{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T14:26:53Z","timestamp":1768487213185,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":43,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819608904","type":"print"},{"value":"9789819608911","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0891-1_2","type":"book-chapter","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:37:52Z","timestamp":1733956672000},"page":"33-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Traitor Tracing Without Trusted Authority from\u00a0Registered Functional Encryption"],"prefix":"10.1007","author":[{"given":"Pedro","family":"Branco","sequence":"first","affiliation":[]},{"given":"Russell W. F.","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Monosij","family":"Maitra","sequence":"additional","affiliation":[]},{"given":"Giulio","family":"Malavolta","sequence":"additional","affiliation":[]},{"given":"Ahmadreza","family":"Rahimi","sequence":"additional","affiliation":[]},{"given":"Ivy K. Y.","family":"Woo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Abdalla, M., Bourse, F., De Caro, A., Pointcheval, D.: Simple functional encryption schemes for inner products. In: Katz, J. (ed.) PKC\u00a02015: 18th International Conference on Theory and Practice of Public Key Cryptography. Lecture Notes in Computer Science, vol. 9020, pp. 733\u2013751. Springer, Heidelberg, Germany, Gaithersburg, MD, USA (Mar\u00a030\u00a0\u2013\u00a0Apr\u00a01, 2015)","DOI":"10.1007\/978-3-662-46447-2_33"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, S., Bhattacherjee, S., Phan, D.H., Stehl\u00e9, D., Yamada, S.: Efficient public trace and revoke from standard assumptions: Extended abstract. In: Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D. (eds.) ACM CCS 2017: 24th Conference on Computer and Communications Security. pp. 2277\u20132293. ACM Press, Dallas, TX, USA (Oct\u00a031\u00a0\u2013\u00a0Nov\u00a02, 2017)","DOI":"10.1145\/3133956.3134041"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, S., Kumari, S., Yadav, A., Yamada, S.: Broadcast, trace and revoke with optimal parameters from polynomial hardness. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2023. pp. 605\u2013636. Springer Nature Switzerland, Cham (2023)","DOI":"10.1007\/978-3-031-30620-4_20"},{"key":"2_CR4","unstructured":"Aranha, D.F., Gouv\u00eaa, C.P.L., Markmann, T., Wahby, R.S., Liao, K.: RELIC is an Efficient LIbrary for Cryptography. https:\/\/github.com\/relic-toolkit\/relic (2020)"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Baltico, C.E.Z., Catalano, D., Fiore, D., Gay, R.: Practical functional encryption for quadratic functions with applications to predicate encryption. In: Katz, J., Shacham, H. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02017, Part\u00a0I. Lecture Notes in Computer Science, vol. 10401, pp. 67\u201398. Springer, Heidelberg, Germany, Santa Barbara, CA, USA (Aug\u00a020\u201324, 2017)","DOI":"10.1007\/978-3-319-63688-7_3"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilian, J. (ed.) Advances in Cryptology \u2013 CRYPTO\u00a02001. Lecture Notes in Computer Science, vol. 2139, pp. 1\u201318. Springer, Heidelberg, Germany, Santa Barbara, CA, USA (Aug\u00a019\u201323, 2001)","DOI":"10.1007\/3-540-44647-8_1"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Boneh, D., Sahai, A., Waters, B.: Fully collusion resistant traitor tracing with short ciphertexts and private keys. In: Vaudenay, S. (ed.) Advances in Cryptology \u2013 EUROCRYPT\u00a02006. Lecture Notes in Computer Science, vol. 4004, pp. 573\u2013592. Springer, Heidelberg, Germany, St. Petersburg, Russia (May\u00a028\u00a0\u2013\u00a0Jun\u00a01, 2006)","DOI":"10.1007\/11761679_34"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Boneh, D., Waters, B.: A fully collusion resistant broadcast, trace, and revoke system. In: Juels, A., Wright, R.N., De Capitani di Vimercati, S. (eds.) ACM CCS 2006: 13th Conference on Computer and Communications Security. pp. 211\u2013220. ACM Press, Alexandria, Virginia, USA (Oct\u00a030\u00a0\u2013\u00a0Nov\u00a03, 2006)","DOI":"10.1145\/1180405.1180432"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Boneh, D., Zhandry, M.: Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. In: Garay, J.A., Gennaro, R. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02014, Part\u00a0I. Lecture Notes in Computer Science, vol. 8616, pp. 480\u2013499. Springer, Heidelberg, Germany, Santa Barbara, CA, USA (Aug\u00a017\u201321, 2014)","DOI":"10.1007\/978-3-662-44371-2_27"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Chor, B., Fiat, A., Naor, M.: Tracing traitors. In: Desmedt, Y. (ed.) Advances in Cryptology \u2013 CRYPTO\u201994. Lecture Notes in Computer Science, vol. 839, pp. 257\u2013270. Springer, Heidelberg, Germany, Santa Barbara, CA, USA (Aug\u00a021\u201325, 1994)","DOI":"10.1007\/3-540-48658-5_25"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Cong, K., Eldefrawy, K., Smart, N.P.: Optimizing registration based encryption. In: Paterson, M.B. (ed.) Cryptography and Coding. pp. 129\u2013157. Springer International Publishing, Cham (2021)","DOI":"10.1007\/978-3-030-92641-0_7"},{"key":"2_CR12","unstructured":"Datta, P., Pal, T.: Registration-based functional encryption. IACR Cryptol. ePrint Arch. p. 457 (2023), https:\/\/eprint.iacr.org\/2023\/457"},{"key":"2_CR13","unstructured":"Datta, P., Pal, T., Yamada, S.: Registered fe beyond predicates: (attribute-based) linear functions and more. Cryptology ePrint Archive, Paper 2023\/457 (2023), https:\/\/eprint.iacr.org\/2023\/457, https:\/\/eprint.iacr.org\/2023\/457"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Fazio, N.: Public key trace and revoke scheme secure against adaptive chosen ciphertext attack. In: Desmedt, Y. (ed.) PKC\u00a02003: 6th International Workshop on Theory and Practice in Public Key Cryptography. Lecture Notes in Computer Science, vol. 2567, pp. 100\u2013115. Springer, Heidelberg, Germany, Miami, FL, USA (Jan\u00a06\u20138, 2003)","DOI":"10.1007\/3-540-36288-6_8"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"D\u00f6ttling, N., Kolonelos, D., Lai, R.W.F., Lin, C., Malavolta, G., Rahimi, A.: Efficient laconic cryptography from\u00c2 learning with\u00c2 errors. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2023. pp. 417\u2013446. Springer Nature Switzerland, Cham (2023)","DOI":"10.1007\/978-3-031-30620-4_14"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Fiore, D., Kolonelos, D., de\u00a0Perthuis, P.: Cuckoo commitments: Registration-based encryption and key-value map commitments for large spaces. In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 4-8, 2023, Proceedings. Lecture Notes in Computer Science, Springer (2023)","DOI":"10.1007\/978-981-99-8733-7_6"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Francati, D., Friolo, D., Maitra, M., Malavolta, G., Rahimi, A., Venturi, D.: Registered (inner-product) functional encryption. In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 4-8, 2023, Proceedings. Lecture Notes in Computer Science, Springer (2023)","DOI":"10.1007\/978-981-99-8733-7_4"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Freitag, C., Waters, B., Wu, D.J.: How to\u00c2 use (plain) witness encryption: Registered abe, flexible broadcast, and more. In: Handschuh, H., Lysyanskaya, A. (eds.) Advances in Cryptology \u2013 CRYPTO 2023. pp. 498\u2013531. Springer Nature Switzerland, Cham (2023)","DOI":"10.1007\/978-3-031-38551-3_16"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Garg, S., Hajiabadi, M., Mahmoody, M., Rahimi, A.: Registration-based encryption: Removing private-key generator from IBE. In: Beimel, A., Dziembowski, S. (eds.) TCC\u00a02018: 16th Theory of Cryptography Conference, Part\u00a0I. Lecture Notes in Computer Science, vol. 11239, pp. 689\u2013718. Springer, Heidelberg, Germany, Panaji, India (Nov\u00a011\u201314, 2018)","DOI":"10.1007\/978-3-030-03807-6_25"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Garg, S., Hajiabadi, M., Mahmoody, M., Rahimi, A., Sekar, S.: Registration-based encryption from standard assumptions. In: Lin, D., Sako, K. (eds.) PKC\u00a02019: 22nd International Conference on Theory and Practice of Public Key Cryptography, Part\u00a0II. Lecture Notes in Computer Science, vol. 11443, pp. 63\u201393. Springer, Heidelberg, Germany, Beijing, China (Apr\u00a014\u201317, 2019)","DOI":"10.1007\/978-3-030-17259-6_3"},{"key":"2_CR21","unstructured":"Gay, R.: Functional encryption for quadratic functions, and applications to predicate encryption. Cryptology ePrint Archive, Report 2016\/1106 (2016), http:\/\/eprint.iacr.org\/2016\/1106"},{"key":"2_CR22","unstructured":"Glaeser, N., Kolonelos, D., Malavolta, G., Rahimi, A.: Efficient registration-based encryption. Cryptology ePrint Archive, Paper 2022\/1505 (2022), https:\/\/eprint.iacr.org\/2022\/1505, https:\/\/eprint.iacr.org\/2022\/1505"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Gong, J., Luo, J., Wee, H.: Traitor tracing with $$N^{1\/3}$$-size ciphertexts and O(1)-size keys from k-Lin. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2023. pp. 637\u2013668. Springer Nature Switzerland, Cham (2023)","DOI":"10.1007\/978-3-031-30620-4_21"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Goyal, R., Koppula, V., Waters, B.: Collusion resistant traitor tracing from learning with errors. In: Diakonikolas, I., Kempe, D., Henzinger, M. (eds.) 50th Annual ACM Symposium on Theory of Computing. pp. 660\u2013670. ACM Press, Los Angeles, CA, USA (Jun\u00a025\u201329, 2018)","DOI":"10.1145\/3188745.3188844"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Goyal, R., Koppula, V., Waters, B.: New approaches to traitor tracing with embedded identities. In: Hofheinz, D., Rosen, A. (eds.) TCC\u00a02019: 17th Theory of Cryptography Conference, Part\u00a0II. Lecture Notes in Computer Science, vol. 11892, pp. 149\u2013179. Springer, Heidelberg, Germany, Nuremberg, Germany (Dec\u00a01\u20135, 2019)","DOI":"10.1007\/978-3-030-36033-7_6"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Goyal, R., Vusirikala, S.: Verifiable registration-based encryption. In: Shacham, H., Boldyreva, A. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02020, Part\u00a0I. pp. 621\u2013651. Lecture Notes in Computer Science, Springer, Heidelberg, Germany, Santa Barbara, CA, USA (Aug\u00a016\u201320, 2020)","DOI":"10.1007\/978-3-030-56784-2_21"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Hohenberger, S., Lu, G., Waters, B., Wu, D.J.: Registered attribute-based encryption. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2023. pp. 511\u2013542. Springer Nature Switzerland, Cham (2023)","DOI":"10.1007\/978-3-031-30620-4_17"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Jain, A., Lin, H., Sahai, A.: Indistinguishability obfuscation from well-founded assumptions. In: Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing. pp. 60\u201373 (2021)","DOI":"10.1145\/3406325.3451093"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Kim, C.H., Hwang, Y.H., Lee, P.J.: An efficient public key trace and revoke scheme secure against adaptive chosen ciphertext attack. In: Laih, C.S. (ed.) Advances in Cryptology \u2013 ASIACRYPT\u00a02003. Lecture Notes in Computer Science, vol. 2894, pp. 359\u2013373. Springer, Heidelberg, Germany, Taipei, Taiwan (Nov\u00a030\u00a0\u2013\u00a0Dec\u00a04, 2003)","DOI":"10.1007\/978-3-540-40061-5_23"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Kim, S., Wu, D.J.: Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions. In: Advances in Cryptology \u2013 ASIACRYPT\u00a02020, Part\u00a0II. pp. 66\u201397. Lecture Notes in Computer Science, Springer, Heidelberg, Germany (Dec 2020)","DOI":"10.1007\/978-3-030-64834-3_3"},{"key":"2_CR31","unstructured":"Kolonelos, D., Malavolta, G., Wee, H.: Distributed broadcast encryption from bilinear groups. Cryptology ePrint Archive, Paper 2023\/874 (2023), https:\/\/eprint.iacr.org\/2023\/874, https:\/\/eprint.iacr.org\/2023\/874"},{"key":"2_CR32","unstructured":"Laurent\u00a0Girod, W.L.: petrelic is a python wrapper around relic. https:\/\/github.com\/spring-epfl\/petrelic (2022)"},{"key":"2_CR33","unstructured":"Luo, J.: Ad hoc (decentralized) broadcast, trace, and revoke. Cryptology ePrint Archive, Paper 2022\/925 (2022), https:\/\/eprint.iacr.org\/2022\/925, https:\/\/eprint.iacr.org\/2022\/925"},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) Advances in Cryptology \u2013 CRYPTO\u00a02001. Lecture Notes in Computer Science, vol. 2139, pp. 41\u201362. Springer, Heidelberg, Germany, Santa Barbara, CA, USA (Aug\u00a019\u201323, 2001)","DOI":"10.1007\/3-540-44647-8_3"},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"Naor, M., Pinkas, B.: Efficient trace and revoke schemes. In: Frankel, Y. (ed.) FC 2000: 4th International Conference on Financial Cryptography. Lecture Notes in Computer Science, vol. 1962, pp. 1\u201320. Springer, Heidelberg, Germany, Anguilla, British West Indies (Feb\u00a020\u201324, 2001)","DOI":"10.1007\/3-540-45472-1_1"},{"key":"2_CR36","doi-asserted-by":"crossref","unstructured":"Nishimaki, R., Wichs, D., Zhandry, M.: Anonymous traitor tracing: How to embed arbitrary information in a key. In: Fischlin, M., Coron, J.S. (eds.) Advances in Cryptology \u2013 EUROCRYPT\u00a02016, Part\u00a0II. Lecture Notes in Computer Science, vol. 9666, pp. 388\u2013419. Springer, Heidelberg, Germany, Vienna, Austria (May\u00a08\u201312, 2016)","DOI":"10.1007\/978-3-662-49896-5_14"},{"key":"2_CR37","unstructured":"Rogaway, P.: The moral character of cryptographic work. Cryptology ePrint Archive, Report 2015\/1162 (2015), http:\/\/eprint.iacr.org\/2015\/1162"},{"key":"2_CR38","doi-asserted-by":"crossref","unstructured":"Wahby, R.S., Boneh, D.: Fast and simple constant-time hashing to the bls12-381 elliptic curve. IACR Transactions on Cryptographic Hardware and Embedded Systems 2019(4), 154\u2013179 (Aug 2019), https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8348","DOI":"10.46586\/tches.v2019.i4.154-179"},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"Wee, H.: Functional encryption for quadratic functions from $$k$$-lin, revisited. In: TCC\u00a02020: 18th Theory of Cryptography Conference, Part\u00a0I. pp. 210\u2013228. Lecture Notes in Computer Science, Springer, Heidelberg, Germany (Mar 2020)","DOI":"10.1007\/978-3-030-64375-1_8"},{"key":"2_CR40","doi-asserted-by":"publisher","unstructured":"Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J.: Ad hoc broadcast encryption. In: Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 741\u2013743. CCS \u201910, Association for Computing Machinery, New York, NY, USA (2010), https:\/\/doi.org\/10.1145\/1866307.1866416","DOI":"10.1145\/1866307.1866416"},{"key":"2_CR41","doi-asserted-by":"crossref","unstructured":"Zhandry, M.: New techniques for traitor tracing: Size $$N^{1\/3}$$ and more from pairings. In: Shacham, H., Boldyreva, A. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02020, Part\u00a0I. pp. 652\u2013682. Lecture Notes in Computer Science, Springer, Heidelberg, Germany, Santa Barbara, CA, USA (Aug\u00a016\u201320, 2020)","DOI":"10.1007\/978-3-030-56784-2_22"},{"key":"2_CR42","doi-asserted-by":"crossref","unstructured":"Zhu, Z., Li, J., Zhang, K., Gong, J., Qian, H.: Registered functional encryptions from pairings. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. pp. 373\u2013402. Springer (2024)","DOI":"10.1007\/978-3-031-58723-8_13"},{"key":"2_CR43","doi-asserted-by":"crossref","unstructured":"Zhu, Z., Zhang, K., Gong, J., Qian, H.: Registered abe via predicate encodings. In: Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 4-8, 2023, Proceedings. Lecture Notes in Computer Science, Springer (2023)","DOI":"10.1007\/978-981-99-8733-7_3"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0891-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:42:48Z","timestamp":1733956968000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0891-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"ISBN":["9789819608904","9789819608911"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0891-1_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"12 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}