Large universe decentralized key-policy attribute-based encryption
In multi‐authority attribute‐based encryption (ABE) systems, each authority manages a different attribute universe and issues the private keys to users. However, the previous multi‐authority ABE schemes are subject to such restrictions during initializing the systems: either the attribute universe i...
Saved in:
Published in | Security and communication networks Vol. 8; no. 3; pp. 501 - 509 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
London
Blackwell Publishing Ltd
01.02.2015
John Wiley & Sons, Inc |
Subjects | |
Online Access | Get full text |
ISSN | 1939-0114 1939-0122 |
DOI | 10.1002/sec.997 |
Cover
Abstract | In multi‐authority attribute‐based encryption (ABE) systems, each authority manages a different attribute universe and issues the private keys to users. However, the previous multi‐authority ABE schemes are subject to such restrictions during initializing the systems: either the attribute universe is polynomially sized and the attributes have to be enumerated or the attribute universe can be exponentially large, but the size of the set of attributes, which will be used in encryption, is not more than a predefined fixed value. These restrictions prevent multi‐authority ABE schemes from being deployed in dynamic practice applications. In this paper, we present a large universe decentralized key‐policy ABE scheme without such additional limitation. In our scheme, there is no requirement of any central authority. Each attribute authority executes independently from the others and can join or depart the system allodiality. Our system supports any monotone access policy. The proposed scheme is constructed on prime order groups and proved selectively secure in the standard model. To the best of our knowledge, our scheme is the first large universe decentralized key‐policy ABE system in the standard model. Copyright © 2014 John Wiley & Sons, Ltd.
Our contributions review current multi‐authority attribute‐based encryption schemes and demonstrate the restrictions in the initial phase, present a new decentralized key‐policy attribute‐based encryption scheme, which can support large attribute universe without such restrictions, and performance comparison and security proof indicate that our scheme is efficient and secure. |
---|---|
AbstractList | In multi‐authority attribute‐based encryption (ABE) systems, each authority manages a different attribute universe and issues the private keys to users. However, the previous multi‐authority ABE schemes are subject to such restrictions during initializing the systems: either the attribute universe is polynomially sized and the attributes have to be enumerated or the attribute universe can be exponentially large, but the size of the set of attributes, which will be used in encryption, is not more than a predefined fixed value. These restrictions prevent multi‐authority ABE schemes from being deployed in dynamic practice applications. In this paper, we present a large universe decentralized key‐policy ABE scheme without such additional limitation. In our scheme, there is no requirement of any central authority. Each attribute authority executes independently from the others and can join or depart the system allodiality. Our system supports any monotone access policy. The proposed scheme is constructed on prime order groups and proved selectively secure in the standard model. To the best of our knowledge, our scheme is the first large universe decentralized key‐policy ABE system in the standard model. Copyright © 2014 John Wiley & Sons, Ltd.
Our contributions review current multi‐authority attribute‐based encryption schemes and demonstrate the restrictions in the initial phase, present a new decentralized key‐policy attribute‐based encryption scheme, which can support large attribute universe without such restrictions, and performance comparison and security proof indicate that our scheme is efficient and secure. In multi‐authority attribute‐based encryption (ABE) systems, each authority manages a different attribute universe and issues the private keys to users. However, the previous multi‐authority ABE schemes are subject to such restrictions during initializing the systems: either the attribute universe is polynomially sized and the attributes have to be enumerated or the attribute universe can be exponentially large, but the size of the set of attributes, which will be used in encryption, is not more than a predefined fixed value. These restrictions prevent multi‐authority ABE schemes from being deployed in dynamic practice applications. In this paper, we present a large universe decentralized key‐policy ABE scheme without such additional limitation. In our scheme, there is no requirement of any central authority. Each attribute authority executes independently from the others and can join or depart the system allodiality. Our system supports any monotone access policy. The proposed scheme is constructed on prime order groups and proved selectively secure in the standard model. To the best of our knowledge, our scheme is the first large universe decentralized key‐policy ABE system in the standard model. Copyright © 2014 John Wiley & Sons, Ltd. In multi-authority attribute-based encryption (ABE) systems, each authority manages a different attribute universe and issues the private keys to users. However, the previous multi-authority ABE schemes are subject to such restrictions during initializing the systems: either the attribute universe is polynomially sized and the attributes have to be enumerated or the attribute universe can be exponentially large, but the size of the set of attributes, which will be used in encryption, is not more than a predefined fixed value. These restrictions prevent multi-authority ABE schemes from being deployed in dynamic practice applications. In this paper, we present a large universe decentralized key-policy ABE scheme without such additional limitation. In our scheme, there is no requirement of any central authority. Each attribute authority executes independently from the others and can join or depart the system allodiality. Our system supports any monotone access policy. The proposed scheme is constructed on prime order groups and proved selectively secure in the standard model. To the best of our knowledge, our scheme is the first large universe decentralized key-policy ABE system in the standard model. Copyright copyright 2014 John Wiley & Sons, Ltd. Our contributions review current multi-authority attribute-based encryption schemes and demonstrate the restrictions in the initial phase, present a new decentralized key-policy attribute-based encryption scheme, which can support large attribute universe without such restrictions, and performance comparison and security proof indicate that our scheme is efficient and secure. |
Author | Ma, Jianfeng Xiong, Jinbo Li, Qi Liu, Ximeng Li, Rui |
Author_xml | – sequence: 1 givenname: Qi surname: Li fullname: Li, Qi email: Correspondence: Qi Li, School of Computer Science and Technology, Xidian University, Xi'an South Taibai Road, Shannxi, 710071, China., qilijs@gmail.com organization: School of Computer Science and Technology, Xidian University, Xi'an, China – sequence: 2 givenname: Jianfeng surname: Ma fullname: Ma, Jianfeng organization: School of Computer Science and Technology, Xidian University, Xi'an, China – sequence: 3 givenname: Rui surname: Li fullname: Li, Rui organization: School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China – sequence: 4 givenname: Jinbo surname: Xiong fullname: Xiong, Jinbo organization: School of Computer Science and Technology, Xidian University, Xi'an, China – sequence: 5 givenname: Ximeng surname: Liu fullname: Liu, Ximeng organization: School of Telecommunications Engineering, Xidian University, Xi'an, China |
BookMark | eNp10NtKxDAQBuAgCh7xFRa8UJDqpEmb5FLXI6wHPOBlSNOpRGu7Jq1an97IiqDoVQby8TPzL5P5pm2QkHUKOxQg3Q1od5QSc2SJKqYSoGk6_z1TvkiWQ3gAyCkXfInsT4y_x1HfuBf0AUclWmw6b2r3juXoEYdk2tbODiPTdd4VfYdJYUL8wsb6Ydq5tlklC5WpA659vSvk9ujwZnySTC6OT8d7k8SyHERiREqhqEoqi6xMS5lngEzyomIiLyhXRtmMg00hLTFjpVQSysrYTIAEKQvGVsjWLHfq2-ceQ6efXLBY16bBtg-a5jmAVJyrSDd-0Ye2903cLirOecaFyqPanCnr2xA8Vnrq3ZPxg6agP7vUsUsdu4wy-SWt68zn8bEqV__ht2f-1dU4_Berrw_HP9Jd6PDtWxv_qHPBRKbvzo_12fn1-O7g6lIz9gGQ7pSU |
CitedBy_id | crossref_primary_10_1109_TNET_2022_3155110 crossref_primary_10_1109_ACCESS_2021_3074142 crossref_primary_10_1007_s12652_021_02915_5 crossref_primary_10_1109_TSC_2021_3086023 crossref_primary_10_1109_ACCESS_2018_2874066 crossref_primary_10_1155_2017_7323158 crossref_primary_10_1155_2018_1701675 crossref_primary_10_1002_sec_1326 crossref_primary_10_3233_MGS_190304 crossref_primary_10_1109_TCC_2014_2372758 crossref_primary_10_1007_s12243_018_00702_6 crossref_primary_10_1155_2017_4070616 crossref_primary_10_1002_sec_1574 crossref_primary_10_1016_j_jisa_2019_05_012 crossref_primary_10_1109_ACCESS_2021_3052247 |
Cites_doi | 10.1007/978-3-642-20465-4_30 10.1007/978-3-642-00730-9_2 10.1007/978-3-642-23822-2_16 10.1007/978-3-642-13190-5_4 10.1109/SP.2007.11 10.1145/1315245.1315270 10.1007/978-3-540-24676-3_14 10.1007/978-3-540-70583-3_47 10.1145/1315245.1315302 10.1007/978-3-540-70936-7_28 10.1002/sec.345 10.1007/978-3-540-24676-3_13 10.1145/1966913.1966964 10.1007/3-540-44647-8_13 10.1145/1180405.1180418 10.4134/BKMS.2009.46.4.803 10.1145/2508859.2516672 10.1007/11426639_27 10.1007/978-3-642-19379-8_4 10.1007/978-3-540-89754-5_33 10.1007/978-3-642-20465-4_31 10.1145/1653662.1653678 |
ContentType | Journal Article |
Copyright | Copyright © 2014 John Wiley & Sons, Ltd. Copyright © 2015 John Wiley & Sons, Ltd. |
Copyright_xml | – notice: Copyright © 2014 John Wiley & Sons, Ltd. – notice: Copyright © 2015 John Wiley & Sons, Ltd. |
DBID | BSCLL AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
DOI | 10.1002/sec.997 |
DatabaseName | Istex CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | CrossRef Technology Research Database Technology Research Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1939-0122 |
EndPage | 509 |
ExternalDocumentID | 3554404691 10_1002_sec_997 SEC997 ark_67375_WNG_MNSCWDRP_3 |
Genre | article |
GroupedDBID | .4S .DC 05W 0R~ 123 24P 31~ 3SF 4.4 52U 5DZ 66C 8-1 8UM AAESR AAEVG AAFWJ AAMMB AANHP AAONW AAZKR ACBWZ ACCMX ACGFO ACRPL ACXQS ACYXJ ADBBV ADIZJ ADMLS ADNMO AEFGJ AEIMD AENEX AFBPY AGQPQ AGXDD AIDQK AIDYY AJXKR ALMA_UNASSIGNED_HOLDINGS AMBMR ARCSS ASPBG ATUGU AVWKF AZFZN AZVAB BCNDV BDRZF BHBCM BNHUX BOGZA BRXPI BSCLL CS3 DR2 DU5 EBS EIS EJD F1Z FEDTE G-S GODZA H13 HVGLF HZ~ IX1 LH4 LITHE LW6 MY. MY~ NNB O9- OIG OK1 P2P PUEGO ROL SUPJJ TH9 TUS W99 WBKPD XV2 AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c3607-a7210bfd18b5d2d8650e384bf376b149a9c540c202de53d8980dfac5708088b33 |
IEDL.DBID | DR2 |
ISSN | 1939-0114 |
IngestDate | Fri Sep 05 12:17:49 EDT 2025 Mon Jun 30 11:42:27 EDT 2025 Wed Oct 01 02:25:53 EDT 2025 Thu Apr 24 23:09:56 EDT 2025 Sun Sep 21 06:14:31 EDT 2025 Sun Sep 21 06:20:43 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Language | English |
License | http://onlinelibrary.wiley.com/termsAndConditions#vor |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c3607-a7210bfd18b5d2d8650e384bf376b149a9c540c202de53d8980dfac5708088b33 |
Notes | ark:/67375/WNG-MNSCWDRP-3 ArticleID:SEC997 istex:C0C8D19DF228C48BE70B7C951C9CE1E18156A086 ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
PQID | 1644454796 |
PQPubID | 1046363 |
PageCount | 9 |
ParticipantIDs | proquest_miscellaneous_1660089449 proquest_journals_1644454796 crossref_primary_10_1002_sec_997 crossref_citationtrail_10_1002_sec_997 wiley_primary_10_1002_sec_997_SEC997 istex_primary_ark_67375_WNG_MNSCWDRP_3 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2015-02 February 2015 2015-02-00 20150201 |
PublicationDateYYYYMMDD | 2015-02-01 |
PublicationDate_xml | – month: 02 year: 2015 text: 2015-02 |
PublicationDecade | 2010 |
PublicationPlace | London |
PublicationPlace_xml | – name: London |
PublicationTitle | Security and communication networks |
PublicationTitleAlternate | Security Comm. Networks |
PublicationYear | 2015 |
Publisher | Blackwell Publishing Ltd John Wiley & Sons, Inc |
Publisher_xml | – name: Blackwell Publishing Ltd – name: John Wiley & Sons, Inc |
References | Goyal V, Jain A, Pandey O, Sahai A. Bounded ciphertext policy attribute based encryption. Automata, Languages and Programming 2008; 5126: 579-591. Hur J, Park C, Hwang SO. Fine-grained user access control in ciphertext-policy attribute-based encryption. Security and Communication Networks 2012; 5(3): 253-261. Müller S, Katzenbeisser S, Eckert C. On multi-authority ciphertext-policy attribute-based encryption. Bulletin of the Korean Mathematical Society 2009; 46(4): 803-819. 2008; 5126 2009; 46 2001 2011 2010 2009 2008 2007 1996 2006 2005 2004 2013 2012; 5 e_1_2_8_17_1 e_1_2_8_18_1 e_1_2_8_19_1 e_1_2_8_13_1 e_1_2_8_24_1 e_1_2_8_14_1 e_1_2_8_25_1 e_1_2_8_15_1 e_1_2_8_16_1 e_1_2_8_3_1 e_1_2_8_2_1 e_1_2_8_4_1 e_1_2_8_7_1 e_1_2_8_6_1 e_1_2_8_9_1 e_1_2_8_8_1 e_1_2_8_20_1 e_1_2_8_10_1 e_1_2_8_21_1 e_1_2_8_11_1 e_1_2_8_22_1 e_1_2_8_12_1 e_1_2_8_23_1 Goyal V (e_1_2_8_5_1) 2008; 5126 |
References_xml | – reference: Goyal V, Jain A, Pandey O, Sahai A. Bounded ciphertext policy attribute based encryption. Automata, Languages and Programming 2008; 5126: 579-591. – reference: Hur J, Park C, Hwang SO. Fine-grained user access control in ciphertext-policy attribute-based encryption. Security and Communication Networks 2012; 5(3): 253-261. – reference: Müller S, Katzenbeisser S, Eckert C. On multi-authority ciphertext-policy attribute-based encryption. Bulletin of the Korean Mathematical Society 2009; 46(4): 803-819. – start-page: 89 year: 2006 end-page: 98 – start-page: 53 year: 2011 end-page: 70 – volume: 5 start-page: 253 issue: 3 year: 2012 end-page: 261 article-title: Fine‐grained user access control in ciphertext‐policy attribute‐based encryption publication-title: Security and Communication Networks – start-page: 321 year: 2007 end-page: 334 – start-page: 515 year: 2007 end-page: 534 – start-page: 278 year: 2011 end-page: 297 – start-page: 456 year: 2007 end-page: 465 – start-page: 463 year: 2013 end-page: 474 – start-page: 20 year: 2009 end-page: 36 – year: 1996 – start-page: 62 year: 2010 end-page: 91 – start-page: 568 year: 2011 end-page: 588 – start-page: 386 year: 2011 end-page: 390 – start-page: 223 year: 2004 end-page: 238 – start-page: 207 year: 2004 end-page: 222 – start-page: 557 year: 2005 end-page: 557 – start-page: 195 year: 2007 end-page: 203 – start-page: 547 year: 2011 end-page: 567 – start-page: 213 year: 2001 end-page: 229 – volume: 5126 start-page: 579 year: 2008 end-page: 591 article-title: Bounded ciphertext policy attribute based encryption publication-title: Automata, Languages and Programming – start-page: 121 year: 2009 end-page: 130 – volume: 46 start-page: 803 issue: 4 year: 2009 end-page: 819 article-title: On multi‐authority ciphertext‐policy attribute‐based encryption publication-title: Bulletin of the Korean Mathematical Society – start-page: 426 year: 2008 end-page: 436 – ident: e_1_2_8_16_1 doi: 10.1007/978-3-642-20465-4_30 – ident: e_1_2_8_14_1 doi: 10.1007/978-3-642-00730-9_2 – ident: e_1_2_8_17_1 doi: 10.1007/978-3-642-23822-2_16 – ident: e_1_2_8_8_1 doi: 10.1007/978-3-642-13190-5_4 – ident: e_1_2_8_22_1 – ident: e_1_2_8_4_1 doi: 10.1109/SP.2007.11 – ident: e_1_2_8_9_1 doi: 10.1145/1315245.1315270 – ident: e_1_2_8_23_1 doi: 10.1007/978-3-540-24676-3_14 – volume: 5126 start-page: 579 year: 2008 ident: e_1_2_8_5_1 article-title: Bounded ciphertext policy attribute based encryption publication-title: Automata, Languages and Programming doi: 10.1007/978-3-540-70583-3_47 – ident: e_1_2_8_25_1 – ident: e_1_2_8_7_1 doi: 10.1145/1315245.1315302 – ident: e_1_2_8_11_1 doi: 10.1007/978-3-540-70936-7_28 – ident: e_1_2_8_10_1 doi: 10.1002/sec.345 – ident: e_1_2_8_24_1 doi: 10.1007/978-3-540-24676-3_13 – ident: e_1_2_8_20_1 doi: 10.1145/1966913.1966964 – ident: e_1_2_8_21_1 doi: 10.1007/3-540-44647-8_13 – ident: e_1_2_8_3_1 doi: 10.1145/1180405.1180418 – ident: e_1_2_8_15_1 doi: 10.4134/BKMS.2009.46.4.803 – ident: e_1_2_8_18_1 doi: 10.1145/2508859.2516672 – ident: e_1_2_8_2_1 doi: 10.1007/11426639_27 – ident: e_1_2_8_6_1 doi: 10.1007/978-3-642-19379-8_4 – ident: e_1_2_8_19_1 doi: 10.1007/978-3-540-89754-5_33 – ident: e_1_2_8_13_1 doi: 10.1007/978-3-642-20465-4_31 – ident: e_1_2_8_12_1 doi: 10.1145/1653662.1653678 |
SSID | ssj0061474 |
Score | 2.1239007 |
Snippet | In multi‐authority attribute‐based encryption (ABE) systems, each authority manages a different attribute universe and issues the private keys to users.... In multi-authority attribute-based encryption (ABE) systems, each authority manages a different attribute universe and issues the private keys to users.... |
SourceID | proquest crossref wiley istex |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 501 |
SubjectTerms | Communication networks Constrictions Cryptography Decentralized Dynamical systems Dynamics Encryption KP-ABE large universe multi-authority Security Universe |
Title | Large universe decentralized key-policy attribute-based encryption |
URI | https://api.istex.fr/ark:/67375/WNG-MNSCWDRP-3/fulltext.pdf https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fsec.997 https://www.proquest.com/docview/1644454796 https://www.proquest.com/docview/1660089449 |
Volume | 8 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
journalDatabaseRights | – providerCode: PRVEBS databaseName: EBSCOhost International Security & Counter Terrorism Reference Center customDbUrl: eissn: 1939-0122 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0061474 issn: 1939-0114 databaseCode: EIS dateStart: 20110501 isFulltext: true titleUrlDefault: https://search.ebscohost.com/login.aspx?authtype=ip,uid&profile=ehost&defaultdb=tsh providerName: EBSCOhost – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1939-0122 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0061474 issn: 1939-0114 databaseCode: ADMLS dateStart: 20110501 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVWIB databaseName: Wiley Online Library - Core collection (SURFmarket) issn: 1939-0114 databaseCode: DR2 dateStart: 20070101 customDbUrl: isFulltext: true eissn: 1939-0122 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0061474 providerName: Wiley-Blackwell |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSyQxEA6iF_ewPpcdX7QweOuxH0l3cpTRcRAdxAeKl5BHNSwuo8wD1JM_wd_oL7HS6WlHF2Hx1NCp0N2VVNWXTuUrQpq5gZhDrkJb2CikGmjIEwUhs457U8WQcHc4-aSXdS_p0TW7nir15fkh6h9uzjJKf-0MXOnh7jtp6BBMSwh3jjxOWblBe1YTR2HMyav9ZJcNFFN_XNb13K36fYhDc06lDx9A5jRULWNNZ4HcTN7Sp5jctsYj3TJPnwgcv_UZi-RnhUCDPT9llsgM9JfJjylewhXSOXb54cHYJ21AYKHK4fzzBDZAs399frkvCYUDNfIlswBvuYhoA5z2g8fSEa2Sy87BRbsbVgUXQpNmUR4qXA5GurAx18wmliN6g5RTXaAX0riUUsIgwDNJlFhgqeWCR7ZQhuUIOznXafqLzPbv-vCbBJlAj14wjfiKUgNWsNTw3FBj44wbkTbIzkT90lRs5K4oxl_peZQTiYqRqJgGCWrBe0_A8a_ITjl-dbsa3Lp8tZzJq96hPOmdt6_2z04lPnRjMsCyMtWhxPUidaxmImuQ7boZjcztnKg-3I2dDOJCLigVDdIsR_Ord5HnB228rP2f2DqZRwDGfBb4BpkdDcawiSBnpLfK-fwGYE38oQ |
linkProvider | Wiley-Blackwell |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwEB6V9gAcaHlULH0QpKq3bPOwE_uItl0W2F2hPtRKHCy_IqGibbXdlaCn_gR-I7-EmTgb2iIkxClSPFacsWfmsz3-DLBTWp8KX-rYVS6JmfEsFpn2MXfEvalTnwk6nDwaF4MT9uGMnzVZlXQWJvBDtAtuZBm1vyYDpwXpvd-soVfedqUsH8AK7c6RUe4fttRRGHXKZkeZ8oFSFg7MUtW9puKdSLRCSv12B2beBqt1tOmvwudFO0OSyXl3PjNde32PwvH_fmQNnjQgNHobRs1TWPKTZ_D4FjXhc-gPKUU8moe8DR8536Rxfrn2LkLL_3nz47LmFI70LNya5fEVBUUX4ciffq990Qs46R8c9wZxc-dCbPMiKWONM8LEVC4VhrvMCQRwPhfMVOiIDM6mtLSI8WyWZM7z3AkpEldpy0tEnkKYPF-H5cnFxL-EqJDo1CtuEGIxZr2TPLeitMy6tBBW5h3YXehf2YaQnO7F-KoClXKmUDEKFdOBqBW8DBwcf4rs1h3YluvpOaWslVydjt-p0fiod7p_-EnhRzcXPawaa71SOGVkRGwmiw68aYvRzmjzRE_8xZxkEBoKyZjswE7dnX9rizo66OHj1b-JvYaHg-PRUA3fjz9uwCPEYzwkhW_C8mw691uIeWZmux7cvwAWJgDM |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT9wwEB5RkKpyoE_EUtqmEuKWJQ87sY_Vwpa2sEJQBOrF8mMiIdCyWnYl4NSf0N_YX9JxnE0XqkpVT5HisZKMPTPfxOPPAJulxVRgqWNXuSRmBlksMo0xd557U6eYCb85-WBQ7J2wz2f8bO6or8AP0f5w85ZR-2tv4CNXbf8mDb1G25WyfARLrKDcyuOho5Y5ioJO2Swo-3KglIX9sr7rdtPxXiBa8jq9uYcy57FqHWz6T-Hb7DVDjclFdzoxXXv3gMHxv77jGaw0EDT6EObMc1jA4QtYniMmfAn9fV8gHk1D1QZGDpsizvM7dBHZ_c_vP0Y1o3CkJ-HMLKRbPiS6iOb9-Lb2RK_gpL_7tbcXNycuxDYvkjLWlA8mpnKpMNxlThB8w1wwU5EbMpRLaWkJ4dksyRzy3AkpEldpy0vCnUKYPF-FxeHVENcgKiS59IobAliMWXSS51aUllmXFsLKvANbM_Ur29CR-1MxLlUgUs4UKUaRYjoQtYKjwMDxp8hWPX5tux5f-IK1kqvTwUd1MDjune4cHSp66MZsgFVjq9eKEkbmac1k0YH3bTNZmV860UO8mnoZAoZCMiY7sFmP5t_eRR3v9uiy_m9i7-Dx4U5f7X8afHkNTwiM8VARvgGLk_EU3xDgmZi39dT-BSRg_2w |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Large+universe+decentralized+key-policy+attribute-based+encryption&rft.jtitle=Security+and+communication+networks&rft.au=Li%2C+Qi&rft.au=Ma%2C+Jianfeng&rft.au=Li%2C+Rui&rft.au=Xiong%2C+Jinbo&rft.date=2015-02-01&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=8&rft.issue=3&rft.spage=501&rft.epage=509&rft_id=info:doi/10.1002%2Fsec.997&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon |