{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T19:41:57Z","timestamp":1769197317461,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642044731","type":"print"},{"value":"9783642044748","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04474-8_28","type":"book-chapter","created":{"date-parts":[[2009,9,3]],"date-time":"2009-09-03T11:25:17Z","timestamp":1251977117000},"page":"347-362","source":"Crossref","is-referenced-by-count":119,"title":["Privacy-Aware Attribute-Based Encryption with User Accountability"],"prefix":"10.1007","author":[{"given":"Jin","family":"Li","sequence":"first","affiliation":[]},{"given":"Kui","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Zhiguo","family":"Wan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A. Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 457\u2013473. Springer, Heidelberg (2005)"},{"key":"28_CR2","unstructured":"Kapadia, A., Tsang, P.P., Smith, S.W.: Attribute-based publishing with hidden credentials and hidden policies. In: NDSS, pp. 179\u2013192 (2007)"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Yu, S., Ren, K., Lou, W.: Attribute-based content distribution with hidden policy. In: NPSEC 2008, pp. 39\u201344 (2008)","DOI":"10.1109\/NPSEC.2008.4664879"},{"key":"28_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-540-68914-0_7","volume-title":"Applied Cryptography and Network Security","author":"T. Nishide","year":"2008","unstructured":"Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol.\u00a05037, pp. 111\u2013129. Springer, Heidelberg (2008)"},{"key":"28_CR5","first-page":"89","volume-title":"CCS 2006","author":"V. Goyal","year":"2006","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: CCS 2006, pp. 89\u201398. ACM, New York (2006)"},{"key":"28_CR6","first-page":"195","volume-title":"CCS 2007","author":"R. Ostrovsky","year":"2007","unstructured":"Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: CCS 2007, pp. 195\u2013203. ACM, New York (2007)"},{"key":"28_CR7","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1109\/SP.2007.11","volume-title":"IEEE Symposium on Security and Privacy 2007","author":"J. Bethencourt","year":"2007","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy 2007, pp. 321\u2013334. IEEE, Los Alamitos (2007)"},{"key":"28_CR8","first-page":"456","volume-title":"CCS 2007","author":"L. Cheung","year":"2007","unstructured":"Cheung, L., Newport, C.: Provably secure ciphertext policy abe. In: CCS 2007, pp. 456\u2013465. ACM, New York (2007)"},{"key":"28_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1007\/978-3-540-70583-3_47","volume-title":"Automata, Languages and Programming","author":"V. Goyal","year":"2008","unstructured":"Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: Aceto, L., Damg\u00e5rd, I., Goldberg, L.A., Halld\u00f3rsson, M.M., Ing\u00f3lfsd\u00f3ttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol.\u00a05126, pp. 579\u2013591. Springer, Heidelberg (2008)"},{"key":"28_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-3-540-70936-7_29","volume-title":"Theory of Cryptography","author":"D. Boneh","year":"2007","unstructured":"Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol.\u00a04392, pp. 535\u2013554. Springer, Heidelberg (2007)"},{"key":"28_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-540-78967-3_9","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"J. Katz","year":"2008","unstructured":"Katz, J., Sahai, A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol.\u00a04965, pp. 146\u2013162. Springer, Heidelberg (2008)"},{"key":"28_CR12","unstructured":"Li, J., Ren, K., Kim, K.: a2be: Accountable attribute-based encryption for abuse free access control, http:\/\/eprint.iacr.org\/2009\/118"},{"key":"28_CR13","unstructured":"Hinek, M.J., Jiang, S., Safavi-Naini, R., Shahandashti, S.F.: Attribute-based encryption with key cloning protection, http:\/\/eprint.iacr.org\/2008\/478"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Yu, S., Ren, K., Lou, W., Li, J.: Defending against key abuse attacks in kp-abe enabled broadcast systems. Accepted by SECURECOMM 2009 (to appear, 2009), http:\/\/eprint.iacr.org\/2009\/295","DOI":"10.1007\/978-3-642-05284-2_18"},{"key":"28_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/11787006_26","volume-title":"Automata, Languages and Programming","author":"M. Abdalla","year":"2006","unstructured":"Abdalla, M., Catalano, D., Alexander, W., Dent, J.M.L., Neven, G., Smart, N.P.: Identity-based encryption gone wild. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.\u00a04052, pp. 300\u2013311. Springer, Heidelberg (2006)"},{"key":"28_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-540-24676-3_14","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 223\u2013238. Springer, Heidelberg (2004)"},{"key":"28_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-540-28628-8_3","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 41\u201355. Springer, Heidelberg (2004)"},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Li, J., Ren, K., Zhu, B., Wan, Z.: Privacy-aware attribute-based encryption with user accountability, Full version, http:\/\/eprint.iacr.org\/2009\/284","DOI":"10.1007\/978-3-642-04474-8_28"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Sahai, A.: Non-malleable non-interactive zero knowledge and adaptive chosen ciphertext security. In: IEEE Symp. on Foundations of Computer Science (1999)","DOI":"10.1109\/SFFCS.1999.814628"},{"key":"28_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"E. Fujisaki","year":"1999","unstructured":"Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 537\u2013554. Springer, Heidelberg (1999)"},{"key":"28_CR21","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-48658-5_25","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"B. Chor","year":"1994","unstructured":"Chor, B., Fiat, A., Naor, M.: Tracing traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994, vol.\u00a0839, pp. 257\u2013270. Springer, Heidelberg (1994)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04474-8_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T23:41:34Z","timestamp":1739317294000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04474-8_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044731","9783642044748"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04474-8_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}