{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:23:14Z","timestamp":1740122594199,"version":"3.37.3"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2021,5,15]],"date-time":"2021-05-15T00:00:00Z","timestamp":1621036800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,15]],"date-time":"2021-05-15T00:00:00Z","timestamp":1621036800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003382","name":"Core Research for Evolutional Science and Technology","doi-asserted-by":"publisher","award":["JPMJCR14D6"],"id":[{"id":"10.13039\/501100003382","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["KAKENHI JP17K12697","KAKENHI JP18H05289"],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001700","name":"Ministry of Education, Culture, Sports, Science and Technology","doi-asserted-by":"publisher","award":["Leading Initiative for Excellent Young Researchers"],"id":[{"id":"10.13039\/501100001700","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s10623-021-00880-w","type":"journal-article","created":{"date-parts":[[2021,5,15]],"date-time":"2021-05-15T11:02:36Z","timestamp":1621076556000},"page":"1535-1574","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Adaptively secure revocable hierarchical IBE from k-linear assumption"],"prefix":"10.1007","volume":"89","author":[{"given":"Keita","family":"Emura","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9310-6976","authenticated-orcid":false,"given":"Atsushi","family":"Takayasu","sequence":"additional","affiliation":[]},{"given":"Yohei","family":"Watanabe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,15]]},"reference":[{"issue":"1","key":"880_CR1","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/s00145-010-9060-3","volume":"24","author":"M Abdalla","year":"2011","unstructured":"Abdalla M., Birkett J., Catalano D., Dent A.W., Malone-Lee J., Neven G., Schuldt J.C.N., Smart N.P.: Wildcarded identity-based encryption. J. Cryptol 24(1), 42\u201382 (2011).","journal-title":"J. Cryptol"},{"key":"880_CR2","doi-asserted-by":"crossref","unstructured":"Abdalla M., Kiltz E., Neven G.: Generalized key delegation for hierarchical identity-based encryption. In: J.\u00a0Biskup, J.\u00a0L\u00f3pez (eds.) Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Proceedings, Lecture Notes in Computer Science, vol. 4734, pp. 139\u2013154. Springer (2007).","DOI":"10.1007\/978-3-540-74835-9_10"},{"key":"880_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal S., Boneh D., Boyen X.: Efficient lattice (H)IBE in the standard model. In: H.\u00a0Gilbert (ed.) Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lecture Notes in Computer Science, vol. 6110, pp. 553\u2013572. Springer (2010).","DOI":"10.1007\/978-3-642-13190-5_28"},{"key":"880_CR4","doi-asserted-by":"crossref","unstructured":"Agrawal S., Boneh D., Boyen X.: Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE. In: T.\u00a0Rabin (ed.) Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Lecture Notes in Computer Science, vol. 6223, pp. 98\u2013115. Springer (2010).","DOI":"10.1007\/978-3-642-14623-7_6"},{"key":"880_CR5","doi-asserted-by":"crossref","unstructured":"Blazy O., Kiltz E., Pan J.: (hierarchical) identity-based encryption from affine message authentication. In: J.A. Garay, R.\u00a0Gennaro (eds.) Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings, Part I, Lecture Notes in Computer Science, vol. 8616, pp. 408\u2013425. Springer (2014).","DOI":"10.1007\/978-3-662-44371-2_23"},{"key":"880_CR6","doi-asserted-by":"crossref","unstructured":"Boldyreva A., Goyal V., Kumar V.: Identity-based encryption with efficient revocation. In: P.\u00a0Ning, P.F. Syverson, S.\u00a0Jha (eds.) Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, pp. 417\u2013426. ACM (2008).","DOI":"10.1145\/1455770.1455823"},{"key":"880_CR7","doi-asserted-by":"crossref","unstructured":"Boneh D., Boyen X.: Efficient selective-id secure identity-based encryption without random oracles. In: C.\u00a0Cachin, J.\u00a0Camenisch (eds.) Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, Lecture Notes in Computer Science, vol. 3027, pp. 223\u2013238. Springer (2004).","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"880_CR8","doi-asserted-by":"crossref","unstructured":"Boneh D., Boyen X., Goh E.: Hierarchical identity based encryption with constant size ciphertext. In: R.\u00a0Cramer (ed.) Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lecture Notes in Computer Science, vol. 3494, pp. 440\u2013456. Springer (2005).","DOI":"10.1007\/11426639_26"},{"key":"880_CR9","doi-asserted-by":"crossref","unstructured":"Boneh D., Franklin M.K.: Identity-based encryption from the weil pairing. In: J.\u00a0Kilian (ed.) Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Proceedings, Lecture Notes in Computer Science, vol. 2139, pp. 213\u2013229. Springer (2001).","DOI":"10.1007\/3-540-44647-8_13"},{"issue":"4","key":"880_CR10","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1007\/s00145-011-9105-2","volume":"25","author":"D Cash","year":"2012","unstructured":"Cash D., Hofheinz D., Kiltz E., Peikert C.: Bonsai trees, or how to delegate a lattice basis. J. Cryptol. 25(4), 601\u2013639 (2012).","journal-title":"J. Cryptol."},{"key":"880_CR11","doi-asserted-by":"crossref","unstructured":"Chang D., Chauhan A.K., Kumar S., Sanadhya S.K.: Revocable identity-based encryption from codes with rank metric. In: N.P. Smart (ed.) Topics in Cryptology - CT-RSA 2018 - The Cryptographers\u2019 Track at the RSA Conference 2018, Lecture Notes in Computer Science, vol. 10808, pp. 435\u2013451. Springer (2018).","DOI":"10.1007\/978-3-319-76953-0_23"},{"key":"880_CR12","doi-asserted-by":"crossref","unstructured":"Chen J., Gay R., Wee H.: Improved dual system ABE in prime-order groups via predicate encodings. In: E.\u00a0Oswald, M.\u00a0Fischlin (eds.) Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lecture Notes in Computer Science, vol. 9057, pp. 595\u2013624. Springer (2015).","DOI":"10.1007\/978-3-662-46803-6_20"},{"key":"880_CR13","doi-asserted-by":"crossref","unstructured":"Chen J., Gong J.: ABE with tag made easy - concise framework and new instantiations in prime-order groups. In: T.\u00a0Takagi, T.\u00a0Peyrin (eds.) Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security. Proceedings, Part II, Lecture Notes in Computer Science, vol. 10625, pp. 35\u201365. Springer (2017).","DOI":"10.1007\/978-3-319-70697-9_2"},{"key":"880_CR14","doi-asserted-by":"crossref","unstructured":"Chen J., Lim H.W., Ling S., Wang H., Nguyen, K.: Revocable identity-based encryption from lattices. In: W.\u00a0Susilo, Y.\u00a0Mu, J.\u00a0Seberry (eds.) Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Lecture Notes in Computer Science, vol. 7372, pp. 390\u2013403. Springer (2012).","DOI":"10.1007\/978-3-642-31448-3_29"},{"key":"880_CR15","first-page":"265","volume":"2014","author":"J Chen","year":"2014","unstructured":"Chen J., Wee H.: Dual system groups and its applications\u2014compact HIBE and more. IACR Cryptol. ePrint Archive 2014, 265 (2014).","journal-title":"IACR Cryptol. ePrint Archive"},{"key":"880_CR16","doi-asserted-by":"crossref","unstructured":"D\u00f6ttling N., Garg S.: From selective IBE to full IBE and selective HIBE. In: Y.\u00a0Kalai, L.\u00a0Reyzin (eds.) Theory of Cryptography\u201415th International Conference, TCC 2017, Lecture Notes in Computer Science, vol. 10677, pp. 372\u2013408. Springer (2017).","DOI":"10.1007\/978-3-319-70500-2_13"},{"key":"880_CR17","doi-asserted-by":"crossref","unstructured":"Emura K., Seo J.H., Youn T.: Semi-generic transformation of revocable hierarchical identity-based encryption and its DBDH instantiation. IEICE Trans. 99-A(1), 83\u201391 (2016).","DOI":"10.1587\/transfun.E99.A.83"},{"issue":"1","key":"880_CR18","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/s00145-015-9220-6","volume":"30","author":"A Escala","year":"2017","unstructured":"Escala A., Herold G., Kiltz E., R\u00e0fols C., Villar J.L.: An algebraic framework for Diffie-Hellman assumptions. J. Cryptol. 30(1), 242\u2013288 (2017).","journal-title":"J. Cryptol."},{"key":"880_CR19","doi-asserted-by":"crossref","unstructured":"Ge A., Wei P.: Identity-based broadcast encryption with efficient revocation. In: D.\u00a0Lin, K.\u00a0Sako (eds.) Public-Key Cryptography\u2014PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings, Part I, Lecture Notes in Computer Science, vol. 11442, pp. 405\u2013435. Springer (2019).","DOI":"10.1007\/978-3-030-17253-4_14"},{"issue":"3","key":"880_CR20","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/s10623-015-0117-z","volume":"80","author":"J Gong","year":"2016","unstructured":"Gong J., Cao Z., Tang S., Chen J.: Extended dual system group and shorter unbounded hierarchical identity based encryption. Des. Codes Cryptogr. 80(3), 525\u2013559 (2016).","journal-title":"Des. Codes Cryptogr."},{"key":"880_CR21","doi-asserted-by":"crossref","unstructured":"Hu Z., Liu S., Chen K., Liu J.K.: Revocable identity-based encryption from the computational Diffie-Hellman problem. In: W.\u00a0Susilo, G.\u00a0Yang (eds.) Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Proceedings, Lecture Notes in Computer Science, vol. 10946, pp. 265\u2013283. Springer (2018).","DOI":"10.1007\/978-3-319-93638-3_16"},{"issue":"3","key":"880_CR22","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1504\/IJACT.2017.086229","volume":"3","author":"Y Ishida","year":"2017","unstructured":"Ishida Y., Shikata J., Watanabe Y.: CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance. IJACT 3(3), 288\u2013311 (2017).","journal-title":"IJACT"},{"issue":"4","key":"880_CR23","doi-asserted-by":"publisher","first-page":"1116","DOI":"10.1007\/s00145-016-9243-7","volume":"30","author":"CS Jutla","year":"2017","unstructured":"Jutla C.S., Roy A.: Shorter quasi-adaptive NIZK proofs for linear subspaces. J. Cryptol. 30(4), 1116\u20131156 (2017).","journal-title":"J. Cryptol."},{"key":"880_CR24","doi-asserted-by":"crossref","unstructured":"Katsumata S., Matsuda T., Takayasu A.: Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance. In: D.\u00a0Lin, K.\u00a0Sako (eds.) Public-Key Cryptography\u2014PKC 2019\u201422nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings, Part II, Lecture Notes in Computer Science, vol. 11443, pp. 441\u2013471. Springer (2019).","DOI":"10.1007\/978-3-030-17259-6_15"},{"key":"880_CR25","doi-asserted-by":"crossref","unstructured":"Langrehr R., Pan J.: Tightly secure hierarchical identity-based encryption. In: D.\u00a0Lin, K.\u00a0Sako (eds.) Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings, Part I, Lecture Notes in Computer Science, vol. 11442, pp. 436\u2013465. Springer (2019).","DOI":"10.1007\/978-3-030-17253-4_15"},{"key":"880_CR26","doi-asserted-by":"crossref","unstructured":"Langrehr R., Pan J.: Hierarchical identity-based encryption with tight multi-challenge security. In: A.\u00a0Kiayias, M.\u00a0Kohlweiss, P.\u00a0Wallden, V.\u00a0Zikas (eds.) Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings, Part I, Lecture Notes in Computer Science, vol. 12110, pp. 153\u2013183. Springer (2020).","DOI":"10.1007\/978-3-030-45374-9_6"},{"key":"880_CR27","first-page":"749","volume":"2016","author":"K Lee","year":"2016","unstructured":"Lee K.: Revocable hierarchical identity-based encryption with adaptive security. IACR Cryptol. ePrint Arch. 2016, 749 (2016).","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"880_CR28","first-page":"798","volume":"2019","author":"K Lee","year":"2019","unstructured":"Lee K.: A generic construction for revocable identity-based encryption with subset difference methods. IACR Cryptol. ePrint Arch. 2019, 798 (2019).","journal-title":"IACR Cryptol. ePrint Arch."},{"issue":"1","key":"880_CR29","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s10623-016-0287-3","volume":"85","author":"K Lee","year":"2017","unstructured":"Lee K., Lee D.H., Park J.H.: Efficient revocable identity-based encryption via subset difference methods. Des. Codes Cryptogr. 85(1), 39\u201376 (2017).","journal-title":"Des. Codes Cryptogr."},{"issue":"10","key":"880_CR30","doi-asserted-by":"publisher","first-page":"2407","DOI":"10.1007\/s10623-017-0453-2","volume":"86","author":"K Lee","year":"2018","unstructured":"Lee K., Park S.: Revocable hierarchical identity-based encryption with shorter private keys and update keys. Des. Codes Cryptogr. 86(10), 2407\u20132440 (2018).","journal-title":"Des. Codes Cryptogr."},{"key":"880_CR31","doi-asserted-by":"crossref","unstructured":"Lewko A.B.: Tools for simulating features of composite order bilinear groups in the prime order setting. In: D.\u00a0Pointcheval, T.\u00a0Johansson (eds.) Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings, Lecture Notes in Computer Science, vol. 7237, pp. 318\u2013335. Springer (2012).","DOI":"10.1007\/978-3-642-29011-4_20"},{"key":"880_CR32","doi-asserted-by":"crossref","unstructured":"Lewko A.B., Waters B.: New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: D.\u00a0Micciancio (ed.) Theory of Cryptography, 7th Theory of Cryptography Conference, TCC 2010, Lecture Notes in Computer Science, vol. 5978, pp. 455\u2013479. Springer (2010).","DOI":"10.1007\/978-3-642-11799-2_27"},{"key":"880_CR33","doi-asserted-by":"crossref","unstructured":"Lewko A.B., Waters B.: Unbounded HIBE and attribute-based encryption. In: K.G. Paterson (ed.) Advances in Cryptology\u2014EUROCRYPT 2011\u201430th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings, Lecture Notes in Computer Science, vol. 6632, pp. 547\u2013567. Springer (2011).","DOI":"10.1007\/978-3-642-20465-4_30"},{"key":"880_CR34","doi-asserted-by":"crossref","unstructured":"Libert B., Vergnaud D.: Adaptive-ID secure revocable identity-based encryption. In: M.\u00a0Fischlin (ed.) Topics in Cryptology\u2014CT-RSA 2009, The Cryptographers\u2019 Track at the RSA Conference 2009. Proceedings, Lecture Notes in Computer Science, vol. 5473, pp. 1\u201315. Springer (2009)","DOI":"10.1007\/978-3-642-00862-7_1"},{"key":"880_CR35","doi-asserted-by":"crossref","unstructured":"Ma X., Lin D.: Generic constructions of revocable identity-based encryption. In: Z.\u00a0Liu, M.\u00a0Yung (eds.) Information Security and Cryptology\u201415th International Conference, Inscrypt 2019, Lecture Notes in Computer Science, vol. 12020, pp. 381\u2013396. Springer (2019).","DOI":"10.1007\/978-3-030-42921-8_22"},{"key":"880_CR36","first-page":"1376","volume":"2019","author":"X Ma","year":"2019","unstructured":"Ma X., Lin D.: Generic constructions of ribe via subset difference method. IACR Cryptol. ePrint Arch. 2019, 1376 (2019).","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"880_CR37","doi-asserted-by":"crossref","unstructured":"Naor D., Naor M., Lotspiech J.: Revocation and tracing schemes for stateless receivers. In: J.\u00a0Kilian (ed.) Advances in Cryptology\u2014CRYPTO 2001, 21st Annual International Cryptology Conference. Proceedings, Lecture Notes in Computer Science, vol. 2139, pp. 41\u201362. Springer (2001).","DOI":"10.1007\/3-540-44647-8_3"},{"issue":"2\u20133","key":"880_CR38","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1007\/s10623-015-0131-1","volume":"77","author":"T Okamoto","year":"2015","unstructured":"Okamoto T., Takashima K.: Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption. Des. Codes Cryptogr. 77(2\u20133), 725\u2013771 (2015).","journal-title":"Des. Codes Cryptogr."},{"key":"880_CR39","doi-asserted-by":"crossref","unstructured":"Ramanna S.C., Sarkar P.: Efficient (anonymous) compact HIBE from standard assumptions. In: S.S.M. Chow, J.K. Liu, L.C.K. Hui, S.\u00a0Yiu (eds.) Provable Security - 8th International Conference, ProvSec 2014. Proceedings, Lecture Notes in Computer Science, vol. 8782, pp. 243\u2013258. Springer (2014).","DOI":"10.1007\/978-3-319-12475-9_17"},{"key":"880_CR40","doi-asserted-by":"crossref","unstructured":"Ryu G., Lee K., Park S., Lee D.H.: Unbounded hierarchical identity-based encryption with efficient revocation. In: H.\u00a0Kim, D.\u00a0Choi (eds.) Information Security Applications\u201416th International Workshop, WISA 2015, Lecture Notes in Computer Science, vol. 9503, pp. 122\u2013133. Springer (2015).","DOI":"10.1007\/978-3-319-31875-2_11"},{"key":"880_CR41","doi-asserted-by":"crossref","unstructured":"Seo J.H., Emura K.: Efficient delegation of key generation and revocation functionalities in identity-based encryption. In: E.\u00a0Dawson (ed.) Topics in Cryptology\u2014CT-RSA 2013\u2014The Cryptographers\u2019 Track at the RSA Conference 2013, Lecture Notes in Computer Science, vol. 7779, pp. 343\u2013358. Springer (2013).","DOI":"10.1007\/978-3-642-36095-4_22"},{"key":"880_CR42","doi-asserted-by":"crossref","unstructured":"Seo J.H., Emura K.: Revocable identity-based encryption revisited: Security model and construction. In: K.\u00a0Kurosawa, G.\u00a0Hanaoka (eds.) Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography. Proceedings, Lecture Notes in Computer Science, vol. 7778, pp. 216\u2013234. Springer (2013).","DOI":"10.1007\/978-3-642-36362-7_14"},{"key":"880_CR43","doi-asserted-by":"crossref","unstructured":"Seo J.H., Emura K.: Adaptive-id secure revocable hierarchical identity-based encryption. In: K.\u00a0Tanaka, Y.\u00a0Suga (eds.) Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Lecture Notes in Computer Science, vol. 9241, pp. 21\u201338. Springer (2015).","DOI":"10.1007\/978-3-319-22425-1_2"},{"key":"880_CR44","doi-asserted-by":"crossref","unstructured":"Seo J.H., Emura K.: Revocable hierarchical identity-based encryption: History-free update, security against insiders, and short ciphertexts. In: K.\u00a0Nyberg (ed.) Topics in Cryptology - CT-RSA 2015, The Cryptographer\u2019s Track at the RSA Conference 2015, Lecture Notes in Computer Science, vol. 9048, pp. 106\u2013123. Springer (2015).","DOI":"10.1007\/978-3-319-16715-2_6"},{"key":"880_CR45","first-page":"201","volume":"2007","author":"H Shacham","year":"2007","unstructured":"Shacham H.: The BBG HIBE has limited delegation. IACR Cryptol. ePrint Arch. 2007, 201 (2007).","journal-title":"IACR Cryptol. ePrint Arch."},{"issue":"2","key":"880_CR46","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1504\/IJES.2017.083736","volume":"9","author":"L Shen","year":"2017","unstructured":"Shen L., Zhang F., Sun Y., Ma J.: An efficient revocable ID-based encryption scheme in the standard model. IJES 9(2), 168\u2013176 (2017).","journal-title":"IJES"},{"key":"880_CR47","doi-asserted-by":"crossref","unstructured":"Takayasu A., Watanabe Y.: Lattice-based revocable identity-based encryption with bounded decryption key exposure resistance. In: J.\u00a0Pieprzyk, S.\u00a0Suriadi (eds.) Information Security and Privacy\u201422nd Australasian Conference, ACISP 2017, Lecture Notes in Computer Science, vol. 10342, pp. 184\u2013204. Springer (2017).","DOI":"10.1007\/978-3-319-60055-0_10"},{"key":"880_CR48","first-page":"323","volume":"2017","author":"A Takayasu","year":"2017","unstructured":"Takayasu A., Watanabe Y.: Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more. IACR Cryptol. ePrint Arch. 2017, 323 (2017).","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"880_CR49","doi-asserted-by":"crossref","unstructured":"Wang C., Li Y., Jiang S., Wu J.: An efficient adaptive-id secure revocable hierarchical identity-based encryption scheme. In: M.\u00a0Qiu (ed.) Smart Computing and Communication\u2014First International Conference, SmartCom 2016, Lecture Notes in Computer Science, vol. 10135, pp. 506\u2013515. Springer (2016).","DOI":"10.1007\/978-3-319-52015-5_52"},{"issue":"9","key":"880_CR50","doi-asserted-by":"publisher","first-page":"e106925","DOI":"10.1371\/journal.pone.0106925","volume":"9","author":"C Wang","year":"2014","unstructured":"Wang C., Li Y., Xia X., Zheng K.: An efficient and provable secure revocable identity-based encryption scheme. PLoS ONE 9(9), e106925 (2014).","journal-title":"PLoS ONE"},{"key":"880_CR51","doi-asserted-by":"crossref","unstructured":"Wang S., Zhang J., He J., Wang H., Li C.: Simplified revocable hierarchical identity-based encryption from lattices. In: Y.\u00a0Mu, R.H. Deng, X.\u00a0Huang (eds.) Cryptology and Network Security - 18th International Conference, CANS 2019, Fuzhou, China, October 25\u201327, 2019, Proceedings, Lecture Notes in Computer Science, vol. 11829, pp. 99\u2013119. Springer (2019).","DOI":"10.1007\/978-3-030-31578-8_6"},{"key":"880_CR52","doi-asserted-by":"crossref","unstructured":"Watanabe Y., Emura K., Seo J.H.: New revocable IBE in prime-order groups: Adaptively secure, decryption key exposure resistant, and with short public parameters. In: H.\u00a0Handschuh (ed.) Topics in Cryptology\u2014CT-RSA 2017\u2014The Cryptographers\u2019 Track at the RSA Conference 2017. Proceedings, Lecture Notes in Computer Science, vol. 10159, pp. 432\u2013449. Springer (2017).","DOI":"10.1007\/978-3-319-52153-4_25"},{"key":"880_CR53","doi-asserted-by":"crossref","unstructured":"Waters B.: Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. In: S.\u00a0Halevi (ed.) Advances in Cryptology\u2014CRYPTO 2009, 29th Annual International Cryptology Conference. Proceedings, Lecture Notes in Computer Science, vol. 5677, pp. 619\u2013636. Springer (2009).","DOI":"10.1007\/978-3-642-03356-8_36"},{"key":"880_CR54","doi-asserted-by":"crossref","unstructured":"Xing Q., Wang B., Wang X., Chen P., Yu B., Tang Y., Gao X.: Unbounded revocable hierarchical identity-based encryption with adaptive-id security. In: J.\u00a0Chen, L.T. Yang (eds.) 18th IEEE International Conference on High Performance Computing and Communications, 14th IEEE International Conference on Smart City, 2nd IEEE International Conference on Data Science and Systems, HPCC\/SmartCity\/DSS 2016, pp. 430\u2013437. IEEE (2016).","DOI":"10.1109\/HPCC-SmartCity-DSS.2016.0068"},{"issue":"4","key":"880_CR55","doi-asserted-by":"publisher","first-page":"e0195204","DOI":"10.1371\/journal.pone.0195204","volume":"13","author":"Q Xing","year":"2018","unstructured":"Xing Q., Wang B., Wang X., Tao J.: Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters. PLoS ONE 13(4), e0195204 (2018).","journal-title":"PLoS ONE"},{"key":"880_CR56","doi-asserted-by":"crossref","unstructured":"Zhandry M.: Secure identity-based encryption in the quantum random oracle model. In: R.\u00a0Safavi-Naini, R.\u00a0Canetti (eds.) Advances in Cryptology\u2014CRYPTO 2012\u201432nd Annual Cryptology Conference, Proceedings, Lecture Notes in Computer Science, vol. 7417, pp. 758\u2013775. Springer (2012).","DOI":"10.1007\/978-3-642-32009-5_44"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00880-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-021-00880-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00880-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,14]],"date-time":"2021-06-14T19:34:03Z","timestamp":1623699243000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-021-00880-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,15]]},"references-count":56,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["880"],"URL":"https:\/\/doi.org\/10.1007\/s10623-021-00880-w","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2021,5,15]]},"assertion":[{"value":"20 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 May 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}