{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T01:19:13Z","timestamp":1768526353950,"version":"3.49.0"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,5,18]],"date-time":"2010-05-18T00:00:00Z","timestamp":1274140800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1007\/s10623-010-9405-9","type":"journal-article","created":{"date-parts":[[2010,5,17]],"date-time":"2010-05-17T01:57:21Z","timestamp":1274061441000},"page":"235-257","source":"Crossref","is-referenced-by-count":59,"title":["Inner-product encryption under standard assumptions"],"prefix":"10.1007","volume":"58","author":[{"given":"Jong Hwan","family":"Park","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,5,18]]},"reference":[{"key":"9405_CR1","unstructured":"Abdalla M., Bellare M., Catalano D., Kiltz E., Kohno T., Lange T., Malone-Lee J., Neven G., Paillier P., Shi H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extentions. In: CRYPTO\u201805, vol. 3621, pp. 205\u2013222. (2005)."},{"key":"9405_CR2","doi-asserted-by":"crossref","unstructured":"Bethancourt J., Sahai A., Waters B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321\u2013334. (2007).","DOI":"10.1109\/SP.2007.11"},{"key":"9405_CR3","unstructured":"Boneh D., Boyen X.: Efficient selective-ID secure identity based encryption without random oracles. In: EUROCRYPT\u201804, vol. 3027, pp. 223\u2013238. (2004)."},{"key":"9405_CR4","unstructured":"Boneh D., Boyen X., Shacham H.: Short group signatures, In: CRYPTO\u201804, vol. 3152, pp. 41\u201355 (2004)."},{"key":"9405_CR5","doi-asserted-by":"crossref","unstructured":"Boneh D., Crescenzo G.D., Octrovsky R., Persiano G., Public key encryption with keyword search. In: EUROCRYPT\u201804. vol. 3027, pp. 506\u2013522. (2004).","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"9405_CR6","unstructured":"Boneh D., Franklin M., Identity-based encryption from the Weil pairing. In: CRYPTO\u201801, vol. 2139, pp. 213\u2013229. (2001)."},{"key":"9405_CR7","doi-asserted-by":"crossref","unstructured":"Boneh D., Gentry C., Hamburg M.: Space-efficient identity based encryption without pairings. In: FOCS\u201807, pp. 647\u2013657. (2007).","DOI":"10.1109\/FOCS.2007.50"},{"key":"9405_CR8","unstructured":"Boneh D., Waters B.: Conjunctive, subset, and range queries on encrypted data. In: TCC\u201807, vol. 4392, pp. 535\u2013554. (2007)."},{"key":"9405_CR9","unstructured":"Boyen D., Waters B.: Anonymous hierarchical identity-based encryption (without random oracles). In: CRYPTO\u201806, vol. 4117, pp. 290\u2013307. (2006)."},{"key":"9405_CR10","unstructured":"Chen L., Cheng Z.: Security proof of Sakai-Kasahara\u2019s idenitty based encryption scheme. In: IMA\u201805, vol. 3796, pp. 442\u2013459. (2005)."},{"key":"9405_CR11","doi-asserted-by":"crossref","unstructured":"Cocks C.: An identity based encryption scheme based on quadratic residues. In: IMA\u201801. (2001).","DOI":"10.1007\/3-540-45325-3_32"},{"key":"9405_CR12","unstructured":"Gentry C.: Practical identity-based encryption without random oracles. In: EUROCRYPT\u201806, vol. 4004, pp. 445\u2013464. (2006)."},{"key":"9405_CR13","doi-asserted-by":"crossref","unstructured":"Goyal V., Pandey O., Sahai A., Waters B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM-CCS\u201806, pp. 89\u201398. (2006).","DOI":"10.1145\/1180405.1180418"},{"key":"9405_CR14","unstructured":"Iovino V., Persiano G.: Hidden-vector encryption with groups of prime order. In: Pairing\u201808, vol. 5209, pp. 75\u201388. (2008)."},{"key":"9405_CR15","unstructured":"Katz J., Sahai A., Waters, B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: EUROCRYPT\u201808, vol. 4965, pp. 146\u2013162 (2008)."},{"key":"9405_CR16","doi-asserted-by":"crossref","unstructured":"Lewko A., Okamoto T., Sahai A., Takashima K., Waters B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner-product encryption. To appear in EUROCRYPT\u201810 (2010).","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"9405_CR17","unstructured":"Okamoto T., Takashima K.: Hierarchical predicate encryption for inner-products. In: ASIACRYPT\u201809, vol. 5912, pp. 214\u2013231 (2009)."},{"key":"9405_CR18","doi-asserted-by":"crossref","unstructured":"Ostrovsky R., Sahai A., Waters B.: Attribute-based encryption with non-monotonic access structures. In: ACM-CCS\u201807, pp. 195\u2013203. (2007).","DOI":"10.1145\/1315245.1315270"},{"key":"9405_CR19","unstructured":"Sahai A., Waters B.: Fuzzy identity-based encryption. In: EUROCRYPT\u201805, vol. 3494, pp. 457\u2013473 (2005)."},{"key":"9405_CR20","unstructured":"Seo J.H., Kobayashi T., Oukubo M., Suzuki K.: Anonymous hierarchical identity-based enryption with constant size ciphertexts. In: PKC\u201809, vol. 5443, pp. 215\u2013234. (2009)."},{"key":"9405_CR21","unstructured":"Waters B.: Efficient identity-based encryption without random oracles. In: EUROCRYPT\u201805, vol. 3494, pp. 114\u2013127. (2005)."},{"key":"9405_CR22","unstructured":"Waters B.: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: CRYPTO\u201809, vol. 5677, pp. 619\u2013636. (2009)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-010-9405-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-010-9405-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-010-9405-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:58:28Z","timestamp":1559246308000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-010-9405-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5,18]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,3]]}},"alternative-id":["9405"],"URL":"https:\/\/doi.org\/10.1007\/s10623-010-9405-9","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,5,18]]}}}