{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:24:12Z","timestamp":1759638252607},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,6,17]],"date-time":"2010-06-17T00:00:00Z","timestamp":1276732800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1007\/s10623-010-9412-x","type":"journal-article","created":{"date-parts":[[2010,6,15]],"date-time":"2010-06-15T22:29:02Z","timestamp":1276640942000},"page":"297-319","source":"Crossref","is-referenced-by-count":13,"title":["Improved hidden vector encryption with short ciphertexts and tokens"],"prefix":"10.1007","volume":"58","author":[{"given":"Kwangsu","family":"Lee","sequence":"first","affiliation":[]},{"given":"Dong Hoon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,6,17]]},"reference":[{"key":"9412_CR1","unstructured":"Abdalla M., Bellare M., Catalano D., Kiltz E., Kohno T., Lange T., Malone-Lee J., Neven G., Paillier P., Shi H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. In: Shoup V. (ed.) Advances in Cryptology\u2014CRYPTO 2005. Lecture Notes in Computer Science, vol. 3621, pp. 205\u2013222. Springer, Heidelberg (2005)."},{"key":"9412_CR2","unstructured":"Bethencourt J., Sahai A., Waters B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy 2007, pp. 321\u2013334. IEEE Computer Society, Oakland, CA, USA (2007)."},{"key":"9412_CR3","unstructured":"Blundo C., Iovino V., Persiano G.: Private-key hidden vector encryption with key privacy. In: Garay J.A., Miyaji A., Otsuka A. (eds.) CANS 2009. Lecture Notes in Computer Science, vol. 5888, pp. 259\u2013277. Springer, Heidelberg (2009)."},{"key":"9412_CR4","unstructured":"Boneh D., Boyen X.: Efficient selective-ID secure identity based encryption without random oracles. In: Cachin C., Camenisch J. (eds.) Advances in Cryptology\u2014EUROCRYPT 2004. Lecture Notes in Computer Science, vol. 3027, pp. 223\u2013238. Springer, Heidelberg (2004)."},{"key":"9412_CR5","unstructured":"Boneh D., Franklin M.K.: Identity-based encryption from the weil pairing. In: Kilian J. (ed.) Advances in Cryptology\u2014CRYPTO 2001. Lecture Notes in Computer Science, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001)."},{"issue":"3","key":"9412_CR6","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D. Boneh","year":"2003","unstructured":"Boneh D., Franklin M.K.: Identity-based encryption from the weil pairing. SIAM J. Comput. 32(3), 586\u2013615 (2003)","journal-title":"SIAM J. Comput."},{"key":"9412_CR7","unstructured":"Boneh D., Waters B.: A fully collusion resistant broadcast, trace, and revoke system. In: ACM Conference on Computer and Communications Security 2006, pp. 211\u2013220. ACM, Alexandria, VA, USA (2006)."},{"key":"9412_CR8","unstructured":"Boyen X., Waters B.: Anonymous hierarchical identity-based encryption (without random oracles). In: Dwork C. (ed.) Advances in Cryptology\u2014CRYPTO 2006. Lecture Notes in Computer Science, vol. 4117, pp. 290\u2013307. Springer, Heidelberg (2006)."},{"key":"9412_CR9","unstructured":"Boneh D., Waters B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan S.P. (ed.) TCC 2007. Lecture Notes in Computer Science, vol. 4392, pp. 535\u2013554. Springer, Heidelberg (2007)."},{"key":"9412_CR10","unstructured":"Boneh D., Boyen X., Goh E.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer R. (ed.) Advances in Cryptology\u2014EUROCRYPT 2005. Lecture Notes in Computer Science, vol. 3493, pp. 440\u2013456. Springer, Heidelberg (2005)."},{"key":"9412_CR11","unstructured":"Boneh D., Goh E.-J., Nissim K.: Evaluating 2-DNF formula on ciphertexts. In: Kilian J. (ed.) TCC 2005. Lecture Notes in Computer Science, vol. 3378, pp. 325\u2013342. Springer, Heidelberg (2005)."},{"key":"9412_CR12","unstructured":"Boneh D., Sahai A., Waters B.: Fully collusion resistant traitor tracing with short ciphertexts and private keys. In: Vaudenay S. (ed.) Advances in Cryptology\u2014EUROCRYPT 2006. Lecture Notes in Computer Science, vol. 4004, pp. 573\u2013592. Springer, Heidelberg (2006)."},{"key":"9412_CR13","unstructured":"Boneh D., Di Crescenzo G., Ostrovsky R., Persiano G.: Public-key encryption with keyword search. In: Cachin C., Camenisch J. (eds.) Advances in Cryptology\u2014EUROCRYPT 2004. Lecture Notes in Computer Science, vol. 3027, pp. 506\u2013522. Springer, Heidelberg (2004)."},{"key":"9412_CR14","unstructured":"Freeman D.M.: Converting pairing-based cryptosystems from composite-order groups to prime-order groups. In: Gilbert H. (ed.) Advances in Cryptology\u2014EUROCRYPT 2010. Lecture Notes in Computer Science, vol. 6110, pp. 44\u201361. Springer, Heidelberg (2010)."},{"issue":"16","key":"9412_CR15","doi-asserted-by":"crossref","first-page":"3113","DOI":"10.1016\/j.dam.2007.12.010","volume":"156","author":"S.D. Galbraith","year":"2008","unstructured":"Galbraith S.D., Paterson K.G., Smart N.P.: Pairings for cryptographers. Discret. Appl. Math. 156(16), 3113\u20133121 (2008)","journal-title":"Discret. Appl. Math."},{"issue":"3","key":"9412_CR16","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O. Goldreich","year":"1996","unstructured":"Goldreich O., Ostrovsky R.: Software protection and simulation by oblivious RAMs. J. ACM 43(3), 431\u2013473 (1996)","journal-title":"J. ACM"},{"key":"9412_CR17","unstructured":"Goyal V., Pandey O., Sahai A., Waters B.: Attribute based encryption for fine-graned access control of encrypted data. In: ACM Conference on Computer and Communications Security 2006, pp. 89\u201398. ACM, Alexandria, VA, USA (2006)."},{"key":"9412_CR18","unstructured":"Iovino V., Persiano G.: Hidden-vector encryption with groups of prime order. In: Galbraith S.D., Paterson K.G. (eds.) Pairing 2008. Lecture Notes in Computer Science, vol. 5209, pp. 75\u201388. Springer, Heidelberg (2008)."},{"key":"9412_CR19","unstructured":"Katz J., Sahai A., Waters B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Smart N.P. (ed.) Advances in Cryptology\u2014EUROCRYPT 2008. Lecture Notes in Computer Science, vol. 4965, pp. 146\u2013162. Springer, Heidelberg (2008)."},{"key":"9412_CR20","unstructured":"Okamoto T., Takashima K.: Hierarchical predicate encryption for inner-products. In: Matsui M. (ed.) Advances in Cryptology\u2014ASIACRYPT 2009. Lecture Notes in Computer Science, vol. 5912, pp. 214\u2013231. Springer, Heidelberg (2009)."},{"key":"9412_CR21","unstructured":"Ostrovsky R., Sahai A., Waters B.: Attribute-based encryption with non-monotonic access structures. In: ACM Conference on Computer and Communications Security 2007, pp. 195\u2013203. ACM, Alexandria, VA, USA (2007)."},{"key":"9412_CR22","unstructured":"Sahai A., Waters B.: Fuzzy identity based encryption. In: Cramer R. (ed.) Advances in Cryptology\u2014EUROCRYPT 2005. Lecture Notes in Computer Science, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005)."},{"key":"9412_CR23","unstructured":"Seo J.H., Kobayashi T., Ohkubo M., Suzuki K.: Anonymous hierarchical identity-based encryption with constant size ciphertexts. In: Jarecki S., Tsudik G. (eds.) PKC 2009. Lecture Notes in Computer Science, vol. 5443, pp. 215\u2013234. Springer, Heidelberg (2009)."},{"key":"9412_CR24","unstructured":"Shen E., Shi E., Waters B.: Predicate privacy in encryption systems. In: Reingold O. (ed.) TCC 2009. Lecture Notes in Computer Science, vol. 5444, pp. 457\u2013473. Springer, Heidelberg (2009)."},{"key":"9412_CR25","unstructured":"Shi E., Waters B.: Delegating capabilities in predicate encryption systems. In: Aceto L., Damg\u00e5rd I., Goldberg L.A., Halld\u00f3rsson M.M., Ing\u00f3lfsd\u00f3ttir A., Walukiewicz I. (eds.) ICALP 2008. Lecture Notes in Computer Science, vol. 5126, pp. 560\u2013578. Springer, Heidelberg (2008)."},{"key":"9412_CR26","unstructured":"Shi E., Bethencourt J., Chan T.H., Song D., Perrig A.: Multi-dimensional range query over encrypted data. In: IEEE Symposium on Security and Privacy 2007, pp. 350\u2013364. IEEE Computer Society, Oakland, CA, USA (2007)."},{"key":"9412_CR27","unstructured":"Song D., Wagner D., Perrig A.: Practical techniques for searches on encrypted data. In: IEEE Symposium on Security and Privacy 2000, pp. 44\u201355. IEEE Computer Society, Oakland, CA, USA (2000)."},{"key":"9412_CR28","unstructured":"Waters B.: Efficient identity-based encryption without random oracles. In: Cramer R. (ed.) Advances in Cryptology\u2014EUROCRYPT 2005. Lecture Notes in Computer Science, vol. 3494, pp. 114\u2013127. Springer, Heidelberg (2005)."},{"key":"9412_CR29","unstructured":"Waters B.: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Halevi S. (ed.) Advances in Cryptology\u2014CRYPTO 2009. Lecture Notes in Computer Science, vol. 5677, pp. 619\u2013636. Springer, Heidelberg (2009)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-010-9412-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-010-9412-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-010-9412-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T15:58:28Z","timestamp":1559231908000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-010-9412-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6,17]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,3]]}},"alternative-id":["9412"],"URL":"https:\/\/doi.org\/10.1007\/s10623-010-9412-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,6,17]]}}}