{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T13:31:17Z","timestamp":1772199077338,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":38,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819529605","type":"print"},{"value":"9789819529612","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-2961-2_4","type":"book-chapter","created":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T14:02:14Z","timestamp":1760364134000},"page":"65-87","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Registered Attribute-Based Signature with\u00a0Attribute Privacy"],"prefix":"10.1007","author":[{"given":"Liuyu","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xinxuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Xudong","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Zhuo","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Zhongliang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,10]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","unstructured":"Albrecht, M.R., G\u00fcr, K.D.: Verifiable oblivious pseudorandom functions from lattices: Practical-ish and thresholdisable. In: Chung, K.M., Sasaki, Y. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02024, Part\u00a0IV. Lecture Notes in Computer Science, vol. 15487, pp. 205\u2013237. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-96-0894-2_7","DOI":"10.1007\/978-981-96-0894-2_7"},{"key":"4_CR2","doi-asserted-by":"publisher","unstructured":"Attrapadung, N., Hanaoka, G., Yamada, S.: Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs. In: Iwata, T., Cheon, J.H. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02015, Part\u00a0I. Lecture Notes in Computer Science, vol.\u00a09452, pp. 575\u2013601. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48797-6_24","DOI":"10.1007\/978-3-662-48797-6_24"},{"key":"4_CR3","doi-asserted-by":"publisher","unstructured":"Attrapadung, N., Tomida, J.: A modular approach to registered ABE for unbounded predicates. In: Reyzin, L., Stebila, D. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02024, Part\u00a0III. Lecture Notes in Computer Science, vol. 14922, pp. 280\u2013316. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-68382-4_9","DOI":"10.1007\/978-3-031-68382-4_9"},{"key":"4_CR4","unstructured":"Benarroch, D., Campanelli, M., Fiore, D., Kim, J., Lee, J., Oh, H., Querol, A.: Proposal: commit-and-prove zero-knowledge proof systems and extensions. In: 4th ZKProof Workshop (2021)"},{"key":"4_CR5","doi-asserted-by":"publisher","unstructured":"Chen, C., et al.: Fully secure attribute-based systems with short ciphertexts\/signatures and threshold access structures. In: Dawson, E. (ed.) Topics in Cryptology \u2013 CT-RSA\u00a02013. Lecture Notes in Computer Science, vol.\u00a07779, pp. 50\u201367. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36095-4_4","DOI":"10.1007\/978-3-642-36095-4_4"},{"key":"4_CR6","doi-asserted-by":"publisher","unstructured":"Cong, K., Eldefrawy, K., Smart, N.P.: Optimizing registration based encryption. In: Paterson, M.B. (ed.) 18th IMA International Conference on Cryptography and Coding. Lecture Notes in Computer Science, vol. 13129, pp. 129\u2013157. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92641-0_7","DOI":"10.1007\/978-3-030-92641-0_7"},{"issue":"5","key":"4_CR7","doi-asserted-by":"publisher","first-page":"1845","DOI":"10.1007\/s10623-022-01163-8","volume":"91","author":"P Datta","year":"2023","unstructured":"Datta, P., Dutta, R., Mukhopadhyay, S.: Short attribute-based signatures for arbitrary turing machines from standard assumptions. Des. Codes Crypt. 91(5), 1845\u20131872 (2023). https:\/\/doi.org\/10.1007\/s10623-022-01163-8","journal-title":"Des. Codes Crypt."},{"key":"4_CR8","unstructured":"Datta, P., Pal, T., Yamada, S.: Registered FE beyond predicates: (attribute-based) linear functions and more. Cryptology ePrint Archive, Report 2023\/457 (2023). https:\/\/eprint.iacr.org\/2023\/457"},{"key":"4_CR9","doi-asserted-by":"publisher","unstructured":"El Kaafarani, A., Chen, L., Ghadafi, E., Davenport, J.H.: Attribute-based signatures with user-controlled linkability. In: Gritzalis, D., Kiayias, A., Askoxylakis, I.G. (eds.) CANS 14: 13th International Conference on Cryptology and Network Security. Lecture Notes in Computer Science, vol.\u00a08813, pp. 256\u2013269. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-12280-9_17","DOI":"10.1007\/978-3-319-12280-9_17"},{"key":"4_CR10","doi-asserted-by":"publisher","unstructured":"El Kaafarani, A., Ghadafi, E.: Attribute-based signatures with user-controlled linkability without random oracles. In: O\u2019Neill, M. (ed.) 16th IMA International Conference on Cryptography and Coding. Lecture Notes in Computer Science, vol. 10655, pp. 161\u2013184. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-71045-7_9","DOI":"10.1007\/978-3-319-71045-7_9"},{"key":"4_CR11","doi-asserted-by":"publisher","unstructured":"El Kaafarani, A., Katsumata, S.: Attribute-based signatures for unbounded circuits in the ROM and efficient instantiations from lattices. In: Abdalla, M., Dahab, R. (eds.) PKC\u00a02018: 21st International Conference on Theory and Practice of Public Key Cryptography, Part\u00a0II. Lecture Notes in Computer Science, vol. 10770, pp. 89\u2013119. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-76581-5_4","DOI":"10.1007\/978-3-319-76581-5_4"},{"key":"4_CR12","doi-asserted-by":"publisher","unstructured":"Escala, A., Herranz, J., Morillo, P.: Revocable attribute-based signatures with adaptive security in the standard model. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 11: 4th International Conference on Cryptology in Africa. Lecture Notes in Computer Science, vol.\u00a06737, pp. 224\u2013241. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21969-6_14","DOI":"10.1007\/978-3-642-21969-6_14"},{"key":"4_CR13","doi-asserted-by":"publisher","unstructured":"Fiore, D., Kolonelos, D., de\u00a0Perthuis, P.: Cuckoo commitments: registration-based encryption and key-value map commitments for large spaces. In: Guo, J., Steinfeld, R. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02023, Part\u00a0V. Lecture Notes in Computer Science, vol. 14442, pp. 166\u2013200. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-8733-7_6","DOI":"10.1007\/978-981-99-8733-7_6"},{"key":"4_CR14","doi-asserted-by":"publisher","unstructured":"Francati, D., Friolo, D., Maitra, M., Malavolta, G., Rahimi, A., Venturi, D.: Registered (inner-product) functional encryption. In: Guo, J., Steinfeld, R. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02023, Part\u00a0V. Lecture Notes in Computer Science, vol. 14442, pp. 98\u2013133. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-8733-7_4","DOI":"10.1007\/978-981-99-8733-7_4"},{"key":"4_CR15","doi-asserted-by":"publisher","unstructured":"Freitag, C., Waters, B., Wu, D.J.: How to use (plain) witness encryption: registered ABE, flexible broadcast, and more. In: Handschuh, H., Lysyanskaya, A. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02023, Part\u00a0IV. Lecture Notes in Computer Science, vol. 14084, pp. 498\u2013531. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-38551-3_16","DOI":"10.1007\/978-3-031-38551-3_16"},{"key":"4_CR16","doi-asserted-by":"publisher","unstructured":"Gardham, D., Manulis, M.: Revocable hierarchical attribute-based signatures from lattices. In: Ateniese, G., Venturi, D. (eds.) ACNS 22: 20th International Conference on Applied Cryptography and Network Security. Lecture Notes in Computer Science, vol. 13269, pp. 459\u2013479. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-09234-3_23","DOI":"10.1007\/978-3-031-09234-3_23"},{"key":"4_CR17","doi-asserted-by":"publisher","unstructured":"Garg, R., Lu, G., Waters, B., Wu, D.J.: Reducing the CRS size in registered ABE systems. In: Reyzin, L., Stebila, D. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02024, Part\u00a0III. Lecture Notes in Computer Science, vol. 14922, pp. 143\u2013177. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-68382-4_5","DOI":"10.1007\/978-3-031-68382-4_5"},{"key":"4_CR18","doi-asserted-by":"publisher","unstructured":"Garg, S., Hajiabadi, M., Mahmoody, M., Rahimi, A.: Registration-based encryption: removing private-key generator from IBE. In: Beimel, A., Dziembowski, S. (eds.) TCC\u00a02018: 16th Theory of Cryptography Conference, Part\u00a0I. Lecture Notes in Computer Science, vol. 11239, pp. 689\u2013718. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03807-6_25","DOI":"10.1007\/978-3-030-03807-6_25"},{"key":"4_CR19","doi-asserted-by":"publisher","unstructured":"Garg, S., Hajiabadi, M., Mahmoody, M., Rahimi, A., Sekar, S.: Registration-based encryption from standard assumptions. In: Lin, D., Sako, K. (eds.) PKC\u00a02019: 22nd International Conference on Theory and Practice of Public Key Cryptography, Part\u00a0II. Lecture Notes in Computer Science, vol. 11443, pp. 63\u201393. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17259-6_3","DOI":"10.1007\/978-3-030-17259-6_3"},{"key":"4_CR20","doi-asserted-by":"publisher","unstructured":"Glaeser, N., Kolonelos, D., Malavolta, G., Rahimi, A.: Efficient registration-based encryption. In: Meng, W., Jensen, C.D., Cremers, C., Kirda, E. (eds.) ACM CCS 2023: 30th Conference on Computer and Communications Security, Copenhagen, Denmark, pp. 1065\u20131079. ACM Press (2023). https:\/\/doi.org\/10.1145\/3576915.3616596","DOI":"10.1145\/3576915.3616596"},{"key":"4_CR21","doi-asserted-by":"publisher","unstructured":"Goyal, R., Vusirikala, S.: Verifiable registration-based encryption. In: Micciancio, D., Ristenpart, T. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02020, Part\u00a0I. Lecture Notes in Computer Science, vol. 12170, pp. 621\u2013651. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56784-2_21","DOI":"10.1007\/978-3-030-56784-2_21"},{"key":"4_CR22","unstructured":"Hayashi, R., Sakai, Y., Yamada, S.: Attribute-based signatures for circuits with optimal parameter size from standard assumptions. Cryptology ePrint Archive, Report 2024\/1129 (2024). https:\/\/eprint.iacr.org\/2024\/1129"},{"key":"4_CR23","doi-asserted-by":"publisher","unstructured":"Herranz, J., Laguillaumie, F., Libert, B., R\u00e0fols, C.: Short attribute-based signatures for threshold predicates. In: Dunkelman, O. (ed.) Topics in Cryptology \u2013 CT-RSA\u00a02012. Lecture Notes in Computer Science, vol.\u00a07178, pp. 51\u201367. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-27954-6_4","DOI":"10.1007\/978-3-642-27954-6_4"},{"key":"4_CR24","doi-asserted-by":"publisher","unstructured":"Hohenberger, S., Lu, G., Waters, B., Wu, D.J.: Registered attribute-based encryption. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT\u00a02023, Part\u00a0III. Lecture Notes in Computer Science, vol. 14006, pp. 511\u2013542. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30620-4_17","DOI":"10.1007\/978-3-031-30620-4_17"},{"key":"4_CR25","doi-asserted-by":"publisher","unstructured":"Li, J., Au, M.H., Susilo, W., Xie, D., Ren, K.: Attribute-based signature and its applications. In: Feng, D., Basin, D.A., Liu, P. (eds.) ASIACCS 10: 5th ACM Symposium on Information, Computer and Communications Security, Beijing, China, pp. 60\u201369. ACM Press (2010). https:\/\/doi.org\/10.1145\/1755688.1755697","DOI":"10.1145\/1755688.1755697"},{"key":"4_CR26","doi-asserted-by":"publisher","unstructured":"Libert, B., Ling, S., Nguyen, K., Wang, H.: Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors. In: Fischlin, M., Coron, J.S. (eds.) Advances in Cryptology \u2013 EUROCRYPT\u00a02016, Part\u00a0II. Lecture Notes in Computer Science, vol.\u00a09666, pp. 1\u201331. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49896-5_1","DOI":"10.1007\/978-3-662-49896-5_1"},{"key":"4_CR27","doi-asserted-by":"publisher","unstructured":"Ling, S., Nguyen, K., Phan, D.H., Tang, K.H., Wang, H., Xu, Y.: Fully dynamic attribute-based signatures for circuits from codes. In: Tang, Q., Teague, V. (eds.) PKC\u00a02024: 27th International Conference on Theory and Practice of Public Key Cryptography, Part\u00a0I. Lecture Notes in Computer Science, vol. 14601, pp. 37\u201373. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-57718-5_2","DOI":"10.1007\/978-3-031-57718-5_2"},{"key":"4_CR28","doi-asserted-by":"publisher","unstructured":"Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Kiayias, A. (ed.) Topics in Cryptology \u2013 CT-RSA\u00a02011. Lecture Notes in Computer Science, vol.\u00a06558, pp. 376\u2013392. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19074-2_24","DOI":"10.1007\/978-3-642-19074-2_24"},{"key":"4_CR29","unstructured":"Nandi, M., Pandit, T.: On the power of pair encodings: frameworks for predicate cryptographic primitives. Cryptology ePrint Archive, Report 2015\/955 (2015). https:\/\/eprint.iacr.org\/2015\/955"},{"key":"4_CR30","doi-asserted-by":"publisher","unstructured":"Okamoto, T., Takashima, K.: Efficient attribute-based signatures for non-monotone predicates in the standard model. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC\u00a02011: 14th International Conference on Theory and Practice of Public Key Cryptography. Lecture Notes in Computer Science, vol.\u00a06571, pp. 35\u201352. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19379-8_3","DOI":"10.1007\/978-3-642-19379-8_3"},{"key":"4_CR31","doi-asserted-by":"publisher","unstructured":"Okamoto, T., Takashima, K.: Decentralized attribute-based signatures. In: Kurosawa, K., Hanaoka, G. (eds.) PKC\u00a02013: 16th International Conference on Theory and Practice of Public Key Cryptography. Lecture Notes in Computer Science, vol.\u00a07778, pp. 125\u2013142. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36362-7_9","DOI":"10.1007\/978-3-642-36362-7_9"},{"key":"4_CR32","doi-asserted-by":"publisher","unstructured":"Sakai, Y., Attrapadung, N., Hanaoka, G.: Attribute-based signatures for circuits from bilinear map. In: Cheng, C.M., Chung, K.M., Persiano, G., Yang, B.Y. (eds.) PKC\u00a02016: 19th International Conference on Theory and Practice of Public Key Cryptography, Part\u00a0I. Lecture Notes in Computer Science, vol.\u00a09614, pp. 283\u2013300. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49384-7_11","DOI":"10.1007\/978-3-662-49384-7_11"},{"key":"4_CR33","doi-asserted-by":"publisher","unstructured":"Sakai, Y., Katsumata, S., Attrapadung, N., Hanaoka, G.: Attribute-based signatures for unbounded languages from standard assumptions. In: Peyrin, T., Galbraith, S. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02018, Part\u00a0II. Lecture Notes in Computer Science, vol. 11273, pp. 493\u2013522. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03329-3_17","DOI":"10.1007\/978-3-030-03329-3_17"},{"key":"4_CR34","doi-asserted-by":"publisher","unstructured":"Tang, F., Li, H., Liang, B.: Attribute-based signatures for circuits from multilinear maps. In: Chow, S.S.M., Camenisch, J., Hui, L.C.K., Yiu, S.M. (eds.) ISC\u00a02014: 17th International Conference on Information Security. Lecture Notes in Computer Science, vol.\u00a08783, pp. 54\u201371. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-13257-0_4","DOI":"10.1007\/978-3-319-13257-0_4"},{"key":"4_CR35","doi-asserted-by":"publisher","unstructured":"Tate, S.R., Vishwanathan, R.: Expiration and revocation of keys for attribute-based signatures. In: Samarati, P. (ed.) Data and Applications Security and Privacy XXIX, DBSec 2015. Lecture Notes in Computer Science, vol.\u00a09149, pp. 153\u2013169. Springer (2015). https:\/\/doi.org\/10.1007\/978-3-319-20810-7_10","DOI":"10.1007\/978-3-319-20810-7_10"},{"key":"4_CR36","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Chen, J., He, D., Zhang, Y.: Bounded collusion-resistant registered functional encryption for circuits. In: Chung, K.M., Sasaki, Y. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02024, Part\u00a0I. Lecture Notes in Computer Science, vol. 15484, pp. 32\u201364. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-96-0875-1_2","DOI":"10.1007\/978-981-96-0875-1_2"},{"key":"4_CR37","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Zhao, J., Zhu, Z., Gong, J., Chen, J.: Registered attribute-based signature. In: Tang, Q., Teague, V. (eds.) PKC\u00a02024: 27th International Conference on Theory and Practice of Public Key Cryptography, Part\u00a0I. Lecture Notes in Computer Science, vol. 14601, pp. 133\u2013162. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-57718-5_5","DOI":"10.1007\/978-3-031-57718-5_5"},{"key":"4_CR38","doi-asserted-by":"publisher","unstructured":"Zhu, Z., Zhang, K., Gong, J., Qian, H.: Registered ABE via predicate encodings. In: Guo, J., Steinfeld, R. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02023, Part\u00a0V. Lecture Notes in Computer Science, vol. 14442, pp. 66\u201397. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-8733-7_3","DOI":"10.1007\/978-981-99-8733-7_3"}],"container-title":["Lecture Notes in Computer Science","Provable and Practical Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-2961-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T12:48:03Z","timestamp":1772196483000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-2961-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,10]]},"ISBN":["9789819529605","9789819529612"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-2961-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,10]]},"assertion":[{"value":"10 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Yokohama","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sulab-sever.u-aizu.ac.jp\/provsec2025\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}