{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T06:40:19Z","timestamp":1718174419169},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,3,26]],"date-time":"2015-03-26T00:00:00Z","timestamp":1427328000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1007\/s10623-015-0068-4","type":"journal-article","created":{"date-parts":[[2015,3,25]],"date-time":"2015-03-25T12:28:16Z","timestamp":1427286496000},"page":"103-124","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Generalized closest substring encryption"],"prefix":"10.1007","volume":"80","author":[{"given":"Fuchun","family":"Guo","sequence":"first","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,26]]},"reference":[{"key":"68_CR1","doi-asserted-by":"crossref","unstructured":"Baek J., Susilo W., Zhou J.: New constructions of fuzzy identity-based encryption. In: Bao F., Miller S. (eds.) In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, pp. 368\u2013370. ACM, New York (2007).","DOI":"10.1145\/1229285.1229330"},{"key":"68_CR2","doi-asserted-by":"crossref","unstructured":"Bethencourt J., Sahai A., Waters B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 321\u2013334. IEEE Computer Society, Washington, DC (2007).","DOI":"10.1109\/SP.2007.11"},{"key":"68_CR3","doi-asserted-by":"crossref","unstructured":"Boneh D., Franklin M.K.: Identity-based encryption from the weil pairing. In: Kilian J. (ed.) Advances in Cryptology\u2014CRYPTO. Lecture Notes in Computer Science, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001).","DOI":"10.1007\/3-540-44647-8_13"},{"key":"68_CR4","doi-asserted-by":"crossref","unstructured":"Boneh D., Boyen X., Goh E.J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer R. (ed.) Advances in Cryptology\u2014EUROCRYPT 2005. Lecture Notes in Computer Science, vol. 3494, pp. 440\u2013456. Springer, Heidelberg (2005).","DOI":"10.1007\/11426639_26"},{"key":"68_CR5","doi-asserted-by":"crossref","unstructured":"Boneh D., Gentry C., Waters B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup V. (ed.) Advances in Cryptology\u2014CRYPTO 2005. Lecture Notes in Computer Science, vol. 3621, pp. 258\u2013275. Springer, Heidelberg (2005).","DOI":"10.1007\/11535218_16"},{"key":"68_CR6","doi-asserted-by":"crossref","unstructured":"Boneh D., Sahai A., Waters B.: Functional encryption: definitions and challenges. In: Ishai Y. (ed.) Theory of Cryptography\u2014TCC. Lecture Notes in Computer Science, vol. 6597, pp. 253\u2013273. Springer, Heidelberg (2011).","DOI":"10.1007\/978-3-642-19571-6_16"},{"key":"68_CR7","doi-asserted-by":"crossref","unstructured":"Chase M.: Multi-authority attribute based encryption. In: Vadhan S.P. (ed.) Theory of Cryptography\u2014TCC. Lecture Notes in Computer Science, vol. 4392, pp. 515\u2013534. Springer, Heidelberg (2007).","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"68_CR8","doi-asserted-by":"crossref","unstructured":"Chase M., Chow S.S.M.: Improving privacy and security in multi-authority attribute-based encryption. In: Al-Shaer E., Jha S., Keromytis A.D. (eds.) Proceedings of the ACM Conference on Computer and Communications Security, pp. 121\u2013130. ACM, New York (2009).","DOI":"10.1145\/1653662.1653678"},{"key":"68_CR9","doi-asserted-by":"crossref","unstructured":"Cheung L., Newport C.C.: Provably secure ciphertext policy ABE. In: Prooceedings of the ACM Conference on Computer and Communications Security 2007, pp. 456\u2013465. ACM, New York (2007).","DOI":"10.1145\/1315245.1315302"},{"key":"68_CR10","unstructured":"Davila J., Balla S., Rajasekaran S.: Fast and practical algorithms for planted (l, d) motif search. IEEE\/ACM Trans. Comput. Biol. Bioinf. 4(4), 544\u2013552 (2007)."},{"key":"68_CR11","doi-asserted-by":"crossref","unstructured":"Deng X., Li G., Li Z., Ma B., Wang L.: Genetic design of drugs without side-effects. SIAM J. Comput. 32(4), 1073\u20131090 (2003).","DOI":"10.1137\/S0097539701397825"},{"key":"68_CR12","doi-asserted-by":"crossref","unstructured":"Fujisaki E., Okamoto T.: Secure integration of asymmetric and symmetric encryption schemes. J. Cryptol. 26(1), 80\u2013101 (2013).","DOI":"10.1007\/s00145-011-9114-1"},{"key":"68_CR13","doi-asserted-by":"crossref","unstructured":"Garg S., Gentry C., Halevi S., Sahai A., Waters B.: Attribute-based encryption for circuits from multilinear maps. In: Canetti R., Garay J.A. (eds.) Advances in Cryptology\u2014CRYPTO. Lecture Notes in Computer Science, vol. 8043, pp. 479\u2013499. Springer, Heidelberg (2013).","DOI":"10.1007\/978-3-642-40084-1_27"},{"key":"68_CR14","doi-asserted-by":"crossref","unstructured":"Gorbunov S., Vaikuntanathan V., Wee H.: Attribute-based encryption for circuits. In: Boneh D., Roughgarden T., Feigenbaum J. (eds.) Proceedings of the ACM Symposium on Theory of Computing\u2014STOC\u201913, pp. 545\u2013554. ACM, New York (2013).","DOI":"10.1145\/2488608.2488677"},{"key":"68_CR15","doi-asserted-by":"crossref","unstructured":"Goyal V., Pandey O., Sahai A., Waters B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Juels A., Wright R.N., di Vimercati S.D.C. (eds.) Proceedings of the ACM Conference on Computer and Communications Security 2006, pp. 89\u201398. ACM, New York (2006).","DOI":"10.1145\/1180405.1180418"},{"key":"68_CR16","doi-asserted-by":"crossref","unstructured":"Herranz J., Laguillaumie F., R\u00e0fols C.: Constant size ciphertexts in threshold attribute-based encryption. In: Nguyen P.Q., Pointcheval D. (eds.) Public Key Cryptography\u201910. Lecture Notes in Computer Science, vol. 6056, pp. 19\u201334. Springer, Heidelberg (2010).","DOI":"10.1007\/978-3-642-13013-7_2"},{"key":"68_CR17","doi-asserted-by":"crossref","unstructured":"Katz J., Sahai A., Waters B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Smart N.P. (ed.) Advances in Cryptology\u2014EUROCRYPT. Lecture Notes in Computer Science, vol. 4965, pp. 146\u2013162. Springer, Heidelberg (2008).","DOI":"10.1007\/978-3-540-78967-3_9"},{"key":"68_CR18","doi-asserted-by":"crossref","unstructured":"Lanct\u00f4t J.K., Li M., Ma B., Wang S., Zhang L.: Distinguishing string selection problems. Inf. Comput. 185(1), 41\u201355 (2003).","DOI":"10.1016\/S0890-5401(03)00057-9"},{"key":"68_CR19","doi-asserted-by":"crossref","unstructured":"Lewko A.B., Okamoto T., Sahai A., Takashima K., Waters B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert H. (ed.) Advances in Cryptology\u2014EUROCRYPT 2010. Lecture Notes in Computer Science, vol. 6110, pp. 62\u201391. Springer, Heidelberg (2010).","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"68_CR20","doi-asserted-by":"crossref","unstructured":"Lucas K., Busch M., Mossinger S., Thompson J.A.: An improved microcomputer program for finding gene- or gene family-specific oligonucleotides suitable as primers for polymerase chain reactions or as probes. Comput. Appl. Biosci. 7(4), 525\u2013529 (1991).","DOI":"10.1093\/bioinformatics\/7.4.525"},{"key":"68_CR21","doi-asserted-by":"crossref","unstructured":"Marx D.: The closest substring problem with small distances. In: Foundations of Computer Science\u2014FOCS, pp. 63\u201372. IEEE Computer Society, Washington, DC (2005).","DOI":"10.1109\/SFCS.2005.70"},{"key":"68_CR22","unstructured":"Morse S.P.: Selected Lectures on Genealogy: An Introduction to Scientific Tools. DNA to Genetic Genealogy, pp. 57\u201382. Weizmann Institute of Science, Rehovot (2013). http:\/\/www.stevemorse.org\/genetealogy\/dna.htm . Accessed 22 Jan 2015"},{"key":"68_CR23","doi-asserted-by":"crossref","unstructured":"Okamoto T., Takashima K.: Hierarchical predicate encryption for inner-products. In: Matsui M. (ed.) Advances in Cryptology\u2014ASIACRYPT. Lecture Notes in Computer Science, vol. 5912, pp. 214\u2013231. Springer, Heidelberg (2009).","DOI":"10.1007\/978-3-642-10366-7_13"},{"key":"68_CR24","doi-asserted-by":"crossref","unstructured":"Okamoto T., Takashima K.: Fully secure functional encryption with general relations from the decisional linear assumption. In: Rabin T. (ed.) Advances in Cryptology\u2014CRYPTO 2010. Lecture Notes in Computer Science, vol. 6223, pp. 191\u2013208. Springer, Heidelberg (2010).","DOI":"10.1007\/978-3-642-14623-7_11"},{"key":"68_CR25","doi-asserted-by":"crossref","unstructured":"Okamoto T., Takashima K.: Adaptively attribute-hiding (hierarchical) inner product encryption. In: Pointcheval D., Johansson T. (eds.) Advances in Cryptology\u2014EUROCRYPT. Lecture Notes in Computer Science, vol. 7237, pp. 591\u2013608. Springer, Heidelberg (2012).","DOI":"10.1007\/978-3-642-29011-4_35"},{"key":"68_CR26","unstructured":"O\u2019Neill A.: Definitional issues in functional encryption. IACR Cryptology. ePrint Archive Report 2010\/556 (2010)."},{"key":"68_CR27","doi-asserted-by":"crossref","unstructured":"Proutski V., Holmes E.C.: Primer master: a new program for the design and analysis of PCR primers. Comput. Appl. Biosci. 12, 253\u2013255 (1996).","DOI":"10.1093\/bioinformatics\/12.3.253"},{"key":"68_CR28","doi-asserted-by":"crossref","unstructured":"Sahai A.: Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security. In: Foundations of Computer Science\u2014FOCS\u201999, pp. 543\u2013553. IEEE Computer Society, Washington, DC(1999).","DOI":"10.1109\/SFFCS.1999.814628"},{"key":"68_CR29","doi-asserted-by":"crossref","unstructured":"Sahai A., Waters B.: Fuzzy identity-based encryption. In: Cramer R. (ed.) Advances in Cryptology\u2014EUROCRYPT 2005. Lecture Notes in Computer Science, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005).","DOI":"10.1007\/11426639_27"},{"key":"68_CR30","doi-asserted-by":"crossref","unstructured":"Sahai A., Seyalioglu H., Waters B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini R., Canetti R. (eds.) Advances in Cryptology\u2014CRYPTO\u201912. Lecture Notes in Computer Science, vol. 7417, pp. 199\u2013217. Springer, Heidelberg (2012).","DOI":"10.1007\/978-3-642-32009-5_13"},{"key":"68_CR31","doi-asserted-by":"crossref","unstructured":"Waters B.: Functional encryption for regular languages. In: Safavi-Naini R., Canetti R. (eds.) Advances in Cryptology\u2014CRYPTO 2012. Lecture Notes in Computer Science, vol. 7417, pp. 218\u2013235. Springer, Heidelberg (2012).","DOI":"10.1007\/978-3-642-32009-5_14"},{"key":"68_CR32","doi-asserted-by":"crossref","unstructured":"Zhou Z., Huang D.: On efficient ciphertext-policy attribute based encryption and broadcast encryption: extended abstract. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 753\u2013755. ACM, New York (2010).","DOI":"10.1145\/1866307.1866420"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-015-0068-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-015-0068-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-015-0068-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:58:40Z","timestamp":1559246320000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-015-0068-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,26]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,7]]}},"alternative-id":["68"],"URL":"https:\/\/doi.org\/10.1007\/s10623-015-0068-4","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3,26]]}}}