{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:28:32Z","timestamp":1761812912299,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032081230","type":"print"},{"value":"9783032081247","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T00:00:00Z","timestamp":1761868800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T00:00:00Z","timestamp":1761868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-08124-7_7","type":"book-chapter","created":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:23:34Z","timestamp":1761812614000},"page":"131-151","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Conditional Attribute-Based PRE: Definition and\u00a0Construction from\u00a0LWE"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-9974-2544","authenticated-orcid":false,"given":"Lisha","family":"Yao","sequence":"first","affiliation":[]},{"given":"Jian","family":"Weng","sequence":"additional","affiliation":[]},{"given":"Pengfei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Guofeng","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Guomin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Haiyang","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,31]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Aono, Y., Boyen, X., Phong, L.T., Wang, L.: Key-private proxy re-encryption under LWE. In: INDOCRYPT 2013, pp. 1\u201318 (2013)","DOI":"10.1007\/978-3-319-03515-4_1"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast cryptographic primitives and circular-secure encryption based on hard learning problems. In: CRYPTO 2009, pp. 595\u2013618 (2009)","DOI":"10.1007\/978-3-642-03356-8_35"},{"issue":"1","key":"7_CR3","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1007\/BF01445125","volume":"296","author":"W Banaszczyk","year":"1993","unstructured":"Banaszczyk, W.: New bounds in some transference theorems in the geometry of numbers. Math. Ann. 296(1), 625\u2013635 (1993)","journal-title":"Math. Ann."},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/BF02574039","volume":"13","author":"W Banaszczyk","year":"1995","unstructured":"Banaszczyk, W.: Inequalities for convex bodies and polar reciprocal lattices in Rn. Discrete Comput. Geom. 13, 217\u2013231 (1995)","journal-title":"Discrete Comput. Geom."},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: EUROCRYPT 1998, pp. 127\u2013144. Springer (1998)","DOI":"10.1007\/BFb0054122"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Boneh, D., et al.: Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. In: EUROCRYPT 2014, pp. 533\u2013556 (2014)","DOI":"10.1007\/978-3-642-55220-5_30"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (leveled) fully homomorphic encryption without bootstrapping. In: ITCS 2012, pp. 309\u2013325 (2012)","DOI":"10.1145\/2090236.2090262"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Cohen, A.: What about bob? The inadequacy of CPA security for proxy re-encryption. In: PKC 2019, pp. 287\u2013316 (2019)","DOI":"10.1007\/978-3-030-17259-6_10"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Davidson, A., Katsumata, S., Nishimaki, R., Yamada, S., Yamakawa, T.: Adaptively secure constrained pseudorandom functions in the standard model. In: CRYPTO 2020, pp. 559\u2013589 (2020)","DOI":"10.1007\/978-3-030-56784-2_19"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: EUROCRYPT 2004, pp. 523\u2013540 (2004)","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Fuchsbauer, G., Kamath, C., Klein, K., Pietrzak, K.: Adaptively secure proxy re-encryption. In: PKC 2019, pp. 317\u2013346 (2019)","DOI":"10.1007\/978-3-030-17259-6_11"},{"issue":"11","key":"7_CR12","doi-asserted-by":"publisher","first-page":"2587","DOI":"10.1007\/s10623-018-0462-9","volume":"86","author":"C Ge","year":"2018","unstructured":"Ge, C., Susilo, W., Fang, L., Wang, J., Shi, Y.: A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system. Des. Codes Crypt. 86(11), 2587\u20132603 (2018). https:\/\/doi.org\/10.1007\/s10623-018-0462-9","journal-title":"Des. Codes Crypt."},{"key":"7_CR13","unstructured":"Goldwasser, S., Kalai, Y.T., Peikert, C., Vaikuntanathan, V.: Robustness of the learning with errors assumption. In: ICS 2010, pp. 230\u2013240 (2010)"},{"key":"7_CR14","doi-asserted-by":"publisher","first-page":"1523","DOI":"10.1016\/j.future.2017.05.026","volume":"86","author":"Q Huang","year":"2018","unstructured":"Huang, Q., Yang, Y., Fu, J.: PRECISE: identity-based private data sharing with conditional proxy re-encryption in online social networks. Future Gener. Comput. Syst. 86, 1523\u20131533 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Katsumata, S., Yamada, S., Yamakawa, T.: Tighter security proofs for GPV-IBE in the quantum random oracle model. In: ASIACRYPT 2018, pp. 253\u2013282 (2018)","DOI":"10.1007\/978-3-030-03329-3_9"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Li, J., Ma, C., Zhang, K.: A novel lattice-based ciphertext-policy attribute-based proxy re-encryption for cloud sharing. In: International Symposium on Security and Privacy in Social Networks and Big Data, pp. 32\u201346 (2019)","DOI":"10.1007\/978-981-15-0758-8_3"},{"key":"7_CR17","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.future.2014.11.016","volume":"52","author":"K Liang","year":"2015","unstructured":"Liang, K., et al.: A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Futur. Gener. Comput. Syst. 52, 95\u2013108 (2015)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Liang, X., Cao, Z., Lin, H., Shao, J.: Attribute based proxy re-encryption with delegating capabilities. In: ASIACCS 2009, pp. 276\u2013286 (2009)","DOI":"10.1145\/1533057.1533094"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Micciancio, D., Peikert, C.: Trapdoors for lattices: simpler, tighter, faster, smaller. In: EUROCRYPT 2012, pp. 700\u2013718 (2012)","DOI":"10.1007\/978-3-642-29011-4_41"},{"issue":"4","key":"7_CR20","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1504\/IJCAT.2022.125183","volume":"68","author":"RY Patil","year":"2022","unstructured":"Patil, R.Y.: Digital forensics evidence management based on proxy re-encryption. Int. J. Comput. Appl. Technol. 68(4), 405\u2013413 (2022)","journal-title":"Int. J. Comput. Appl. Technol."},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: STOC 2005, pp. 84\u201393 (2005)","DOI":"10.1145\/1060590.1060603"},{"key":"7_CR22","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/j.ins.2019.01.051","volume":"527","author":"M Su","year":"2020","unstructured":"Su, M., Zhou, B., Fu, A., Yu, Y., Zhang, G.: PRTA: a proxy re-encryption based trusted authorization scheme for nodes on cloudiot. Inf. Sci. 527, 533\u2013547 (2020)","journal-title":"Inf. Sci."},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Susilo, W., Dutta, P., Duong, D.H., Roy, P.S.: Lattice-based HRA-secure attribute-based proxy re-encryption in standard model. In: ESORICS 2021, pp. 169\u2013191 (2021)","DOI":"10.1007\/978-3-030-88428-4_9"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Tsabary, R.: Fully secure attribute-based encryption for t-CNF from LWE. In: CRYPTO 2019, pp. 62\u201385 (2019)","DOI":"10.1007\/978-3-030-26948-7_3"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-08124-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T08:23:51Z","timestamp":1761812631000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-08124-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,31]]},"ISBN":["9783032081230","9783032081247"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-08124-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,31]]},"assertion":[{"value":"31 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seoul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isc25.skku.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}