{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:17:20Z","timestamp":1725794240399},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319067339"},{"type":"electronic","value":"9783319067346"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06734-6_24","type":"book-chapter","created":{"date-parts":[[2014,5,21]],"date-time":"2014-05-21T04:22:02Z","timestamp":1400646122000},"page":"398-419","source":"Crossref","is-referenced-by-count":10,"title":["Expressive Attribute Based Signcryption with Constant-Size Ciphertext"],"prefix":"10.1007","author":[{"given":"Y. Sreenivasa","family":"Rao","sequence":"first","affiliation":[]},{"given":"Ratna","family":"Dutta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A. Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 457\u2013473. Springer, Heidelberg (2005)"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute Based Encryption for Fine- Grained Access Control of Encrypted Data. In: ACM Conference on Computer and Communications Security, pp. 89\u201398 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-Policy Attribute-Based Encryption. In: IEEE Symposium on Security and Privacy, pp. 321\u2013334 (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"24_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-642-15317-4_11","volume-title":"Security and Cryptography for Networks","author":"M. Gagn\u00e9","year":"2010","unstructured":"Gagn\u00e9, M., Narayan, S., Safavi-Naini, R.: Threshold Attribute-Based Signcryption. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol.\u00a06280, pp. 154\u2013171. Springer, Heidelberg (2010)"},{"issue":"9","key":"24_CR5","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/JSAC.2013.SUP.0513004","volume":"31","author":"C. Hu","year":"2013","unstructured":"Hu, C., Zhang, N., Li, H., Cheng, X., Liao, X.: Body Area Network Security: A Fuzzy Attribute-based Signcryption Scheme. IEEE Journal on Selected Areas in Communications\u00a031(9), 37\u201346 (2013)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Wang, C., Huang, J.: Attribute-based Signcryption with Ciphertext-policy and Claim-predicate Mechanism. In: CIS 2011, pp. 905\u2013909 (2011)","DOI":"10.1109\/CIS.2011.204"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Emura, K., Miyaji, A., Rahman, M.S.: Dynamic Attribute-Based Signcryption without Random Oracles. Int. J. Applied Cryptography\u00a02(3), 199\u2013211","DOI":"10.1504\/IJACT.2012.045589"},{"key":"24_CR8","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.tcs.2011.12.004","volume":"422","author":"N. Attrapadung","year":"2012","unstructured":"Attrapadung, N., Herranz, J., Laguillaumie, F., Libert, B., de Panafieu, E., R\u00e0fols, C.: Attribute-Based Encryption Schemes with Constant-Size Ciphertexts. Theor. Comput. Sci.\u00a0422, 15\u201338 (2012)","journal-title":"Theor. Comput. Sci."},{"key":"24_CR9","unstructured":"Waters, B.: Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. Cryptology ePrint report 2008\/290 (2008)"},{"key":"24_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/BFb0052234","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"Y. Zheng","year":"1997","unstructured":"Zheng, Y.: Digital Signcryption or How to Achieve Cost (Signature & Encryption) <\u2009< Cost(Signature) + Cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 165\u2013179. Springer, Heidelberg (1997)"},{"key":"24_CR11","unstructured":"Malone-Lee, J.: Identity-based signcryption. Cryptology ePrint Archive, Report 2002\/098 (2002)"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) Advances in Cryptology CRYPTO -1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)","DOI":"10.1007\/3-540-39568-7_5"},{"key":"#cr-split#-24_CR13.1","doi-asserted-by":"crossref","unstructured":"Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-Based signatures. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol.\u00a06558, pp. 376-392. Springer, Heidelberg (2011)","DOI":"10.1007\/978-3-642-19074-2_24"},{"key":"#cr-split#-24_CR13.2","unstructured":"The first version available as Cryptology ePrint report 2008\/328"},{"issue":"2","key":"24_CR14","first-page":"1","volume":"6","author":"A. Ge","year":"2012","unstructured":"Ge, A., Ma, C., Zhang, Z.: Attribute-Based Signature Scheme with Constant Size Signature in the Standard Model. IET Information Security\u00a06(2), 1\u20138 (2012)","journal-title":"IET Information Security"},{"key":"24_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-642-27954-6_4","volume-title":"Topics in Cryptology \u2013 CT-RSA 2012","author":"J. Herranz","year":"2012","unstructured":"Herranz, J., Laguillaumie, F., Libert, B., R\u00e0fols, C.: Short Attribute-Based Signatures for Threshold Predicates. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol.\u00a07178, pp. 51\u201367. Springer, Heidelberg (2012)"},{"key":"24_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/978-3-642-36334-4_19","volume-title":"Pairing-Based Cryptography \u2013 Pairing 2012","author":"M. Gagn\u00e9","year":"2013","unstructured":"Gagn\u00e9, M., Narayan, S., Safavi-Naini, R.: Short Pairing-Efficient Threshold-Attribute-Based Signature. In: Abdalla, M., Lange, T. (eds.) Pairing 2012. LNCS, vol.\u00a07708, pp. 295\u2013313. Springer, Heidelberg (2013)"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Wei, J., Hu, X., Liu, W.: Traceable attribute-based signcryption. Security Comm. Networks, doi: 10.1002\/sec.940 (2013)","DOI":"10.1002\/sec.940"},{"key":"24_CR18","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1002\/sec.614","volume":"6","author":"Z. Guo","year":"2013","unstructured":"Guo, Z., Li, M., Fan, X.: Attribute-based ring signcryption scheme. Security Comm. Networks\u00a06, 790\u2013796 (2013), doi:10.1002\/sec.614","journal-title":"Security Comm. Networks"},{"key":"24_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-319-02726-5_25","volume-title":"Information and Communications Security","author":"Y.S. Rao","year":"2013","unstructured":"Rao, Y.S., Dutta, R.: Computationally Efficient Expressive Key-Policy Attribute Based Encryption Schemes with Constant-Size Ciphertext. In: Qing, S., Zhou, J., Liu, D. (eds.) ICICS 2013. LNCS, vol.\u00a08233, pp. 346\u2013362. Springer, Heidelberg (2013)"},{"key":"24_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-642-16280-0_17","volume-title":"Provable Security","author":"S.S.D. Selvi","year":"2010","unstructured":"Selvi, S.S.D., Sree Vivek, S., Pandu Rangan, C.: Identity Based Public Verifiable Signcryption Scheme. In: Heng, S.-H., Kurosawa, K. (eds.) ProvSec 2010. LNCS, vol.\u00a06402, pp. 244\u2013260. Springer, Heidelberg (2010)"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Ostrovksy, R., Sahai, A., Waters, B.: Attribute Based Encryption with Non-Monotonic Access Structures. In: ACM Conference on Computer and Communications Security, pp. 195\u2013203 (2007)","DOI":"10.1145\/1315245.1315270"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2014"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06734-6_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T21:33:51Z","timestamp":1558906431000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06734-6_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319067339","9783319067346"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06734-6_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}