bib0009","series-title":"CCS","first-page":"89","article-title":"Attribute-based encryption for fine-grained access control of encrypted data","author":"Goyal","year":"2006"},{"key":"10.1016\/j.ins.2018.07.077_bib0010","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.tcs.2017.10.020","article-title":"Provably secure certificate-based encryption with leakage resilience","volume":"711","author":"Guo","year":"2018","journal-title":"Theor. Comp. Sci."},{"issue":"18","key":"10.1016\/j.ins.2018.07.077_bib0011","doi-asserted-by":"crossref","first-page":"4852","DOI":"10.1002\/sec.1659","article-title":"Hierarchical attribute-based encryption with continuous auxiliary inputs leakage","volume":"9","author":"Guo","year":"2016","journal-title":"Secur. Commun. Netw."},{"issue":"5","key":"10.1016\/j.ins.2018.07.077_bib0012","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1145\/1506409.1506429","article-title":"Lest we remember: cold-boot attacks on encryption keys","volume":"52","author":"Halderman","year":"2009","journal-title":"Commun. ACM"},{"issue":"3","key":"10.1016\/j.ins.2018.07.077_bib0013","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1007\/s00145-015-9200-x","article-title":"Leakage-resilient cryptography from minimal assumptions","volume":"29","author":"Hazay","year":"2016","journal-title":"J. Cryptol."},{"issue":"8","key":"10.1016\/j.ins.2018.07.077_bib0014","doi-asserted-by":"crossref","first-page":"1343","DOI":"10.1109\/TIFS.2013.2271848","article-title":"Attribute-based encryption with verifiable outsourced decryption","volume":"8","author":"Lai","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.ins.2018.07.077_bib0015","series-title":"ASIACCS","first-page":"239","article-title":"Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption","author":"Lai","year":"2014"},{"key":"10.1016\/j.ins.2018.07.077_bib0016","first-page":"62","article-title":"Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption","volume":"6110","author":"Lewko","year":"2010"},{"key":"10.1016\/j.ins.2018.07.077_bib0017","first-page":"70","article-title":"Achieving leakage resilience through dual system encryption","volume":"6597","author":"Lewko","year":"2011"},{"key":"10.1016\/j.ins.2018.07.077_bib0018","series-title":"SP 2010, IEEE Computer Society","first-page":"273","article-title":"Revocation systems with very small private keys","author":"Lewko","year":"2010"},{"key":"10.1016\/j.ins.2018.07.077_bib0019","first-page":"547","article-title":"Unbounded HIBE and attribute-based encryption","volume":"6632","author":"Lewko","year":"2011"},{"key":"10.1016\/j.ins.2018.07.077_bib0020","first-page":"455","article-title":"New techniques for dual system encryption and fully secure hibe with short ciphertexts","volume":"5978","author":"Lewko","year":"2010"},{"key":"10.1016\/j.ins.2018.07.077_bib0021","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1016\/j.ins.2018.04.067","article-title":"Anonymous certificate-based broadcast encryption with constant decryption cost","volume":"454-455","author":"Li","year":"2018","journal-title":"Inf. Sci."},{"issue":"10","key":"10.1016\/j.ins.2018.07.077_bib0022","doi-asserted-by":"crossref","first-page":"1016","DOI":"10.1002\/sec.1396","article-title":"Provably secure identity-based encryption resilient to post-challenge continuous auxiliary inputs leakage","volume":"9","author":"Li","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.ins.2018.07.077_bib0023","first-page":"1","article-title":"Continuous leakage-resilient certificate-based encryption","volume":"355\u2013356","author":"Li","year":"2016","journal-title":"Inf. Sci."},{"issue":"5","key":"10.1016\/j.ins.2018.07.077_bib0024","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1109\/TSC.2016.2542813","article-title":"KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage","volume":"10","author":"Li","year":"2017","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.ins.2018.07.077_bib0025","doi-asserted-by":"crossref","DOI":"10.1155\/2017\/3596205","article-title":"Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length","volume":"2017","author":"Li","year":"2017","journal-title":"Secur. Commun. Netw."},{"issue":"1","key":"10.1016\/j.ins.2018.07.077_bib0026","doi-asserted-by":"crossref","DOI":"10.1002\/dac.2942","article-title":"Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage","volume":"30","author":"Li","year":"2017","journal-title":"Int. J. Commun. Syst."},{"issue":"7","key":"10.1016\/j.ins.2018.07.077_bib0027","doi-asserted-by":"crossref","first-page":"1066","DOI":"10.1093\/comjnl\/bxv128","article-title":"A leakage-resilient CCA-secure identity-based encryption scheme","volume":"59","author":"Li","year":"2016","journal-title":"Comp. J."},{"key":"10.1016\/j.ins.2018.07.077_bib0028","doi-asserted-by":"crossref","DOI":"10.1109\/TSC.2017.2710190","article-title":"Full verifiability for outsourced decryption in attribute based encryption","author":"Li","year":"2017","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"7","key":"10.1016\/j.ins.2018.07.077_bib0029","first-page":"3339","article-title":"Ciphertext-policy attribute-based encryption with hidden access policy and testing","volume":"10","author":"Li","year":"2016","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"10.1016\/j.ins.2018.07.077_bib0030","article-title":"Certificateless public integrity checking of group shared data on cloud storage","author":"Li","year":"2017","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"2","key":"10.1016\/j.ins.2018.07.077_bib0031","doi-asserted-by":"crossref","first-page":"1767","DOI":"10.1109\/JSYST.2017.2667679","article-title":"User collusion avoidance CP-ABE with efficient attribute revocation for cloud storage","volume":"12","author":"Li","year":"2018","journal-title":"IEEE Syst. J."},{"issue":"5","key":"10.1016\/j.ins.2018.07.077_bib0032","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1109\/TSC.2016.2520932","article-title":"Flexible and fine-grained attribute-based data storage in cloud computing","volume":"10","author":"Li","year":"2017","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"3","key":"10.1016\/j.ins.2018.07.077_bib0033","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.ins.2017.11.008","article-title":"Identity-based broadcast encryption with continuous leakage resilience","volume":"429","author":"Li","year":"2018","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2018.07.077_bib0034","article-title":"Hierarchical attribute based encryption with continuous leakage-resilience","author":"Li","year":"2018","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2018.07.077_bib0035","first-page":"84","article-title":"Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks","volume":"7779","author":"Liu","year":"2013"},{"issue":"1","key":"10.1016\/j.ins.2018.07.077_bib0036","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/TIFS.2012.2223683","article-title":"White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures","volume":"8","author":"Liu","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.ins.2018.07.077_bib0037","first-page":"278","article-title":"Physically observable cryptography","volume":"2951","author":"Micali","year":"2004"},{"issue":"4","key":"10.1016\/j.ins.2018.07.077_bib0038","doi-asserted-by":"crossref","first-page":"772","DOI":"10.1137\/100813464","article-title":"Public-key cryptosystems resilient to key leakage","volume":"41","author":"Naor","year":"2012","journal-title":"SIAM J. Comput."},{"issue":"6","key":"10.1016\/j.ins.2018.07.077_bib0039","doi-asserted-by":"crossref","first-page":"1274","DOI":"10.1109\/TIFS.2015.2405905","article-title":"White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes","volume":"10","author":"Ning","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.ins.2018.07.077_bib0040","doi-asserted-by":"crossref","unstructured":"J. Ning, Z. Cao, X. Dong, L. Wei, White-box traceable CP-ABE for cloud storage service: how to catch people leaking their access credentials effectively. IEEE Trans. Dependable Secure Comput. (2016) DOI:10.1109\/TDSC.2016.2608343.","DOI":"10.1109\/TDSC.2016.2608343"},{"key":"10.1016\/j.ins.2018.07.077_bib0041","series-title":"CCS 2007","first-page":"195","article-title":"Attribute-based encryption with non-monotonic access structures","author":"Ostrovsky","year":"2007"},{"issue":"6","key":"10.1016\/j.ins.2018.07.077_bib0042","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1007\/s10207-014-0270-9","article-title":"Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation","volume":"14","author":"Qian","year":"2015","journal-title":"Int. J. Inf. Secur."},{"issue":"1","key":"10.1016\/j.ins.2018.07.077_bib0043","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1049\/iet-ifs.2013.0173","article-title":"Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience","volume":"9","author":"Qin","year":"2013","journal-title":"IET Inf. Secur."},{"key":"10.1016\/j.ins.2018.07.077_bib0044","first-page":"457","article-title":"Fuzzy identity-based encryption","volume":"3494","author":"Sahai","year":"2005"},{"key":"10.1016\/j.ins.2018.07.077_bib0045","first-page":"53","article-title":"Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization","volume":"6571","author":"Waters","year":"2011"},{"key":"10.1016\/j.ins.2018.07.077_bib0046","first-page":"619","article-title":"Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions","volume":"5677","author":"Waters","year":"2009"},{"issue":"1","key":"10.1016\/j.ins.2018.07.077_bib0047","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/TIFS.2016.2601070","article-title":"A novel efficient remote data possession checking protocol in cloud storage","volume":"12","author":"Yan","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.ins.2018.07.077_bib0048","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.jss.2015.05.066","article-title":"Certificate-based encryption resilient to key leakage","volume":"116","author":"Yu","year":"2016","journal-title":"J. Syst. Software"},{"key":"10.1016\/j.ins.2018.07.077_bib0049","first-page":"117","article-title":"Identity-based encryption resilient to continual auxiliary leakage","volume":"7237","author":"Yuen","year":"2012"},{"key":"10.1016\/j.ins.2018.07.077_bib0050","series-title":"ASIACCS 2013","first-page":"511","article-title":"Anonymous attribute-based encryption supporting efficient decryption test","author":"Zhang","year":"2013"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025516308374?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025516308374?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,21]],"date-time":"2018-09-21T23:31:43Z","timestamp":1537572703000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025516308374"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":50,"alternative-id":["S0020025516308374"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2018.07.077","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2019,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Key-policy attribute-based encryption against continual auxiliary input leakage","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2018.07.077","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}