{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:21:31Z","timestamp":1740172891241,"version":"3.37.3"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100002261","name":"\u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0439 \u0424\u043e\u043d\u0434 \u0424\u0443\u043d\u0434\u0430\u043c\u0435\u043d\u0442\u0430\u043b\u044c\u043d\u044b\u0445 \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0439","doi-asserted-by":"publisher","award":["18-37-20033","18-37-20033"],"award-info":[{"award-number":["18-37-20033","18-37-20033"]}],"id":[{"id":"10.13039\/501100002261","id-type":"DOI","asserted-by":"publisher"}]},{"name":"\u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0439\u041d\u0430\u0443\u0447 \u043d\u044b\u0439\u0424\u043e\u043d\u0434","award":["17-11-01377"],"award-info":[{"award-number":["17-11-01377"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s11416-020-00366-8","type":"journal-article","created":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T20:03:16Z","timestamp":1598644996000},"page":"333-341","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Advanced attribute-based encryption protocol based on the modified secret sharing scheme"],"prefix":"10.1007","volume":"16","author":[{"given":"M. A.","family":"Kudinov","sequence":"first","affiliation":[]},{"given":"A. A.","family":"Chilikov","sequence":"additional","affiliation":[]},{"given":"E. O.","family":"Kiktenko","sequence":"additional","affiliation":[]},{"given":"A. K.","family":"Fedorov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"key":"366_CR1","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters B.R.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 89\u201398 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"366_CR2","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. In: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pp. 213\u2013229 (2001)","DOI":"10.1007\/3-540-44647-8_13"},{"key":"366_CR3","doi-asserted-by":"crossref","unstructured":"Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Advances in Cryptology\u2014CRYPTO, Lecture Notes in Computer Science, vol. 3621, pp. 258\u2013275 (2005)","DOI":"10.1007\/11535218_16"},{"key":"366_CR4","doi-asserted-by":"crossref","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology EUROCRYPT, vol. 2005, pp. 457\u2013473 (2005)","DOI":"10.1007\/11426639_27"},{"key":"366_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1007\/11787006_26","volume-title":"ICALP (2)","author":"M Abdalla","year":"2006","unstructured":"Abdalla, M., Catalano, D., Dent, A.W., Malone-Lee, J., Neven, G., Smart, N.P.: Identity-based encryption gone wild. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP (2). Lecture Notes in Computer Science, vol. 4052, pp. 300\u2013311. Springer, Berlin, Heidelberg (2006)"},{"key":"366_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/0-387-34799-2_3","volume-title":"Advances in Cryptology CRYPTO 88","author":"J Benaloh","year":"1990","unstructured":"Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. In: Goldwasser, S. (ed.) Advances in Cryptology CRYPTO 88. Lecture Notes in Computer Science, vol. 403, pp. 27\u201335. Springer, New York, NY (1990)"},{"key":"366_CR7","doi-asserted-by":"crossref","unstructured":"Boneh, D.: The decision Diffie\u2013Hellman problem. In: Buhler, J.P. (ed.) Proceedings of the Third Algorithmic Number Theory Symposium, Lecture Notes in Computer Science, vol. 1423, pp. 48\u201363. Springer, Berlin (1998)","DOI":"10.1007\/BFb0054851"},{"key":"366_CR8","doi-asserted-by":"crossref","unstructured":"Cramer, R., Damgrd, I., Kiltz, E., Zakarias, S., Zottarel, A.: DDH-like assumptions based on extension rings. In: Public Key Cryptography-PKC 2012, Lecture Notes in Computer Science, vol. 7293, pp. 644\u2013661 (2012)","DOI":"10.1007\/978-3-642-30057-8_38"},{"key":"366_CR9","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM Conference on Computer and Communications Security (ACM CCS), pp. 62\u201373 (1993)","DOI":"10.1145\/168588.168596"},{"key":"366_CR10","doi-asserted-by":"crossref","unstructured":"Canetti, R., Halevi, S., Katz, J.: A forward-secure public-key encryption scheme. In: Advances in Cryptology\u2014Eurocrypt, Lecture Notes in Computer Science, vol. 2656, pp. 255\u2013271 (2003)","DOI":"10.1007\/3-540-39200-9_16"},{"key":"366_CR11","doi-asserted-by":"crossref","unstructured":"Canetti, R., Halevi, S., Katz, J.: Chosen ciphertext security from identity based encryption. In: Advances in Cryptology-Eurocrypt, Lecture Notes in Computer Science, vol. 3027, pp. 207\u2013222 (2004)","DOI":"10.1007\/978-3-540-24676-3_13"},{"key":"366_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-540-24676-3_14","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2004. EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X.: Efficient selective-ID secure identity based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) Advances in Cryptology\u2014EUROCRYPT 2004. EUROCRYPT 2004. Lecture Notes in Computer Science, vol. 3027, pp. 223\u2013238. Springer, Berlin (2004)"},{"key":"366_CR13","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of Cryptography: Volume 1 Basic Tools","author":"O Goldreich","year":"2001","unstructured":"Goldreich, O.: Foundations of Cryptography: Volume 1 Basic Tools. Cambridge University Press, Cambridge (2001)"},{"key":"366_CR14","unstructured":"Kapadia, A., Tsang, P., Smith, S.: Attribute-Based Publishing with Hidden Credentials and Hidden Policies (2007)"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-020-00366-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-020-00366-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-020-00366-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T23:28:25Z","timestamp":1630106905000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-020-00366-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"references-count":14,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["366"],"URL":"https:\/\/doi.org\/10.1007\/s11416-020-00366-8","relation":{},"ISSN":["2263-8733"],"issn-type":[{"type":"electronic","value":"2263-8733"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"2 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}