Large universe decentralized key-policy attribute-based encryption

In multi‐authority attribute‐based encryption (ABE) systems, each authority manages a different attribute universe and issues the private keys to users. However, the previous multi‐authority ABE schemes are subject to such restrictions during initializing the systems: either the attribute universe i...

Full description

Saved in:
Bibliographic Details
Published inSecurity and communication networks Vol. 8; no. 3; pp. 501 - 509
Main Authors Li, Qi, Ma, Jianfeng, Li, Rui, Xiong, Jinbo, Liu, Ximeng
Format Journal Article
LanguageEnglish
Published London Blackwell Publishing Ltd 01.02.2015
John Wiley & Sons, Inc
Subjects
Online AccessGet full text
ISSN1939-0114
1939-0122
DOI10.1002/sec.997

Cover

Abstract In multi‐authority attribute‐based encryption (ABE) systems, each authority manages a different attribute universe and issues the private keys to users. However, the previous multi‐authority ABE schemes are subject to such restrictions during initializing the systems: either the attribute universe is polynomially sized and the attributes have to be enumerated or the attribute universe can be exponentially large, but the size of the set of attributes, which will be used in encryption, is not more than a predefined fixed value. These restrictions prevent multi‐authority ABE schemes from being deployed in dynamic practice applications. In this paper, we present a large universe decentralized key‐policy ABE scheme without such additional limitation. In our scheme, there is no requirement of any central authority. Each attribute authority executes independently from the others and can join or depart the system allodiality. Our system supports any monotone access policy. The proposed scheme is constructed on prime order groups and proved selectively secure in the standard model. To the best of our knowledge, our scheme is the first large universe decentralized key‐policy ABE system in the standard model. Copyright © 2014 John Wiley & Sons, Ltd. Our contributions review current multi‐authority attribute‐based encryption schemes and demonstrate the restrictions in the initial phase, present a new decentralized key‐policy attribute‐based encryption scheme, which can support large attribute universe without such restrictions, and performance comparison and security proof indicate that our scheme is efficient and secure.
AbstractList In multi‐authority attribute‐based encryption (ABE) systems, each authority manages a different attribute universe and issues the private keys to users. However, the previous multi‐authority ABE schemes are subject to such restrictions during initializing the systems: either the attribute universe is polynomially sized and the attributes have to be enumerated or the attribute universe can be exponentially large, but the size of the set of attributes, which will be used in encryption, is not more than a predefined fixed value. These restrictions prevent multi‐authority ABE schemes from being deployed in dynamic practice applications. In this paper, we present a large universe decentralized key‐policy ABE scheme without such additional limitation. In our scheme, there is no requirement of any central authority. Each attribute authority executes independently from the others and can join or depart the system allodiality. Our system supports any monotone access policy. The proposed scheme is constructed on prime order groups and proved selectively secure in the standard model. To the best of our knowledge, our scheme is the first large universe decentralized key‐policy ABE system in the standard model. Copyright © 2014 John Wiley & Sons, Ltd. Our contributions review current multi‐authority attribute‐based encryption schemes and demonstrate the restrictions in the initial phase, present a new decentralized key‐policy attribute‐based encryption scheme, which can support large attribute universe without such restrictions, and performance comparison and security proof indicate that our scheme is efficient and secure.
In multi‐authority attribute‐based encryption (ABE) systems, each authority manages a different attribute universe and issues the private keys to users. However, the previous multi‐authority ABE schemes are subject to such restrictions during initializing the systems: either the attribute universe is polynomially sized and the attributes have to be enumerated or the attribute universe can be exponentially large, but the size of the set of attributes, which will be used in encryption, is not more than a predefined fixed value. These restrictions prevent multi‐authority ABE schemes from being deployed in dynamic practice applications. In this paper, we present a large universe decentralized key‐policy ABE scheme without such additional limitation. In our scheme, there is no requirement of any central authority. Each attribute authority executes independently from the others and can join or depart the system allodiality. Our system supports any monotone access policy. The proposed scheme is constructed on prime order groups and proved selectively secure in the standard model. To the best of our knowledge, our scheme is the first large universe decentralized key‐policy ABE system in the standard model. Copyright © 2014 John Wiley & Sons, Ltd.
In multi-authority attribute-based encryption (ABE) systems, each authority manages a different attribute universe and issues the private keys to users. However, the previous multi-authority ABE schemes are subject to such restrictions during initializing the systems: either the attribute universe is polynomially sized and the attributes have to be enumerated or the attribute universe can be exponentially large, but the size of the set of attributes, which will be used in encryption, is not more than a predefined fixed value. These restrictions prevent multi-authority ABE schemes from being deployed in dynamic practice applications. In this paper, we present a large universe decentralized key-policy ABE scheme without such additional limitation. In our scheme, there is no requirement of any central authority. Each attribute authority executes independently from the others and can join or depart the system allodiality. Our system supports any monotone access policy. The proposed scheme is constructed on prime order groups and proved selectively secure in the standard model. To the best of our knowledge, our scheme is the first large universe decentralized key-policy ABE system in the standard model. Copyright copyright 2014 John Wiley & Sons, Ltd. Our contributions review current multi-authority attribute-based encryption schemes and demonstrate the restrictions in the initial phase, present a new decentralized key-policy attribute-based encryption scheme, which can support large attribute universe without such restrictions, and performance comparison and security proof indicate that our scheme is efficient and secure.
Author Ma, Jianfeng
Xiong, Jinbo
Li, Qi
Liu, Ximeng
Li, Rui
Author_xml – sequence: 1
  givenname: Qi
  surname: Li
  fullname: Li, Qi
  email: Correspondence: Qi Li, School of Computer Science and Technology, Xidian University, Xi'an South Taibai Road, Shannxi, 710071, China., qilijs@gmail.com
  organization: School of Computer Science and Technology, Xidian University, Xi'an, China
– sequence: 2
  givenname: Jianfeng
  surname: Ma
  fullname: Ma, Jianfeng
  organization: School of Computer Science and Technology, Xidian University, Xi'an, China
– sequence: 3
  givenname: Rui
  surname: Li
  fullname: Li, Rui
  organization: School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China
– sequence: 4
  givenname: Jinbo
  surname: Xiong
  fullname: Xiong, Jinbo
  organization: School of Computer Science and Technology, Xidian University, Xi'an, China
– sequence: 5
  givenname: Ximeng
  surname: Liu
  fullname: Liu, Ximeng
  organization: School of Telecommunications Engineering, Xidian University, Xi'an, China
BookMark eNp10NtKxDAQBuAgCh7xFRa8UJDqpEmb5FLXI6wHPOBlSNOpRGu7Jq1an97IiqDoVQby8TPzL5P5pm2QkHUKOxQg3Q1od5QSc2SJKqYSoGk6_z1TvkiWQ3gAyCkXfInsT4y_x1HfuBf0AUclWmw6b2r3juXoEYdk2tbODiPTdd4VfYdJYUL8wsb6Ydq5tlklC5WpA659vSvk9ujwZnySTC6OT8d7k8SyHERiREqhqEoqi6xMS5lngEzyomIiLyhXRtmMg00hLTFjpVQSysrYTIAEKQvGVsjWLHfq2-ceQ6efXLBY16bBtg-a5jmAVJyrSDd-0Ye2903cLirOecaFyqPanCnr2xA8Vnrq3ZPxg6agP7vUsUsdu4wy-SWt68zn8bEqV__ht2f-1dU4_Berrw_HP9Jd6PDtWxv_qHPBRKbvzo_12fn1-O7g6lIz9gGQ7pSU
CitedBy_id crossref_primary_10_1109_TNET_2022_3155110
crossref_primary_10_1109_ACCESS_2021_3074142
crossref_primary_10_1007_s12652_021_02915_5
crossref_primary_10_1109_TSC_2021_3086023
crossref_primary_10_1109_ACCESS_2018_2874066
crossref_primary_10_1155_2017_7323158
crossref_primary_10_1155_2018_1701675
crossref_primary_10_1002_sec_1326
crossref_primary_10_3233_MGS_190304
crossref_primary_10_1109_TCC_2014_2372758
crossref_primary_10_1007_s12243_018_00702_6
crossref_primary_10_1155_2017_4070616
crossref_primary_10_1002_sec_1574
crossref_primary_10_1016_j_jisa_2019_05_012
crossref_primary_10_1109_ACCESS_2021_3052247
Cites_doi 10.1007/978-3-642-20465-4_30
10.1007/978-3-642-00730-9_2
10.1007/978-3-642-23822-2_16
10.1007/978-3-642-13190-5_4
10.1109/SP.2007.11
10.1145/1315245.1315270
10.1007/978-3-540-24676-3_14
10.1007/978-3-540-70583-3_47
10.1145/1315245.1315302
10.1007/978-3-540-70936-7_28
10.1002/sec.345
10.1007/978-3-540-24676-3_13
10.1145/1966913.1966964
10.1007/3-540-44647-8_13
10.1145/1180405.1180418
10.4134/BKMS.2009.46.4.803
10.1145/2508859.2516672
10.1007/11426639_27
10.1007/978-3-642-19379-8_4
10.1007/978-3-540-89754-5_33
10.1007/978-3-642-20465-4_31
10.1145/1653662.1653678
ContentType Journal Article
Copyright Copyright © 2014 John Wiley & Sons, Ltd.
Copyright © 2015 John Wiley & Sons, Ltd.
Copyright_xml – notice: Copyright © 2014 John Wiley & Sons, Ltd.
– notice: Copyright © 2015 John Wiley & Sons, Ltd.
DBID BSCLL
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1002/sec.997
DatabaseName Istex
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
CrossRef
Technology Research Database
Technology Research Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1939-0122
EndPage 509
ExternalDocumentID 3554404691
10_1002_sec_997
SEC997
ark_67375_WNG_MNSCWDRP_3
Genre article
GroupedDBID .4S
.DC
05W
0R~
123
24P
31~
3SF
4.4
52U
5DZ
66C
8-1
8UM
AAESR
AAEVG
AAFWJ
AAMMB
AANHP
AAONW
AAZKR
ACBWZ
ACCMX
ACGFO
ACRPL
ACXQS
ACYXJ
ADBBV
ADIZJ
ADMLS
ADNMO
AEFGJ
AEIMD
AENEX
AFBPY
AGQPQ
AGXDD
AIDQK
AIDYY
AJXKR
ALMA_UNASSIGNED_HOLDINGS
AMBMR
ARCSS
ASPBG
ATUGU
AVWKF
AZFZN
AZVAB
BCNDV
BDRZF
BHBCM
BNHUX
BOGZA
BRXPI
BSCLL
CS3
DR2
DU5
EBS
EIS
EJD
F1Z
FEDTE
G-S
GODZA
H13
HVGLF
HZ~
IX1
LH4
LITHE
LW6
MY.
MY~
NNB
O9-
OIG
OK1
P2P
PUEGO
ROL
SUPJJ
TH9
TUS
W99
WBKPD
XV2
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c3607-a7210bfd18b5d2d8650e384bf376b149a9c540c202de53d8980dfac5708088b33
IEDL.DBID DR2
ISSN 1939-0114
IngestDate Fri Sep 05 12:17:49 EDT 2025
Mon Jun 30 11:42:27 EDT 2025
Wed Oct 01 02:25:53 EDT 2025
Thu Apr 24 23:09:56 EDT 2025
Sun Sep 21 06:14:31 EDT 2025
Sun Sep 21 06:20:43 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
License http://onlinelibrary.wiley.com/termsAndConditions#vor
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c3607-a7210bfd18b5d2d8650e384bf376b149a9c540c202de53d8980dfac5708088b33
Notes ark:/67375/WNG-MNSCWDRP-3
ArticleID:SEC997
istex:C0C8D19DF228C48BE70B7C951C9CE1E18156A086
ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
PQID 1644454796
PQPubID 1046363
PageCount 9
ParticipantIDs proquest_miscellaneous_1660089449
proquest_journals_1644454796
crossref_primary_10_1002_sec_997
crossref_citationtrail_10_1002_sec_997
wiley_primary_10_1002_sec_997_SEC997
istex_primary_ark_67375_WNG_MNSCWDRP_3
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2015-02
February 2015
2015-02-00
20150201
PublicationDateYYYYMMDD 2015-02-01
PublicationDate_xml – month: 02
  year: 2015
  text: 2015-02
PublicationDecade 2010
PublicationPlace London
PublicationPlace_xml – name: London
PublicationTitle Security and communication networks
PublicationTitleAlternate Security Comm. Networks
PublicationYear 2015
Publisher Blackwell Publishing Ltd
John Wiley & Sons, Inc
Publisher_xml – name: Blackwell Publishing Ltd
– name: John Wiley & Sons, Inc
References Goyal V, Jain A, Pandey O, Sahai A. Bounded ciphertext policy attribute based encryption. Automata, Languages and Programming 2008; 5126: 579-591.
Hur J, Park C, Hwang SO. Fine-grained user access control in ciphertext-policy attribute-based encryption. Security and Communication Networks 2012; 5(3): 253-261.
Müller S, Katzenbeisser S, Eckert C. On multi-authority ciphertext-policy attribute-based encryption. Bulletin of the Korean Mathematical Society 2009; 46(4): 803-819.
2008; 5126
2009; 46
2001
2011
2010
2009
2008
2007
1996
2006
2005
2004
2013
2012; 5
e_1_2_8_17_1
e_1_2_8_18_1
e_1_2_8_19_1
e_1_2_8_13_1
e_1_2_8_24_1
e_1_2_8_14_1
e_1_2_8_25_1
e_1_2_8_15_1
e_1_2_8_16_1
e_1_2_8_3_1
e_1_2_8_2_1
e_1_2_8_4_1
e_1_2_8_7_1
e_1_2_8_6_1
e_1_2_8_9_1
e_1_2_8_8_1
e_1_2_8_20_1
e_1_2_8_10_1
e_1_2_8_21_1
e_1_2_8_11_1
e_1_2_8_22_1
e_1_2_8_12_1
e_1_2_8_23_1
Goyal V (e_1_2_8_5_1) 2008; 5126
References_xml – reference: Goyal V, Jain A, Pandey O, Sahai A. Bounded ciphertext policy attribute based encryption. Automata, Languages and Programming 2008; 5126: 579-591.
– reference: Hur J, Park C, Hwang SO. Fine-grained user access control in ciphertext-policy attribute-based encryption. Security and Communication Networks 2012; 5(3): 253-261.
– reference: Müller S, Katzenbeisser S, Eckert C. On multi-authority ciphertext-policy attribute-based encryption. Bulletin of the Korean Mathematical Society 2009; 46(4): 803-819.
– start-page: 89
  year: 2006
  end-page: 98
– start-page: 53
  year: 2011
  end-page: 70
– volume: 5
  start-page: 253
  issue: 3
  year: 2012
  end-page: 261
  article-title: Fine‐grained user access control in ciphertext‐policy attribute‐based encryption
  publication-title: Security and Communication Networks
– start-page: 321
  year: 2007
  end-page: 334
– start-page: 515
  year: 2007
  end-page: 534
– start-page: 278
  year: 2011
  end-page: 297
– start-page: 456
  year: 2007
  end-page: 465
– start-page: 463
  year: 2013
  end-page: 474
– start-page: 20
  year: 2009
  end-page: 36
– year: 1996
– start-page: 62
  year: 2010
  end-page: 91
– start-page: 568
  year: 2011
  end-page: 588
– start-page: 386
  year: 2011
  end-page: 390
– start-page: 223
  year: 2004
  end-page: 238
– start-page: 207
  year: 2004
  end-page: 222
– start-page: 557
  year: 2005
  end-page: 557
– start-page: 195
  year: 2007
  end-page: 203
– start-page: 547
  year: 2011
  end-page: 567
– start-page: 213
  year: 2001
  end-page: 229
– volume: 5126
  start-page: 579
  year: 2008
  end-page: 591
  article-title: Bounded ciphertext policy attribute based encryption
  publication-title: Automata, Languages and Programming
– start-page: 121
  year: 2009
  end-page: 130
– volume: 46
  start-page: 803
  issue: 4
  year: 2009
  end-page: 819
  article-title: On multi‐authority ciphertext‐policy attribute‐based encryption
  publication-title: Bulletin of the Korean Mathematical Society
– start-page: 426
  year: 2008
  end-page: 436
– ident: e_1_2_8_16_1
  doi: 10.1007/978-3-642-20465-4_30
– ident: e_1_2_8_14_1
  doi: 10.1007/978-3-642-00730-9_2
– ident: e_1_2_8_17_1
  doi: 10.1007/978-3-642-23822-2_16
– ident: e_1_2_8_8_1
  doi: 10.1007/978-3-642-13190-5_4
– ident: e_1_2_8_22_1
– ident: e_1_2_8_4_1
  doi: 10.1109/SP.2007.11
– ident: e_1_2_8_9_1
  doi: 10.1145/1315245.1315270
– ident: e_1_2_8_23_1
  doi: 10.1007/978-3-540-24676-3_14
– volume: 5126
  start-page: 579
  year: 2008
  ident: e_1_2_8_5_1
  article-title: Bounded ciphertext policy attribute based encryption
  publication-title: Automata, Languages and Programming
  doi: 10.1007/978-3-540-70583-3_47
– ident: e_1_2_8_25_1
– ident: e_1_2_8_7_1
  doi: 10.1145/1315245.1315302
– ident: e_1_2_8_11_1
  doi: 10.1007/978-3-540-70936-7_28
– ident: e_1_2_8_10_1
  doi: 10.1002/sec.345
– ident: e_1_2_8_24_1
  doi: 10.1007/978-3-540-24676-3_13
– ident: e_1_2_8_20_1
  doi: 10.1145/1966913.1966964
– ident: e_1_2_8_21_1
  doi: 10.1007/3-540-44647-8_13
– ident: e_1_2_8_3_1
  doi: 10.1145/1180405.1180418
– ident: e_1_2_8_15_1
  doi: 10.4134/BKMS.2009.46.4.803
– ident: e_1_2_8_18_1
  doi: 10.1145/2508859.2516672
– ident: e_1_2_8_2_1
  doi: 10.1007/11426639_27
– ident: e_1_2_8_6_1
  doi: 10.1007/978-3-642-19379-8_4
– ident: e_1_2_8_19_1
  doi: 10.1007/978-3-540-89754-5_33
– ident: e_1_2_8_13_1
  doi: 10.1007/978-3-642-20465-4_31
– ident: e_1_2_8_12_1
  doi: 10.1145/1653662.1653678
SSID ssj0061474
Score 2.1239007
Snippet In multi‐authority attribute‐based encryption (ABE) systems, each authority manages a different attribute universe and issues the private keys to users....
In multi-authority attribute-based encryption (ABE) systems, each authority manages a different attribute universe and issues the private keys to users....
SourceID proquest
crossref
wiley
istex
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 501
SubjectTerms Communication networks
Constrictions
Cryptography
Decentralized
Dynamical systems
Dynamics
Encryption
KP-ABE
large universe
multi-authority
Security
Universe
Title Large universe decentralized key-policy attribute-based encryption
URI https://api.istex.fr/ark:/67375/WNG-MNSCWDRP-3/fulltext.pdf
https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fsec.997
https://www.proquest.com/docview/1644454796
https://www.proquest.com/docview/1660089449
Volume 8
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: EBSCOhost International Security & Counter Terrorism Reference Center
  customDbUrl:
  eissn: 1939-0122
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0061474
  issn: 1939-0114
  databaseCode: EIS
  dateStart: 20110501
  isFulltext: true
  titleUrlDefault: https://search.ebscohost.com/login.aspx?authtype=ip,uid&profile=ehost&defaultdb=tsh
  providerName: EBSCOhost
– providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1939-0122
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0061474
  issn: 1939-0114
  databaseCode: ADMLS
  dateStart: 20110501
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVWIB
  databaseName: Wiley Online Library - Core collection (SURFmarket)
  issn: 1939-0114
  databaseCode: DR2
  dateStart: 20070101
  customDbUrl:
  isFulltext: true
  eissn: 1939-0122
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0061474
  providerName: Wiley-Blackwell
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSyQxEA6iF_ewPpcdX7QweOuxH0l3cpTRcRAdxAeKl5BHNSwuo8wD1JM_wd_oL7HS6WlHF2Hx1NCp0N2VVNWXTuUrQpq5gZhDrkJb2CikGmjIEwUhs457U8WQcHc4-aSXdS_p0TW7nir15fkh6h9uzjJKf-0MXOnh7jtp6BBMSwh3jjxOWblBe1YTR2HMyav9ZJcNFFN_XNb13K36fYhDc06lDx9A5jRULWNNZ4HcTN7Sp5jctsYj3TJPnwgcv_UZi-RnhUCDPT9llsgM9JfJjylewhXSOXb54cHYJ21AYKHK4fzzBDZAs399frkvCYUDNfIlswBvuYhoA5z2g8fSEa2Sy87BRbsbVgUXQpNmUR4qXA5GurAx18wmliN6g5RTXaAX0riUUsIgwDNJlFhgqeWCR7ZQhuUIOznXafqLzPbv-vCbBJlAj14wjfiKUgNWsNTw3FBj44wbkTbIzkT90lRs5K4oxl_peZQTiYqRqJgGCWrBe0_A8a_ITjl-dbsa3Lp8tZzJq96hPOmdt6_2z04lPnRjMsCyMtWhxPUidaxmImuQ7boZjcztnKg-3I2dDOJCLigVDdIsR_Ord5HnB228rP2f2DqZRwDGfBb4BpkdDcawiSBnpLfK-fwGYE38oQ
linkProvider Wiley-Blackwell
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwEB6V9gAcaHlULH0QpKq3bPOwE_uItl0W2F2hPtRKHCy_IqGibbXdlaCn_gR-I7-EmTgb2iIkxClSPFacsWfmsz3-DLBTWp8KX-rYVS6JmfEsFpn2MXfEvalTnwk6nDwaF4MT9uGMnzVZlXQWJvBDtAtuZBm1vyYDpwXpvd-soVfedqUsH8AK7c6RUe4fttRRGHXKZkeZ8oFSFg7MUtW9puKdSLRCSv12B2beBqt1tOmvwudFO0OSyXl3PjNde32PwvH_fmQNnjQgNHobRs1TWPKTZ_D4FjXhc-gPKUU8moe8DR8536Rxfrn2LkLL_3nz47LmFI70LNya5fEVBUUX4ciffq990Qs46R8c9wZxc-dCbPMiKWONM8LEVC4VhrvMCQRwPhfMVOiIDM6mtLSI8WyWZM7z3AkpEldpy0tEnkKYPF-H5cnFxL-EqJDo1CtuEGIxZr2TPLeitMy6tBBW5h3YXehf2YaQnO7F-KoClXKmUDEKFdOBqBW8DBwcf4rs1h3YluvpOaWslVydjt-p0fiod7p_-EnhRzcXPawaa71SOGVkRGwmiw68aYvRzmjzRE_8xZxkEBoKyZjswE7dnX9rizo66OHj1b-JvYaHg-PRUA3fjz9uwCPEYzwkhW_C8mw691uIeWZmux7cvwAWJgDM
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT9wwEB5RkKpyoE_EUtqmEuKWJQ87sY_Vwpa2sEJQBOrF8mMiIdCyWnYl4NSf0N_YX9JxnE0XqkpVT5HisZKMPTPfxOPPAJulxVRgqWNXuSRmBlksMo0xd557U6eYCb85-WBQ7J2wz2f8bO6or8AP0f5w85ZR-2tv4CNXbf8mDb1G25WyfARLrKDcyuOho5Y5ioJO2Swo-3KglIX9sr7rdtPxXiBa8jq9uYcy57FqHWz6T-Hb7DVDjclFdzoxXXv3gMHxv77jGaw0EDT6EObMc1jA4QtYniMmfAn9fV8gHk1D1QZGDpsizvM7dBHZ_c_vP0Y1o3CkJ-HMLKRbPiS6iOb9-Lb2RK_gpL_7tbcXNycuxDYvkjLWlA8mpnKpMNxlThB8w1wwU5EbMpRLaWkJ4dksyRzy3AkpEldpy0vCnUKYPF-FxeHVENcgKiS59IobAliMWXSS51aUllmXFsLKvANbM_Ur29CR-1MxLlUgUs4UKUaRYjoQtYKjwMDxp8hWPX5tux5f-IK1kqvTwUd1MDjune4cHSp66MZsgFVjq9eKEkbmac1k0YH3bTNZmV860UO8mnoZAoZCMiY7sFmP5t_eRR3v9uiy_m9i7-Dx4U5f7X8afHkNTwiM8VARvgGLk_EU3xDgmZi39dT-BSRg_2w
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Large+universe+decentralized+key-policy+attribute-based+encryption&rft.jtitle=Security+and+communication+networks&rft.au=Li%2C+Qi&rft.au=Ma%2C+Jianfeng&rft.au=Li%2C+Rui&rft.au=Xiong%2C+Jinbo&rft.date=2015-02-01&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=8&rft.issue=3&rft.spage=501&rft.epage=509&rft_id=info:doi/10.1002%2Fsec.997&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon