{"id":"https://openalex.org/W4395097164","doi":"https://doi.org/10.1109/jbhi.2024.3391218","title":"An Access Control Scheme With Privacy-Preserving Authentication and Flexible Revocation for Smart Healthcare","display_name":"An Access Control Scheme With Privacy-Preserving Authentication and Flexible Revocation for Smart Healthcare","publication_year":2024,"publication_date":"2024-04-24","ids":{"openalex":"https://openalex.org/W4395097164","doi":"https://doi.org/10.1109/jbhi.2024.3391218","pmid":"https://pubmed.ncbi.nlm.nih.gov/38656852"},"language":"en","primary_location":{"id":"doi:10.1109/jbhi.2024.3391218","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jbhi.2024.3391218","pdf_url":null,"source":{"id":"https://openalex.org/S2495854775","display_name":"IEEE Journal of Biomedical and Health Informatics","issn_l":"2168-2194","issn":["2168-2194","2168-2208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal of Biomedical and Health Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005552400","display_name":"Xiyu Liang","orcid":null},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I118574674","display_name":"Jiangsu Normal University","ror":"https://ror.org/051hvcm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I118574674"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiyu Liang","raw_affiliation_strings":["College of Computer Science and Technology, Jiangsu Normal University, Xuzhou, China","Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Jiangsu Normal University, Xuzhou, China","institution_ids":["https://openalex.org/I118574674"]},{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100380002","display_name":"Yali Liu","orcid":"https://orcid.org/0000-0001-9269-3390"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I118574674","display_name":"Jiangsu Normal University","ror":"https://ror.org/051hvcm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I118574674"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yali Liu","raw_affiliation_strings":["College of Computer Science and Technology, Jiangsu Normal University, Xuzhou, China","Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Jiangsu Normal University, Xuzhou, China","institution_ids":["https://openalex.org/I118574674"]},{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081596329","display_name":"Jianting Ning","orcid":"https://orcid.org/0000-0001-7165-398X"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianting Ning","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5005552400"],"corresponding_institution_ids":["https://openalex.org/I111753288","https://openalex.org/I118574674","https://openalex.org/I5343935"],"apc_list":null,"apc_paid":null,"fwci":8.6879,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.98092069,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"28","issue":"6","first_page":"3269","last_page":"3278"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.8945270776748657},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7429706454277039},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.7367804646492004},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6989902257919312},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5946797728538513},{"id":"https://openalex.org/keywords/revocation-list","display_name":"Revocation list","score":0.48926207423210144},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4450664222240448},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4439631700515747},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4314676821231842},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.41058340668678284},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.36608079075813293},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3626123070716858},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.15809419751167297}],"concepts":[{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.8945270776748657},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7429706454277039},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7367804646492004},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6989902257919312},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5946797728538513},{"id":"https://openalex.org/C147296133","wikidata":"https://www.wikidata.org/wiki/Q196765","display_name":"Revocation list","level":5,"score":0.48926207423210144},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4450664222240448},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4439631700515747},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4314676821231842},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.41058340668678284},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36608079075813293},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3626123070716858},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.15809419751167297},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.0}],"mesh":[{"descriptor_ui":"D000465","descriptor_name":"Algorithms","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D000465","descriptor_name":"Algorithms","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D000465","descriptor_name":"Algorithms","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D000465","descriptor_name":"Algorithms","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D000465","descriptor_name":"Algorithms","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D003219","descriptor_name":"Confidentiality","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D003219","descriptor_name":"Confidentiality","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D003219","descriptor_name":"Confidentiality","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D003219","descriptor_name":"Confidentiality","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D003219","descriptor_name":"Confidentiality","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D006801","descriptor_name":"Humans","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D006801","descriptor_name":"Humans","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D006801","descriptor_name":"Humans","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D006801","descriptor_name":"Humans","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D006801","descriptor_name":"Humans","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D017216","descriptor_name":"Telemedicine","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D017216","descriptor_name":"Telemedicine","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D017216","descriptor_name":"Telemedicine","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D017216","descriptor_name":"Telemedicine","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D017216","descriptor_name":"Telemedicine","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D057286","descriptor_name":"Electronic Health Records","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D057286","descriptor_name":"Electronic Health Records","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D057286","descriptor_name":"Electronic Health Records","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D057286","descriptor_name":"Electronic Health Records","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D057286","descriptor_name":"Electronic Health Records","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D059015","descriptor_name":"Wireless Technology","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D059015","descriptor_name":"Wireless Technology","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D059015","descriptor_name":"Wireless Technology","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D059015","descriptor_name":"Wireless Technology","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D059015","descriptor_name":"Wireless Technology","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false}],"locations_count":2,"locations":[{"id":"doi:10.1109/jbhi.2024.3391218","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jbhi.2024.3391218","pdf_url":null,"source":{"id":"https://openalex.org/S2495854775","display_name":"IEEE Journal of Biomedical and Health Informatics","issn_l":"2168-2194","issn":["2168-2194","2168-2208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal of Biomedical and Health Informatics","raw_type":"journal-article"},{"id":"pmid:38656852","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/38656852","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE journal of biomedical and health informatics","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2743467308","display_name":null,"funder_award_id":"GCIS202114","funder_id":"https://openalex.org/F4320323266","funder_display_name":"Guilin University of Electronic Technology"},{"id":"https://openalex.org/G5043465742","display_name":null,"funder_award_id":"61972094","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5669255772","display_name":null,"funder_award_id":"62032005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7279539792","display_name":null,"funder_award_id":"61702237","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320323266","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1498316612","https://openalex.org/W1978731185","https://openalex.org/W2034562114","https://openalex.org/W2042220809","https://openalex.org/W2048543827","https://openalex.org/W2078590992","https://openalex.org/W2106116277","https://openalex.org/W2108072891","https://openalex.org/W2131846073","https://openalex.org/W2160390934","https://openalex.org/W2312972188","https://openalex.org/W2791895608","https://openalex.org/W2796994201","https://openalex.org/W2810787109","https://openalex.org/W2921960465","https://openalex.org/W2939119543","https://openalex.org/W2955375055","https://openalex.org/W2981797988","https://openalex.org/W3006383655","https://openalex.org/W3007218738","https://openalex.org/W3013979714","https://openalex.org/W3016761910","https://openalex.org/W3034598256","https://openalex.org/W3092550547","https://openalex.org/W3102399356","https://openalex.org/W3112962245","https://openalex.org/W3128174515","https://openalex.org/W3135412623","https://openalex.org/W3156079496","https://openalex.org/W3161118573","https://openalex.org/W3181914005","https://openalex.org/W3199380764","https://openalex.org/W3217302241","https://openalex.org/W4220867361","https://openalex.org/W4282021345","https://openalex.org/W4284992543","https://openalex.org/W4318619326","https://openalex.org/W4319068551","https://openalex.org/W4323362563","https://openalex.org/W4366578507"],"related_works":["https://openalex.org/W791333163","https://openalex.org/W284682584","https://openalex.org/W2924208536","https://openalex.org/W4283656462","https://openalex.org/W3143142693","https://openalex.org/W2389225248","https://openalex.org/W4287330711","https://openalex.org/W3108079065","https://openalex.org/W3127505884","https://openalex.org/W2351042329"],"abstract_inverted_index":{"IoT":[0],"and":[1,32,45,66,80,118,131,170,184],"5G-enabled":[2],"smart":[3,84,162],"healthcare":[4,85],"allows":[5],"medical":[6,29],"practitioners":[7],"to":[8,49,59,96,140],"diagnose":[9],"patients":[10],"from":[11,40,100],"any":[12],"location":[13],"via":[14],"electronic":[15],"health":[16],"records":[17],"(EHRs)":[18],"by":[19],"wireless":[20],"body":[21],"area":[22],"network":[23],"(WBAN)":[24],"devices.":[25],"Privacy,":[26],"including":[27],"the":[28,33,60,138,153,181],"practitioner's":[30],"identity":[31],"patient's":[34],"EHR,":[35],"can":[36],"easily":[37],"be":[38,53],"leaked":[39],"hospitals":[41],"or":[42],"cloud":[43],"servers,":[44],"secret":[46,67,111,123,134,142],"keys":[47,143],"used":[48],"access":[50,74,94,158,190],"EHRs":[51],"must":[52],"revoked":[54],"after":[55],"diagnosis.":[56],"In":[57,125],"response":[58],"challenges":[61],"associated":[62],"with":[63,77,188],"user":[64],"authentication":[65,79,107],"key":[68,112,182],"revocation,":[69],"this":[70],"paper":[71],"proposes":[72],"an":[73,157],"control":[75,95,159,191],"scheme":[76,160],"privacy-preserving":[78,106],"flexible":[81,129],"revocation":[82,130,185],"for":[83,108,122,144,161],"using":[86],"attribute-based":[87],"encryption":[88],"(ABE),":[89],"named":[90],"PAFR-ABE,":[91],"which":[92,114,136],"provides":[93],"prevent":[97],"malicious":[98],"users":[99,109],"decrypting":[101],"EHRs.":[102],"Meanwhile,":[103],"PAFR-ABE":[104,127,151,177],"ensures":[105],"during":[110],"generation,":[113],"safeguards":[115],"users'":[116],"identities":[117],"prevents":[119],"unauthorized":[120],"requests":[121],"keys.":[124],"addition,":[126],"achieves":[128],"recovery":[132],"of":[133,156,167],"keys,":[135],"eliminates":[137],"need":[139],"update":[141],"unrevoked":[145],"users.":[146],"Security":[147],"analysis":[148,174],"indicates":[149],"that":[150,176],"meets":[152],"security":[154,169],"requirements":[155],"healthcare,":[163],"especially":[164],"in":[165,180],"terms":[166],"forward":[168],"backward":[171],"security.":[172],"Performance":[173],"shows":[175],"is":[178],"efficient":[179],"generation":[183],"algorithms":[186],"compared":[187],"typical":[189],"schemes.":[192]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":19},{"year":2024,"cited_by_count":4}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
