{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:17:30Z","timestamp":1757618250013,"version":"3.44.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T00:00:00Z","timestamp":1749513600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T00:00:00Z","timestamp":1749513600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s00145-025-09541-w","type":"journal-article","created":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T17:27:44Z","timestamp":1749576464000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions"],"prefix":"10.1007","volume":"38","author":[{"given":"Nuttapong","family":"Attrapadung","sequence":"first","affiliation":[]},{"given":"Junichi","family":"Tomida","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,10]]},"reference":[{"key":"9541_CR1","first-page":"259","volume-title":"TCC 2016-A, Part II 2016, volume 9563 of LNCS","author":"S Agrawal","year":"2016","unstructured":"S. Agrawal, M. Chase, A study of pair encodings: Predicate encryption in prime order groups. In E. Kushilevitz and T. Malkin, editors, TCC 2016-A, Part II 2016, volume 9563 of LNCS, (Springer, Heidelberg, 2016) pp. 259\u2013288. ."},{"key":"9541_CR2","doi-asserted-by":"crossref","unstructured":"S. Agrawal, M. Chase. FAME: Fast attribute-based message encryption. In B. M. Thuraisingham, D. Evans, T. Malkin, D. Xu, editors, ACM CCS 2017, pages 665\u2013682. ACM Press, , 2017.","DOI":"10.1145\/3133956.3134014"},{"key":"9541_CR3","first-page":"627","volume-title":"EUROCRYPT 2017, Part I, 2017 volume 10210 of LNCS","author":"S Agrawal","year":"2017","unstructured":"S. Agrawal, M. Chase. Simplifying design and analysis of complex predicate encryption schemes. In J.-S. Coron, J. B. Nielsen, editors, EUROCRYPT 2017, Part I, 2017 volume 10210 of LNCS, (Springer, Heidelberg, 2017), pp. 627\u2013656."},{"key":"9541_CR4","first-page":"765","volume-title":"CRYPTO 2019, Part II, 2019, volume 11693 of LNCS","author":"S Agrawal","year":"2019","unstructured":"S. Agrawal, M. Maitra, S. Yamada. Attribute based encryption (and more) for nondeterministic finite automata from LWE. In A. Boldyreva, D. Micciancio, editors, CRYPTO 2019, Part II, 2019, volume 11693 of LNCS, (Springer, Heidelberg, 2019), pp. 765\u2013797."},{"key":"9541_CR5","first-page":"91","volume-title":"TCC 2019, Part II, 2019 volume 11892 of LNCS","author":"S Agrawal","year":"2019","unstructured":"S. Agrawal, M. Maitra, S. Yamada. Attribute based encryption for deterministic finite automata from $${{\\sf DLIN}}$$. In D. Hofheinz, A. Rosen, editors, TCC 2019, Part II, 2019 volume 11892 of LNCS, (Springer, Heidelberg, 2019), pp. 91\u2013117."},{"key":"9541_CR6","first-page":"36","volume-title":"CRYPTO 2017, Part I, 2019 volume 10401 of LNCS","author":"M Ambrona","year":"2017","unstructured":"M. Ambrona, G. Barthe, B. Schmidt. Generic transformations of predicate encodings: Constructions and applications. In J. Katz, H. Shacham, editors, CRYPTO 2017, Part I, 2019 volume 10401 of LNCS, (Springer, Heidelberg, 2017), pp. 36\u201366."},{"key":"9541_CR7","first-page":"557","volume-title":"EUROCRYPT 2014, 2014 volume 8441 of LNCS","author":"N Attrapadung","year":"2014","unstructured":"N. Attrapadung. Dual system encryption via doubly selective security: Framework, fully secure functional encryption for regular languages, and more. In P. Q. Nguyen, E. Oswald, editors, EUROCRYPT 2014, 2014 volume 8441 of LNCS, (Springer, Heidelberg, 2014), pp. 557\u2013577."},{"key":"9541_CR8","series-title":"Part II, volume 10032 of LNCS","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/978-3-662-53890-6_20","volume-title":"ASIACRYPT 2016","author":"N Attrapadung","year":"2016","unstructured":"N. Attrapadung. Dual system encryption framework in prime-order groups via computational pair encodings. In J. H. Cheon, T. Takagi, editors, ASIACRYPT 2016, Part II, volume 10032 of LNCS, pages 591\u2013623. Springer, Heidelberg, 2016."},{"key":"9541_CR9","series-title":"Part I, volume 11476 of LNCS","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-030-17653-2_2","volume-title":"EUROCRYPT 2019","author":"N Attrapadung","year":"2019","unstructured":"N. Attrapadung. Unbounded dynamic predicate compositions in attribute-based encryption. In Y. Ishai, V. Rijmen, editors, EUROCRYPT 2019, Part I, volume 11476 of LNCS, pages 34\u201367. Springer, Heidelberg, 2019."},{"key":"9541_CR10","series-title":"Part I, volume 9452 of LNCS","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1007\/978-3-662-48797-6_24","volume-title":"ASIACRYPT 2015","author":"N Attrapadung","year":"2015","unstructured":"N. Attrapadung, G. Hanaoka, S. Yamada. Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs. In T. Iwata, J. H. Cheon, editors, ASIACRYPT 2015, Part I, volume 9452 of LNCS, pages 575\u2013601. Springer, Heidelberg, 2015."},{"key":"9541_CR11","series-title":"LNCS","first-page":"90","volume-title":"PKC 2011","author":"N Attrapadung","year":"2011","unstructured":"N. Attrapadung, B. Libert, E. de Panafieu. Expressive key-policy attribute-based encryption with constant-size ciphertexts. In D. Catalano, N. Fazio, R. Gennaro, A. Nicolosi, editors, PKC 2011, volume 6571 of LNCS, pages 90\u2013108. Springer, Heidelberg, 2011."},{"key":"9541_CR12","series-title":"Part III, volume 12493 of LNCS","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/978-3-030-64840-4_14","volume-title":"ASIACRYPT 2020","author":"N Attrapadung","year":"2020","unstructured":"N. Attrapadung, J. Tomida. Unbounded dynamic predicate compositions in ABE from standard assumptions. In S. Moriai, H. Wang, editors, ASIACRYPT 2020, Part III, volume 12493 of LNCS, pages 405\u2013436. Springer, Heidelberg, 2020."},{"key":"9541_CR13","series-title":"LNCS","first-page":"87","volume-title":"CT-RSA 2015","author":"N Attrapadung","year":"2015","unstructured":"N. Attrapadung, S. Yamada. Duality in ABE: Converting attribute based encryption for dual predicate and dual policy via computational encodings. In K. Nyberg, editor, CT-RSA 2015, volume 9048 of LNCS, pages 87\u2013105. Springer, Heidelberg, 2015."},{"key":"9541_CR14","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"D. Boneh, M. K. Franklin. Identity-based encryption from the Weil pairing. In J. Kilian, editor, CRYPTO 2001, volume 2139 of LNCS, pages 213\u2013229. Springer, Heidelberg, 2001."},{"key":"9541_CR15","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-3-540-89255-7_28","volume-title":"ASIACRYPT 2008","author":"D Boneh","year":"2008","unstructured":"D. Boneh, M. Hamburg. Generalized identity based and broadcast encryption schemes. In J. Pieprzyk, editor, ASIACRYPT 2008, volume 5350 of LNCS, pages 455\u2013470. Springer, Heidelberg, 2008."},{"key":"9541_CR16","series-title":"Part II, volume 9057 of LNCS","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/978-3-662-46803-6_20","volume-title":"EUROCRYPT 2015","author":"J Chen","year":"2015","unstructured":"J. Chen, R. Gay, H. Wee. Improved dual system ABE in prime-order groups via predicate encodings. In E. Oswald, M. Fischlin, editors, EUROCRYPT 2015, Part II, volume 9057 of LNCS, pages 595\u2013624. Springer, Heidelberg, 2015."},{"key":"9541_CR17","series-title":"Part I, volume 10820 of LNCS","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/978-3-319-78381-9_19","volume-title":"EUROCRYPT 2018","author":"J Chen","year":"2018","unstructured":"J. Chen, J. Gong, L. Kowalczyk, H. Wee. Unbounded ABE via bilinear entropy expansion, revisited. In J. B. Nielsen, V. Rijmen, editors, EUROCRYPT 2018, Part I, volume 10820 of LNCS, pages 503\u2013534. Springer, Heidelberg, 2018."},{"key":"9541_CR18","series-title":"LNCS","first-page":"277","volume-title":"SCN 14","author":"J Chen","year":"2014","unstructured":"J. Chen, H. Wee. Semi-adaptive attribute-based encryption and improved delegation for Boolean formula. In M. Abdalla, R. D. Prisco, editors, SCN 14, volume 8642 of LNCS, pages 277\u2013297. Springer, Heidelberg, 2014."},{"issue":"4","key":"9541_CR19","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1137\/0214058","volume":"14","author":"S Cook","year":"1985","unstructured":"S. Cook, H. Hoover. A depth-universal circuit. SIAM Journal on Computing, 14(4):833\u2013839, 1985.","journal-title":"SIAM Journal on Computing"},{"key":"9541_CR20","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-540-76900-2_12","volume-title":"ASIACRYPT 2007","author":"C Delerabl\u00e9e","year":"2007","unstructured":"C. Delerabl\u00e9e. Identity-based broadcast encryption with constant size ciphertexts and private keys. In K. Kurosawa, editor, ASIACRYPT 2007, volume 4833 of LNCS, pages 200\u2013215. Springer, Heidelberg, 2007."},{"issue":"1","key":"9541_CR21","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/s00145-015-9220-6","volume":"30","author":"A Escala","year":"2017","unstructured":"A. Escala, G. Herold, E. Kiltz, C. R\u00e0fols, J. L. Villar. An algebraic framework for Diffie-Hellman assumptions. Journal of Cryptology, 30(1):242\u2013288, 2017.","journal-title":"Journal of Cryptology"},{"key":"9541_CR22","series-title":"Part II, volume 10032 of LNCS","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1007\/978-3-662-53890-6_21","volume-title":"ASIACRYPT 2016","author":"J Gong","year":"2016","unstructured":"J. Gong, X. Dong, J. Chen, Z. Cao. Efficient IBE with tight reduction to standard assumption in the multi-challenge setting. In J. H. Cheon, T. Takagi, editors, ASIACRYPT 2016, Part II, volume 10032 of LNCS, pages 624\u2013654. Springer, Heidelberg, 2016."},{"key":"9541_CR23","series-title":"Part II, volume 11693 of LNCS","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1007\/978-3-030-26951-7_25","volume-title":"CRYPTO 2019","author":"J Gong","year":"2019","unstructured":"J. Gong, B. Waters, H. Wee. ABE for DFA from $$k$$-Lin. In A. Boldyreva, D. Micciancio, editors, CRYPTO 2019, Part II, volume 11693 of LNCS, pages 732\u2013764. Springer, Heidelberg, 2019."},{"key":"9541_CR24","series-title":"Part III, volume 12107 of LNCS","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-030-45727-3_10","volume-title":"EUROCRYPT 2020","author":"J Gong","year":"2020","unstructured":"J. Gong, H. Wee. Adaptively secure ABE for DFA from $$k$$-Lin and more. In A. Canteaut, Y. Ishai, editors, EUROCRYPT 2020, Part III, volume 12107 of LNCS, pages 278\u2013308. Springer, Heidelberg, 2020."},{"key":"9541_CR25","doi-asserted-by":"crossref","unstructured":"S. Gorbunov, V. Vaikuntanathan, H. Wee. Attribute-based encryption for circuits. In D. Boneh, T. Roughgarden, J. Feigenbaum, editors, 45th ACM STOC, pages 545\u2013554. ACM Press, 2013.","DOI":"10.1145\/2488608.2488677"},{"key":"9541_CR26","series-title":"Part II, volume 9986 of LNCS","first-page":"361","volume-title":"TCC 2016-B","author":"R Goyal","year":"2016","unstructured":"R. Goyal, V. Koppula, B. Waters. Semi-adaptive security and bundling functionalities made generic and easy. In M. Hirt, A. D. Smith, editors, TCC 2016-B, Part II, volume 9986 of LNCS, pages 361\u2013388. Springer, Heidelberg, 2016."},{"key":"9541_CR27","doi-asserted-by":"crossref","unstructured":"V. Goyal, O. Pandey, A. Sahai, B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. In A. Juels, R. N. Wright, S. De Capitani di Vimercati, editors, ACM CCS 2006, pages 89\u201398. ACM Press, 2006.","DOI":"10.1145\/1180405.1180418"},{"key":"9541_CR28","series-title":"Part I, volume 10401 of LNCS","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-319-63688-7_5","volume-title":"CRYPTO 2017","author":"Z Jafargholi","year":"2017","unstructured":"Z. Jafargholi, C. Kamath, K. Klein, I. Komargodski, K. Pietrzak, D. Wichs. Be adaptive, avoid overcommitting. In J. Katz, H. Shacham, editors, CRYPTO 2017, Part I, volume 10401 of LNCS, pages 133\u2013163. Springer, Heidelberg, 2017."},{"key":"9541_CR29","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-540-78967-3_9","volume-title":"EUROCRYPT 2008","author":"J Katz","year":"2008","unstructured":"J. Katz, A. Sahai, B. Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In N. P. Smart, editor, EUROCRYPT 2008, volume 4965 of LNCS, pages 146\u2013162. Springer, Heidelberg, 2008."},{"key":"9541_CR30","series-title":"Part I, volume 11476 of LNCS","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-17653-2_1","volume-title":"EUROCRYPT 2019","author":"L Kowalczyk","year":"2019","unstructured":"L. Kowalczyk, H. Wee. Compact adaptively secure ABE for $${{\\sf NC}}^{1}$$ from $$k$$-Lin. In Y. Ishai, V. Rijmen, editors, EUROCRYPT 2019, Part I, volume 11476 of LNCS, pages 3\u201333. Springer, Heidelberg, 2019."},{"key":"9541_CR31","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/978-3-642-20465-4_30","volume-title":"EUROCRYPT 2011","author":"AB Lewko","year":"2011","unstructured":"A. B. Lewko, B. Waters. Unbounded HIBE and attribute-based encryption. In K. G. Paterson, editor, EUROCRYPT 2011, volume 6632 of LNCS, pages 547\u2013567. Springer, Heidelberg, 2011."},{"key":"9541_CR32","first-page":"247","volume-title":"EUROCRYPT 2020, Part III, volume 12107 of LNCS","author":"H Lin","year":"2020","unstructured":"H. Lin, J. Luo. Compact adaptively secure ABE from $$k$$-Lin: Beyond $${{\\sf NC}}^{1}$$ and towards $$\\sf NL$$. In A. Canteaut, Y. Ishai, editors, EUROCRYPT 2020, Part III, volume 12107 of LNCS, (Springer, Heidelberg, 2020), pp. 247\u2013277"},{"key":"9541_CR33","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-642-14623-7_11","volume-title":"CRYPTO 2010","author":"T Okamoto","year":"2010","unstructured":"T. Okamoto, K. Takashima. Fully secure functional encryption with general relations from the decisional linear assumption. In T. Rabin, editor, CRYPTO 2010, volume 6223 of LNCS, pages 191\u2013208. Springer, Heidelberg, 2010."},{"key":"9541_CR34","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-642-34961-4_22","volume-title":"ASIACRYPT 2012","author":"T Okamoto","year":"2012","unstructured":"T. Okamoto, K. Takashima. Fully secure unbounded inner-product and attribute-based encryption. In X. Wang and K. Sako, editors, ASIACRYPT 2012, volume 7658 of LNCS, pages 349\u2013366. Springer, Heidelberg, 2012."},{"issue":"4","key":"9541_CR35","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1109\/TCC.2014.2353053","volume":"2","author":"T Okamoto","year":"2014","unstructured":"T. Okamoto, K. Takashima. Efficient attribute-based signatures for non-monotone predicates in the standard model. IEEE Trans. Cloud Comput., 2(4):409\u2013421, 2014.","journal-title":"IEEE Trans. Cloud Comput."},{"key":"9541_CR36","doi-asserted-by":"crossref","unstructured":"R. Ostrovsky, A. Sahai, B. Waters. Attribute-based encryption with non-monotonic access structures. In P. Ning, S. De Capitani di Vimercati, P. F. Syverson, editors, ACM CCS 2007, pages 195\u2013203. ACM Press, 2007.","DOI":"10.1145\/1315245.1315270"},{"key":"9541_CR37","doi-asserted-by":"crossref","unstructured":"Y. Rouselakis, B. Waters. Practical constructions and new proof methods for large universe attribute-based encryption. In A.-R. Sadeghi, V. D. Gligor, M. Yung, editors, ACM CCS 2013, pages 463\u2013474. ACM Press, 2013.","DOI":"10.1145\/2508859.2516672"},{"key":"9541_CR38","first-page":"457","volume-title":"EUROCRYPT 2005, volume 3494 of LNCS","author":"A Sahai","year":"2005","unstructured":"A. Sahai, B. R. Waters. Fuzzy identity-based encryption. In R. Cramer, editor, EUROCRYPT 2005, volume 3494 of LNCS, pages 457\u2013473. Springer, Heidelberg 2005."},{"key":"9541_CR39","first-page":"298","volume-title":"SCN 14, volume 8642 of LNCS","author":"K Takashima","year":"2014","unstructured":"K. Takashima. Expressive attribute-based encryption with constant-size ciphertexts from the decisional linear assumption. In M. Abdalla, R. D. Prisco, editors, SCN 14, volume 8642 of LNCS, pages 298\u2013317. Springer, Heidelberg 2014."},{"key":"9541_CR40","first-page":"3","volume-title":"PKC 2020, Part I, volume 12110 of LNCS","author":"J Tomida","year":"2020","unstructured":"J. Tomida, Y. Kawahara, R. Nishimaki. Fast, compact, and expressive attribute-based encryption. In A. Kiayias, M. Kohlweiss, P. Wallden, V. Zikas, editors, PKC 2020, Part I, volume 12110 of LNCS, pages 3\u201333. Springer, Heidelberg 2020."},{"key":"9541_CR41","first-page":"619","volume-title":"CRYPTO 2009, volume 5677 of LNCS","author":"B Waters","year":"2009","unstructured":"B. Waters. Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. In S. Halevi, editor, CRYPTO 2009, volume 5677 of LNCS, pages 619\u2013636. Springer, Heidelberg 2009."},{"key":"9541_CR42","first-page":"218","volume-title":"CRYPTO 2012, volume 7417 of LNCS","author":"B Waters","year":"2012","unstructured":"B. Waters. Functional encryption for regular languages. In R. Safavi-Naini, R. Canetti, editors, CRYPTO 2012, volume 7417 of LNCS, pages 218\u2013235. Springer, Heidelberg 2012."},{"key":"9541_CR43","first-page":"616","volume-title":"TCC 2014, volume 8349 of LNCS","author":"H Wee","year":"2014","unstructured":"H. Wee. Dual system encryption via predicate encodings. In Y. Lindell, editor, TCC 2014, volume 8349 of LNCS, pages 616\u2013637. Springer, Heidelberg 2014."},{"key":"9541_CR44","first-page":"275","volume-title":"PKC 2014, volume 8383 of LNCS","author":"S Yamada","year":"2014","unstructured":"S. Yamada, N. Attrapadung, G. Hanaoka, N. Kunihiro. A framework and compact constructions for non-monotonic attribute-based encryption. In H. Krawczyk, editor, PKC 2014, volume 8383 of LNCS, pages 275\u2013292. Springer, Heidelberg 2014."}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-025-09541-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00145-025-09541-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-025-09541-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T19:07:27Z","timestamp":1757185647000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00145-025-09541-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,10]]},"references-count":44,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["9541"],"URL":"https:\/\/doi.org\/10.1007\/s00145-025-09541-w","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"type":"print","value":"0933-2790"},{"type":"electronic","value":"1432-1378"}],"subject":[],"published":{"date-parts":[[2025,6,10]]},"assertion":[{"value":"13 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 June 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"26"}}