{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:27:30Z","timestamp":1725888450357},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319594620"},{"type":"electronic","value":"9783319594637"}],"license":[{"start":{"date-parts":[[2017,5,28]],"date-time":"2017-05-28T00:00:00Z","timestamp":1495929600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-59463-7_34","type":"book-chapter","created":{"date-parts":[[2017,5,27]],"date-time":"2017-05-27T02:26:44Z","timestamp":1495852004000},"page":"340-348","source":"Crossref","is-referenced-by-count":0,"title":["A New Broadcast Encryption Scheme for Multi Sets"],"prefix":"10.1007","author":[{"given":"Liqun","family":"Lv","sequence":"first","affiliation":[]},{"given":"Xiaoyuan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,28]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Fiat, A., Naor, M.: Broadcast encryption. In: Proceedings of Advances in Cryptology - CRYPTO 1993, International Cryptology Conference, Santa Barbara, California, USA, 22\u201326 August 1993, pp. 480\u2013491 (1993)","DOI":"10.1007\/3-540-48329-2_40"},{"issue":"6","key":"34_CR2","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1007\/s11859-013-0963-3","volume":"18","author":"X Zou","year":"2013","unstructured":"Zou, X., Xiang, J.: Dynamic broadcast encryption scheme with revoking user. Wuhan Univ. J. Nat. Sci. 18(6), 499\u2013503 (2013)","journal-title":"Wuhan Univ. J. Nat. Sci."},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Fazio, N.: Public key broadcast encryption for stateless receivers. In: DRM 2002, vol. 2696, pp. 61\u201380 (2002)","DOI":"10.1007\/978-3-540-44993-5_5"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Fazio, N.: Public key trace and revoke scheme secure against adaptive chosen ciphertext attack. Lecture Notes in Computer Science, vol. 2567, pp. 100\u2013115 (2003)","DOI":"10.1007\/3-540-36288-6_8"},{"key":"34_CR5","doi-asserted-by":"crossref","unstructured":"Goodrich, M.T., Sun, J.Z., Tamassia, R.: Efficient tree-based revocation in groups of low-state devices. In: Advances in Cryptology - CRYPTO 2004, International Cryptology Conference, pp. 511\u2013527 (2004)","DOI":"10.1007\/978-3-540-28628-8_31"},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Halevy, D., Shamir, A.: The LSD broadcast encryption scheme. In: Advances in Cryptology - CRYPTO 2002, International Cryptology Conference, pp. 47\u201360 (2002)","DOI":"10.1007\/3-540-45708-9_4"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Dan, B., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: CRYPTO 2005, vol. 3621, pp. 258\u2013275 (2005)","DOI":"10.1007\/11535218_16"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Delerabl\u00e9e, C.: Identity-based broadcast encryption with constant size ciphertexts and private keys. In: Advances in Crypotology, International Conference on Theory and Application of Cryptology and Information Security, pp. 200\u2013215 (2007)","DOI":"10.1007\/978-3-540-76900-2_12"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Gentry, C., Waters, B.: Adaptive security in broadcast encryption systems (with Short Ciphertexts). In: Advances in Cryptology - EUROCRYPT 2009 (2009)","DOI":"10.1007\/978-3-642-01001-9_10"},{"key":"34_CR10","unstructured":"Dan, B., Waters, B., Zhandry, M.: Low overhead broadcast encryption from multilinear maps. In: Advances in Cryptology \u2013 CRYPTO 2014. Springer, Heidelberg (2014)"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Ren, Y., Wang, S., Zhang, X.: Non-interactive dynamic identity-based broadcast encryption without random oracles. In: Information and Communications Security. Springer, Heidelberg (2012)","DOI":"10.1007\/978-3-642-34129-8_47"},{"key":"34_CR12","unstructured":"Park, S., Lee, K., Dong, H.L.: New constructions of revocable identity-based encryption from multilinear maps. IEEE Trans. Inf. Forensics Secur. 10(8), 1\u20131(2015)"},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"Boneh, D., Waters, B.: A fully collusion resistant broadcast, trace, and revoke system. In: ACM Conference on Computer and Communications Security, pp. 211\u2013220 (2006)","DOI":"10.1145\/1180405.1180432"},{"issue":"3","key":"34_CR14","doi-asserted-by":"crossref","first-page":"64","DOI":"10.4018\/IJITWE.2015070105","volume":"10","author":"C Gu","year":"2015","unstructured":"Gu, C.: An improved multilinear map and its applications. Int. J. Inf. Technol. Web. Eng. 10(3), 64\u201381 (2015)","journal-title":"Int. J. Inf. Technol. Web. Eng."},{"key":"34_CR15","first-page":"1","volume":"8616","author":"B Dan","year":"2014","unstructured":"Dan, B., Zhandry, M.: Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. Algorithmica 8616, 1\u201353 (2014)","journal-title":"Algorithmica"},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Ohtake, G., Hanaoka, G., Ogawa, K.: Efficient broadcast encryption with personalized messages. In: International Conference on Provable Security, pp. 214\u2013228 (2010)","DOI":"10.1007\/978-3-642-16280-0_15"},{"issue":"12","key":"34_CR17","doi-asserted-by":"crossref","first-page":"e0143975","DOI":"10.1371\/journal.pone.0143975","volume":"10","author":"K Xu","year":"2015","unstructured":"Xu, K., Liao, Y., Qiao, L., Liu, Z., Yang, X.: An identity-based (IDB) broadcast encryption scheme with personalized messages (BEPM). PLoS ONE 10(12), e0143975 (2015)","journal-title":"PLoS ONE"},{"issue":"2","key":"34_CR18","doi-asserted-by":"crossref","first-page":"72","DOI":"10.4018\/IJTHI.2016040106","volume":"12","author":"Z Wei","year":"2016","unstructured":"Wei, Z.: A pairing-based homomorphic encryption scheme for multi-user settings. Int. J. Technol. Hum. Interact. (IJTHI) 12(2), 72\u201382 (2016)","journal-title":"Int. J. Technol. Hum. Interact. (IJTHI)"},{"issue":"1","key":"34_CR19","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1504\/IJGUC.2014.058246","volume":"5","author":"Y Chen","year":"2014","unstructured":"Chen, Y., Chen, X., Li, H.: More dcca-secure public-key encryptions from kem\u00a0+\u00a0dem style hybrid paradigms and some observations on the \u2018inner-outer\u2019 structure. Int. J. Grid Util. Comput. 5(1), 60\u201370 (2014)","journal-title":"Int. J. Grid Util. Comput."},{"issue":"2\/3","key":"34_CR20","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1504\/IJGUC.2013.056255","volume":"4","author":"S Li","year":"2013","unstructured":"Li, S., Zhang, F.: Leakage-resilient identity-based encryption scheme. Int. J. Grid Util. Comput. 4(2\/3), 187\u2013196 (2013)","journal-title":"Int. J. Grid Util. Comput."},{"issue":"3","key":"34_CR21","doi-asserted-by":"crossref","first-page":"82","DOI":"10.4018\/IJITWE.2015070106","volume":"10","author":"H Chen","year":"2015","unstructured":"Chen, H., Hu, Y., Lian, Z., Jia, H., Wang, X.A.: An additively homomorphic encryption over large message space. Int. J. Inf. Technol. Web. Eng. 10(3), 82\u2013102 (2015)","journal-title":"Int. J. Inf. Technol. Web. Eng."},{"key":"34_CR22","doi-asserted-by":"crossref","unstructured":"Ma, J., Zhang, Y., Wang, Z., Yu, K.: A message topic model for multi-grain SMS spam filtering. Int. J. Technol. Hum. Interact. (IJTHI) 12(2), 83\u201395 (2016)","DOI":"10.4018\/IJTHI.2016040107"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internetworking, Data &amp; Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59463-7_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T05:20:19Z","timestamp":1569388819000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59463-7_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,28]]},"ISBN":["9783319594620","9783319594637"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59463-7_34","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2017,5,28]]}}}