{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:36:01Z","timestamp":1725870961777},"publisher-location":"Cham","reference-count":47,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491745"},{"type":"electronic","value":"9783319491752"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49175-2_11","type":"book-chapter","created":{"date-parts":[[2016,11,9]],"date-time":"2016-11-09T06:59:42Z","timestamp":1478674782000},"page":"213-237","source":"Crossref","is-referenced-by-count":1,"title":["Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness"],"prefix":"10.1007","author":[{"given":"Yohei","family":"Watanabe","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Goichiro","family":"Hanaoka","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Junji","family":"Shikata","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,11,10]]},"reference":[{"issue":"1","key":"11_CR1","doi-asserted-by":"crossref","first-page":"12:1","DOI":"10.1145\/1952982.1952994","volume":"14","author":"G Ateniese","year":"2011","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., Peterson, Z., Song, D.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14(1), 12:1\u201312:34 (2011)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"doi-asserted-by":"crossref","unstructured":"Ateniese, G., De Santis, A., Ferrara, A.L., Masucci, B.: Provably-secure time-bound hierarchical key assignment schemes. In: The 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 288\u2013297. ACM, New York (2006)","key":"11_CR2","DOI":"10.1145\/1180405.1180441"},{"issue":"2","key":"11_CR3","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/s00145-010-9094-6","volume":"25","author":"G Ateniese","year":"2012","unstructured":"Ateniese, G., De Santis, A., Ferrara, A.L., Masucci, B.: Provably-secure time-bound hierarchical key assignment schemes. J. Cryptol. 25(2), 243\u2013270 (2012)","journal-title":"J. Cryptol."},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-10868-6_17","volume-title":"Cryptography and Coding","author":"N Attrapadung","year":"2009","unstructured":"Attrapadung, N., Imai, H.: Attribute-based encryption supporting direct\/indirect revocation modes. In: Parker, M.G. (ed.) IMACC 2009. LNCS, vol. 5921, pp. 278\u2013300. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-10868-6_17"},{"issue":"99","key":"11_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/MC.2013.333","volume":"PP","author":"E Ayday","year":"2013","unstructured":"Ayday, E., De Cristofaro, E., Hubaux, J., Tsudik, G.: The chills and thrills of whole genome sequencing. Computer PP(99), 1 (2013)","journal-title":"Computer"},{"issue":"2","key":"11_CR6","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MC.2015.59","volume":"48","author":"E Ayday","year":"2015","unstructured":"Ayday, E., De Cristofaro, E., Hubaux, J.P., Tsudik, G.: Whole genome sequencing: revolutionary medicine or privacy nightmare? Computer 48(2), 58\u201366 (2015)","journal-title":"Computer"},{"doi-asserted-by":"crossref","unstructured":"Barker, E., Barker, W., Burr, W., Polk, W., Smid, M.: Recommendation for key management - part 1: General (revision 3). NIST Special Publication 800-57, July 2012","key":"11_CR7","DOI":"10.6028\/NIST.SP.800-57p1r3"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/3-540-46416-6_50","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 91","author":"S Berkovits","year":"1991","unstructured":"Berkovits, S.: How to broadcast a secret. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 535\u2013541. Springer, Heidelberg (1991). doi: 10.1007\/3-540-46416-6_50"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/3-540-39757-4_22","volume-title":"Advances in Cryptology","author":"R Blom","year":"1985","unstructured":"Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335\u2013338. Springer, Heidelberg (1985). doi: 10.1007\/3-540-39757-4_22"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/3-540-48329-2_10","volume-title":"Advances in Cryptology \u2014 CRYPTO 93","author":"C Blundo","year":"1994","unstructured":"Blundo, C., Cresti, A., Santis, A., Vaccaro, U.: Fully dynamic secret sharing schemes. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 110\u2013125. Springer, Heidelberg (1994). doi: 10.1007\/3-540-48329-2_10"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/BFb0053444","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201994","author":"C Blundo","year":"1995","unstructured":"Blundo, C., Cresti, A.: Space requirements for broadcast encryption. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 287\u2013298. Springer, Heidelberg (1995). doi: 10.1007\/BFb0053444"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/3-540-68697-5_29","volume-title":"Advances in Cryptology \u2014 CRYPTO 96","author":"C Blundo","year":"1996","unstructured":"Blundo, C., Mattos, L.A.F., Stinson, D.R.: Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 387\u2013400. Springer, Heidelberg (1996). doi: 10.1007\/3-540-68697-5_29"},{"doi-asserted-by":"crossref","unstructured":"Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encryption with efficient revocation. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS 2008, pp. 417\u2013426. ACM, New York (2008)","key":"11_CR13","DOI":"10.1145\/1455770.1455823"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/11535218_16","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"D Boneh","year":"2005","unstructured":"Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258\u2013275. Springer, Heidelberg (2005). doi: 10.1007\/11535218_16"},{"key":"11_CR15","first-page":"1","volume":"3","author":"R Canetti","year":"1997","unstructured":"Canetti, R., Gennaro, R., Herzberg, A.: Proactive security: long-term protection against break-ins. CryptoBytes 3, 1\u20138 (1997)","journal-title":"CryptoBytes"},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-642-10868-6_16","volume-title":"Cryptography and Coding","author":"H Chen","year":"2009","unstructured":"Chen, H., Ling, S., Padr\u00f3, C., Wang, H., Xing, C.: Key predistribution schemes and one-time broadcast encryption schemes from algebraic geometry codes. In: Parker, M.G. (ed.) IMACC 2009. LNCS, vol. 5921, pp. 263\u2013277. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-10868-6_16"},{"key":"11_CR17","volume-title":"Elements of Information Theory","author":"TM Cover","year":"2006","unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory, 2nd edn. Wiley-Interscience, Hoboken (2006)","edition":"2"},{"key":"11_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/978-3-540-78967-3_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"R Cramer","year":"2008","unstructured":"Cramer, R., Dodis, Y., Fehr, S., Padr\u00f3, C., Wichs, D.: Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors. In: Smart, N. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 471\u2013488. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-78967-3_27"},{"key":"11_CR19","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511921889","volume-title":"Information Theory: Coding Theorems for Discrete Memoryless Systems","author":"I Csisz\u00e1r","year":"2011","unstructured":"Csisz\u00e1r, I., Koerner, J.: Information Theory: Coding Theorems for Discrete Memoryless Systems, 2nd edn. Cambridge University Press, Cambridge (2011)","edition":"2"},{"key":"11_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-540-44993-5_5","volume-title":"Digital Rights Management","author":"Y Dodis","year":"2003","unstructured":"Dodis, Y., Fazio, N.: Public key broadcast encryption for stateless receivers. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 61\u201380. Springer, Heidelberg (2003). doi: 10.1007\/978-3-540-44993-5_5"},{"key":"11_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/3-540-48329-2_40","volume-title":"Advances in Cryptology \u2014 CRYPTO 93","author":"A Fiat","year":"1994","unstructured":"Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480\u2013491. Springer, Heidelberg (1994). doi: 10.1007\/3-540-48329-2_40"},{"key":"11_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-01001-9_10","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"C Gentry","year":"2009","unstructured":"Gentry, C., Waters, B.: Adaptive security in broadcast encryption systems (with Short Ciphertexts). In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 171\u2013188. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-01001-9_10"},{"doi-asserted-by":"crossref","unstructured":"Halevi, S., Harnik, D., Pinkas, B., Shulman-Peleg, A.: Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, pp. 491\u2013500. ACM, New York (2011)","key":"11_CR23","DOI":"10.1145\/2046707.2046765"},{"key":"11_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/3-540-44750-4_27","volume-title":"Advances in Cryptology \u2014 CRYPT0 95","author":"A Herzberg","year":"1995","unstructured":"Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or: how to cope with perpetual leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 339\u2013352. Springer, Heidelberg (1995). doi: 10.1007\/3-540-44750-4_27"},{"key":"11_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/978-3-642-14992-4_13","volume-title":"Financial Cryptography and Data Security","author":"S Kamara","year":"2010","unstructured":"Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Seb\u00e9, F. (eds.) FC 2010. LNCS, vol. 6054, pp. 136\u2013149. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-14992-4_13"},{"key":"11_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/3-540-49649-1_33","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 98","author":"K Kurosawa","year":"1998","unstructured":"Kurosawa, K., Yoshida, T., Desmedt, Y., Burmester, M.: Some bounds and a construction for secure broadcast encryption. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 420\u2013433. Springer, Heidelberg (1998). doi: 10.1007\/3-540-49649-1_33"},{"key":"11_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-319-02726-5_6","volume-title":"Information and Communications Security","author":"J Liu","year":"2013","unstructured":"Liu, J., Wang, H., Xian, M., Huang, K.: A secure and efficient scheme for cloud storage against eavesdropper. In: Qing, S., Zhou, J., Liu, D. (eds.) ICICS 2013. LNCS, vol. 8233, pp. 75\u201389. Springer, Heidelberg (2013). doi: 10.1007\/978-3-319-02726-5_6"},{"key":"11_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-319-08344-5_8","volume-title":"Information Security and Privacy","author":"Z Liu","year":"2014","unstructured":"Liu, Z., Li, J., Chen, X., Yang, J., Jia, C.: TMDS: thin-model data sharing scheme supporting keyword search in cloud storage. In: Susilo, W., Mu, Y. (eds.) ACISP 2014. LNCS, vol. 8544, pp. 115\u2013130. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-08344-5_8"},{"key":"11_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1007\/BFb0054150","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201998","author":"M Luby","year":"1998","unstructured":"Luby, M., Staddon, J.: Combinatorial bounds for broadcast encryption. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 512\u2013526. Springer, Heidelberg (1998). doi: 10.1007\/BFb0054150"},{"key":"11_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/3-540-48184-2_14","volume-title":"Advances in Cryptology \u2014 CRYPTO 87","author":"T Matsumoto","year":"1988","unstructured":"Matsumoto, T., Imai, H.: On the key predistribution system: a practical solution to the key distribution problem. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 185\u2013193. Springer, Heidelberg (1988). doi: 10.1007\/3-540-48184-2_14"},{"key":"11_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-44647-8_3","volume-title":"Advances in Cryptology \u2014 CRYPTO 2001","author":"D Naor","year":"2001","unstructured":"Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41\u201362. Springer, Heidelberg (2001). doi: 10.1007\/3-540-44647-8_3"},{"key":"11_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/978-3-540-30564-4_22","volume-title":"Selected Areas in Cryptography","author":"V Nikov","year":"2004","unstructured":"Nikov, V., Nikova, S.: On proactive secret sharing schemes. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 308\u2013325. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-30564-4_22"},{"issue":"1\u20133","key":"11_CR33","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.dam.2004.02.015","volume":"143","author":"C Padr\u00f3","year":"2004","unstructured":"Padr\u00f3, C., Gracia, I., Mart\u00edn, S.: Improving the trade-off between storage and communication in broadcast encryption schemes. Discret. Appl. Math. 143(1\u20133), 213\u2013220 (2004)","journal-title":"Discret. Appl. Math."},{"issue":"1","key":"11_CR34","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1016\/S0166-218X(02)00447-X","volume":"128","author":"C Padr\u00f3","year":"2003","unstructured":"Padr\u00f3, C., Gracia, I., Mart\u00edn, S., Morillo, P.: Linear broadcast encryption schemes. Discret. Appl. Math. 128(1), 223\u2013238 (2003)","journal-title":"Discret. Appl. Math."},{"key":"11_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/978-3-642-21554-4_22","volume-title":"Applied Cryptography and Network Security","author":"DH Phan","year":"2011","unstructured":"Phan, D.H., Pointcheval, D., Strefler, M.: Security notions for broadcast encryption. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 377\u2013394. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-21554-4_22"},{"key":"11_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-642-32009-5_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"A Sahai","year":"2012","unstructured":"Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 199\u2013217. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-32009-5_13"},{"key":"11_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005). doi: 10.1007\/11426639_27"},{"issue":"2","key":"11_CR38","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1016\/j.dam.2005.03.025","volume":"154","author":"AD Santis","year":"2006","unstructured":"Santis, A.D., Ferrara, A.L., Masucci, B.: Unconditionally secure key assignment schemes. Discret. Appl. Math. 154(2), 234\u2013252 (2006)","journal-title":"Discret. Appl. Math."},{"issue":"3","key":"11_CR39","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1007\/s00145-012-9129-2","volume":"26","author":"H Shacham","year":"2013","unstructured":"Shacham, H., Waters, B.: Compact proofs of retrievability. J. Cryptol. 26(3), 442\u2013483 (2013)","journal-title":"J. Cryptol."},{"doi-asserted-by":"crossref","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27, 379\u2013423, 623\u2013656 (1948). http:\/\/cm.bell-labs.com\/cm\/ms\/what\/shannonday\/shannon1948.pdf","key":"11_CR40","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"11_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-662-45472-5_8","volume-title":"Financial Cryptography and Data Security","author":"J Stanek","year":"2014","unstructured":"Stanek, J., Sorniotti, A., Androulaki, E., Kencl, L.: A secure data deduplication scheme for cloud storage. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 99\u2013118. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-45472-5_8"},{"issue":"3","key":"11_CR42","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1023\/A:1008268610932","volume":"12","author":"D Stinson","year":"1997","unstructured":"Stinson, D.: On some methods for unconditionally secure key distribution and broadcast encryption. Des. Codes Crypt. 12(3), 215\u2013243 (1997)","journal-title":"Des. Codes Crypt."},{"key":"11_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/3-540-46513-8_15","volume-title":"Selected Areas in Cryptography","author":"DR Stinson","year":"2000","unstructured":"Stinson, D.R., Wei, R.: Unconditionally secure proactive secret sharing scheme with combinatorial structures. In: Heys, H., Adams, C. (eds.) SAC 1999. LNCS, vol. 1758, pp. 200\u2013214. Springer, Heidelberg (2000). doi: 10.1007\/3-540-46513-8_15"},{"unstructured":"The Presidential Commission for the Study of Bioethical Issues: Privacy and progress in whole genome sequencing. President\u2019s Bioethics Commission Releases Report on Genomics and Privacy, October 2012","key":"11_CR44"},{"unstructured":"Watanabe, Y., Hanaoka, G., Shikata, J.: Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness. Cryptology ePrint Archive, Report 2016\/064 (2016). http:\/\/eprint.iacr.org\/","key":"11_CR45"},{"key":"11_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/978-3-319-26059-4_27","volume-title":"Provable Security","author":"Y Watanabe","year":"2015","unstructured":"Watanabe, Y., Shikata, J.: Constructions of unconditionally secure broadcast encryption from key predistribution systems with trade-offs between communication and storage. In: Au, M.-H., Miyaji, A. (eds.) ProvSec 2015. LNCS, vol. 9451, pp. 489\u2013502. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-26059-4_27"},{"doi-asserted-by":"crossref","unstructured":"Yang, K., Jia, X., Ren, K.: Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 2013, pp. 523\u2013528. ACM, New York (2013)","key":"11_CR47","DOI":"10.1145\/2484313.2484383"}],"container-title":["Lecture Notes in Computer Science","Information Theoretic Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49175-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T07:50:41Z","timestamp":1568533841000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49175-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491745","9783319491752"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49175-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}