{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T19:18:43Z","timestamp":1761765523614},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2012,2,1]],"date-time":"2012-02-01T00:00:00Z","timestamp":1328054400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1007\/s00145-012-9119-4","type":"journal-article","created":{"date-parts":[[2012,1,31]],"date-time":"2012-01-31T10:14:07Z","timestamp":1328004847000},"page":"191-224","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":99,"title":["Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products"],"prefix":"10.1007","volume":"26","author":[{"given":"Jonathan","family":"Katz","sequence":"first","affiliation":[]},{"given":"Amit","family":"Sahai","sequence":"additional","affiliation":[]},{"given":"Brent","family":"Waters","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,2,1]]},"reference":[{"issue":"3","key":"9119_CR1","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/s00145-007-9006-6","volume":"21","author":"M. Abdalla","year":"2008","unstructured":"M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, H. Shi, Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. J. Cryptol.\n                  21(3), 350\u2013391 (2008)","journal-title":"J. Cryptol."},{"issue":"4","key":"9119_CR2","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s10207-006-0002-x","volume":"5","author":"S. Al-Riyami","year":"2006","unstructured":"S. Al-Riyami, J. Malone-Lee, N. Smart, Escrow-free encryption supporting cryptographic workflow. Intl. J. Inf. Secur.\n                  5(4), 217\u2013229 (2006)","journal-title":"Intl. J. Inf. Secur."},{"key":"9119_CR3","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/11507840_7","volume-title":"Financial Cryptography and Data Security 2005","author":"W. Bagga","year":"2005","unstructured":"W. Bagga, R. Molva, Policy-based cryptography and applications, in Financial Cryptography and Data Security 2005. LNCS, vol. 3570 (Springer, Berlin, 2005), pp. 72\u201387"},{"key":"9119_CR4","first-page":"321","volume-title":"IEEE Symposium on Security & Privacy","author":"J. Bethencourt","year":"2007","unstructured":"J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encryption, in IEEE Symposium on Security & Privacy (IEEE Press, New York, 2007), pp. 321\u2013334"},{"key":"9119_CR5","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-540-24676-3_14","volume-title":"Advances in Cryptology\u2014Eurocrypt 2004","author":"D. Boneh","year":"2004","unstructured":"D. Boneh, X. Boyen, Efficient selective-ID secure identity-based encryption without random oracles, in Advances in Cryptology\u2014Eurocrypt 2004. LNCS, vol. 3027 (Springer, Berlin, 2004), pp. 223\u2013238"},{"key":"9119_CR6","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-540-28628-8_27","volume-title":"Advances in Cryptology\u2014Crypto 2004","author":"D. Boneh","year":"2004","unstructured":"D. Boneh, X. Boyen, Secure identity-based encryption without random oracles, in Advances in Cryptology\u2014Crypto 2004. LNCS, vol. 3152 (Springer, Berlin, 2004), pp. 443\u2013459"},{"issue":"2","key":"9119_CR7","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/s00145-007-9005-7","volume":"21","author":"D. Boneh","year":"2008","unstructured":"D. Boneh, X. Boyen, Short signatures without random oracles and the SDH assumption in bilinear groups. J. Cryptol.\n                  21(2), 149\u2013177 (2008)","journal-title":"J. Cryptol."},{"issue":"3","key":"9119_CR8","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D. Boneh","year":"2003","unstructured":"D. Boneh, M.K. Franklin, Identity-based encryption from the Weil pairing. SIAM J. Comput.\n                  32(3), 586\u2013615 (2003)","journal-title":"SIAM J. Comput."},{"key":"9119_CR9","series-title":"LNCS","first-page":"535","volume-title":"4th Theory of Cryptography Conference\u2014TCC 2007","author":"D. Boneh","year":"2007","unstructured":"D. Boneh, B. Waters, Conjunctive, subset, and range queries on encrypted data, in 4th Theory of Cryptography Conference\u2014TCC 2007. LNCS, vol. 4392 (Springer, Berlin, 2007), pp. 535\u2013554"},{"key":"9119_CR10","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-540-28628-8_3","volume-title":"Advances in Cryptology\u2014Crypto 2004","author":"D. Boneh","year":"2004","unstructured":"D. Boneh, X. Boyen, H. Shacham, Short group signatures, in Advances in Cryptology\u2014Crypto 2004. LNCS, vol. 3152 (Springer, Berlin, 2004), pp. 41\u201355"},{"key":"9119_CR11","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology\u2014Eurocrypt 2004","author":"D. Boneh","year":"2004","unstructured":"D. Boneh, G. Di Crescenzo, R. Ostrovsky, G. Persiano, Public key encryption with keyword search, in Advances in Cryptology\u2014Eurocrypt 2004. LNCS, vol. 3027 (Springer, Berlin, 2004), pp. 506\u2013522"},{"key":"9119_CR12","series-title":"LNCS","first-page":"325","volume-title":"2nd Theory of Cryptography Conference\u2014TCC 2005","author":"D. Boneh","year":"2005","unstructured":"D. Boneh, E.-J. Goh, K. Nissim, Evaluating 2-DNF formulas on ciphertexts, in 2nd Theory of Cryptography Conference\u2014TCC 2005. LNCS, vol. 3378 (Springer, Berlin, 2005), pp. 325\u2013341"},{"key":"9119_CR13","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/11426639_26","volume-title":"Advances in Cryptology\u2014Eurocrypt 2005","author":"D. Boneh","year":"2005","unstructured":"D. Boneh, X. Boyen, E.-J. Goh, Hierarchical identity-based encryption with constant-size ciphertext, in Advances in Cryptology\u2014Eurocrypt 2005. LNCS, vol. 3494 (Springer, Berlin, 2005), pp. 440\u2013456"},{"key":"9119_CR14","series-title":"LNCS","first-page":"253","volume-title":"8th Theory of Cryptography Conference\u2014TCC 2011","author":"D. Boneh","year":"2011","unstructured":"D. Boneh, A. Sahai, B. Waters, Functional encryption: Definitions and challenges, in 8th Theory of Cryptography Conference\u2014TCC 2011. LNCS, vol. 6597 (Springer, Berlin, 2011), pp. 253\u2013273"},{"key":"9119_CR15","series-title":"LNCS","first-page":"39","volume-title":"2nd Intl. Conference on Pairing-Based Cryptography","author":"X. Boyen","year":"2008","unstructured":"X. Boyen, The uber-assumption family: A\u00a0unified complexity framework for bilinear groups, in 2nd Intl. Conference on Pairing-Based Cryptography. LNCS, vol. 5209 (Springer, Berlin, 2008), pp. 39\u201356"},{"key":"9119_CR16","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/11818175_17","volume-title":"Advances in Cryptology\u2014Crypto 2006","author":"X. Boyen","year":"2006","unstructured":"X. Boyen, B. Waters, Anonymous hierarchical identity-based encryption (without random oracles), in Advances in Cryptology\u2014Crypto 2006. LNCS, vol. 4117 (Springer, Berlin, 2006), pp. 290\u2013307"},{"key":"9119_CR17","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-540-28628-8_4","volume-title":"Advances in Cryptology\u2014Crypto 2004","author":"J. Camenisch","year":"2004","unstructured":"J. Camenisch, A. Lysyanskaya, Signature schemes and anonymous credentials from bilinear maps, in Advances in Cryptology\u2014Crypto 2004. LNCS, vol. 3152 (Springer, Berlin, 2004), pp. 56\u201372"},{"issue":"3","key":"9119_CR18","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/s00145-006-0442-5","volume":"20","author":"R. Canetti","year":"2007","unstructured":"R. Canetti, S. Halevi, J. Katz, A forward-secure public-key encryption scheme. J. Cryptol.\n                  20(3), 265\u2013294 (2007)","journal-title":"J. Cryptol."},{"key":"9119_CR19","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/3-540-45325-3_32","volume-title":"Cryptography and Coding, 8th IMA International Conference","author":"C. Cocks","year":"2001","unstructured":"C. Cocks, An identity based encryption scheme based on quadratic residues, in Cryptography and Coding, 8th IMA International Conference. LNCS, vol. 2260 (Springer, Berlin, 2001), pp. 360\u2013363"},{"key":"9119_CR20","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-642-13190-5_3","volume-title":"Advances in Cryptology\u2014Eurocrypt 2010","author":"D.M. Freeman","year":"2010","unstructured":"D.M. Freeman, Converting pairing-based cryptosystems from composite-order groups to prime-order groups, in Advances in Cryptology\u2014Eurocrypt 2010. LNCS, vol. 6110 (Springer, Berlin, 2010), pp. 44\u201361"},{"issue":"16","key":"9119_CR21","doi-asserted-by":"publisher","first-page":"3113","DOI":"10.1016\/j.dam.2007.12.010","volume":"156","author":"S.D. Galbraith","year":"2008","unstructured":"S.D. Galbraith, K.G. Paterson, N.P. Smart, Pairings for cryptographers. Discrete Appl. Math.\n                  156(16), 3113\u20133121 (2008)","journal-title":"Discrete Appl. Math."},{"key":"9119_CR22","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/11761679_27","volume-title":"Advances in Cryptology\u2014Eurocrypt 2006","author":"C. Gentry","year":"2006","unstructured":"C. Gentry, Practical identity-based encryption without random oracles, in Advances in Cryptology\u2014Eurocrypt 2006. LNCS, vol. 4004 (Springer, Berlin, 2006), pp. 445\u2013464"},{"key":"9119_CR23","first-page":"89","volume-title":"ACM CCS\u201906: 13th ACM Conf. on Computer and Communications Security","author":"V. Goyal","year":"2006","unstructured":"V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in ACM CCS\u201906: 13th ACM Conf. on Computer and Communications Security (ACM, New York, 2006), pp. 89\u201398"},{"issue":"4","key":"9119_CR24","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s00145-004-0312-y","volume":"17","author":"A. Joux","year":"2004","unstructured":"A. Joux, A one-round protocol for tripartite Diffie\u2013Hellman. J. Cryptol.\n                  17(4), 263\u2013276 (2004)","journal-title":"J. Cryptol."},{"issue":"4","key":"9119_CR25","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s00145-003-0052-4","volume":"16","author":"A. Joux","year":"2003","unstructured":"A. Joux, K. Nguyen, Separating decision Diffie\u2013Hellman from computational Diffie\u2013Hellman in cryptographic groups. J. Cryptol.\n                  16(4), 239\u2013247 (2003)","journal-title":"J. Cryptol."},{"key":"9119_CR26","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-13190-5_4","volume-title":"Advances in Cryptology\u2014Eurocrypt 2010","author":"A.B. Lewko","year":"2010","unstructured":"A.B. Lewko, T. Okamoto, A. Sahai, K. Takashima, B. Waters, Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption, in Advances in Cryptology\u2014Eurocrypt 2010. LNCS, vol. 6110 (Springer, Berlin, 2010), pp. 62\u201391"},{"issue":"2","key":"9119_CR27","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/BF02113297","volume":"55","author":"V.I. Nechaev","year":"1994","unstructured":"V.I. Nechaev, On the complexity of a deterministic algorithm for the discrete logarithm. Math. Notes\n                  55(2), 165\u2013172 (1994)","journal-title":"Math. Notes"},{"key":"9119_CR28","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-642-10366-7_13","volume-title":"Advances in Cryptology\u2014Asiacrypt 2009","author":"T. Okamoto","year":"2009","unstructured":"T. Okamoto, K. Takashima, Hierarchical predicate encryption for inner products, in Advances in Cryptology\u2014Asiacrypt 2009. LNCS, vol. 5912 (Springer, Berlin, 2009), pp. 214\u2013231"},{"key":"9119_CR29","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-642-14623-7_11","volume-title":"Advances in Cryptology\u2014Crypto 2010","author":"T. Okamoto","year":"2010","unstructured":"T. Okamoto, K. Takashima, Fully secure functional encryption with general relations from the decisional linear assumption, in Advances in Cryptology\u2014Crypto 2010. LNCS, vol. 6223 (Springer, Berlin, 2010), pp. 191\u2013208"},{"key":"9119_CR30","first-page":"195","volume-title":"14th ACM Conf. on Computer and Communications Security (CCS)","author":"R. Ostrovsky","year":"2007","unstructured":"R. Ostrovsky, A. Sahai, B. Waters, Attribute-based encryption with non-monotonic access structures, in 14th ACM Conf. on Computer and Communications Security (CCS) (ACM, New York, 2007), pp. 195\u2013203"},{"key":"9119_CR31","first-page":"463","volume-title":"ACM Conf. on Computer and Communications Security (CCS)","author":"A. Sahai","year":"2010","unstructured":"A. Sahai, H. Seyalioglu, Worry-free encryption: Functional encryption with public keys, in ACM Conf. on Computer and Communications Security (CCS) (ACM, New York, 2010), pp. 463\u2013472"},{"key":"9119_CR32","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology\u2014Eurocrypt 2005","author":"A. Sahai","year":"2005","unstructured":"A. Sahai, B. Waters, Fuzzy identity-based encryption, in Advances in Cryptology\u2014Eurocrypt 2005. LNCS, vol. 3494 (Springer, New York, 2005), pp. 457\u2013473"},{"key":"9119_CR33","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology\u2014Crypto\u201984","author":"A. Shamir","year":"1985","unstructured":"A. Shamir, Identity-based cryptosystems and signature schemes, in Advances in Cryptology\u2014Crypto\u201984. LNCS, vol. 196 (Springer, New York, 1985), pp. 47\u201353"},{"key":"9119_CR34","series-title":"LNCS","first-page":"457","volume-title":"6th Theory of Cryptography Conference\u2014TCC 2009","author":"E. Shen","year":"2009","unstructured":"E. Shen, E. Shi, B. Waters, Predicate privacy in encryption systems, in 6th Theory of Cryptography Conference\u2014TCC 2009. LNCS, vol. 5444 (Springer, Berlin, 2009), pp. 457\u2013473"},{"key":"9119_CR35","first-page":"350","volume-title":"IEEE Symposium on Security & Privacy","author":"E. Shi","year":"2007","unstructured":"E. Shi, J. Bethencourt, H.T.-H. Chan, D.X. Song, A. Perrig, Multi-dimensional range queries over encrypted data, in IEEE Symposium on Security & Privacy (IEEE Press, New York, 2007), pp. 350\u2013364"},{"key":"9119_CR36","series-title":"LNCS","first-page":"256","volume-title":"Advances in Cryptology----Eurocrypt\u201997","author":"V. Shoup","year":"1997","unstructured":"V. Shoup, Lower bounds for discrete logarithms and related problems, in Advances in Cryptology----Eurocrypt\u201997. LNCS, vol. 1233 (Springer, Berlin, 1997), pp. 256\u2013266"},{"key":"9119_CR37","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/11426639_7","volume-title":"Advances in Cryptology\u2014Eurocrypt 2005","author":"B. Waters","year":"2005","unstructured":"B. Waters, Efficient identity-based encryption without random oracles, in Advances in Cryptology\u2014Eurocrypt 2005. LNCS, vol. 3494 (Springer, Berlin, 2005), pp. 114\u2013127"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-012-9119-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-012-9119-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-012-9119-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-012-9119-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T08:08:06Z","timestamp":1586333286000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-012-9119-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,2,1]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,4]]}},"alternative-id":["9119"],"URL":"https:\/\/doi.org\/10.1007\/s00145-012-9119-4","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,2,1]]},"assertion":[{"value":"27 June 2008","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2012","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}