{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:20:29Z","timestamp":1740097229185,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,30]],"date-time":"2016-05-30T00:00:00Z","timestamp":1464566400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"US National Science Foundation","award":["CHN-1262277"]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61422206, 61120106008"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,30]]},"DOI":"10.1145\/2897845.2897846","type":"proceedings-article","created":{"date-parts":[[2016,5,27]],"date-time":"2016-05-27T12:37:36Z","timestamp":1464352656000},"page":"59-70","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control"],"prefix":"10.1145","author":[{"given":"Heyi","family":"Tang","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Yong","family":"Cui","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Chaowen","family":"Guan","sequence":"additional","affiliation":[{"name":"University at Buffalo, Buffalo, USA"}]},{"given":"Jianping","family":"Wu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Jian","family":"Weng","sequence":"additional","affiliation":[{"name":"Jinan University, Guangzhou, China"}]},{"given":"Kui","family":"Ren","sequence":"additional","affiliation":[{"name":"University at Buffalo, Buffalo, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Crypto++ 5.0. http:\/\/www.cryptopp.com\/. Crypto++ 5.0. http:\/\/www.cryptopp.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Enabling ciphertext deduplication for secure cloud storage and access control(full version). https:\/\/www.dropbox.com\/sh\/o5apxgnrli49hr0\/AAAIwKMJXWnfXNLW2yIBTuz3a. Enabling ciphertext deduplication for secure cloud storage and access control(full version). https:\/\/www.dropbox.com\/sh\/o5apxgnrli49hr0\/AAAIwKMJXWnfXNLW2yIBTuz3a."},{"key":"e_1_3_2_1_3_1","unstructured":"Openssh: 2.1.1p4. http:\/\/www.openssh.com\/. Openssh: 2.1.1p4. http:\/\/www.openssh.com\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0057-3"},{"key":"e_1_3_2_1_5_1","volume-title":"Self-protecting electronic medical records using attribute-based encryption","author":"Akinyele J. A.","year":"2010","unstructured":"J. A. Akinyele , C. U. Lehmann , M. D. Green , M. W. Pagano , Z. N. Peterson , and A. D. Rubin . Self-protecting electronic medical records using attribute-based encryption . 2010 . J. A. Akinyele, C. U. Lehmann, M. D. Green, M. W. Pagano, Z. N. Peterson, and A. D. Rubin. Self-protecting electronic medical records using attribute-based encryption. 2010."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592585"},{"key":"e_1_3_2_1_8_1","first-page":"179","volume-title":"Proceedings of the 22nd USENIX conference on security","author":"Bellare M.","year":"2013","unstructured":"M. Bellare , S. Keelveedhi , and T. Ristenpart . Dupless: Server-aided encryption for deduplicated storage . In Proceedings of the 22nd USENIX conference on security , pages 179 -- 194 . USENIX Association , 2013 . M. Bellare, S. Keelveedhi, and T. Ristenpart. Dupless: Server-aided encryption for deduplicated storage. In Proceedings of the 22nd USENIX conference on security, pages 179--194. USENIX Association, 2013."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/88314.88328"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/850928.851884"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_13_1","volume-title":"USENIX Security Symposium","volume":"2011","author":"Green M.","year":"2011","unstructured":"M. Green , S. Hohenberger , and B. Waters . Outsourcing the decryption of abe ciphertexts . In USENIX Security Symposium , volume 2011 , 2011 . M. Green, S. Hohenberger, and B. Waters. Outsourcing the decryption of abe ciphertexts. In USENIX Security Symposium, volume 2011, 2011."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54631-0_17"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2271848"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1534530.1534541"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/3-540-48184-2_32","volume-title":"Advances in Cryptology-CRYPTO'87","author":"Merkle R. C.","year":"1988","unstructured":"R. C. Merkle . A digital signature based on a conventional encryption function . In Advances in Cryptology-CRYPTO'87 , pages 369 -- 378 . Springer , 1988 . R. C. Merkle. A digital signature based on a conventional encryption function. In Advances in Cryptology-CRYPTO'87, pages 369--378. Springer, 1988."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/502059.502052"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315270"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180419"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516672"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456469.1456471"},{"key":"e_1_3_2_1_25_1","first-page":"157","article-title":"Optimizing file replication over limited bandwidth networks using remote differential compression","author":"Teodosiu D.","year":"2006","unstructured":"D. Teodosiu , N. Bjorner , Y. Gurevich , M. Manasse , and J. Porkka . Optimizing file replication over limited bandwidth networks using remote differential compression . Microsoft Research TR- 2006 -- 157 , 2006. D. Teodosiu, N. Bjorner, Y. Gurevich, M. Manasse, and J. Porkka. Optimizing file replication over limited bandwidth networks using remote differential compression. Microsoft Research TR-2006--157, 2006.","journal-title":"Microsoft Research TR-"},{"key":"e_1_3_2_1_26_1","volume-title":"NDSS","author":"Traynor P.","year":"2008","unstructured":"P. Traynor , K. R. Butler , W. Enck , and P. McDaniel . Realizing massive-scale conditional access systems through attribute-based cryptosystems . In NDSS , 2008 . P. Traynor, K. R. Butler, W. Enck, and P. McDaniel. Realizing massive-scale conditional access systems through attribute-based cryptosystems. In NDSS, 2008."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1964658.1964664"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2013.2238910"}],"event":{"name":"ASIA CCS '16: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Xi'an China","acronym":"ASIA CCS '16"},"container-title":["Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2897845.2897846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T15:09:43Z","timestamp":1673104183000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897845.2897846"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,30]]},"references-count":26,"alternative-id":["10.1145\/2897845.2897846","10.1145\/2897845"],"URL":"https:\/\/doi.org\/10.1145\/2897845.2897846","relation":{},"subject":[],"published":{"date-parts":[[2016,5,30]]},"assertion":[{"value":"2016-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}