Attribute‐Key Attack Against a Class of Key Generation Algorithm Frameworks
ABSTRACT Attribute‐based encryption (ABE) schemes are widely used for access control of ciphertext in cloud computing. Research on the ability of existing ABE schemes to resist multiple attacks, such as attribute‐key attacks, master‐key attacks, decryption attacks, and so forth, can prevent insecure...
        Saved in:
      
    
          | Published in | Concurrency and computation Vol. 37; no. 21-22 | 
|---|---|
| Main Authors | , , , , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
        Hoboken, USA
          John Wiley & Sons, Inc
    
        25.09.2025
     Wiley Subscription Services, Inc  | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 1532-0626 1532-0634  | 
| DOI | 10.1002/cpe.70222 | 
Cover
| Abstract | ABSTRACT
Attribute‐based encryption (ABE) schemes are widely used for access control of ciphertext in cloud computing. Research on the ability of existing ABE schemes to resist multiple attacks, such as attribute‐key attacks, master‐key attacks, decryption attacks, and so forth, can prevent insecure schemes from being used. This paper summarizes the framework of a class of key generation algorithms in ABE schemes, called Key generation algorithm Under Encoding (KUE) model, based on which we propose the prerequisites for the success of attribute‐key attack. We implement the attribute‐key attack for two typical ciphertext‐policy attribute encryption schemes that fit the KUE model, and reveal the security flaws of the schemes through specific attack examples, which further confirm the practical feasibility of the attack under the KUE model. At last, two countermeasures are proposed against such attacks, providing valuable insights for the design of secure ABE schemes. | 
    
|---|---|
| AbstractList | Attribute‐based encryption (ABE) schemes are widely used for access control of ciphertext in cloud computing. Research on the ability of existing ABE schemes to resist multiple attacks, such as attribute‐key attacks, master‐key attacks, decryption attacks, and so forth, can prevent insecure schemes from being used. This paper summarizes the framework of a class of key generation algorithms in ABE schemes, called Key generation algorithm Under Encoding (KUE) model, based on which we propose the prerequisites for the success of attribute‐key attack. We implement the attribute‐key attack for two typical ciphertext‐policy attribute encryption schemes that fit the KUE model, and reveal the security flaws of the schemes through specific attack examples, which further confirm the practical feasibility of the attack under the KUE model. At last, two countermeasures are proposed against such attacks, providing valuable insights for the design of secure ABE schemes. ABSTRACT Attribute‐based encryption (ABE) schemes are widely used for access control of ciphertext in cloud computing. Research on the ability of existing ABE schemes to resist multiple attacks, such as attribute‐key attacks, master‐key attacks, decryption attacks, and so forth, can prevent insecure schemes from being used. This paper summarizes the framework of a class of key generation algorithms in ABE schemes, called Key generation algorithm Under Encoding (KUE) model, based on which we propose the prerequisites for the success of attribute‐key attack. We implement the attribute‐key attack for two typical ciphertext‐policy attribute encryption schemes that fit the KUE model, and reveal the security flaws of the schemes through specific attack examples, which further confirm the practical feasibility of the attack under the KUE model. At last, two countermeasures are proposed against such attacks, providing valuable insights for the design of secure ABE schemes.  | 
    
| Author | Zhou, Aoyang Zhao, Xiufeng Sun, Keshuo Gao, Haiying Hu, Bin  | 
    
| Author_xml | – sequence: 1 givenname: Keshuo surname: Sun fullname: Sun, Keshuo organization: Information Engineering University – sequence: 2 givenname: Haiying orcidid: 0009-0008-4493-7694 surname: Gao fullname: Gao, Haiying email: xdgaohaiying@163.com organization: Information Engineering University – sequence: 3 givenname: Bin surname: Hu fullname: Hu, Bin organization: Information Engineering University – sequence: 4 givenname: Aoyang surname: Zhou fullname: Zhou, Aoyang organization: Information Engineering University – sequence: 5 givenname: Xiufeng surname: Zhao fullname: Zhao, Xiufeng organization: Information Engineering University  | 
    
| BookMark | eNp1kMFOwzAMhiM0JLbBgTeIxIlDt8Rp2u5YVdtADMEBzlHaJqNb14wk09Qbj8Az8iR0FHHjZFv-7N_-R2jQmEYhdE3JhBIC02KvJjEBgDM0pJxBQCIWDv5yiC7QyLkNIZQSRofoMfXeVvnBq6-PzwfV4q6WxRana1k1zmOJs1o6h43Gp-5SNcpKX5kGp_Xa2Mq_7fDCyp06Grt1l-hcy9qpq984Rq-L-Ut2F6yelvdZugoK4DMIdJSXRRmXLOe5TIgsYx7GwGUS5SQsCPCIKKrZLAlDkDLRSZ6AljEvIwhVdzYbo5t-796a94NyXmzMwTadpGAQAos47_4eo9ueKqxxziot9rbaSdsKSsTJLdG5JX7c6thpzx6rWrX_gyJ7nvcT341ZbOY | 
    
| Cites_doi | 10.1109/ACCESS.2018.2854600 10.1109/TC.2020.3043950 10.1007/978-3-030-75539-3_5 10.1109/TCC.2021.3131686 10.1109/TPDS.2012.97 10.1109/JIOT.2024.3468018 10.1109/TCC.2015.2513388 10.1109/TETC.2019.2904637 10.1109/TPDS.2015.2448095 10.1109/JIOT.2023.3325996 10.1007/11426639_27 10.1007/s10207-014-0270-9 10.1109/TIFS.2016.2523941 10.1109/SP.2007.11 10.1109/TDSC.2020.2977646 10.1007/s11227-018-2644-7 10.1109/SCT.1993.336536 10.1109/JIOT.2021.3137240  | 
    
| ContentType | Journal Article | 
    
| Copyright | 2025 John Wiley & Sons Ltd. | 
    
| Copyright_xml | – notice: 2025 John Wiley & Sons Ltd. | 
    
| DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D  | 
    
| DOI | 10.1002/cpe.70222 | 
    
| DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts  Academic Computer and Information Systems Abstracts Professional  | 
    
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional  | 
    
| DatabaseTitleList | Computer and Information Systems Abstracts CrossRef  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Computer Science | 
    
| EISSN | 1532-0634 | 
    
| EndPage | n/a | 
    
| ExternalDocumentID | 10_1002_cpe_70222 CPE70222  | 
    
| Genre | researchArticle | 
    
| GrantInformation_xml | – fundername: National Natural Science Foundation of China funderid: 61902428 – fundername: the fund of Laboratory for Advanced Computing and Intelligence Engineering  | 
    
| GroupedDBID | .3N .DC .GA 05W 0R~ 10A 1L6 1OB 1OC 33P 3SF 3WU 4.4 50Y 50Z 51W 51X 52M 52N 52O 52P 52S 52T 52U 52W 52X 5GY 5VS 66C 702 7PT 8-0 8-1 8-3 8-4 8-5 8UM 930 A03 AAESR AAEVG AAHQN AAMNL AANLZ AAONW AAXRX AAYCA AAZKR ABCQN ABCUV ABEML ABIJN ACAHQ ACCZN ACPOU ACSCC ACXBN ACXQS ADBBV ADEOM ADIZJ ADKYN ADMGS ADOZA ADXAS ADZMN AEIGN AEIMD AEUYR AEYWJ AFBPY AFFPM AFGKR AFWVQ AGHNM AGYGG AHBTC AITYG AIURR AJXKR ALMA_UNASSIGNED_HOLDINGS ALUQN ALVPJ AMBMR AMYDB ATUGU AUFTA AZBYB BAFTC BDRZF BFHJK BHBCM BMNLL BROTX BRXPI BY8 CS3 D-E D-F DCZOG DPXWK DR2 DRFUL DRSTM EBS F00 F01 F04 F5P G-S G.N GNP GODZA HGLYW HHY HZ~ IX1 JPC KQQ LATKE LAW LC2 LC3 LEEKS LITHE LOXES LP6 LP7 LUTES LYRES MEWTI MK4 MRFUL MRSTM MSFUL MSSTM MXFUL MXSTM N04 N05 N9A O66 O9- OIG P2W P2X P4D PQQKQ Q.N Q11 QB0 QRW R.K ROL RX1 SUPJJ TN5 UB1 V2E W8V W99 WBKPD WIH WIK WOHZO WQJ WXSBR WYISQ WZISG XG1 XV2 ~IA ~WT AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D  | 
    
| ID | FETCH-LOGICAL-c2592-f6bdcd7d3b5ba80ad754725a86b04c02560e1f398442aa8f8b82fa75d624e0313 | 
    
| IEDL.DBID | DR2 | 
    
| ISSN | 1532-0626 | 
    
| IngestDate | Sat Aug 23 15:40:22 EDT 2025 Wed Oct 01 05:37:35 EDT 2025 Sat Aug 23 09:20:08 EDT 2025  | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Issue | 21-22 | 
    
| Language | English | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-c2592-f6bdcd7d3b5ba80ad754725a86b04c02560e1f398442aa8f8b82fa75d624e0313 | 
    
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14  | 
    
| ORCID | 0009-0008-4493-7694 | 
    
| PQID | 3242365506 | 
    
| PQPubID | 2045170 | 
    
| PageCount | 11 | 
    
| ParticipantIDs | proquest_journals_3242365506 crossref_primary_10_1002_cpe_70222 wiley_primary_10_1002_cpe_70222_CPE70222  | 
    
| ProviderPackageCode | CITATION AAYXX  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 25 September 2025 2025-09-25 20250925  | 
    
| PublicationDateYYYYMMDD | 2025-09-25 | 
    
| PublicationDate_xml | – month: 09 year: 2025 text: 25 September 2025 day: 25  | 
    
| PublicationDecade | 2020 | 
    
| PublicationPlace | Hoboken, USA | 
    
| PublicationPlace_xml | – name: Hoboken, USA – name: Hoboken  | 
    
| PublicationTitle | Concurrency and computation | 
    
| PublicationYear | 2025 | 
    
| Publisher | John Wiley & Sons, Inc Wiley Subscription Services, Inc  | 
    
| Publisher_xml | – name: John Wiley & Sons, Inc – name: Wiley Subscription Services, Inc  | 
    
| References | 2021; 9 2019; 7 2023; 21 2018; 9 2015; 14 2021; 12704 2023; 11 2022; 71 2013; 24 2022; 9 2007 2024; 11 1993 2025; 13 2020; 76 2025; 12 2016; 27 2005; 3494 2022; 19 2016; 11 e_1_2_10_12_1 e_1_2_10_9_1 e_1_2_10_13_1 e_1_2_10_10_1 e_1_2_10_21_1 e_1_2_10_20_1 Wen W. (e_1_2_10_19_1) 2025; 13 e_1_2_10_2_1 e_1_2_10_4_1 e_1_2_10_18_1 e_1_2_10_3_1 e_1_2_10_6_1 e_1_2_10_16_1 e_1_2_10_5_1 e_1_2_10_17_1 e_1_2_10_8_1 e_1_2_10_14_1 e_1_2_10_7_1 Miao Y. (e_1_2_10_11_1) 2023; 21 e_1_2_10_15_1  | 
    
| References_xml | – volume: 11 start-page: 1265 issue: 6 year: 2016 end-page: 1277 article-title: An Efficient File Hierarchy Attribute‐Based Encryption Scheme in Cloud Computing publication-title: IEEE Transactions on Information Forensics and Security – volume: 11 start-page: 10441 issue: 6 year: 2024 end-page: 10451 article-title: Efficient Revocable Attribute‐Based Encryption With Verifiable Data Integrity publication-title: IEEE Internet of Things Journal – start-page: 321 year: 2007 end-page: 334 – volume: 21 start-page: 1 year: 2023 end-page: 18 article-title: Verifiable Outsourced Attribute‐Based Encryption Scheme for Cloud‐Assisted Mobile E‐health System publication-title: IEEE Transactions on Dependable and Secure Computing – volume: 24 start-page: 131 issue: 1 year: 2013 end-page: 143 article-title: Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute‐Based Encryption publication-title: IEEE Transactions on Parallel and Distributed Systems – volume: 12 start-page: 2146 issue: 2 year: 2025 end-page: 2157 article-title: PH‐MG‐ABE: A Flexible Policy‐Hidden Multigroup Attribute‐Based Encryption Scheme for Secure Cloud Storage publication-title: IEEE Internet of Things Journal – volume: 14 start-page: 487 issue: 6 year: 2015 end-page: 497 article-title: Privacy‐Preserving Personal Health Record Using Multi‐authority Attribute‐based Encryption With Revocation publication-title: International Journal of Information Security – volume: 9 start-page: 983 issue: 2 year: 2021 end-page: 993 article-title: Extended File Hierarchy Access Control Scheme With Attribute‐Based Encryption in Cloud Computing publication-title: IEEE Transactions on Emerging Topics in Computing – volume: 13 start-page: 1 year: 2025 end-page: 13 article-title: Efficient Registered Attribute Based Access Control With Same Sub‐Policies in Mobile Cloud Computing publication-title: IEEE Transactions on Mobile Computing – volume: 12704 start-page: 100 year: 2021 end-page: 125 – volume: 9 start-page: 38273 issue: 6 year: 2018 end-page: 38284 article-title: Efficient Compressed Ciphertext Length Scheme Using Multi‐Authority CP‐ABE for Hierarchical Attributes publication-title: IEEE Access – volume: 71 start-page: 175 issue: 1 year: 2022 end-page: 184 article-title: Efficient CP‐ABE Scheme With Shared Decryption in Cloud Storage publication-title: IEEE Transactions on Computers – volume: 27 start-page: 1484 issue: 5 year: 2016 end-page: 1496 article-title: TMACS: A Robust and Verifiable Threshold Multi‐Authority Access Control System in Public Cloud Storage publication-title: IEEE Transactions on Parallel and Distributed Systems – volume: 7 start-page: 383 issue: 2 year: 2019 end-page: 391 article-title: A Modified Hierarchical Attribute‐Based Encryption Access Control Method for Mobile Cloud Computing publication-title: IEEE Transactions on Cloud Computing – volume: 3494 start-page: 457 year: 2005 end-page: 473 – volume: 11 start-page: 1273 issue: 2 year: 2023 end-page: 1285 article-title: Efficient Revocable Storage Attribute‐based Encryption With Arithmetic Span Programs in Cloud‐Assisted Internet of Things publication-title: IEEE Transactions on Cloud Computing – volume: 9 start-page: 12482 issue: 14 year: 2022 end-page: 12496 article-title: Secure Decentralized Attribute‐Based Sharing of Personal Health Records With Blockchain publication-title: IEEE Internet of Things Journal – start-page: 102 year: 1993 end-page: 111 – volume: 19 start-page: 316 issue: 1 year: 2022 end-page: 327 article-title: A Traceable and Revocable Ciphertext‐Policy Attribute‐Based Encryption Scheme Based on Privacy Protection publication-title: IEEE Transactions on Dependable and Secure Computing – volume: 76 start-page: 4884 issue: 7 year: 2020 end-page: 4903 article-title: An Attribute‐Based Encryption Scheme With Multiple Authorities on Hierarchical Personal Health Record in Cloud publication-title: Journal of Supercomputing – ident: e_1_2_10_13_1 doi: 10.1109/ACCESS.2018.2854600 – ident: e_1_2_10_16_1 doi: 10.1109/TC.2020.3043950 – ident: e_1_2_10_20_1 doi: 10.1007/978-3-030-75539-3_5 – ident: e_1_2_10_7_1 doi: 10.1109/TCC.2021.3131686 – ident: e_1_2_10_8_1 doi: 10.1109/TPDS.2012.97 – ident: e_1_2_10_18_1 doi: 10.1109/JIOT.2024.3468018 – ident: e_1_2_10_5_1 doi: 10.1109/TCC.2015.2513388 – ident: e_1_2_10_15_1 doi: 10.1109/TETC.2019.2904637 – ident: e_1_2_10_4_1 doi: 10.1109/TPDS.2015.2448095 – ident: e_1_2_10_17_1 doi: 10.1109/JIOT.2023.3325996 – ident: e_1_2_10_2_1 doi: 10.1007/11426639_27 – ident: e_1_2_10_9_1 doi: 10.1007/s10207-014-0270-9 – ident: e_1_2_10_12_1 doi: 10.1109/TIFS.2016.2523941 – ident: e_1_2_10_3_1 doi: 10.1109/SP.2007.11 – ident: e_1_2_10_6_1 doi: 10.1109/TDSC.2020.2977646 – volume: 21 start-page: 1 year: 2023 ident: e_1_2_10_11_1 article-title: Verifiable Outsourced Attribute‐Based Encryption Scheme for Cloud‐Assisted Mobile E‐health System publication-title: IEEE Transactions on Dependable and Secure Computing – ident: e_1_2_10_14_1 doi: 10.1007/s11227-018-2644-7 – ident: e_1_2_10_21_1 doi: 10.1109/SCT.1993.336536 – volume: 13 start-page: 1 year: 2025 ident: e_1_2_10_19_1 article-title: Efficient Registered Attribute Based Access Control With Same Sub‐Policies in Mobile Cloud Computing publication-title: IEEE Transactions on Mobile Computing – ident: e_1_2_10_10_1 doi: 10.1109/JIOT.2021.3137240  | 
    
| SSID | ssj0011031 | 
    
| Score | 2.4085217 | 
    
| Snippet | ABSTRACT
Attribute‐based encryption (ABE) schemes are widely used for access control of ciphertext in cloud computing. Research on the ability of existing ABE... Attribute‐based encryption (ABE) schemes are widely used for access control of ciphertext in cloud computing. Research on the ability of existing ABE schemes...  | 
    
| SourceID | proquest crossref wiley  | 
    
| SourceType | Aggregation Database Index Database Publisher  | 
    
| SubjectTerms | Access control Algorithms attribute‐based encryption attribute‐key attack Cloud computing Countermeasures Encryption KUE model  | 
    
| Title | Attribute‐Key Attack Against a Class of Key Generation Algorithm Frameworks | 
    
| URI | https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fcpe.70222 https://www.proquest.com/docview/3242365506  | 
    
| Volume | 37 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVWIB databaseName: Wiley Online Library - Core collection (SURFmarket) issn: 1532-0626 databaseCode: DR2 dateStart: 19960101 customDbUrl: isFulltext: true eissn: 1532-0634 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0011031 providerName: Wiley-Blackwell  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NS8MwGA5jJy_OT5xOCeLBS7c2S5oUT2NsDGUi4mAHoSRNOoe6ja076Mmf4G_0l5iPdlNBEG8t_aB937zJ87TJ8wBwxrAQPJDcC1JCPcwQ9zQKQR4WUSCJFDQSZr1z_zrsDfDlkAxL4KJYC-P0IVYf3Exl2P7aFDgXi8ZaNDSZqTo1dEX3v0EztHTqdiUdFRj7AqeVijxfo_ZCVchHjdWV38eiNcD8ClPtONOtgPviCd30ksf6MhP15PWHeOM_X2ELbOb4E7Zcg9kGJTXZAZXC2wHmpb4L-q3MeWGpj7f3K_UC9T5PHmFrxMcaUUIOrZ0mnKbQHHXq1SbJsPU0ms7H2cMz7BYTvxZ7YNDt3LV7Xm694CWaDyEvDYVMJJVNQQRnPpeUYIoIZ6HwcWJxkgrSZsQwRpyzlAmGUk6JDBFWRg5yH5Qn04k6AFBqTBpoVBRRgTAPE65Tg4RCmnj5KuG0Ck6LJMQzp7AROy1lFOsAxTZAVVAr0hPnRbaILRYMNcUKq-Dcxvn3G8Ttm47dOPz7qUdgAxm3X_MPitRAOZsv1bGGIJk4sW3tE0XQ1n8 | 
    
| linkProvider | Wiley-Blackwell | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnZ3PS8MwFMcfcx704m9xOjWIBy-dbZY2LXgp4pi6DZENdpGSNOkUdRtbPejJP8G_0b_EJG3nDxDEW0t_0L6X13xemnwfwKFPOGeOYJaTuNQiPmaWohBsER44whWcBlyvd253vGaPXPTdfglOirUwmT7EbMBNR4b5XusA1wPSx5-qofFY1qjOV-ZgnngqT9FIdD0Tj3J0AYNMLRVbtuL2QlfIxsezS7_3Rp-I-RVUTU_TWIab4hmzCSb3taeU1-KXH_KN_32JFVjKERSFWZtZhZIcrsFyUd4B5dG-Du0wzcphyffXt0v5jNQ-i-9ROGB3CioRQ6aiJholSB_NBKy1n1H4MBhN7tLbR9Qo5n5NN6DXOOueNq28-oIVq5QIW4nHRSyoqHOXM99mgrqEYpf5HrdJbFBJOkk98AnBjPmJz32cMOoKDxOpFSE3oTwcDeUWIKGw1FFgFFCOCfNipnyDucQq97JlzGgFDgovRONMZCPK5JRxpAwUGQNVoFr4J8rjbBoZHPRUluVV4MgY-vcbRKdXZ2Zj---n7sNCs9tuRa3zzuUOLGJd_Ff_knKrUE4nT3JXEUnK90zD-wDHuNqg | 
    
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS8MwFD7oBPHFecV5DeKDL51tljQp-DLUMa8MUfBFStKkc0y3od2DPvkT_I3-EpN0nRcQxLeWJqU9J6f5TnryfQA7nEgpAiW8IKXMIxwLz6AQ7BEZBYoqySJp9zufX4TNa3JyQ28mYL_YC5PzQ4wX3GxkuO-1DXA9UOneJ2toMtBVZvOVSZgiNOK2oO_wckweFVgBg5wtFXu-we0Fr5CP98Zdv89GnxDzK1B1M02jDLfFM-YFJt3qMJPV5OUHfeN_X2IOZkcQFNXzMTMPE7q3AOVC3gGNon0RzutZLoel31_fTvUzMuci6aJ6W3QMqEQCOUVN1E-RvZoTWFs_o_p9u__Yye4eUKOo_XpaguvG0dVB0xupL3iJSYmwl4ZSJYqpmqRScF8oRgnDVPBQ-iRxUEkHaS3ihGAheMolx6lgVIWYaMsIuQylXr-nVwApA0sDA4wiJjERYSKMb7DU2ORevk4Eq8B24YV4kJNsxDmdMo6NgWJnoAqsF_6JR3H2FDs4GJosK6zArjP07zeID1pH7mD17023YLp12IjPji9O12AGW-1f-0eKrkMpexzqDQNIMrnpxt0HoozaJA | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Attribute%E2%80%90Key+Attack+Against+a+Class+of+Key+Generation+Algorithm+Frameworks&rft.jtitle=Concurrency+and+computation&rft.au=Sun%2C+Keshuo&rft.au=Gao%2C+Haiying&rft.au=Hu%2C+Bin&rft.au=Zhou%2C+Aoyang&rft.date=2025-09-25&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.issn=1532-0626&rft.eissn=1532-0634&rft.volume=37&rft.issue=21-22&rft.epage=n%2Fa&rft_id=info:doi/10.1002%2Fcpe.70222&rft.externalDBID=10.1002%252Fcpe.70222&rft.externalDocID=CPE70222 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1532-0626&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1532-0626&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1532-0626&client=summon |