{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:56:40Z","timestamp":1725868600834},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491080"},{"type":"electronic","value":"9783319491097"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49109-7_27","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T05:03:15Z","timestamp":1477026195000},"page":"281-291","source":"Crossref","is-referenced-by-count":0,"title":["Toward Construction of Encryption with Decryption Awareness Ability for Cloud Storage"],"prefix":"10.1007","author":[{"given":"Xu An","family":"Wang","sequence":"first","affiliation":[]},{"given":"Fatos","family":"Xhafa","sequence":"additional","affiliation":[]},{"given":"GuangMing","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Barak B, Goldreich O, Impagliazzo R, Rudich S, Sahai A, Vadhan SP, Yang K (2001) On the (im)possibility of obfuscating programs. In: Kilian J (ed) CRYPTO 2001, Springer, Berlin, Germany, Santa Barbara, CA, USA, LNCS, vol 2139, pp 1\u201318","DOI":"10.1007\/3-540-44647-8_1"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Boneh D, Franklin MK (2001) Identity-based encryption from the Weil pairing. In: Kilian J (ed) CRYPTO 2001, Springer, Berlin, Germany, Santa Barbara, CA, USA, LNCS, vol 2139, pp 213\u2013229","DOI":"10.1007\/3-540-44647-8_13"},{"key":"27_CR3","doi-asserted-by":"publisher","unstructured":"Boneh D, ZhandryM(2014) Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. In: Garay JA, Gennaro R (eds) CRYPTO 2014, Part I, Springer, Berlin, Germany, Santa Barbara, CA, USA, LNCS, vol 8616, pp 480\u2013499, DOI 10.1007\/978-3-662-44371-2_27","DOI":"10.1007\/978-3-662-44371-2_27"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Brakerski Z, Vaikuntanathan V (2011) Efficient fully homomorphic encryption from (standard) LWE. In: Ostrovsky R (ed) 52nd FOCS, IEEE Computer Society Press, Palm Springs, California, USA, pp 97\u2013106","DOI":"10.1109\/FOCS.2011.12"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Brakerski Z, Gentry C, Vaikuntanathan V (2012) (leveled) fully homomorphic encryption without bootstrapping. Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, pages 309\u2013325","DOI":"10.1145\/2090236.2090262"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Chase M, Chow SSM (2009) Improving privacy and security in multi-authority attribute-based encryption. In: Al-Shaer E, Jha S, Keromytis AD (eds) ACM CCS 09, ACM Press, Chicago, Illinois, USA, pp 121\u2013130","DOI":"10.1145\/1653662.1653678"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Transactions on Information Theory 22(6):644\u2013654","DOI":"10.1109\/TIT.1976.1055638"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Garg S, Gentry C, Halevi S, Raykova M, Sahai A, Waters B (2013) Candidate indistinguishability obfuscation and functional encryption for all circuits. In: 54th FOCS, IEEE Computer Society Press, Berkeley, CA, USA, pp 40\u201349","DOI":"10.1109\/FOCS.2013.13"},{"key":"27_CR9","doi-asserted-by":"publisher","unstructured":"Garg S, Gentry C, Halevi S, Sahai A, Waters B (2013) Attribute-based encryption for circuits from multilinear maps. In: Canetti R, Garay JA (eds) CRYPTO 2013, Part II, Springer, Berlin, Germany, Santa Barbara, CA, USA, LNCS, vol 8043, pp 479\u2013499, DOI 10.1007\/978-3-642-40084-1_27","DOI":"10.1007\/978-3-642-40084-1_27"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Gentry C, Halevi S, Smart NP (2012) Fully homomorphic encryption with polylog overhead. In: Pointcheval D, Johansson T (eds) EUROCRYPT 2012, Springer, Berlin, Germany, Cambridge, UK, LNCS, vol 7237, pp 465\u2013482","DOI":"10.1007\/978-3-642-29011-4_28"},{"key":"27_CR11","doi-asserted-by":"publisher","unstructured":"Gentry C, Sahai A, Waters B (2013) Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based. In: Canetti R, Garay JA (eds) CRYPTO 2013, Part I, Springer, Berlin, Germany, Santa Barbara, CA, USA, LNCS, vol 8042, pp 75\u201392, DOI 10.1007\/978-3-642-40041-4_5","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Goldwasser S, Kalai YT (2005) On the impossibility of obfuscation with auxiliary input. In: 46th FOCS, IEEE Computer Society Press, Pittsburgh, PA, USA, pp 553\u2013562","DOI":"10.1109\/SFCS.2005.60"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Goldwasser S, Rothblum GN (2007) On best-possible obfuscation. In: Vadhan SP (ed) TCC 2007, Springer, Berlin, Germany, Amsterdam, The Netherlands, LNCS, vol 4392, pp 194\u2013213","DOI":"10.1007\/978-3-540-70936-7_11"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Gorbunov S, Vaikuntanathan V, Wee H (2013) Attribute-based encryption for circuits. In: Boneh D, Roughgarden T, Feigenbaum J (eds) 45th ACM STOC, ACM Press, Palo Alto, CA, USA, pp 545\u2013554","DOI":"10.1145\/2488608.2488677"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Juels A, Wright RN, Vimercati S (eds) ACM CCS 06, ACM Press, Alexandria, Virginia, USA, pp 89\u201398, available as Cryptology ePrint Archive Report 2006\/309","DOI":"10.1145\/1180405.1180418"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Hada S (2000) Zero-knowledge and code obfuscation. In: Okamoto T (ed) ASIACRYPT 2000, Springer, Berlin, Germany, Kyoto, Japan, LNCS, vol 1976, pp 443\u2013457","DOI":"10.1007\/3-540-44448-3_34"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Halevi S, Shoup V (2014) Algorithms in HElib. Cryptology ePrint Archive, Report 2014\/106, http:\/\/eprint.iacr.org\/2014\/106","DOI":"10.1007\/978-3-662-44371-2_31"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Lewko AB,Waters B (2011) Decentralizing attribute-based encryption. In: Paterson KG (ed) EUROCRYPT 2011, Springer, Berlin, Germany, Tallinn, Estonia, LNCS, vol 6632, pp 568\u2013588","DOI":"10.1007\/978-3-642-20465-4_31"},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Lewko AB, Waters B (2012) New proof methods for attribute-based encryption: Achieving full security through selective techniques. In: Safavi-Naini R, Canetti R (eds) CRYPTO 2012, Springer, Berlin, Germany, Santa Barbara, CA, USA, LNCS, vol 7417, pp 180\u2013198","DOI":"10.1007\/978-3-642-32009-5_12"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Lewko AB, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert H (ed) EUROCRYPT 2010, Springer, Berlin, Germany, French Riviera, LNCS, vol 6110, pp 62\u201391","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Okamoto T, Takashima K (2010) Fully secure functional encryption with general relations from the decisional linear assumption. In: Rabin T (ed) CRYPTO 2010, Springer, Berlin, Germany, Santa Barbara, CA, USA, LNCS, vol 6223, pp 191\u2013208","DOI":"10.1007\/978-3-642-14623-7_11"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Rivest RL, Shamir A, Adleman LM (1978) A method for obtaining digital signature and public-key cryptosystems. Communications of the Association for Computing Machinery 21(2):120\u2013126","DOI":"10.1145\/359340.359342"},{"key":"27_CR23","doi-asserted-by":"crossref","unstructured":"Sahai A, Waters B (2014) How to use indistinguishability obfuscation: deniable encryption, and more. In: Shmoys DB (ed) 46th ACMSTOC, ACMPress, New York, NY, USA, pp 475\u2013484","DOI":"10.1145\/2591796.2591825"},{"key":"27_CR24","doi-asserted-by":"crossref","unstructured":"Sahai A,Waters BR (2005) Fuzzy identity-based encryption. In: Cramer R (ed) EUROCRYPT 2005, Springer, Berlin, Germany, Aarhus, Denmark, LNCS, vol 3494, pp 457\u2013473","DOI":"10.1007\/11426639_27"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49109-7_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T21:47:08Z","timestamp":1498340828000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49109-7_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491080","9783319491097"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49109-7_27","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}