{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:27:19Z","timestamp":1759091239607},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,9,23]],"date-time":"2011-09-23T00:00:00Z","timestamp":1316736000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s11227-011-0683-4","type":"journal-article","created":{"date-parts":[[2011,9,22]],"date-time":"2011-09-22T17:29:02Z","timestamp":1316712542000},"page":"1075-1091","source":"Crossref","is-referenced-by-count":13,"title":["A scalable encryption scheme for multi-privileged group communications"],"prefix":"10.1007","volume":"64","author":[{"given":"Guojun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Qiushuang","family":"Du","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Qin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,9,23]]},"reference":[{"key":"683_CR1","series-title":"LNCS","first-page":"248","volume-title":"Proceedings of pairing","author":"N Attrapadung","year":"2009","unstructured":"Attrapadung N, Imai H (2009) Conjunctive broadcast and attribute-based encryption. In: Proceedings of pairing. LNCS, vol.\u00a05671, pp 248\u2013265"},{"key":"683_CR2","unstructured":"Beimel A (1996) Secure schemes for secret sharing and key distribution. Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel"},{"key":"683_CR3","first-page":"321","volume-title":"Proceedings of IEEE S&P 2007","author":"J Bethencourt","year":"2007","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE S&P 2007, pp 321\u2013334"},{"key":"683_CR4","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/11535218_16","volume-title":"Proceedings of CRYPTO 2005","author":"D Boneh","year":"2005","unstructured":"Boneh D, Gentry C, Waters B (2005) Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Proceedings of CRYPTO 2005. LNCS, vol\u00a03621, pp 258\u2013275"},{"key":"683_CR5","first-page":"689","volume-title":"Proceedings of IEEE INFOCOM 1999","author":"I Chang","year":"1999","unstructured":"Chang I, Engel R, Kandlur D, Pendarakis D, Saha D (1999) Key management for secure Internet multicast using boolean function minimization techniques. In: Proceedings of IEEE INFOCOM 1999, pp 689\u2013698"},{"issue":"2","key":"683_CR6","doi-asserted-by":"crossref","first-page":"303","DOI":"10.4134\/BKMS.2009.46.2.303","volume":"46","author":"JH Cheon","year":"2009","unstructured":"Cheon JH, Lee DH (2009) A note on self-bilinear maps. J Korean Math Soc 46(2):303\u2013309","journal-title":"J Korean Math Soc"},{"key":"683_CR7","unstructured":"Cheung L, Cooley JA, Khazan R, Newport C, (2007) Collusion-resistant group key management using attribute-based encryption. Cryptology ePrint Archive Report"},{"key":"683_CR8","first-page":"89","volume-title":"Proceedings of ACM CCS 2005","author":"V Goyal","year":"2005","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2005) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of ACM CCS 2005, pp 89\u201398"},{"key":"683_CR9","first-page":"13","volume-title":"Proceedings of DRM 2010","author":"P Junod","year":"2010","unstructured":"Junod P, Karlov A (2010) An efficient public-key attribute-based broadcast encryption scheme allowing arbitrary access policies. In: Proceedings of DRM 2010, pp 13\u201324"},{"key":"683_CR10","first-page":"273","volume-title":"Proceedings of IEEE S&P 2010","author":"A Lewko","year":"2010","unstructured":"Lewko A, Sahai A, Waters B (2010) Revocation systems with very small private keys. In: Proceedings of IEEE S&P 2010, pp 273\u2013285"},{"key":"683_CR11","series-title":"LNCS","first-page":"539","volume-title":"Proceedings of ICCNMC 2005","author":"R Li","year":"2005","unstructured":"Li R, Li J, Kameda H (2005) Distributed hierarchical access control for secure group communications. In: Proceedings of ICCNMC 2005. LNCS, vol\u00a03619, pp 539\u2013548"},{"key":"683_CR12","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/978-3-540-68164-9_22","volume-title":"Proceedings of AfricaCrypt 2008","author":"D Lubicz","year":"2008","unstructured":"Lubicz D, Sirvent T (2008) Attribute-based broadcast encryption scheme made efficient. In: Proceedings of AfricaCrypt 2008, pp 325\u2013342"},{"key":"683_CR13","first-page":"1","volume":"99","author":"J Hur","year":"2010","unstructured":"Hur J, Noh DK (2010) Attribute-based access control with efficient revocation in data outsourcing systems IEEE Trans Parallel Distrib Syst 99:1\u20138","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"683_CR14","first-page":"195","volume-title":"Proceedings of ACM CCS 2007","author":"R Ostrovsky","year":"2007","unstructured":"Ostrovsky R, Sahai A, Waters B (2007) Attribute based encryption with non-monotonic access structure. In: Proceedings of ACM CCS 2007, pp 195\u2013203"},{"issue":"3","key":"683_CR15","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1145\/937503.937506","volume":"35","author":"S Rafaeli","year":"2003","unstructured":"Rafaeli S, Hutchison D (2003) A survey of key management for secure group communication. ACM Comput Surv 35(3):309\u2013329","journal-title":"ACM Comput Surv"},{"key":"683_CR16","doi-asserted-by":"crossref","first-page":"1296","DOI":"10.1109\/INFCOM.2004.1357015","volume-title":"Proceedings of IEEE INFOCOM 2004","author":"Y Sun","year":"2004","unstructured":"Sun Y, Liu KJR (2004) Scalable hierarchical access control in secure group communications. In: Proceedings of IEEE INFOCOM 2004, pp 1296\u20131306"},{"issue":"11\u201312","key":"683_CR17","doi-asserted-by":"crossref","first-page":"2497","DOI":"10.1016\/j.comcom.2007.04.019","volume":"30","author":"G Wang","year":"2007","unstructured":"Wang G, Ouyang J, Chen H-H, Guo M (2007) Efficient group key management for multi-privileged groups. Comput Commun 30(11\u201312):2497\u20132509","journal-title":"Comput Commun"},{"key":"683_CR18","series-title":"LNCS","first-page":"23","volume-title":"Proceedings of INSCRYPT 2008","author":"W Zhao","year":"2008","unstructured":"Zhao W, Liu C, Ye D (2008) Provably secure convertible nominative signature scheme. In: Proceedings of INSCRYPT 2008. LNCS, vol\u00a05487, pp 23\u201340"},{"key":"683_CR19","first-page":"1","volume-title":"Proceedings of IEEE INFOCOM 2010","author":"Z Zhou","year":"2010","unstructured":"Zhou Z, Huang D (2010) Constructing efficient attribute-based broadcast encryption. In: Proceedings of IEEE INFOCOM 2010, pp 1\u20132"},{"key":"683_CR20","first-page":"753","volume-title":"Proceedings of ACM CCS 2010","author":"Z Zhou","year":"2010","unstructured":"Zhou Z, Huang D (2010) On efficient ciphertext-policy attribute based encryption and broadcast encryption. In: Proceedings of ACM CCS 2010, pp 753\u2013755"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-011-0683-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-011-0683-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-011-0683-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,16]],"date-time":"2019-06-16T06:09:33Z","timestamp":1560665373000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-011-0683-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9,23]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["683"],"URL":"https:\/\/doi.org\/10.1007\/s11227-011-0683-4","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,9,23]]}}}