{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T19:08:11Z","timestamp":1726513691413},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2012,11,1]],"date-time":"2012-11-01T00:00:00Z","timestamp":1351728000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Parallel Distrib. Syst."],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1109\/tpds.2012.50","type":"journal-article","created":{"date-parts":[[2012,2,1]],"date-time":"2012-02-01T22:01:28Z","timestamp":1328133688000},"page":"2150-2162","source":"Crossref","is-referenced-by-count":123,"title":["Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption"],"prefix":"10.1109","volume":"23","author":[{"given":"Jinguang","family":"Han","sequence":"first","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Yan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"bibttd201211215014","first-page":"223","article-title":"Efficient Selective-Id Secure Identity-Based Encryption without Random Oracles","author":"boneh","year":"2004","journal-title":"Advances in Cryptology Proc Of EUROCRYPT"},{"key":"bibttd201211215039","first-page":"184","article-title":"Pseudonym Systems","author":"lysyanskaya","year":"1999","journal-title":"Proc Sixth Ann Int'l Workshop Selected Areas in Cryptography (SAC '99)"},{"key":"bibttd201211215013","first-page":"114","article-title":"Efficient Identity-Based Encryption without Random Oracles","author":"waters","year":"2005","journal-title":"EUROCRYPT '05 Proc Advances in Cryptology"},{"key":"bibttd201211215016","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"bibttd201211215015","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653678"},{"key":"bibttd201211215010","first-page":"213","article-title":"Identity-Based Encryption from the Weil Pairing","author":"boneh","year":"2001","journal-title":"CRYPTO '01 Proc Advances in Cryptology"},{"key":"bibttd201211215012","first-page":"445","article-title":"Practical Identity-Based Encryption without Random Oracles","author":"gentry","year":"2006","journal-title":"Advances in Cryptology Proc Of EUROCRYPT"},{"key":"bibttd201211215011","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"bibttd201211215031","doi-asserted-by":"publisher","DOI":"10.4134\/BKMS.2009.46.4.803"},{"key":"bibttd201211215032","first-page":"278","article-title":"Fully Secure Multi-Authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles","author":"liu","year":"2011","journal-title":"Proc 16th European Symp Research in Computer Security (ESORICS '11)"},{"key":"bibttd201211215033","first-page":"129","article-title":"Non-Interactive and Information- Theoretic Secure Verifiable Secret Sharing","author":"pedersen","year":"1991","journal-title":"CRYPTO '91 Proc 11th Ann Int'l Cryptology Conf Advances in Cryptology"},{"key":"bibttd201211215034","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1007\/BFb0052252","article-title":"Efficient Group Signature Schemes for Large Groups","author":"camenisch","year":"1997","journal-title":"CRYPTO '97 Proc of the 17th Annual Int'l Cryptology Conf on Advances in Cryptology"},{"key":"bibttd201211215018","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1145\/1315245.1315302","article-title":"Provably Secure Ciphertext Policy Abe","author":"cheung","year":"2007","journal-title":"Proc ACM Conf Computer and Comm Security (CCS '07)"},{"key":"bibttd201211215035","first-page":"196","article-title":"Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data","author":"camenisch","year":"2009","journal-title":"Proc 12th Int'l Conf Practice nad Theory in Public Key Cryptography (PKC '09)"},{"key":"bibttd201211215017","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1145\/1315245.1315270","article-title":"Attribute- Based Encryption with Non-Monotonic Access Structures","author":"ostrovsky","year":"2007","journal-title":"Proc ACM Conf Computer and Comm Security (CCS '07)"},{"key":"bibttd201211215036","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76900-2_16"},{"key":"bibttd201211215037","doi-asserted-by":"publisher","DOI":"10.1145\/4372.4373"},{"key":"bibttd201211215019","first-page":"19","article-title":"Constant Size Ciphertexts in Threshold Attribute-Based Encryption","author":"herranz","year":"2010","journal-title":"Proc Public Key Cryptography (PKC '10)"},{"key":"bibttd201211215038","first-page":"93","article-title":"An Efficient System for Non-Transferable Anonymous Credentials with Optional Anonymity Revocation","author":"camenisch","year":"2001","journal-title":"EUROCRYPT '01 Proc Int'l Conf the Theory and Application of Cryptographic Techniques Advances in Cryptology"},{"key":"bibttd201211215027","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"bibttd20121121505","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"bibttd201211215026","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.203"},{"key":"bibttd20121121504","first-page":"457","article-title":"Fuzzy Identity-Based Encryption","author":"sahai","year":"2005","journal-title":"EUROCRYPT '05 Proc Advances in Cryptology"},{"key":"bibttd201211215025","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.130"},{"key":"bibttd20121121503","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"bibttd201211215024","first-page":"1","article-title":"Blind Attribute-Based Encryption and Oblivious Transfer with Fine-Grained Access Control","author":"rial","year":"2010","journal-title":"Proc 2010th Benelux Workshop Information and System Security (WISSec '10)"},{"key":"bibttd20121121502","first-page":"111","article-title":"Access Control Using Pairing Based Cryptography","author":"smart","year":"2003","journal-title":"CT-RSA '03 Proc RSA Conf The Cryptographers' Track"},{"key":"bibttd20121121509","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1145\/1966913.1966964","article-title":"Multi-Authority Ciphertext-Policy Attribute-Based Encryption with Accountability","author":"li","year":"2011","journal-title":"Proc ACM Symp Information Computer and Comm Security (ASIACCS '11)"},{"key":"bibttd201211215023","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1007\/978-3-642-01957-9_11","article-title":"Dual-Policy Attribute Based Encryption","author":"attrapadung","year":"2009","journal-title":"Proc Seventh Int'l Conf Applied Cryptography andNetwork Security (ACNS '09)"},{"key":"bibttd20121121508","first-page":"568","article-title":"Decentralizing Attribute - Based Encryption","author":"lewko","year":"2011","journal-title":"EUROCRYPT '11 Proc 30th Ann Int'l Conf Theory and Applications of Cryptographic Techniques Advances in Cryptology"},{"key":"bibttd201211215022","author":"beimel","year":"1996","journal-title":"Secure schemes for secret sharing and key distribution"},{"key":"bibttd20121121507","first-page":"426","article-title":"Secure Threshold Multi-Authority Attribute Based Encryption without a Central Authority","author":"lin","year":"2008","journal-title":"INDOCRYPT '08 Proc Int'l Conf Cryptology in India"},{"key":"bibttd201211215021","first-page":"53","article-title":"Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization","author":"waters","year":"2011","journal-title":"Proc 14th Int'l Conf Practice and Theory in Public Key Cryptography Conf Public Key Cryptography (PKC '11)"},{"key":"bibttd201211215020","first-page":"62","article-title":"Fully Secure Functional Encryption: Attribute- Based Encryption and (Hierarchical) Inner Product Encryption","author":"lewko","year":"2010","journal-title":"Advances in Cryptology Proc Of EUROCRYPT"},{"key":"bibttd20121121506","first-page":"20","article-title":"Distributed Attribute-Based Encryption","author":"mller","year":"2008","journal-title":"Proc 11th Int'l Conf Information Security and Cryptology (ICISC '08)"},{"key":"bibttd201211215029","doi-asserted-by":"publisher","DOI":"10.1006\/inco.2000.2881"},{"key":"bibttd201211215028","first-page":"295","article-title":"Secure Distributed Key Generation for Discrete-Log Based Cryptosystems","author":"gennaro","year":"1999","journal-title":"EUROCRYPT '99 Proc 17th Int'l Conf Theory and Application of Cryptographic Techniques"},{"key":"bibttd201211215030","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1007\/3-540-48910-X_23","article-title":"Distributed Pseudo -Random Functions and KDCs","author":"naor","year":"1999","journal-title":"Advances in Cryptology Proc Of EUROCRYPT"},{"key":"bibttd20121121501","doi-asserted-by":"publisher","DOI":"10.1109\/35.312841"}],"container-title":["IEEE Transactions on Parallel and Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/71\/6311386\/06143930.pdf?arnumber=6143930","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T21:11:06Z","timestamp":1713474666000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6143930\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11]]},"references-count":39,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tpds.2012.50","relation":{},"ISSN":["1045-9219"],"issn-type":[{"value":"1045-9219","type":"print"}],"subject":[],"published":{"date-parts":[[2012,11]]}}}