{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T14:21:53Z","timestamp":1777299713475,"version":"3.51.4"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2021,9,23]],"date-time":"2021-09-23T00:00:00Z","timestamp":1632355200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,23]],"date-time":"2021-09-23T00:00:00Z","timestamp":1632355200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1007\/s10623-021-00939-8","type":"journal-article","created":{"date-parts":[[2021,9,23]],"date-time":"2021-09-23T23:38:40Z","timestamp":1632440320000},"page":"2577-2626","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Fast, compact, and expressive attribute-based encryption"],"prefix":"10.1007","volume":"89","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7995-877X","authenticated-orcid":false,"given":"Junichi","family":"Tomida","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yuto","family":"Kawahara","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ryo","family":"Nishimaki","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,9,23]]},"reference":[{"key":"939_CR1","doi-asserted-by":"publisher","unstructured":"Agrawal S., Chase M.: FAME: Fast attribute-based message encryption. In: Thuraisingham B.M., Evans D., Malkin T., Xu D. (eds.) ACM CCS 2017, pp. 665\u2013682. ACM Press, New York (2017). https:\/\/doi.org\/10.1145\/3133956.3134014.","DOI":"10.1145\/3133956.3134014"},{"key":"939_CR2","doi-asserted-by":"publisher","unstructured":"Agrawal S., Chase M.: Simplifying design and analysis of complex predicate encryption schemes. In: Coron J.S., Nielsen J.B. (eds.) EUROCRYPT\u00a02017, Part\u00a0I, LNCS, vol. 10210, pp. 627\u2013656. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-319-56620-7_22.","DOI":"10.1007\/978-3-319-56620-7_22"},{"key":"939_CR3","doi-asserted-by":"publisher","unstructured":"Attrapadung N.: Unbounded dynamic predicate compositions in attribute-based encryption. In: Ishai Y., Rijmen V. (eds.) EUROCRYPT 2019, Part\u00a0I, LNCS, vol. 11476, pp. 34\u201367. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-030-17653-2_2.","DOI":"10.1007\/978-3-030-17653-2_2"},{"key":"939_CR4","doi-asserted-by":"publisher","unstructured":"Attrapadung N., Libert B., de\u00a0Panafieu E.: Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: Catalano D., Fazio N., Gennaro R., Nicolosi A. (eds.) PKC\u00a02011, LNCS, vol. 6571, pp. 90\u2013108. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19379-8_6 .","DOI":"10.1007\/978-3-642-19379-8_6"},{"key":"939_CR5","unstructured":"Barbulescu R., Duquesne S.: Updating key size estimations for pairings. Cryptology ePrint Archive, Report 2017\/334 (2017). http:\/\/eprint.iacr.org\/2017\/334."},{"key":"939_CR6","doi-asserted-by":"publisher","unstructured":"Bellare M., Rogaway P.: Optimal asymmetric encryption. In: Santis A.D. (ed.) EUROCRYPT 1994, vol. 950, pp. 92\u2013111. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/BFb0053428.","DOI":"10.1007\/BFb0053428"},{"key":"939_CR7","doi-asserted-by":"publisher","unstructured":"Bellare M., Rogaway P.: The exact security of digital signatures: how to sign with RSA and Rabin. In: Maure U.M. (ed.) EUROCRYPT 1996, vol. 1070, pp. 399\u2013416. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68339-9_34.","DOI":"10.1007\/3-540-68339-9_34"},{"key":"939_CR8","doi-asserted-by":"publisher","unstructured":"Bethencourt J., Sahai A., Waters B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, pp. 321\u2013334. IEEE Computer Society Press (2007). https:\/\/doi.org\/10.1109\/SP.2007.11.","DOI":"10.1109\/SP.2007.11"},{"key":"939_CR9","doi-asserted-by":"publisher","unstructured":"Boneh D., Boyen X.: Secure identity based encryption without random oracles. In: Franklin M. (ed.) CRYPTO\u00a02004, LNCS, vol. 3152, pp. 443\u2013459. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28628-8_27.","DOI":"10.1007\/978-3-540-28628-8_27"},{"issue":"3","key":"939_CR10","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D Boneh","year":"2003","unstructured":"Boneh D., Franklin M.K.: Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586\u2013615 (2003).","journal-title":"SIAM J. Comput."},{"key":"939_CR11","doi-asserted-by":"publisher","unstructured":"Boneh D., Katz J.: Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. In: Menezes A. (ed.) CT-RSA\u00a02005, vol. 3376, pp. 87\u2013103. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-30574-3_8.","DOI":"10.1007\/978-3-540-30574-3_8"},{"issue":"4","key":"939_CR12","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1145\/1008731.1008734","volume":"51","author":"R Canetti","year":"2004","unstructured":"Canetti R., Goldreich O., Halevi S.: The random oracle methodology, revisited. J. ACM 51(4), 557\u2013594 (2004).","journal-title":"J. ACM"},{"key":"939_CR13","doi-asserted-by":"publisher","unstructured":"Canetti R., Halevi S., Katz J.: A forward-secure public-key encryption scheme. In: Biham E. (ed.) EUROCRYPT 2003, LNCS, vol. 2656, pp. 255\u2013271. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_16.","DOI":"10.1007\/3-540-39200-9_16"},{"key":"939_CR14","doi-asserted-by":"publisher","unstructured":"Canetti R., Halevi S., Katz J.: Chosen-ciphertext security from identity-based encryption. In:\u00a0Cachin C.,\u00a0Camenisch J. (eds.) EUROCRYPT 2004, LNCS, vol. 3027, pp. 207\u2013222. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24676-3_13.","DOI":"10.1007\/978-3-540-24676-3_13"},{"key":"939_CR15","doi-asserted-by":"publisher","unstructured":"Chen J., Gay R., Wee H.: Improved dual system ABE in prime-order groups via predicate encodings. In:\u00a0Oswald E.,\u00a0Fischlin M. (eds.) EUROCRYPT 2015, Part\u00a0II, LNCS, vol. 9057, pp. 595\u2013624. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46803-6_20.","DOI":"10.1007\/978-3-662-46803-6_20"},{"key":"939_CR16","doi-asserted-by":"publisher","unstructured":"Chen J., Gong J., Kowalczyk L., Wee H.: Unbounded ABE via bilinear entropy expansion, revisited. In: Nielsen J.B., Rijmen V. (eds.) EUROCRYPT 2018, vol. 10820, pp. 503\u2013534. (2018). https:\/\/doi.org\/10.1007\/978-3-319-78381-9_19.","DOI":"10.1007\/978-3-319-78381-9_19"},{"issue":"1","key":"939_CR17","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/s00145-015-9220-6","volume":"30","author":"A Escala","year":"2017","unstructured":"Escala A., Herold G., Kiltz E., R\u00e0fols C., Villar J.L.: An algebraic framework for Diffie\u2013Hellman assumptions. J. Cryptol. 30(1), 242\u2013288 (2017). https:\/\/doi.org\/10.1007\/s00145-015-9220-6.","journal-title":"J. Cryptol."},{"issue":"1","key":"939_CR18","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/s00145-011-9114-1","volume":"26","author":"E Fujisaki","year":"2013","unstructured":"Fujisaki E., Okamoto T.: Secure integration of asymmetric and symmetric encryption schemes. J. Cryptol. 26(1), 80\u2013101 (2013). https:\/\/doi.org\/10.1007\/s00145-011-9114-1.","journal-title":"J. Cryptol."},{"key":"939_CR19","doi-asserted-by":"publisher","unstructured":"Gong J., Dong X., Chen J., Cao Z.: Efficient IBE with tight reduction to standard assumption in the multi-challenge setting. In: Cheon J.H.,\u00a0Takagi T. (eds.) ASIACRYPT\u00a02016, Part\u00a0II, LNCS, vol. 10032, pp. 624\u2013654. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53890-6_21.","DOI":"10.1007\/978-3-662-53890-6_21"},{"key":"939_CR20","doi-asserted-by":"publisher","unstructured":"Goyal V., Pandey O., Sahai A., Waters B.: Attribute-based encryption for fine-grained access control of encrypted data. In:\u00a0Juels A., Wright R.N.,\u00a0De Capitani di Vimercati S. (eds.) ACM CCS 2006, pp. 89\u201398. ACM Press (2006). https:\/\/doi.org\/10.1145\/1180405.1180418. Available as Cryptology ePrint Archive Report 2006\/309.","DOI":"10.1145\/1180405.1180418"},{"key":"939_CR21","doi-asserted-by":"publisher","unstructured":"Jafargholi Z., Kamath C., Klein K., Komargodski I., Pietrzak K., Wichs D.: Be adaptive, avoid overcommitting. In:\u00a0Katz J.,\u00a0Shacham H. (eds.) CRYPTO\u00a02017, Part\u00a0I, LNCS, vol. 10401, pp. 133\u2013163. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-319-63688-7_5.","DOI":"10.1007\/978-3-319-63688-7_5"},{"issue":"2","key":"939_CR22","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s00145-012-9119-4","volume":"26","author":"J Katz","year":"2013","unstructured":"Katz J., Sahai A., Waters B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. J. Cryptol. 26(2), 191\u2013224 (2013). https:\/\/doi.org\/10.1007\/s00145-012-9119-4.","journal-title":"J. Cryptol."},{"key":"939_CR23","doi-asserted-by":"publisher","unstructured":"Kim T., Barbulescu R.: Extended tower number field sieve: a new complexity for the medium prime case. In:\u00a0Robshaw M.,\u00a0Katz J. (eds.) CRYPTO\u00a02016, Part\u00a0I, LNCS, vol. 9814, pp. 543\u2013571. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53018-4_20.","DOI":"10.1007\/978-3-662-53018-4_20"},{"key":"939_CR24","doi-asserted-by":"publisher","unstructured":"Kim T., Jeong J.: Extended tower number field sieve with application to finite fields of arbitrary composite extension degree. In:\u00a0Fehr S. (ed.) PKC\u00a02017, Part\u00a0I, LNCS, vol. 10174, pp. 388\u2013408. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54365-8_16.","DOI":"10.1007\/978-3-662-54365-8_16"},{"key":"939_CR25","doi-asserted-by":"publisher","unstructured":"Kowalczyk L., Wee H.: Compact adaptively secure ABE for $${\\sf NC}^1$$ from $$k$$-Lin. In: Ishai Y., Rijmen V. (eds.) EUROCRYPT 2019, Part\u00a0I, LNCS, vol. 11476, pp. 3\u201333. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-030-17653-2_1.","DOI":"10.1007\/978-3-030-17653-2_1"},{"key":"939_CR26","unstructured":"Lewko A., Waters B.: Decentralizing attribute-based encryption. Cryptology ePrint Archive, Report 2010\/351 (2010). http:\/\/eprint.iacr.org\/2010\/351."},{"key":"939_CR27","doi-asserted-by":"publisher","unstructured":"Lewko A.B., Okamoto T., Sahai A., Takashima K., Waters B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In:\u00a0Gilbert H. (ed.) EUROCRYPT 2010, LNCS, vol. 6110, pp. 62\u201391. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13190-5_4.","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"939_CR28","doi-asserted-by":"publisher","unstructured":"Lewko A.B., Sahai A., Waters B.: Revocation systems with very small private keys. In: 2010 IEEE Symposium on Security and Privacy, pp. 273\u2013285. IEEE Computer Society Press (2010). https:\/\/doi.org\/10.1109\/SP.2010.23.","DOI":"10.1109\/SP.2010.23"},{"key":"939_CR29","doi-asserted-by":"publisher","unstructured":"Lewko A.B., Waters B.: New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In:\u00a0Micciancio D. (ed.) TCC\u00a02010, LNCS, vol. 5978, pp. 455\u2013479. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-11799-2_27.","DOI":"10.1007\/978-3-642-11799-2_27"},{"key":"939_CR30","doi-asserted-by":"publisher","unstructured":"Okamoto T., Takashima K.: Fully secure functional encryption with general relations from the decisional linear assumption. In:\u00a0Rabin T. (ed.) CRYPTO\u00a02010, LNCS, vol. 6223, pp. 191\u2013208. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14623-7_11.","DOI":"10.1007\/978-3-642-14623-7_11"},{"key":"939_CR31","doi-asserted-by":"publisher","unstructured":"Okamoto T., Takashima K.: Fully secure unbounded inner-product and attribute-based encryption. In:\u00a0Wang X.,\u00a0Sako K. (eds.) ASIACRYPT\u00a02012, LNCS, vol. 7658, pp. 349\u2013366. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34961-4_22.","DOI":"10.1007\/978-3-642-34961-4_22"},{"key":"939_CR32","doi-asserted-by":"publisher","unstructured":"Ostrovsky R., Sahai A., Waters B.: Attribute-based encryption with non-monotonic access structures. In: Ning P., De Capitani di Vimercati S., Syverson P.F. (eds.) ACM CCS 2007, pp. 195\u2013203. ACM Press (2007). https:\/\/doi.org\/10.1145\/1315245.1315270.","DOI":"10.1145\/1315245.1315270"},{"key":"939_CR33","doi-asserted-by":"publisher","unstructured":"Sahai A., Waters B.R.: Fuzzy identity-based encryption. In: Cramer R. (ed.) EUROCRYPT 2005, LNCS, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_27.","DOI":"10.1007\/11426639_27"},{"key":"939_CR34","doi-asserted-by":"publisher","unstructured":"Tomida J., Kawahara Y., Nishimaki R.: Fast, compact, and expressive attribute-based encryption. In:\u00a0Kiayias A.,\u00a0Kohlweiss M.,\u00a0Wallden P.,\u00a0Zikas V. (eds.) PKC\u00a02020, Part\u00a0I, LNCS vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_27.","DOI":"10.1007\/11426639_27"},{"key":"939_CR35","doi-asserted-by":"publisher","unstructured":"Waters B.: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In:\u00a0Halevi S. (ed.) CRYPTO\u00a02009, LNCS, vol. 5677, pp. 619\u2013636. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03356-8_36.","DOI":"10.1007\/978-3-642-03356-8_36"},{"key":"939_CR36","doi-asserted-by":"publisher","unstructured":"Wee H.: Dual system encryption via predicate encodings. In:\u00a0Lindell Y. (ed.) TCC\u00a02014, LNCS, vol. 8349, pp. 616\u2013637. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54242-8_26.","DOI":"10.1007\/978-3-642-54242-8_26"},{"key":"939_CR37","doi-asserted-by":"publisher","unstructured":"Yamada S., Attrapadung N., Hanaoka G., Kunihiro N.: Generic constructions for chosen-ciphertext secure attribute based encryption. In: Catalano D., Fazio N., Gennaro R., Nicolosi A. (eds.) PKC\u00a02011, vol. 6571, pp. 71\u201389. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19379-8_5.","DOI":"10.1007\/978-3-642-19379-8_5"},{"key":"939_CR38","doi-asserted-by":"publisher","unstructured":"Yamada S., Attrapadung N., Hanaoka G., Kunihiro N.: A framework and compact constructions for non-monotonic attribute-based encryption. In:\u00a0Krawczyk H. (ed.) PKC\u00a02014, LNCS, vol. 8383, pp. 275\u2013292. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54631-0_16.","DOI":"10.1007\/978-3-642-54631-0_16"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00939-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-021-00939-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00939-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T22:34:54Z","timestamp":1633646094000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-021-00939-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,23]]},"references-count":38,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["939"],"URL":"https:\/\/doi.org\/10.1007\/s10623-021-00939-8","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,23]]},"assertion":[{"value":"29 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 July 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}