{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:29:01Z","timestamp":1775579341686,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T00:00:00Z","timestamp":1568592000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T00:00:00Z","timestamp":1568592000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s00145-019-09335-x","type":"journal-article","created":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T21:18:11Z","timestamp":1568668691000},"page":"954-1002","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Compact Adaptively Secure ABE for $${\\textsf {NC}}^{1}$$ from k-Lin"],"prefix":"10.1007","volume":"33","author":[{"given":"Lucas","family":"Kowalczyk","sequence":"first","affiliation":[]},{"given":"Hoeteck","family":"Wee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,16]]},"reference":[{"key":"9335_CR1","doi-asserted-by":"crossref","unstructured":"Shashank Agrawal and Melissa Chase. Simplifying design and analysis of complex predicate encryption schemes. In Jean-S\u00e9bastien Coron and Jesper\u00a0Buus Nielsen, editors, EUROCRYPT\u00a02017, Part\u00a0I, volume 10210 of LNCS, pages 627\u2013656. Springer, Heidelberg, April\u00a0\/\u00a0May 2017.","DOI":"10.1007\/978-3-319-56620-7_22"},{"key":"9335_CR2","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/978-3-642-55220-5_31","volume-title":"EUROCRYPT 2014","author":"Nuttapong Attrapadung","year":"2014","unstructured":"Nuttapong Attrapadung. Dual system encryption via doubly selective security: Framework, fully secure functional encryption for regular languages, and more. In Phong\u00a0Q. Nguyen and Elisabeth Oswald, editors, EUROCRYPT\u00a02014, volume 8441 of LNCS, pages 557\u2013577. Springer, Heidelberg, May 2014."},{"key":"9335_CR3","doi-asserted-by":"crossref","unstructured":"Nuttapong Attrapadung. Dual system encryption framework in prime-order groups via computational pair encodings. In Jung\u00a0Hee Cheon and Tsuyoshi Takagi, editors, ASIACRYPT\u00a02016, Part\u00a0II, volume 10032 of LNCS, pages 591\u2013623. Springer, Heidelberg, December 2016.","DOI":"10.1007\/978-3-662-53890-6_20"},{"key":"9335_CR4","doi-asserted-by":"crossref","unstructured":"Olivier Blazy, Eike Kiltz, and Jiaxin Pan. (Hierarchical) identity-based encryption from affine message authentication. In Juan\u00a0A. Garay and Rosario Gennaro, editors, CRYPTO\u00a02014, Part\u00a0I, volume 8616 of LNCS, pages 408\u2013425. Springer, Heidelberg, August 2014.","DOI":"10.1007\/978-3-662-44371-2_23"},{"key":"9335_CR5","doi-asserted-by":"crossref","unstructured":"John Bethencourt, Amit Sahai, and Brent Waters. Ciphertext-policy attribute-based encryption. In 2007 IEEE Symposium on Security and Privacy, pages 321\u2013334. IEEE Computer Society Press, May 2007.","DOI":"10.1109\/SP.2007.11"},{"key":"9335_CR6","doi-asserted-by":"crossref","unstructured":"Jie Chen, Junqing Gong, Lucas Kowalczyk, and Hoeteck Wee. Unbounded ABE via bilinear entropy expansion, revisited. In Jesper\u00a0Buus Nielsen and Vincent Rijmen, editors, EUROCRYPT\u00a02018, Part\u00a0I, volume 10820 of LNCS, pages 503\u2013534. Springer, Heidelberg, April\u00a0\/\u00a0May 2018.","DOI":"10.1007\/978-3-319-78381-9_19"},{"key":"9335_CR7","doi-asserted-by":"crossref","unstructured":"Jie Chen, Romain Gay, and Hoeteck Wee. Improved dual system ABE in prime-order groups via predicate encodings. In Elisabeth Oswald and Marc Fischlin, editors, EUROCRYPT\u00a02015, Part\u00a0II, volume 9057 of LNCS, pages 595\u2013624. Springer, Heidelberg, April 2015.","DOI":"10.1007\/978-3-662-46803-6_20"},{"key":"9335_CR8","doi-asserted-by":"crossref","unstructured":"Jung\u00a0Hee Cheon. Security analysis of the strong Diffie-Hellman problem. In Serge Vaudenay, editor, EUROCRYPT\u00a02006, volume 4004 of LNCS, pages 1\u201311. Springer, Heidelberg, May\u00a0\/\u00a0June 2006.","DOI":"10.1007\/11761679_1"},{"key":"9335_CR9","doi-asserted-by":"crossref","unstructured":"Jie Chen and Hoeteck Wee. Fully, (almost) tightly secure IBE and dual system groups. In Ran Canetti and Juan\u00a0A. Garay, editors, CRYPTO\u00a02013, Part\u00a0II, volume 8043 of LNCS, pages 435\u2013460. Springer, Heidelberg, August 2013.","DOI":"10.1007\/978-3-642-40084-1_25"},{"key":"9335_CR10","series-title":"LNCS","first-page":"277","volume-title":"SCN 14","author":"Jie Chen","year":"2014","unstructured":"Jie Chen and Hoeteck Wee. Semi-adaptive attribute-based encryption and improved delegation for Boolean formula. In Michel Abdalla and Roberto\u00a0De Prisco, editors, SCN 14, volume 8642 of LNCS, pages 277\u2013297. Springer, Heidelberg, September 2014."},{"key":"9335_CR11","doi-asserted-by":"crossref","unstructured":"Alex Escala, Gottfried Herold, Eike Kiltz, Carla R\u00e0fols, and Jorge Villar. An algebraic framework for Diffie-Hellman assumptions. In Ran Canetti and Juan\u00a0A. Garay, editors, CRYPTO\u00a02013, Part\u00a0II, volume 8043 of LNCS, pages 129\u2013147. Springer, Heidelberg, August 2013.","DOI":"10.1007\/978-3-642-40084-1_8"},{"key":"9335_CR12","doi-asserted-by":"crossref","unstructured":"Georg Fuchsbauer, Zahra Jafargholi, and Krzysztof Pietrzak. A quasipolynomial reduction for generalized selective decryption on trees. In Rosario Gennaro and Matthew J.\u00a0B. Robshaw, editors, CRYPTO\u00a02015, Part\u00a0I, volume 9215 of LNCS, pages 601\u2013620. Springer, Heidelberg, August 2015.","DOI":"10.1007\/978-3-662-47989-6_29"},{"key":"9335_CR13","doi-asserted-by":"crossref","unstructured":"Georg Fuchsbauer, Momchil Konstantinov, Krzysztof Pietrzak, and Vanishree Rao. Adaptive security of constrained PRFs. In Palash Sarkar and Tetsu Iwata, editors, ASIACRYPT\u00a02014, Part\u00a0II, volume 8874 of LNCS, pages 82\u2013101. Springer, Heidelberg, December 2014.","DOI":"10.1007\/978-3-662-45608-8_5"},{"key":"9335_CR14","doi-asserted-by":"crossref","unstructured":"Junqing Gong, Xiaolei Dong, Jie Chen, and Zhenfu Cao. Efficient IBE with tight reduction to standard assumption in the multi-challenge setting. In Jung\u00a0Hee Cheon and Tsuyoshi Takagi, editors, ASIACRYPT\u00a02016, Part\u00a0II, volume 10032 of LNCS, pages 624\u2013654. Springer, Heidelberg, December 2016.","DOI":"10.1007\/978-3-662-53890-6_21"},{"key":"9335_CR15","doi-asserted-by":"crossref","unstructured":"Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai, and Brent Waters. Attribute-based encryption for circuits from multilinear maps. In Ran Canetti and Juan\u00a0A. Garay, editors, CRYPTO\u00a02013, Part\u00a0II, volume 8043 of LNCS, pages 479\u2013499. Springer, Heidelberg, August 2013.","DOI":"10.1007\/978-3-642-40084-1_27"},{"key":"9335_CR16","doi-asserted-by":"crossref","unstructured":"Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. Attribute-based encryption for fine-grained access control of encrypted data. In Ari Juels, Rebecca\u00a0N. Wright, and Sabrina De Capitani di Vimercati, editors, ACM CCS 2006, pages 89\u201398. ACM Press, October\u00a0\/\u00a0November 2006. Available as Cryptology ePrint Archive Report 2006\/309.","DOI":"10.1145\/1180405.1180418"},{"key":"9335_CR17","doi-asserted-by":"crossref","unstructured":"Sergey Gorbunov, Vinod Vaikuntanathan, and Hoeteck Wee. Attribute-based encryption for circuits. In Dan Boneh, Tim Roughgarden, and Joan Feigenbaum, editors, 45th ACM STOC, pages 545\u2013554. ACM Press, June 2013.","DOI":"10.1145\/2488608.2488677"},{"key":"9335_CR18","doi-asserted-by":"crossref","unstructured":"Brett Hemenway, Zahra Jafargholi, Rafail Ostrovsky, Alessandra Scafuro, and Daniel Wichs. Adaptively secure garbled circuits from one-way functions. In Matthew Robshaw and Jonathan Katz, editors, CRYPTO\u00a02016, Part\u00a0III, volume 9816 of LNCS, pages 149\u2013178. Springer, Heidelberg, August 2016.","DOI":"10.1007\/978-3-662-53015-3_6"},{"key":"9335_CR19","doi-asserted-by":"crossref","unstructured":"Yuval Ishai and Eyal Kushilevitz. Perfect constant-round secure computation via perfect randomizing polynomials. In Peter Widmayer, Francisco\u00a0Triguero Ruiz, Rafael\u00a0Morales Bueno, Matthew Hennessy, Stephan Eidenbenz, and Ricardo Conejo, editors, ICALP 2002, volume 2380 of LNCS, pages 244\u2013256. Springer, Heidelberg, July 2002.","DOI":"10.1007\/3-540-45465-9_22"},{"key":"9335_CR20","doi-asserted-by":"crossref","unstructured":"Zahra Jafargholi, Chethan Kamath, Karen Klein, Ilan Komargodski, Krzysztof Pietrzak, and Daniel Wichs. Be adaptive, avoid overcommitting. In Jonathan Katz and Hovav Shacham, editors, CRYPTO\u00a02017, Part\u00a0I, volume 10401 of LNCS, pages 133\u2013163. Springer, Heidelberg, August 2017.","DOI":"10.1007\/978-3-319-63688-7_5"},{"key":"9335_CR21","doi-asserted-by":"crossref","unstructured":"Zahra Jafargholi and Daniel Wichs. Adaptive security of Yao\u2019s garbled circuits. In Martin Hirt and Adam\u00a0D. Smith, editors, TCC\u00a02016-B, Part\u00a0I, volume 9985 of LNCS, pages 433\u2013458. Springer, Heidelberg, October\u00a0\/\u00a0November 2016.","DOI":"10.1007\/978-3-662-53641-4_17"},{"key":"9335_CR22","series-title":"LNCS","first-page":"23","volume-title":"ICISC 18","author":"Lucas Kowalczyk","year":"2019","unstructured":"Lucas Kowalczyk, Jiahui Liu, Tal Malkin, and Kailash Meiyappan. Mitigating the one-use restriction in attribute-based encryption. In Kwangsu Lee, editor, ICISC 18, volume 11396 of LNCS, pages 23\u201336. Springer, Heidelberg, November 2019."},{"key":"9335_CR23","doi-asserted-by":"crossref","unstructured":"Lucas Kowalczyk and Hoeteck Wee. Compact adaptively secure ABE for $$\\sf NCs^1$$ from $$k$$-lin. In Yuval Ishai and Vincent Rijmen, editors, EUROCRYPT\u00a02019, Part\u00a0I, volume 11476 of LNCS, pages 3\u201333. Springer, Heidelberg, May 2019.","DOI":"10.1007\/978-3-030-17653-2_1"},{"key":"9335_CR24","doi-asserted-by":"crossref","unstructured":"Allison\u00a0B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In Henri Gilbert, editor, EUROCRYPT\u00a02010, volume 6110 of LNCS, pages 62\u201391. Springer, Heidelberg, May\u00a0\/\u00a0June 2010.","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"9335_CR25","doi-asserted-by":"crossref","unstructured":"Allison\u00a0B. Lewko, Amit Sahai, and Brent Waters. Revocation systems with very small private keys. In 2010 IEEE Symposium on Security and Privacy, pages 273\u2013285. IEEE Computer Society Press, May 2010.","DOI":"10.1109\/SP.2010.23"},{"key":"9335_CR26","series-title":"LNCS","first-page":"455","volume-title":"TCC 2010","author":"Allison B Lewko","year":"2010","unstructured":"Allison\u00a0B. Lewko and Brent Waters. New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In Daniele Micciancio, editor, TCC\u00a02010, volume 5978 of LNCS, pages 455\u2013479. Springer, Heidelberg, February 2010."},{"key":"9335_CR27","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/978-3-642-20465-4_30","volume-title":"EUROCRYPT 2011","author":"Allison B Lewko","year":"2011","unstructured":"Allison\u00a0B. Lewko and Brent Waters. Unbounded HIBE and attribute-based encryption. In Kenneth\u00a0G. Paterson, editor, EUROCRYPT\u00a02011, volume 6632 of LNCS, pages 547\u2013567. Springer, Heidelberg, May 2011."},{"key":"9335_CR28","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/978-3-642-32009-5_12","volume-title":"CRYPTO 2012","author":"Allison B Lewko","year":"2012","unstructured":"Allison\u00a0B. Lewko and Brent Waters. New proof methods for attribute-based encryption: Achieving full security through selective techniques. In Reihaneh Safavi-Naini and Ran Canetti, editors, CRYPTO\u00a02012, volume 7417 of LNCS, pages 180\u2013198. Springer, Heidelberg, August 2012."},{"key":"9335_CR29","doi-asserted-by":"crossref","unstructured":"Rafail Ostrovsky, Amit Sahai, and Brent Waters. Attribute-based encryption with non-monotonic access structures. In Peng Ning, Sabrina De Capitani di Vimercati, and Paul\u00a0F. Syverson, editors, ACM CCS 2007, pages 195\u2013203. ACM Press, October 2007.","DOI":"10.1145\/1315245.1315270"},{"key":"9335_CR30","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-642-14623-7_11","volume-title":"CRYPTO 2010","author":"Tatsuaki Okamoto","year":"2010","unstructured":"Tatsuaki Okamoto and Katsuyuki Takashima. Fully secure functional encryption with general relations from the decisional linear assumption. In Tal Rabin, editor, CRYPTO\u00a02010, volume 6223 of LNCS, pages 191\u2013208. Springer, Heidelberg, August 2010."},{"key":"9335_CR31","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-642-34961-4_22","volume-title":"ASIACRYPT 2012","author":"Tatsuaki Okamoto","year":"2012","unstructured":"Tatsuaki Okamoto and Katsuyuki Takashima. Fully secure unbounded inner-product and attribute-based encryption. In Xiaoyun Wang and Kazue Sako, editors, ASIACRYPT\u00a02012, volume 7658 of LNCS, pages 349\u2013366. Springer, Heidelberg, December 2012."},{"key":"9335_CR32","series-title":"LNCS","first-page":"422","volume-title":"TCC 2012","author":"Bryan Parno","year":"2012","unstructured":"Bryan Parno, Mariana Raykova, and Vinod Vaikuntanathan. How to delegate and verify in public: Verifiable computation from attribute-based encryption. In Ronald Cramer, editor, TCC\u00a02012, volume 7194 of LNCS, pages 422\u2013439. Springer, Heidelberg, March 2012."},{"key":"9335_CR33","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"EUROCRYPT 2005","author":"Amit Sahai","year":"2005","unstructured":"Amit Sahai and Brent\u00a0R. Waters. Fuzzy identity-based encryption. In Ronald Cramer, editor, EUROCRYPT\u00a02005, volume 3494 of LNCS, pages 457\u2013473. Springer, Heidelberg, May 2005."},{"key":"9335_CR34","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-540-24582-7_12","volume-title":"INDOCRYPT 2003","author":"V Vinod","year":"2003","unstructured":"V.\u00a0Vinod, Arvind Narayanan, K.\u00a0Srinathan, C.\u00a0Pandu Rangan, and Kwangjo Kim. On the power of computational secret sharing. In Thomas Johansson and Subhamoy Maitra, editors, INDOCRYPT\u00a02003, volume 2904 of LNCS, pages 162\u2013176. Springer, Heidelberg, 2003."},{"key":"9335_CR35","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/978-3-642-03356-8_36","volume-title":"CRYPTO 2009","author":"Brent Waters","year":"2009","unstructured":"Brent Waters. Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. In Shai Halevi, editor, CRYPTO\u00a02009, volume 5677 of LNCS, pages 619\u2013636. Springer, Heidelberg, August 2009."},{"key":"9335_CR36","series-title":"LNCS","first-page":"616","volume-title":"TCC 2014","author":"Hoeteck Wee","year":"2014","unstructured":"Hoeteck Wee. Dual system encryption via predicate encodings. In Yehuda Lindell, editor, TCC\u00a02014, volume 8349 of LNCS, pages 616\u2013637. Springer, Heidelberg, February 2014."}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-019-09335-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-019-09335-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-019-09335-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T11:07:20Z","timestamp":1695208040000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-019-09335-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,16]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["9335"],"URL":"https:\/\/doi.org\/10.1007\/s00145-019-09335-x","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,16]]},"assertion":[{"value":"26 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}