{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:53:12Z","timestamp":1742928792749,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":9,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789400758599"},{"type":"electronic","value":"9789400758605"}],"license":[{"start":{"date-parts":[[2012,12,11]],"date-time":"2012-12-11T00:00:00Z","timestamp":1355184000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,12,11]],"date-time":"2012-12-11T00:00:00Z","timestamp":1355184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-94-007-5860-5_24","type":"book-chapter","created":{"date-parts":[[2012,12,10]],"date-time":"2012-12-10T12:00:32Z","timestamp":1355140832000},"page":"205-213","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Attribute-Based Encryption for Commercial Content Distribution"],"prefix":"10.1007","author":[{"given":"Hyoseung","family":"Kim","sequence":"first","affiliation":[]},{"given":"Seunghwan","family":"Park","sequence":"additional","affiliation":[]},{"given":"Jong Hwan","family":"Park","sequence":"additional","affiliation":[]},{"given":"Dong Hoon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,12,11]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Boneh V, Boyen X (2004) Efficient selective-ID secure identity-based encryption without random oracles. In: Eurocrypt\u201904, Lecture notes in computer science, vol 3027, pp 223\u2013238","DOI":"10.1007\/978-3-540-24676-3_14"},{"issue":"3","key":"24_CR2","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D Boneh","year":"2003","unstructured":"Boneh D, Franklin M (2003) Identity-based encryption from the weil pairing. SIAM J Comput 32(3): 586\u2013615. Earlier version in Crypto\u201901, Lecture notes in computer science, vol 2139, pp 213\u2013229, 2001","journal-title":"SIAM J Comput"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypteddata. In: ACM CCS\u201906, pp 89\u201398","DOI":"10.1145\/1180405.1180418"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Lewko A, Sahai A, Waters B (2010) Revocation systems with very small private keys. In: IEEE symposium on security and privacy (S&P)","DOI":"10.1109\/SP.2010.23"},{"key":"24_CR5","unstructured":"OMA: DRM Specification-OMA-TS-DRM_DRM-V2_1-20081106-A (2008). http:\/\/www.openmobilealliance.org\/Technical\/release_program\/drm_v2_1.aspx"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: ACMCCS\u201907, pp 195\u2013203","DOI":"10.1145\/1315245.1315270"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Eurocrypt\u201905, Lecture notes in computer science, vol 3494, pp 457\u2013473","DOI":"10.1007\/11426639_27"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Okamoto T, Takashima K (2010) Fully secure functional encryption with general relations from the decisional linear assumption. In: CRYPTO\u201910, Lecture notes in computer science, vol 6223, pp 191\u2013208","DOI":"10.1007\/978-3-642-14623-7_11"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Zhou Z, Huang D (2010) On efficient ciphertext-policy attribute based encryption and broadcast encryption. In: ACM CCS\u201910","DOI":"10.1145\/1866307.1866420"}],"container-title":["Lecture Notes in Electrical Engineering","IT Convergence and Security 2012"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-007-5860-5_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T08:11:40Z","timestamp":1676794300000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-007-5860-5_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12,11]]},"ISBN":["9789400758599","9789400758605"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-94-007-5860-5_24","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2012,12,11]]},"assertion":[{"value":"11 December 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}