{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T04:46:13Z","timestamp":1769316373630,"version":"3.49.0"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772088"],"award-info":[{"award-number":["61772088"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of\u00a0Hunan Province","doi-asserted-by":"publisher","award":["2017JJ2292"],"award-info":[{"award-number":["2017JJ2292"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Key Projects of Hunan Province","award":["2016JC2012"],"award-info":[{"award-number":["2016JC2012"]}]},{"name":"Outstanding Youth Research Project of Provincial Education Department of Hunan","award":["17B030"],"award-info":[{"award-number":["17B030"]}]},{"name":"Science and Technology Planning Project of Changsha","award":["K1705018"],"award-info":[{"award-number":["K1705018"]}]},{"name":"Science and Technology Planning Project of Changsha","award":["ZD1601042"],"award-info":[{"award-number":["ZD1601042"]}]},{"name":"Science and Technology Planning Project of Changsha","award":["K1705031"],"award-info":[{"award-number":["K1705031"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2018.2889754","type":"journal-article","created":{"date-parts":[[2019,1,3]],"date-time":"2019-01-03T14:46:56Z","timestamp":1546526816000},"page":"5682-5694","source":"Crossref","is-referenced-by-count":89,"title":["CP-ABSE: A Ciphertext-Policy Attribute-Based Searchable Encryption Scheme"],"prefix":"10.1109","volume":"7","author":[{"given":"Hui","family":"Yin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6890-8953","authenticated-orcid":false,"given":"Jixin","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5402-8389","authenticated-orcid":false,"given":"Yinqiao","family":"Xiong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8441-781X","authenticated-orcid":false,"given":"Lu","family":"Ou","sequence":"additional","affiliation":[]},{"given":"Fangmin","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4432-3448","authenticated-orcid":false,"given":"Shaolin","family":"Liao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5224-4048","authenticated-orcid":false,"given":"Keqin","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"53","article-title":"Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization","author":"waters","year":"2011","journal-title":"Public Key Cryptography"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315302"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","article-title":"Enabling personalized search over encrypted outsourced data with efficiency improvement","volume":"27","author":"fu","year":"2016","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2406704"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2401003"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.282"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2017.2709318"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485890"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844400"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2845468"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23298"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.45"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.14"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847976"},{"key":"ref20","first-page":"183459e","article-title":"Searchable attribute-based encryption scheme with attribute revocation in cloud storage","volume":"12","author":"wang","year":"2018","journal-title":"PLoS ONE"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13257-0_21"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484345"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2756070"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2878268"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_30"},{"key":"ref25","author":"goh","year":"2003","journal-title":"Secure Indexes IACR ePrint Cryptography Archive"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2016.12.003"},{"key":"ref51","year":"2018","journal-title":"Request for Comments Database"},{"key":"ref53","year":"2013","journal-title":"The Java Pairing Based Cryptography Library"},{"key":"ref52","year":"2015","journal-title":"Hermetic Word Frequency Counter"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24852-1_3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/11602897_35"},{"key":"ref40","first-page":"547","article-title":"Decentralizing attribute-based encryption","author":"lewko","year":"2011","journal-title":"Proc EUROCRYPT"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2016.0104"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847943"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03584-0_28"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2599883"},{"key":"ref4","first-page":"44","article-title":"Practical techniques for searches on encrypted data","volume":"8","author":"song","year":"2000","journal-title":"Proc IEEE Symp Secur Privacy"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14992-4_13"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_21"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133980"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133970"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2448099"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2825289"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68914-0_7"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00468-1_12"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.04.015"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315270"},{"key":"ref44","first-page":"179","article-title":"Attribute-based publishing with hidden credentials and hidden policies","author":"kapadia","year":"2007","journal-title":"Proc NDSS"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653678"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08600300.pdf?arnumber=8600300","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:37:39Z","timestamp":1641987459000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8600300\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2889754","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}