{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T18:17:34Z","timestamp":1774721854359,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,5,23]],"date-time":"2016-05-23T00:00:00Z","timestamp":1463961600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402055"],"award-info":[{"award-number":["61402055"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Scientic Research Project of Hunan Province","award":["No.15C0041"],"award-info":[{"award-number":["No.15C0041"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Acta Informatica"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s00236-016-0270-5","type":"journal-article","created":{"date-parts":[[2016,5,24]],"date-time":"2016-05-24T10:06:03Z","timestamp":1464084363000},"page":"521-541","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["Efficient and secure attribute-based signature for monotone predicates"],"prefix":"10.1007","volume":"54","author":[{"given":"Ke","family":"Gu","sequence":"first","affiliation":[]},{"given":"Weijia","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,23]]},"reference":[{"issue":"1","key":"270_CR1","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/s00145-007-9011-9","volume":"22","author":"A Bender","year":"2009","unstructured":"Bender, A., Katz, J., Morselli, R.: Ring signatures: stronger definitions, and constructions without random oracles. J. Cryptol. 22(1), 114\u2013138 (2009)","journal-title":"J. Cryptol."},{"key":"270_CR2","doi-asserted-by":"crossref","unstructured":"Boyen, X.: Mesh signatures. Advances in Cryptology-EUROCRYPT 2007. LNCS 4515, Springer-Verlag, pp. 210\u2013227 ( 2007)","DOI":"10.1007\/978-3-540-72540-4_12"},{"key":"270_CR3","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Warters, B.: Ciphertext-Policy Attribute-Based Encryption. In: Proceedings of IEEE Symposium on Security and Privacy, ACM, pp. 321\u2013334 (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"270_CR4","unstructured":"Beimel, A.: Secure Schemes for Secret Sharing and Key Distribution, PhD Thesis, Israel Institute of Technology, Haifa, Israel (1996)"},{"key":"270_CR5","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X.: Short signatures without random oracles. Advances in Cryptology-EUROCRYPT 2004. LNCS 3027, Springer-Verlag, pp.56\u201373 (2004)","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"270_CR6","doi-asserted-by":"crossref","unstructured":"Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Randomizable proofs and delegatable anonymous credentials. Advances in Cryptology-CRYPTO 2009, LNCS 5677, Springer-Verlag, pp. 108\u2013125 (2009)","DOI":"10.1007\/978-3-642-03356-8_7"},{"key":"270_CR7","doi-asserted-by":"crossref","unstructured":"Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: P-signatures and noninteractive anonymous credentials. TCC 2008, LNCS 4948, Springer-Verlag, pp. 356\u2013374 (2008)","DOI":"10.1007\/978-3-540-78524-8_20"},{"key":"270_CR8","unstructured":"Beimel, A.: Secure Schemes for Secret Sharing and Key Distribution. PhD Thesis, Israel Institute of Technology, Haifa, Israel (1996)"},{"key":"270_CR9","doi-asserted-by":"crossref","unstructured":"Chen, C., Chen, J., Lim, H.W., Zhang, Z.F., Feng, D.G., Ling, S., Wang, H.X.: Fully secure attribute-based systems with short ciphertexts\/signatures and threshold access structures. RSA 2013, LNCS 7779, Springer-Verlag, pp. 50\u201367 (2013)","DOI":"10.1007\/978-3-642-36095-4_4"},{"key":"270_CR10","doi-asserted-by":"crossref","unstructured":"Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, ACM, pp. 456\u2013465 (2007)","DOI":"10.1145\/1315245.1315302"},{"key":"270_CR11","doi-asserted-by":"crossref","unstructured":"Gu, J.: An efficient and practicable anonymous authentication scheme using smart cards. Information Theory and Information Security 2010 (ICITIS 2010), IEEE Computer Society, pp. 470\u2013473 (2010)","DOI":"10.1109\/ICITIS.2010.5689562"},{"key":"270_CR12","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Warters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, ACM, pp. 89\u201398 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"270_CR13","doi-asserted-by":"crossref","unstructured":"Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute-based encryption. In: Proceedings of the 35th International Colloquium on Automata, Languages and Programming. LNCS 5126, Springer-Verlag, pp. 579\u2013591 (2008)","DOI":"10.1007\/978-3-540-70583-3_47"},{"key":"270_CR14","unstructured":"Guo, S., Zeng, Y.: Attribute-based signature scheme. In: International Conference on Information Security and Assurance 2008, IEEE Computer Society, pp. 509\u2013511 (2008)"},{"key":"270_CR15","doi-asserted-by":"crossref","unstructured":"Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. Advances in Cryptology-EUROCRYPT 2008, LNCS 4965, Springer-Verlag, pp. 415\u2013432 (2008)","DOI":"10.1007\/978-3-540-78967-3_24"},{"key":"270_CR16","doi-asserted-by":"crossref","unstructured":"Herranz, J., Laguillaumie, F., Libert, B., Rfols, C.: Short attribute-based signatures for threshold predicates. CT-RSA 2012, LNCS 7178, Springer-Verlag, pp. 51\u201367 (2012)","DOI":"10.1007\/978-3-642-27954-6_4"},{"key":"270_CR17","doi-asserted-by":"crossref","unstructured":"Karchmer, M., Wigderson, A.: On span programs. In: Proceedings of the 8th IEEE Structure in Complexity Theory conference, San Diego, IEEE Computer Society Press, pp. 102\u2013111 (1993)","DOI":"10.1109\/SCT.1993.336536"},{"key":"270_CR18","unstructured":"Khader, D.: Attribute based group signature with revocation. Cryptology ePrint Archive, Report 2007\/241 (2007). http:\/\/eprint.iacr.org\/2007\/241"},{"key":"270_CR19","unstructured":"Khader, D.: Attribute based group signatures. Cryptology ePrint Archive, Report 2007\/159 (2007). http:\/\/eprint.iacr.org\/2007\/159"},{"key":"270_CR20","doi-asserted-by":"crossref","unstructured":"Libert, B., Peters, T., Yung, M.: Scalable group signatures with revocation. Advances in Cryptology-EUROCRYPT 2012, LNCS 7323, Springer-Verlag, pp. 609\u2013627 (2012)","DOI":"10.1007\/978-3-642-29011-4_36"},{"key":"270_CR21","doi-asserted-by":"crossref","unstructured":"Li, J., Au, M.H., Susilo, W., Xie, D., Ren, K.: Attribute-based signature and its applications. ASIACCS 2010, ACM, pp. 60\u201369 (2010)","DOI":"10.1145\/1755688.1755697"},{"key":"270_CR22","unstructured":"Li, J., Kim, K.: Attribute-based ring signatures. Cryptology ePrint Archive, Report 2008\/394 (2008). http:\/\/eprint.iacr.org\/2008\/394"},{"key":"270_CR23","doi-asserted-by":"crossref","unstructured":"Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. Topics in Cryptology-CT-RSA 2011, LNCS 6558, Springer-Verlag, pp. 376\u2013392 (2011)","DOI":"10.1007\/978-3-642-19074-2_24"},{"key":"270_CR24","doi-asserted-by":"crossref","unstructured":"Okamoto, T., Takashima, K., Signatures, efficient attribute-based, for non-monotone predicates in the standard model. Public Key Cryptography-PKC: LNCS 6571. Springer-Verlag, pp. 35\u201352 (2011)","DOI":"10.1007\/978-3-642-19379-8_3"},{"key":"270_CR25","doi-asserted-by":"crossref","unstructured":"Sahai, A., Warters, B.: Fuzzy identity-based encryption. Advances in Cryptology-EUROCRYPT 2005, LNCS 3494, Springer-Verlag, pp. 457\u2013473 (2005)","DOI":"10.1007\/11426639_27"},{"key":"270_CR26","doi-asserted-by":"crossref","unstructured":"Shahandashti, S.F., Safavi-Naini, R.: Threshold attribute-based signatures and their application to anonymous credential systems. Advances in Cryptology-AFRICACRYPT 2009, LNCS 5580, Springer-Verlag, pp. 198\u2013216 (2009)","DOI":"10.1007\/978-3-642-02384-2_13"},{"key":"270_CR27","doi-asserted-by":"crossref","unstructured":"Waters, B.: Efficient identity-based encryption without random oracles. Advances in Cryptology-EUROCRYPT 2005, LNCS 3494, Springer-Verlag, pp. 114\u2013127 (2005)","DOI":"10.1007\/11426639_7"},{"key":"270_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Feng, D.G., Zhang, Z.F., Zhang, L.W.: On the security of an efficient attribute-based signature. NSS 2013, LNCS 7873, Springer-Verlag, pp. 381\u2013392 (2013)","DOI":"10.1007\/978-3-642-38631-2_28"}],"container-title":["Acta Informatica"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00236-016-0270-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00236-016-0270-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00236-016-0270-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00236-016-0270-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T19:08:30Z","timestamp":1748977710000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00236-016-0270-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,23]]},"references-count":28,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["270"],"URL":"https:\/\/doi.org\/10.1007\/s00236-016-0270-5","relation":{},"ISSN":["0001-5903","1432-0525"],"issn-type":[{"value":"0001-5903","type":"print"},{"value":"1432-0525","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,23]]}}}