{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:56:28Z","timestamp":1762005388327,"version":"3.37.3"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2022,8,13]],"date-time":"2022-08-13T00:00:00Z","timestamp":1660348800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,8,13]],"date-time":"2022-08-13T00:00:00Z","timestamp":1660348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2022,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Attribute-based encryption (ABE) is a form of public-key encryption that allows fine-grained access control on encrypted data. Blind key-generation (BKG) attribute-based encryption (Rial,<jats:sc>Designs, Codes and Cryptography 2016<\/jats:sc>) is a variant in which the master authority issues secret keys without learning any information about the attributes associated to them. This extra functionality makes it an appealing building block for several applications. In this work, we extend the generic framework of ABE based on pair encodings (Attrapadung,<jats:sc>Eurocrypt 2014<\/jats:sc>) to support blind key-generation. In particular, we define two new notions of pair encodings that we coin<jats:italic>BKG-compatible<\/jats:italic>and<jats:italic>algebraic<\/jats:italic>pair encoding. We show that every encoding satisfies the former without loss of generality, whereas the latter is satisfied by all existing pair encodings from the literature. We then show how to enhance any ABE based on a BKG-compatible pair encoding to achieve honest-but-curious blind key-generation. In the case of algebraic encodings, our protocol admits a very efficient version, secure against malicious parties. The main advantage of our work is generality. Our protocol is designed over the recent and most advanced modular frameworks of ABE that can handle a rich variety of predicates.<\/jats:p>","DOI":"10.1007\/s10623-022-01069-5","type":"journal-article","created":{"date-parts":[[2022,8,13]],"date-time":"2022-08-13T09:03:11Z","timestamp":1660381391000},"page":"2271-2299","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Blind key-generation attribute-based encryption for general predicates"],"prefix":"10.1007","volume":"90","author":[{"given":"Masayuki","family":"Abe","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5927-9235","authenticated-orcid":false,"given":"Miguel","family":"Ambrona","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,13]]},"reference":[{"key":"1069_CR1","doi-asserted-by":"crossref","unstructured":"Ambrona, M., Barthe, G., Gay, R., Wee, H.: Attribute-based encryption in the generic group model: automated proofs and new constructions. In: Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D. (eds.) ACM CCS 2017, pp. 647\u2013664. ACM Press (October\/November 2017)","DOI":"10.1145\/3133956.3134088"},{"key":"1069_CR2","doi-asserted-by":"crossref","unstructured":"Ambrona, M., Gilles, B., Benedikt, S.: Generic transformations of predicate encodings: constructions and applications. In: Jonathan, K., Hovav, S. (eds.) CRYPTO 2017, Part I, LNCS, vol. 10401, pp. 36\u201366. Springer, Heidelberg (2017)","DOI":"10.1007\/978-3-319-63688-7_2"},{"key":"1069_CR3","first-page":"259","volume-title":"TCC 2016-A, Part II, LNCS","author":"S Agrawal","year":"2016","unstructured":"Agrawal S., Chase M.: A study of pair encodings: predicate encryption in prime order groups. In: Kushilevitz E., Malkin T. (eds.) TCC 2016-A, Part II, LNCS, vol. 9563, pp. 259\u2013288. Springer, Heidelberg (2016)."},{"key":"1069_CR4","doi-asserted-by":"crossref","unstructured":"Agrawal, S., Chase, M.: Simplifying design and analysis of complex predicate encryption schemes. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT\u00a02017, Part\u00a0I, LNCS, vol. 10210, pp. 627\u2013656. Springer, Heidelberg (April\/May 2017)","DOI":"10.1007\/978-3-319-56620-7_22"},{"key":"1069_CR5","unstructured":"Aranha, D.F., Gouv\u00eaa, C.P.L., Markmann, T., Wahby, R.S., Liao, K.: RELIC is an Efficient LIbrary for Cryptography. https:\/\/github.com\/relic-toolkit\/relic"},{"key":"1069_CR6","unstructured":"Akinyele, J.A., Lehmann, C.U., Green, M.D., Pagano, M.W., Peterson, Z.N.J., Rubin, A.D.: Self-protecting electronic medical records using attribute-based encryption. Cryptology ePrint Archive, Report 2010\/565, 2010. http:\/\/eprint.iacr.org\/2010\/565"},{"key":"1069_CR7","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/978-3-642-55220-5_31","volume-title":"EUROCRYPT 2014, LNCS","author":"N Attrapadung","year":"2014","unstructured":"Attrapadung N.: Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more. In: Nguyen P.Q., Oswald E. (eds.) EUROCRYPT 2014, LNCS, vol. 8441, pp. 557\u2013577. Springer, Heidelberg (2014)."},{"key":"1069_CR8","doi-asserted-by":"crossref","unstructured":"Attrapadung, N.: Dual system encryption framework in prime-order groups via computational pair encodings. In: J.H. Cheon, T. Takagi (eds.) ASIACRYPT\u00a02016, Part\u00a0II, LNCS, vol. 10032, pp. 591\u2013623. Springer, Heidelberg (December 2016)","DOI":"10.1007\/978-3-662-53890-6_20"},{"key":"1069_CR9","first-page":"34","volume-title":"EUROCRYPT 2019, Part I, LNCS","author":"N Attrapadung","year":"2019","unstructured":"Attrapadung N.: Unbounded dynamic predicate compositions in attribute-based encryption. In: Ishai Y., Rijmen V. (eds.) EUROCRYPT 2019, Part I, LNCS, vol. 11476, pp. 34\u201367. Springer, Heidelberg (2019)."},{"key":"1069_CR10","first-page":"87","volume-title":"CT-RSA 2015, LNCS","author":"N Attrapadung","year":"2015","unstructured":"Attrapadung N., Yamada S.: Duality in ABE: converting attribute based encryption for dual predicate and dual policy via computational encodings. In: Nyberg K. (ed.) CT-RSA 2015, LNCS, vol. 9048, pp. 87\u2013105. Springer, Heidelberg (2015)."},{"key":"1069_CR11","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-540-24676-3_14","volume-title":"EUROCRYPT 2004, LNCS","author":"D Boneh","year":"2004","unstructured":"Boneh D., Boyen X.: Efficient selective-ID secure identity based encryption without random oracles. In: Cachin C., Camenisch J. (eds.) EUROCRYPT 2004, LNCS, vol. 3027, pp. 223\u2013238. Springer, Heidelberg (2004)."},{"key":"1069_CR12","doi-asserted-by":"crossref","unstructured":"Bootle, J., Cerulli, A., Chaidos, P., Ghadafi, E., Groth, J., Petit, C.: Short accountable ring signatures based on DDH. In: Pernul, G., Ryan, EP.Y.A., Weippl, R. (eds.) ESORICS\u00a02015, Part\u00a0I, LNCS, Vol. 9326, pp. 243\u2013265. Springer, Heidelberg (September 2015)","DOI":"10.1007\/978-3-319-24174-6_13"},{"key":"1069_CR13","doi-asserted-by":"crossref","unstructured":"Blum, M., Feldman, P., Micali, S. Non-interactive zero-knowledge and its applications (extended abstract). In: 20th ACM STOC, pp. 103\u2013112. ACM Press (May 1988)","DOI":"10.1145\/62212.62222"},{"key":"1069_CR14","first-page":"390","volume-title":"CRYPTO\u201992, LNCS","author":"M Bellare","year":"1993","unstructured":"Bellare M., Goldreich O.: On defining proofs of knowledge. In: Brickell E.F. (ed.) CRYPTO\u201992, LNCS, vol. 740, pp. 390\u2013420. Springer, Heidelberg (1993)."},{"key":"1069_CR15","first-page":"319","volume-title":"SAC 2005, LNCS","author":"PSLM Barreto","year":"2006","unstructured":"Barreto P.S.L.M., Naehrig M.: Pairing-friendly elliptic curves of prime order. In: Preneel B., Tavares S. (eds.) SAC 2005, LNCS, vol. 3897, pp. 319\u2013331. Springer, Heidelberg (2006)."},{"key":"1069_CR16","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, pp. 321\u2013334. IEEE Computer Society Press (May 2007)","DOI":"10.1109\/SP.2007.11"},{"key":"1069_CR17","first-page":"535","volume-title":"TCC 2007, LNCS","author":"D Boneh","year":"2007","unstructured":"Boneh D., Waters B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan S.P. (ed.) TCC 2007, LNCS, vol. 4392, pp. 535\u2013554. Springer, Heidelberg (2007)."},{"key":"1069_CR18","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Dubovitskaya, M., Neven, G.: Oblivious transfer with access control. In: Al-Shaer, E., Jha, S., Keromytis, A.D. (eds.) ACM CCS 2009, pp. 131\u2013140. ACM Press (November 2009)","DOI":"10.1145\/1653662.1653679"},{"key":"1069_CR19","first-page":"501","volume-title":"PKC 2009, LNCS","author":"SE Coull","year":"2009","unstructured":"Coull S.E., Green M., Hohenberger S.: Controlling access to an oblivious database using stateful anonymous credentials. In: Jarecki S., Tsudik G. (eds.) PKC 2009, LNCS, vol. 5443, pp. 501\u2013520. Springer, Heidelberg (2009)."},{"key":"1069_CR20","first-page":"595","volume-title":"EUROCRYPT 2015, Part II, LNCS","author":"J Chen","year":"2015","unstructured":"Chen J., Gay R., Wee H.: Improved dual system ABE in prime-order groups via predicate encodings. In: Oswald E., Fischlin M. (eds.) EUROCRYPT 2015, Part II, LNCS, vol. 9057, pp. 595\u2013624. Springer, Heidelberg (2015)."},{"key":"1069_CR21","doi-asserted-by":"crossref","unstructured":"Canard, S., Hamdi, A., Laguillaumie, F.: Blind functional encryption. In: ICICS (2020)","DOI":"10.1007\/978-3-030-61078-4_11"},{"key":"1069_CR22","doi-asserted-by":"crossref","unstructured":"Cheung, L., Newport, C.C.: Provably secure ciphertext policy ABE. In: Ning, P., Capitani di Vimercati, S.D., Syverson, P.F. (eds.) ACM CCS 2007, pp. 456\u2013465. ACM Press (October 2007)","DOI":"10.1145\/1315245.1315302"},{"key":"1069_CR23","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/978-3-642-40084-1_25","volume-title":"CRYPTO 2013, Part II, LNCS","author":"J Chen","year":"2013","unstructured":"Chen J., Wee H.: Fully, (almost) tightly secure IBE and dual system groups. In: Canetti R., Garay J.A. (eds.) CRYPTO 2013, Part II, LNCS, vol. 8043, pp. 435\u2013460. Springer, Heidelberg (2013)."},{"key":"1069_CR24","unstructured":"Chen, J., Wee, H.: Dual system groups and its applications\u2014compact HIBE and more. Cryptology ePrint Archive, Report 2014\/265, 2014. http:\/\/eprint.iacr.org\/2014\/265"},{"key":"1069_CR25","unstructured":"Dinh, T.T.A., Datta, A.:. Streamforce: outsourcing access control enforcement for stream data to the clouds. In: Fourth ACM Conference on Data and Application Security and Privacy, CODASPY\u201914, San Antonio, TX, USA - March 03\u201305, 2014, pp. 13\u201324 (2014)"},{"key":"1069_CR26","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-642-40084-1_8","volume-title":"CRYPTO 2013, Part II, LNCS","author":"A Escala","year":"2013","unstructured":"Escala A., Herold G., Kiltz E., R\u00e0fols C., Villar J.: An algebraic framework for Diffie-Hellman assumptions. In: Canetti R., Garay J.A. (eds.) CRYPTO 2013, Part II, LNCS, vol. 8043, pp. 129\u2013147. Springer, Heidelberg (2013)."},{"key":"1069_CR27","first-page":"480","volume-title":"CRYPTO\u201993, LNCS","author":"A Fiat","year":"1994","unstructured":"Fiat A., Naor M.: Broadcast encryption. In: Stinson D.R. (ed.) CRYPTO\u201993, LNCS, vol. 773, pp. 480\u2013491. Springer, Heidelberg (1994)."},{"key":"1069_CR28","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-540-76900-2_16","volume-title":"ASIACRYPT 2007, LNCS","author":"M Green","year":"2007","unstructured":"Green M., Hohenberger S.: Blind identity-based encryption and simulatable oblivious transfer. In: Kurosawa K. (ed.) ASIACRYPT 2007, LNCS, vol. 4833, pp. 265\u2013282. Springer, Heidelberg (2007)."},{"key":"1069_CR29","first-page":"253","volume-title":"EUROCRYPT 2015, Part II, LNCS","author":"J Groth","year":"2015","unstructured":"Groth J., Kohlweiss M.: One-out-of-many proofs: or how to leak a secret and spend a coin. In: Oswald E., Fischlin M. (eds.) EUROCRYPT 2015, Part II, LNCS, vol. 9057, pp. 253\u2013280. Springer, Heidelberg (2015)."},{"key":"1069_CR30","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems (extended abstract). In: 17th ACM STOC, pp. 291\u2013304. ACM Press (May 1985)","DOI":"10.1145\/22145.22178"},{"issue":"1","key":"1069_CR31","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S Goldwasser","year":"1989","unstructured":"Goldwasser S., Micali S., Rackoff C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186\u2013208 (1989).","journal-title":"SIAM J. Comput."},{"key":"1069_CR32","first-page":"171","volume-title":"CRYPTO\u201986, LNCS","author":"O Goldreich","year":"1987","unstructured":"Goldreich O., Micali S., Wigderson A.: How to prove all NP-statements in zero-knowledge, and a methodology of cryptographic protocol design. In: Odlyzko A.M. (ed.) CRYPTO\u201986, LNCS, vol. 263, pp. 171\u2013185. Springer, Heidelberg (1987)."},{"key":"1069_CR33","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A, Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Juels, A., Wright, R.N., Capitani di Vimercati, S.D. (eds.) ACM CCS 2006, pp. 89\u201398. ACM Press (October\/November 2006). Available as Cryptology ePrint Archive Report 2006\/309.","DOI":"10.1145\/1180405.1180418"},{"key":"1069_CR34","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-540-78967-3_9","volume-title":"EUROCRYPT 2008, LNCS","author":"J Katz","year":"2008","unstructured":"Katz J., Sahai A., Waters B.: Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Smart N.P. (ed.) EUROCRYPT 2008, LNCS, vol. 4965, pp. 146\u2013162. Springer, Heidelberg (2008)."},{"key":"1069_CR35","unstructured":"Karchmer, M., Wigderson, A.: On span programs. In: Proceedings of Structures in Complexity Theory, pp. 102\u2013111 (1993)"},{"key":"1069_CR36","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/978-3-642-29011-4_20","volume-title":"EUROCRYPT 2012, LNCS","author":"AB Lewko","year":"2012","unstructured":"Lewko A.B.: Tools for simulating features of composite order bilinear groups in the prime order setting. In: Pointcheval D., Johansson T. (eds.) EUROCRYPT 2012, LNCS, vol. 7237, pp. 318\u2013335. Springer, Heidelberg (2012)."},{"key":"1069_CR37","doi-asserted-by":"crossref","unstructured":"Lewko, A.B., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT\u00a02010, LNCS, vol. 6110, pp. 62\u201391. Springer, Heidelberg (May\/June 2010)","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"1069_CR38","first-page":"455","volume-title":"TCC 2010, LNCS","author":"AB Lewko","year":"2010","unstructured":"Lewko A.B., Waters B.: New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Micciancio D. (ed.) TCC 2010, LNCS, vol. 5978, pp. 455\u2013479. Springer, Heidelberg (2010)."},{"key":"1069_CR39","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/978-3-642-20465-4_30","volume-title":"EUROCRYPT 2011, LNCS","author":"AB Lewko","year":"2011","unstructured":"Lewko A.B., Waters B.: Unbounded HIBE and attribute-based encryption. In: Paterson K.G. (ed.) EUROCRYPT 2011, LNCS, vol. 6632, pp. 547\u2013567. Springer, Heidelberg (2011)."},{"key":"1069_CR40","doi-asserted-by":"crossref","unstructured":"Morillo, P., R\u00e0fols, C., Villar, J.L.: The kernel matrix Diffie-Hellman assumption. In: Cheon, J.H., Takagi, T., (eds.) ASIACRYPT\u00a02016, Part\u00a0I, LNCS, vol. 10031, pp. 729\u2013758. Springer, Heidelberg (December 2016)","DOI":"10.1007\/978-3-662-53887-6_27"},{"key":"1069_CR41","doi-asserted-by":"crossref","unstructured":"Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Ning, P., Capitani di Vimercati, S.D., Syverson, P.F. (eds.) ACM CCS 2007, pp. 195\u2013203. ACM Press (October 2007)","DOI":"10.1145\/1315245.1315270"},{"key":"1069_CR42","unstructured":"Rabin, M.: How to exchange secrets by oblivious transfer. Technical Report Tech. Memo TR-81, Aiken Computation Laboratory (1981)"},{"issue":"2","key":"1069_CR43","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/s10623-015-0134-y","volume":"81","author":"A Rial","year":"2016","unstructured":"Rial A.: Blind attribute-based encryption and oblivious transfer with fine-grained access control. Des. Codes Cryptogr. 81(2), 179\u2013223 (2016).","journal-title":"Des. Codes Cryptogr."},{"key":"1069_CR44","doi-asserted-by":"crossref","unstructured":"Rouselakis, Y., Waters, B.: Practical constructions and new proof methods for large universe attribute-based encryption. In: Sadeghi, A.-R., Gligor, V.D., Yung, M., (eds.) ACM CCS 2013, pp. 463\u2013474. ACM Press (November 2013)","DOI":"10.1145\/2508859.2516672"},{"key":"1069_CR45","doi-asserted-by":"crossref","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO\u201984, LNCS, vol. 196, pp 47\u201353. Springer, Heidelberg (August 1984)","DOI":"10.1007\/3-540-39568-7_5"},{"key":"1069_CR46","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"EUROCRYPT 2005, LNCS","author":"A Sahai","year":"2005","unstructured":"Sahai A., Waters B.R.: Fuzzy identity-based encryption. In: Cramer R. (ed.) EUROCRYPT 2005, LNCS, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005)."},{"key":"1069_CR47","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/978-3-642-03356-8_36","volume-title":"CRYPTO 2009, LNCS","author":"B Waters","year":"2009","unstructured":"Waters B.: Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. In: Halevi S. (ed.) CRYPTO 2009, LNCS, vol. 5677, pp. 619\u2013636. Springer, Heidelberg (2009)."},{"key":"1069_CR48","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-642-32009-5_14","volume-title":"CRYPTO 2012, LNCS","author":"B Waters","year":"2012","unstructured":"Waters B.: Functional encryption for regular languages. In: Safavi-Naini R., Canetti R. (eds.) CRYPTO 2012, LNCS, vol. 7417, pp. 218\u2013235. Springer, Heidelberg (2012)."},{"key":"1069_CR49","first-page":"616","volume-title":"TCC 2014, LNCS","author":"H Wee","year":"2014","unstructured":"Wee H.: Dual system encryption via predicate encodings. In: Lindell Y. (ed.) TCC 2014, LNCS, vol. 8349, pp. 616\u2013637. Springer, Heidelberg (2014)."},{"key":"1069_CR50","unstructured":"Wang, F., Mickens, J., Zeldovich, N., Vaikuntanathan, V.: Sieve: Cryptographically enforced access control for user data in untrusted clouds. In: 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), pp. 611\u2013626. Santa Clara, CA, March 2016. USENIX Association."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-022-01069-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-022-01069-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-022-01069-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T21:12:48Z","timestamp":1676409168000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-022-01069-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,13]]},"references-count":50,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["1069"],"URL":"https:\/\/doi.org\/10.1007\/s10623-022-01069-5","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2022,8,13]]},"assertion":[{"value":"19 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 May 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Any person employed by NTT would be in CoI.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"Available now upon request (open source in the future).","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}]}}