{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:05:22Z","timestamp":1725869122789},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491080"},{"type":"electronic","value":"9783319491097"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49109-7_11","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T05:03:15Z","timestamp":1477026195000},"page":"115-122","source":"Crossref","is-referenced-by-count":1,"title":["Ciphertext-Policy Attribute Based Encryption with Large Attribute Universe"],"prefix":"10.1007","author":[{"given":"Siyu","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Aijun","family":"Ge","sequence":"additional","affiliation":[]},{"given":"Fushan","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Chuangui","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Sahai A. and Waters B.: Fuzzy identity based encryption. In: Proc. Advances in Cryptology-Eurocrypt, pp. 457-473(2005)","DOI":"10.1007\/11426639_27"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Chen C., Zhang Z., and Feng D.: Efficient ciphertext-policy attribute-based encryption with constant-size ciphertext and constant computation-cost. In: Proc. ProveSec\u201911, pp. 84-101(2011)","DOI":"10.1007\/978-3-642-24316-5_8"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Goyal V., Pandey O., Sahai A. andWaters B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proc. CCS\u201906, pp. 89-98(2006)","DOI":"10.1145\/1180405.1180418"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Ostrovsky R., Sahai A. and Waters B.: Attribute-based encryption with nonmonotonic access structures. In: Proc. ACM Conference on Computer and Communication Security, pp. 195-203(2007)","DOI":"10.1145\/1315245.1315270"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Bethencourt J., Sahai A. and Waters B.: Ciphertext-policy attribute-based encryption. In: Proc. IEEE Symposium on Security and Privacy, pp. 321-334(2007)","DOI":"10.1109\/SP.2007.11"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Cheung L. and Newport C.: Provably secure ciphertext policy abe. In: Proc. ACM Conference on Computer and Communication Security, pp. 456-465(2007)","DOI":"10.1145\/1315245.1315302"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Emura K., Miyaji A., Nomura A., et al.: A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: Proc. ISPEC\u201909, pp. 13-23(2009)","DOI":"10.1007\/978-3-642-00843-6_2"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Zhou Z., and Huang D.: On efficient ciphertext-policy attribute-based encryption and broadcast encryption. In: Proc. CCS\u201910, pp. 753-755(2010)","DOI":"10.1145\/1866307.1866420"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Ge A., Zhang R., Chen C., Ma C.and Zhang,Z.: Threshold ciphertext-policy attribute-based encryption with constant-size ciphertexts. In: Proc. ACISP\u201912, pp. 336-349(2012)","DOI":"10.1007\/978-3-642-31448-3_25"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Chen C., Chen J., Lim H., et al.: Fully secure attribute-based systems with short ciphertexts\/signatures and threshold access structures. In: Proc. CT-RSA\u201913, pp. 50-67(2013)","DOI":"10.1007\/978-3-642-36095-4_4"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Guo F., Mu Y., Susilo W., Wong D.and Varadharajan,V.: CP-ABE with constant-size keys for lightweight devices. In: IEEE Trans. Inf. Forensics Security, vol.9, no.5, pp. 763-771(2014)","DOI":"10.1109\/TIFS.2014.2309858"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49109-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T17:59:53Z","timestamp":1568483993000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49109-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491080","9783319491097"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49109-7_11","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}