{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T14:59:31Z","timestamp":1777042771349,"version":"3.51.4"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2018,1,9]],"date-time":"2018-01-09T00:00:00Z","timestamp":1515456000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100010418","name":"Institute for Information & communications Technology Promotion","doi-asserted-by":"crossref","award":["2017-0-01863"],"award-info":[{"award-number":["2017-0-01863"]}],"id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s10623-017-0453-2","type":"journal-article","created":{"date-parts":[[2018,1,9]],"date-time":"2018-01-09T09:56:34Z","timestamp":1515491794000},"page":"2407-2440","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Revocable hierarchical identity-based encryption with shorter private keys and update keys"],"prefix":"10.1007","volume":"86","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1910-8890","authenticated-orcid":false,"given":"Kwangsu","family":"Lee","sequence":"first","affiliation":[]},{"given":"Seunghwan","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,9]]},"reference":[{"key":"453_CR1","first-page":"417","volume-title":"ACM Conference on Computer and Communications Security","author":"A Boldyreva","year":"2008","unstructured":"Boldyreva A., Goyal V., Kumar V.: Identity-based encryption with efficient revocation. In: Ning P., Syverson P.F., Jha S. (eds.) ACM Conference on Computer and Communications Security, pp. 417\u2013426. ACM, New York (2008)."},{"key":"453_CR2","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-3-540-24676-3_14","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2004, LNCS","author":"D Boneh","year":"2004","unstructured":"Boneh D., Boyen X.: Efficient selective-id secure identity-based encryption without random oracles. In: Cachin C., Camenisch J. (eds.) Advances in Cryptology\u2014EUROCRYPT 2004, LNCS, vol. 3027, pp. 223\u2013238. Springer, Heidelberg (2004)."},{"issue":"4","key":"453_CR3","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1007\/s00145-010-9078-6","volume":"24","author":"D Boneh","year":"2011","unstructured":"Boneh D., Boyen X.: Efficient selective identity-based encryption without random oracles. J. Cryptol. 24(4), 659\u2013693 (2011).","journal-title":"J. Cryptol."},{"key":"453_CR4","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology\u2014CRYPTO 2001, LNCS","author":"D Boneh","year":"2001","unstructured":"Boneh D., Franklin M.K.: Identity-based encryption from the weil pairing. In: Kilian J. (ed.) Advances in Cryptology\u2014CRYPTO 2001, LNCS, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001)."},{"key":"453_CR5","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1007\/11426639_26","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2005, LNCS","author":"D Boneh","year":"2005","unstructured":"Boneh D., Boyen X., Goh E.J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer R. (ed.) Advances in Cryptology\u2014EUROCRYPT 2005, LNCS, vol. 3494, pp. 440\u2013456. Springer, Heidelberg (2005)."},{"key":"453_CR6","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1007\/978-3-540-72540-4_23","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2007, LNCS","author":"X Boyen","year":"2007","unstructured":"Boyen X.: General Ad Hoc encryption from exponent inversion IBE. In: Naor M. (ed.) Advances in Cryptology\u2014EUROCRYPT 2007, LNCS, vol. 4515, pp. 394\u2013411. Springer, Heidelberg (2007)."},{"key":"453_CR7","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1007\/11818175_17","volume-title":"Advances in Cryptology\u2014CRYPTO 2006, LNCS","author":"X Boyen","year":"2006","unstructured":"Boyen X., Waters B.: Anonymous hierarchical identity-based encryption (without random oracles). In: Dwork C. (ed.) Advances in Cryptology\u2014CRYPTO 2006, LNCS, vol. 4117, pp. 290\u2013307. Springer, Heidelberg (2006)."},{"key":"453_CR8","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/3-540-39200-9_16","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2003, LNCS","author":"R Canetti","year":"2003","unstructured":"Canetti R., Halevi S., Katz J.: A forward-secure public-key encryption scheme. In: Biham E. (ed.) Advances in Cryptology\u2014EUROCRYPT 2003, LNCS, vol. 2656, pp. 255\u2013271. Springer, Heidelberg (2003)."},{"key":"453_CR9","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/978-3-540-24676-3_13","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2004, LNCS","author":"R Canetti","year":"2004","unstructured":"Canetti R., Halevi S., Katz J.: Chosen-ciphertext security from identity-based encryption. In: Cachin C., Camenisch J. (eds.) Advances in Cryptology\u2014EUROCRYPT 2004, LNCS, vol. 3027, pp. 207\u2013222. Springer, Heidelberg (2004)."},{"issue":"6","key":"453_CR10","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W., Hellman M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644\u2013654 (1976).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"A(1)","key":"453_CR11","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1587\/transfun.E99.A.83","volume":"99","author":"K Emura","year":"2016","unstructured":"Emura K., Seo J.H., Youn T.: Semi-generic transformation of revocable hierarchical identity-based encryption and its DBDH instantiation. IEICE Trans. 99(A(1)), 83\u201391 (2016).","journal-title":"IEICE Trans."},{"key":"453_CR12","first-page":"437","volume-title":"Theory of Cryptography\u2014TCC 2009, LNCS","author":"C Gentry","year":"2009","unstructured":"Gentry C., Halevi S.: Hierarchical identity based encryption with polynomially many levels. In: Reingold O. (ed.) Theory of Cryptography\u2014TCC 2009, LNCS, vol. 5444, pp. 437\u2013456. Springer, Heidelberg (2009)."},{"key":"453_CR13","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1007\/3-540-36178-2_34","volume-title":"Advances in Cryptology\u2014ASIACRYPT 2002, LNCS","author":"C Gentry","year":"2002","unstructured":"Gentry C., Silverberg A.: Hierarchical id-based cryptography. In: Zheng Y. (ed.) Advances in Cryptology\u2014ASIACRYPT 2002, LNCS, vol. 2501, pp. 548\u2013566. Springer, Heidelberg (2002)."},{"issue":"4","key":"453_CR14","doi-asserted-by":"crossref","first-page":"792","DOI":"10.1145\/6490.6503","volume":"33","author":"O Goldreich","year":"1986","unstructured":"Goldreich O., Goldwasser S., Micali S.: How to construct random functions. J. ACM 33(4), 792\u2013807 (1986).","journal-title":"J. ACM"},{"key":"453_CR15","first-page":"89","volume-title":"ACM Conference on Computer and Communications Security","author":"V Goyal","year":"2006","unstructured":"Goyal V., Pandey O., Sahai A., Waters B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Juels A., Wright R.N., di Vimercati S.D.C. (eds.) ACM Conference on Computer and Communications Security, pp. 89\u201398. ACM, New York (2006)."},{"key":"453_CR16","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/3-540-45708-9_4","volume-title":"Advances in Cryptology\u2014CRYPTO 2002, LNCS","author":"D Halevy","year":"2002","unstructured":"Halevy D., Shamir A.: The LSD broadcast encryption scheme. In: Yung M. (ed.) Advances in Cryptology\u2014CRYPTO 2002, LNCS, vol. 2442, pp. 47\u201360. Springer, Heidelberg (2002)."},{"key":"453_CR17","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1007\/3-540-46035-7_31","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2002, LNCS","author":"J Horwitz","year":"2002","unstructured":"Horwitz J., Lynn B.: Toward hierarchical identity-based encryption. In: Knudsen L.R. (ed.) Advances in Cryptology\u2014EUROCRYPT 2002, LNCS, vol. 2332, pp. 466\u2013481. Springer, Heidelberg (2002)."},{"key":"453_CR18","unstructured":"Lee K.: Revocable hierarchical identity-based encryption with adaptive security. Cryptology ePrint Archive, Report 2016\/749 (2016). http:\/\/eprint.iacr.org\/2016\/749."},{"key":"453_CR19","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/978-3-642-42033-7_13","volume-title":"Advances in Cryptology\u2014ASIACRYPT 2013, LNCS","author":"K Lee","year":"2013","unstructured":"Lee K., Choi S.G., Lee D.H., Park J.H., Yung M.: Self-updatable encryption: time constrained access control with hidden attributes and better efficiency. In: Sako K., Sarkar P. (eds.) Advances in Cryptology\u2014ASIACRYPT 2013, LNCS, vol. 8269, pp. 235\u2013254. Springer, Heidelberg (2013)."},{"issue":"1","key":"453_CR20","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/s10623-016-0287-3","volume":"85","author":"K Lee","year":"2017","unstructured":"Lee K., Lee D.H., Park J.H.: Efficient revocable identity-based encryption via subset difference methods. Des. Codes Cryptogr. 85(1), 39\u201376 (2017).","journal-title":"Des. Codes Cryptogr."},{"issue":"2","key":"453_CR21","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1007\/s10623-013-9868-6","volume":"74","author":"K Lee","year":"2015","unstructured":"Lee K., Park J.H., Lee D.H.: Anonymous HIBE with short ciphertexts: full security in prime order groups. Des. Codes Cryptogr. 74(2), 395\u2013425 (2015).","journal-title":"Des. Codes Cryptogr."},{"key":"453_CR22","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1007\/978-3-642-29011-4_20","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2012, LNCS","author":"AB Lewko","year":"2012","unstructured":"Lewko A.B.: Tools for simulating features of composite order bilinear groups in the prime order setting. In: Pointcheval D., Johansson T. (eds.) Advances in Cryptology\u2014EUROCRYPT 2012, LNCS, vol. 7237, pp. 318\u2013335. Springer, Heidelberg (2012)."},{"key":"453_CR23","first-page":"455","volume-title":"Theory of Cryptography\u2014TCC 2010, LNCS","author":"AB Lewko","year":"2010","unstructured":"Lewko A.B., Waters B.: New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Micciancio D. (ed.) Theory of Cryptography\u2014TCC 2010, LNCS, vol. 5978, pp. 455\u2013479. Springer, Heidelberg (2010)."},{"key":"453_CR24","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1007\/978-3-642-20465-4_30","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2011, LNCS","author":"AB Lewko","year":"2011","unstructured":"Lewko A.B., Waters B.: Unbounded HIBE and attribute-based encryption. In: Paterson K.G. (ed.) Advances in Cryptology\u2014EUROCRYPT 2011, LNCS, vol. 6632, pp. 547\u2013567. Springer, Heidelberg (2011)."},{"key":"453_CR25","first-page":"1","volume-title":"Topics in Cryptology\u2014CT-RSA 2009, LNCS","author":"B Libert","year":"2009","unstructured":"Libert B., Vergnaud D.: Adaptive-id secure revocable identity-based encryption. In: Fischlin M. (ed.) Topics in Cryptology\u2014CT-RSA 2009, LNCS, vol. 5473, pp. 1\u201315. Springer, Heidelberg (2009)."},{"key":"453_CR26","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/3-540-44647-8_3","volume-title":"Advances in Cryptology\u2014CRYPTO 2001, LNCS","author":"D Naor","year":"2001","unstructured":"Naor D., Naor M., Lotspiech J.: Revocation and tracing schemes for stateless receivers. In: Kilian J. (ed.) Advances in Cryptology\u2014CRYPTO 2001, LNCS, vol. 2139, pp. 41\u201362. Springer, Heidelberg (2001)."},{"issue":"8","key":"453_CR27","doi-asserted-by":"crossref","first-page":"1564","DOI":"10.1109\/TIFS.2015.2419180","volume":"10","author":"S Park","year":"2015","unstructured":"Park S., Lee K., Lee D.H.: New constructions of revocable identity-based encryption from multilinear maps. IEEE Trans. Inf. Forensic Secur. 10(8), 1564\u20131577 (2015).","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"453_CR28","first-page":"463","volume-title":"ACM Conference on Computer and Communications Security\u2014CCS 2013","author":"Y Rouselakis","year":"2013","unstructured":"Rouselakis Y., Waters B.: Practical constructions and new proof methods for large universe attribute-based encryption. In: Sadeghi A.R., Gligor V.D., Yung M. (eds.) ACM Conference on Computer and Communications Security\u2014CCS 2013, pp. 463\u2013474. ACM, New York (2013)."},{"key":"453_CR29","first-page":"122","volume-title":"Information Security Applications\u2014WISA 2015, LNCS","author":"G Ryu","year":"2016","unstructured":"Ryu G., Lee K., Park S., Lee D.H.: Unbounded hierarchical identity-based encryption with efficient revocation. In: Kim H., Choi D. (eds.) Information Security Applications\u2014WISA 2015, LNCS, vol. 9503, pp. 122\u2013133. Springer, Heidelberg (2016)."},{"key":"453_CR30","first-page":"343","volume-title":"Topics in Cryptology\u2014CT-RSA 2013, LNCS","author":"JH Seo","year":"2013","unstructured":"Seo J.H., Emura K.: Efficient delegation of key generation and revocation functionalities in identity-based encryption. In: Dawson E. (ed.) Topics in Cryptology\u2014CT-RSA 2013, LNCS, vol. 7779, pp. 343\u2013358. Springer, Heidelberg (2013)."},{"key":"453_CR31","first-page":"216","volume-title":"Public-Key Cryptography\u2014PKC 2013, LNCS","author":"JH Seo","year":"2013","unstructured":"Seo J.H., Emura K.: Revocable identity-based encryption revisited: security model and construction. In: Kurosawa K., Hanaoka G. (eds.) Public-Key Cryptography\u2014PKC 2013, LNCS, vol. 7778, pp. 216\u2013234. Springer, Heidelberg (2013)."},{"key":"453_CR32","first-page":"106","volume-title":"Topics in Cryptology\u2014CT-RSA 2015, LNCS","author":"JH Seo","year":"2015","unstructured":"Seo J.H., Emura K.: Revocable hierarchical identity-based encryption: History-free update, security against insiders, and short ciphertexts. In: Nyberg K. (ed.) Topics in Cryptology\u2014CT-RSA 2015, LNCS, vol. 9048, pp. 106\u2013123. Springer, Heidelberg (2015)."},{"key":"453_CR33","first-page":"21","volume-title":"Advances in Information and Computer Security\u2014IWSEC 2015, LNCS","author":"JH Seo","year":"2015","unstructured":"Seo J.H., Emura K.: Adaptive-id secure revocable hierarchical identity-based encryption. In: Tanaka K., Suga Y. (eds.) Advances in Information and Computer Security\u2014IWSEC 2015, LNCS, vol. 9241, pp. 21\u201338. Springer, Heidelberg (2015)."},{"key":"453_CR34","first-page":"215","volume-title":"Public-Key Cryptography\u2014PKC 2009, LNCS","author":"JH Seo","year":"2009","unstructured":"Seo J.H., Kobayashi T., Ohkubo M., Suzuki K.: Anonymous hierarchical identity-based encryption with constant size ciphertexts. In: Jarecki S., Tsudik G. (eds.) Public-Key Cryptography\u2014PKC 2009, LNCS, vol. 5443, pp. 215\u2013234. Springer, Heidelberg (2009)."},{"key":"453_CR35","first-page":"47","volume-title":"Advances in Cryptology\u2014CRYPTO \u201984, LNCS","author":"A Shamir","year":"1984","unstructured":"Shamir A.: Identity-based cryptosystems and signature schemes. In: Blakley G.R., Chaum D. (eds.) Advances in Cryptology\u2014CRYPTO \u201984, LNCS, vol. 196, pp. 47\u201353. Springer, Heidelberg (1984)."},{"key":"453_CR36","first-page":"560","volume-title":"ICALP 2008, LNCS","author":"E Shi","year":"2008","unstructured":"Shi E., Waters B.: Delegating capabilities in predicate encryption systems. In: Aceto L., Damg\u00e5rd I., Goldberg L.A., Halld\u00f3rsson M.M., Ing\u00f3lfsd\u00f3ttir A., Walukiewicz I. (eds.) ICALP 2008, LNCS, vol. 5126, pp. 560\u2013578. Springer, Heidelberg (2008)."},{"key":"453_CR37","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1007\/978-3-319-52153-4_25","volume-title":"Topics in Cryptology\u2014CT-RSA 2017, LNCS","author":"Y Watanabe","year":"2017","unstructured":"Watanabe Y., Emura K., Seo J.H.: New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters. In: Handschuh H. (ed.) Topics in Cryptology\u2014CT-RSA 2017, LNCS, vol. 10159, pp. 432\u2013449. Springer, Heidelberg (2017)."},{"key":"453_CR38","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1007\/978-3-642-03356-8_36","volume-title":"Advances in Cryptology\u2014CRYPTO 2009, LNCS","author":"B Waters","year":"2009","unstructured":"Waters B.: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Halevi S. (ed.) Advances in Cryptology\u2014CRYPTO 2009, LNCS, vol. 5677, pp. 619\u2013636. Springer, Heidelberg (2009)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-017-0453-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-017-0453-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-017-0453-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T14:15:13Z","timestamp":1534774513000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-017-0453-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,9]]},"references-count":38,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["453"],"URL":"https:\/\/doi.org\/10.1007\/s10623-017-0453-2","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,9]]}}}