REFERENCES
1. Renugadevi N, Swaminathan G, Kumar AS. Key management schemes for secure group communication in wireless networks - a survey. In: 2014 International Conference on Contemporary Computing and Informatics (IC3I); 2014. pp. 446–50.
2. Boyd C, Mathuria A, Stebila D. Protocols for authentication and key establishment Berlin, Heidelberg: Springer Berlin Heidelberg; 2020.
3. Steam. STEAM- & SPIELSTATISTIKEN; . Available from: https://store.steampowered.com/stats/?l=german. [Last accessed on 29 Nov 2023].
4. Activision Blizzard I. Activision Blizzard Announces Third-Quarter 2019 Financial Results; . Available from: https://investor.activision.com/static-files/594047f5-10b9-4fbf-b43b-45c8552cbd79. [Last accessed on 29 NOV 2021].
5. Department SR. Anzahl der zahlenden Streaming-Abonnenten von Netflix weltweit vom 3. Quartal 2011 bis zum 1. Quartal 2021. Available from: https://de.statista.com/statistik/daten/studie/196642/umfrage/abonnenten-von-netflix-quartalszahlen/. [Last accessed on 29 Nov 2023].
6. Brandt M. 155 Millionen Premium-Kunden. Available from: https://de.statista.com/infografik/13769/monatlich-aktive-nutzer-und-zahlende-abonnenten-von-spotify-weltweit/. [Last accessed on 29 Nov 2023].
7. Prantl T, Ten P, Iffländer L, et al. Evaluating the Performance of a State-of-the-Art Group-oriented Encryption Scheme for Dynamic Groups in an IoT Scenario. In: Proceedings of the 28th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS); 2020. pp. 1–8.
8. Nishat K, Purushothama BR. Group-oriented encryption for dynamic groups with constant rekeying cost. Security Comm Networks 2016;9:4120-37.
9. Rodeh O, Birman K, Dolev D. Optimized group rekey for group communication systems. Available from: https://www.researchgate.net/publication/2325687_Optimized_Group_Rekey_for_Group_Communication_Systems/. [Last accessed on 29 Nov 2023].
10. Waldvogel M, Caronni G, Sun D, Weiler N, Plattner B. The versaKey framework: versatile group key management. IEEE J Select Areas Commun 1999;17:1614-31.
11. Qiao Z, Liang S, Davis S, Jiang H. Survey of attribute based encryption. In: 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD); 2014. pp. 1–6.
12. Bordogna G, Pang L, Yang J, Jiang Z. A survey of research progress and development tendency of attribute-based encryption. ScientificWorldJournal 2014:193426.
14. Waters B. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano D, Fazio N, Gennaro R, Nicolosi A, editors. Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography (PKC). Berlin, Heidelberg: Springer Berlin Heidelberg; 2011. pp. 53–70.
15. Zhang Y, Deng RH, Xu S, Sun J, Li Q, Zheng D. Attribute-based encryption for cloud computing access control: a survey. ACM Comput Surv 2021;53:1-41.
16. Lee CC, Chung PS, Hwang MS. A survey on attribute-based encryption schemes of access control in cloud environments. Int J Netw Secur 2013;15:231-40.
17. Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS). New York, NY, USA: Association for Computing Machinery; 2006. pp. 89–98.
18. Premkamal PK, Pasupleti SK, Alphonse PJA. Attribute based encryption in cloud computing: a survey, gap analysis, and future directions. J Netw Comput Appl 2018;108:37-52.
19. Ostrovsky R, Sahai A, Waters B. Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS). New York, NY, USA: Association for Computing Machinery; 2007. pp. 195–203.
20. Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, editor. Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Berlin, Heidelberg: Springer Berlin Heidelberg; 2005. pp. 457–73.
21. Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP '07), Berkele, CA, USA, 2007, pp. 321-34,.
22. Rasori M, Manna ML, Perazzo P, Dini G. A survey on attribute-based encryption schemes suitable for the internet of things. IEEE Internet Things J 2022;9:8269-90.
23. Chase M. Multi-authority attribute based encryption. In: Vadhan SP, editor. Proceedings of the 4th Theory of Cryptography Conference (TCC). Berlin, Heidelberg: Springer Berlin Heidelberg; 2007. pp. 515–34.
24. Li Q, Ma J, Li R, Liu X, Xiong J, Chen D. Secure, efficient and revocable multi-authority access control system in cloud storage. Computers Security 2016;59:45-59.
25. Yu P, Wen Q, Ni W, et al. Decentralized, revocable and verifiable attribute-based encryption in hybrid cloud system. Wireless Pers Commun 2019;106:719-38.
26. Xue K, Xue Y, Hong J, et al. RAAC: robust and auditable access control with multiple attribute authorities for public cloud storage. IEEE Trans Inform Forensic Secur 2017;12:953-67.
27. Chase M, Chow SSM. Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS). ACM. New York, NY, USA: Association for Computing Machinery; 2009. pp. 121–30.
28. Lewko A, Waters B. Decentralizing attribute-based encryption. In: Paterson KG, editor. Proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Berlin, Heidelberg: Springer Berlin Heidelberg; 2011. pp. 568–88.
29. Han J, Susilo W, Mu Y, Yan J. Privacy-preserving decentralized key-policy attribute-based encryption. IEEE Trans Parallel Distrib Syst 2012;23:2150-62.
30. Zhang K, Li H, Ma J, Liu X. Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability. Sci China Inf Sci 2018;61.
31. Li J, Ren K, Zhu B, Wan Z. Privacy-aware attribute-based encryption with user accountability. In: Samarati P, Yung M, Martinelli F, Ardagna CA, editors. Proceedings of the 12th International Information Security Conference (ISC). Berlin, Heidelberg: Springer Berlin Heidelberg; 2009. pp. 347–62.
32. Wang Y, Chen K, Long Y, Liu Z. Accountable authority key policy attribute-based encryption. Sci China Inf Sci 2012;55:1631-38.
33. Ning J, Dong X, Cao Z, Wei L. Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud. In: Pernul G, Y A Ryan P, Weippl E, editors. Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS). Cham: Springer International Publishing; 2015. pp. 270–89.
34. Zhang Y, Li J, Zheng D, Chen X, Li H. Towards privacy protection and malicious behavior traceability in smart health. Pers Ubiquit Comput 2017;21:815-30.
35. Ning J, Cao Z, Dong X, Gong J, Chen J. Traceable CP-ABE with short cipher- texts: How to catch people selling decryption devices on eBay efficiently. In: Askoxylakis I, Ioannidis S, Katsikas S, Meadows C, editors. Proceedings of the 21st European Symposium on Research in Computer Security (ESORICS). Cham: Springer International Publishing; 2016. pp. 551–289.
36. Liu Z, Duan S, Zhou P, Wang B. Traceable-then-revocable ciphertext-policy attribute-based encryption scheme. Future Gener Comp Sy 2017;93:903-13.
37. Nishide T, Yoneyama K, Ohta K. ABE with partially hidden encryptor-specified access structure. In: Bellovin SM, Gennaro R, Keromytis A, Yung M, editors. Proceedings of the 6th International Conference on Applied Cryptography and Network Security (ACNS). Berlin, Heidelberg: Springer Berlin Heidelberg; 2008. pp. 111–29.
38. Lai J, Deng RH, Li Y. Fully secure cipertext-policy hiding CP-ABE. In: Bao F, Weng J, editors. Proceedings of the 7th International Conference on Information Security Practice and Experience (ISPEC). Berlin, Heidelberg: Springer Berlin Heidelberg; 2011. pp. 24–39.
39. Phuong TVX, Yang G, Susilo W. Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Trans Inform Forensic Secur 2016;11:35-45.
40. Zhang Y, Zheng D, Deng RH. Security and privacy in smart health: Efficient policy-hiding attribute-based access control. IEEE Internet Things J 2018;5:2130-45.
41. Zhang L, Hu G, Mu Y, Rezaeibagha F. Hidden ciphertext policy attribute-based encryption with fast decryption for personal health record system. IEEE Access 2019;7:33202-13.
42. Liang X, Cao Z, Lin H, Shao J. Attribute based proxy re-encryption with delegating capabilities. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (ASIACCS). ACM. New York, NY, USA: Association for Computing Machinery; 2009. pp. 276–86.
43. Luo S, Hu J, Chen Z. Ciphertext policy attribute-based proxy re-encryption. In: Soriano M, Qing S, López J, editors. Information and Communications Security. Berlin: Springer Berlin Heidelberg; 2010. pp. 401-15.
44. Liang K, Au MH, Liu JK, et al. A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Future Gener Comp Sy 2015;52:95-108.
45. Yang Y, Zhu H, Lu H, Weng J, Zhang Y, Choo KR. Cloud based data sharing with fine-grained proxy re-encryption. Pervasive Mob Comput 2016;28:122-34.
46. Zhang Y, Li J, Chen X, Li H. Anonymous attribute-based proxy re-encryption for access control in cloud computing. Security Comm Networks 2016;9:2397-411.
47. Hur J, Noh DK. Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parallel Distrib Syst 2011;22:1214-21.
48. Yang K, Jia X, Ren K. Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In: Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security. ACM. New York, NY, USA: Association for Computing Machinery; 2013. pp. 523–28.
49. Cui H, Deng RH, Li Y, Qin B. Server-aided revocable attribute-based encryption. In: Askoxylakis I, Ioannidis S, Katsikas S, Meadows C, editors. Proceedings of the European Symposium on Research in Computer Security (ESORICS). Cham: Springer International Publishing; 2016. pp. 570–87.
50. Xu S, Yang G, Mu Y, Deng RH. Secure fine-grained access control and data sharing for dynamic groups in the cloud. IEEE Trans Inform Forensic Secur 2018;13:2101-13.
51. Yang Y, Liu JK, Liang K, Cho KKR, Zhou J. Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data. In: Pernul G, Y A Ryan P, Weippl E, editors. Proceedings of the European Symposium on Research in Computer Security (ESORICS). Cham: Springer International Publishing; 2015. pp. 146–66.
52. Fan CI, Huang VSM, Ruan HM. Arbitrary-state attribute-based encryption with dynamic membership. IEEE Trans Comput 2013;63:1951-61.
53. Zhang Y, Chen X, Li J, Li H, Li F. Attribute-based data sharing with flexible and direct revocation in cloud computing. KSⅡ TⅡS 2014;8:4028-49.
54. Lewko A, Sahai A, Waters B. Revocation systems with very small private keys. In: 2010 IEEE Symposium on Security and Privacy (SP). IEEE. Los Alamitos, CA, USA: IEEE Computer Society; 2010. pp. 273–85.
55. Shi Y, Zheng Q, Liu J, Han Z. Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation. Inf Sci 2015;295:221-31.
56. Wang G, Liu Q, Wu J, Guo M. Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput Secur 2011;30:320-31.
57. Wan Z, Liu J, Deng RH. HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Inform Forensic Secur 2012;7:743-54.
58. Deng H, Wu Q, Qin B, et al. Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Inf Sci 2014;275:370-84.
59. Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W. An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inform Forensic Secur 2016;11:1265-77.
60. Teng W, Yang G, Xiang Y, Zhang T, Wang D. Attribute-based access control with constant-size ciphertext in cloud computing. IEEE Trans Cloud Comput ;6:617-27.
61. Li J, Yu Q, Zhang Y. Hierarchical attribute based encryption with continuous leakage-resilience. Inf Sci 2019;2:113-34.
62. Lai J, Deng RH, Li Y, Weng J. Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. New York, NY, USA: Association for Computing Machinery; 2014. pp. 239–48.