{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,11]],"date-time":"2024-08-11T13:51:13Z","timestamp":1723384273301},"reference-count":25,"publisher":"Elsevier BV","issue":"9","license":[{"start":{"date-parts":[[2010,5,1]],"date-time":"2010-05-01T00:00:00Z","timestamp":1272672000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1016\/j.ins.2010.01.008","type":"journal-article","created":{"date-parts":[[2010,1,12]],"date-time":"2010-01-12T10:00:28Z","timestamp":1263290428000},"page":"1681-1689","source":"Crossref","is-referenced-by-count":101,"title":["Hidden attribute-based signatures without anonymity revocation"],"prefix":"10.1016","volume":"180","author":[{"given":"Jin","family":"Li","sequence":"first","affiliation":[]},{"given":"Kwangjo","family":"Kim","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ins.2010.01.008_bib1","doi-asserted-by":"crossref","unstructured":"J. Baek, W. Susilo, J. Zhou, New Constructions of fuzzy identity-based encryption, ASIACCS\u201907, ACM, 2007, pp. 368\u2013370.","DOI":"10.1145\/1229285.1229330"},{"key":"10.1016\/j.ins.2010.01.008_bib2","unstructured":"M. Bellare, D. Micciancio, B. Warinschi, Foundations of group signatures: formal definitions, simplified requirements, and a construction based on general assumptions, EUROCRYPT\u201903, LNCS, vol. 2656, Springer, 2003, pp. 614\u2013629."},{"key":"10.1016\/j.ins.2010.01.008_bib3","doi-asserted-by":"crossref","unstructured":"J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encryption, in: IEEE Symposium on Security and Privacy\u201907, IEEE, 2007, pp. 321\u2013334.","DOI":"10.1109\/SP.2007.11"},{"key":"10.1016\/j.ins.2010.01.008_bib4","unstructured":"D. Boneh, X. Boyen. Efficient selective-ID secure identity based encryption without random oracles, EUROCRYPT\u201904, Springer, LNCS, vol. 3027, 2004, pp. 223\u2013238."},{"key":"10.1016\/j.ins.2010.01.008_bib5","unstructured":"E. Bresson, J. Stern, M. Szydlo, Threshold ring signatures and applications to ad-hoc groups, CRYPTO\u201902, LNCS, vol. 2442, Springer, 2002, pp. 465\u2013480."},{"key":"10.1016\/j.ins.2010.01.008_bib6","unstructured":"A. Burnett, A. Duffy, Tom Dowling, A biometric identity based signature scheme, Also appeared at Industry Track of ACNS 2005. Available at: ."},{"key":"10.1016\/j.ins.2010.01.008_bib7","unstructured":"M. Chase, Multi-authority attribute based encryption, TCC\u201907, LNCS, vol. 4392, Springer, 2007, pp. 515\u2013534."},{"key":"10.1016\/j.ins.2010.01.008_bib8","doi-asserted-by":"crossref","unstructured":"D. Chaum, E.V. Heyst, Group signatures, EUROCRYPT\u201991, LNCS, vol. 547, Springer, 1991, pp. 257\u2013265.","DOI":"10.1007\/3-540-46416-6_22"},{"key":"10.1016\/j.ins.2010.01.008_bib9","doi-asserted-by":"crossref","unstructured":"S.S.M. Chow, V.K.-W. Wei, J.K. Liu, T.H. Yuen, Ring signatures without random oracles, ASIACCS\u201906, ACM Press, 2006, pp. 297\u2013302.","DOI":"10.1145\/1128817.1128861"},{"key":"10.1016\/j.ins.2010.01.008_bib10","unstructured":"S.S.M. Chow, S.-M. Yiu, L.C.K. Hui, Efficient identity based ring signature, ACNS\u201905, LNCS, vol. 3531, Springer, 2005, pp. 499\u2013512."},{"key":"10.1016\/j.ins.2010.01.008_bib11","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1016\/j.ins.2007.08.001","article-title":"Access control in user hierarchy based on elliptic curve cryptosystem","volume":"178","author":"Chung","year":"2008","journal-title":"Information Sciences"},{"key":"10.1016\/j.ins.2010.01.008_bib12","unstructured":"D. Galindo, J. Herranz, E. Kiltz, On the generic construction of identity-based signatures with additional properties, ASIACRYPT\u201906, LNCS, vol. 4284, Springer, 2006, pp. 178\u2013193."},{"key":"10.1016\/j.ins.2010.01.008_bib13","unstructured":"S. Guo, Y. Zeng, Attribute-based signature scheme, in: 2008 International Conference on Information Security and Assurance (ISA 2008), 2008, pp. 509\u2013511."},{"key":"10.1016\/j.ins.2010.01.008_bib14","doi-asserted-by":"crossref","unstructured":"V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in: CCS\u201906, ACM, 2006, pp. 89\u201398.","DOI":"10.1145\/1180405.1180418"},{"key":"10.1016\/j.ins.2010.01.008_bib15","unstructured":"D. Khader, Attribute based group signatures, 2007. Available at: ."},{"key":"10.1016\/j.ins.2010.01.008_bib16","unstructured":"A. Kiayias, H.S. Zhou, Hidden identity-based signatures, FC\u201907, LNCS, vol. 4886, Springer, 2007, pp. 134\u2013147."},{"key":"10.1016\/j.ins.2010.01.008_bib17","unstructured":"J. Li, X. Chen, T.H. Yuen, Y. Wang, Proxy ring signature: formal definitions, efficient construction and new variant, CIS\u201906, LNCS, vol. 4456, Springer, 2007, pp. 545\u2013555."},{"key":"10.1016\/j.ins.2010.01.008_bib18","unstructured":"H. Maji, M. Prabhakaran, M. Rosulek, Attribute based signatures: achieving attribute privacy and collusion\u2013resistance, 2008. Available at: ."},{"key":"10.1016\/j.ins.2010.01.008_bib19","unstructured":"R.L. Rivest, A. Shamir, Y. Tauman, How to leak a secret, ASIACRYPT\u201901, LNCS, vol. 2248, Springer, 2001, pp. 552\u2013565."},{"key":"10.1016\/j.ins.2010.01.008_bib20","unstructured":"A. Sahai, B. Waters, Fuzzy identity-based encryption, EUROCRYPT\u201905, LNCS, vol. 3494, Springer, 2005, pp. 457\u2013473."},{"key":"10.1016\/j.ins.2010.01.008_bib21","unstructured":"H. Shacham, B. Waters, Efficient ring signatures without random oracles, PKC\u201907, LNCS, vol. 4450, Springer, 2007, pp. 166\u2013180."},{"key":"10.1016\/j.ins.2010.01.008_bib22","doi-asserted-by":"crossref","unstructured":"A. Shamir, Identity based cryptosystems and signature schemes, CRYPTO\u201984, LNCS, vol. 196, Springer, 1984, pp. 47\u201353.","DOI":"10.1007\/3-540-39568-7_5"},{"key":"10.1016\/j.ins.2010.01.008_bib23","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1016\/j.ins.2006.03.016","article-title":"A new ring signature scheme with signer-admission property","volume":"177","author":"Wang","year":"2007","journal-title":"Information Sciences"},{"key":"10.1016\/j.ins.2010.01.008_bib24","unstructured":"B. Waters, Efficient identity-based encryption without random oracles, EUROCRYPT\u201905, LNCS, vol. 3494, Springer, 2005, pp. 114\u2013127."},{"key":"10.1016\/j.ins.2010.01.008_bib25","unstructured":"P. Yang, Z. Cao, X. Dong, Fuzzy identity based signature, 2008. Available at: ."}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025510000186?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025510000186?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T02:56:51Z","timestamp":1558753011000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025510000186"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":25,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2010,5]]}},"alternative-id":["S0020025510000186"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2010.01.008","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2010,5]]}}}