{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T05:13:32Z","timestamp":1739510012537,"version":"3.37.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T00:00:00Z","timestamp":1739145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T00:00:00Z","timestamp":1739145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s11432-024-4214-0","type":"journal-article","created":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T08:16:17Z","timestamp":1739434577000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Witness encryption with updatable ciphertexts"],"prefix":"10.1007","volume":"68","author":[{"given":"Yuzhu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Mingwu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,10]]},"reference":[{"key":"4214_CR1","first-page":"467","volume-title":"Proceedings of Symposium on Theory of Computing Conference","author":"S Garg","year":"2013","unstructured":"Garg S, Gentry C, Sahai A, et, al. Witness encryption and its applications. In: Proceedings of Symposium on Theory of Computing Conference, New York, 2013. 467\u2013476"},{"key":"4214_CR2","first-page":"498","volume-title":"Proceedings of Advances in Cryptology-CRYPTO","author":"C Freitag","year":"2023","unstructured":"Freitag C, Waters B, Wu D J. How to use (plain) witness encryption: registered abe, flexible broadcast, and more. In: Proceedings of Advances in Cryptology-CRYPTO, Santa Barbara, 2023. 498\u2013531"},{"key":"4214_CR3","first-page":"3","volume-title":"Proceedings of Public-Key Cryptography","author":"R Goyal","year":"2019","unstructured":"Goyal R, Vusirikala S, Waters B. Collusion resistant broadcast and trace from positional witness encryption. In: Proceedings of Public-Key Cryptography, Beijing, 2019. 3\u201333"},{"key":"4214_CR4","doi-asserted-by":"publisher","first-page":"2549","DOI":"10.1007\/s10623-018-0461-x","volume":"86","author":"J Liu","year":"2018","unstructured":"Liu J, Jager T, Kakvi S A, et al. How to build time-lock encryption. Des Codes Cryptogr, 2018, 86: 2549\u20132586","journal-title":"Des Codes Cryptogr"},{"key":"4214_CR5","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-031-45513-1_13","volume-title":"Proceedings of Provable and Practical Security","author":"Y Z Wang","year":"2023","unstructured":"Wang Y Z, Wang X B, Zhang M W. Homomorphic witness encryption from indistinguishable obfuscation. In: Proceedings of Provable and Practical Security, Wuhan, 2023. 231\u2013250"},{"key":"4214_CR6","first-page":"275","volume-title":"Proceedings of Advances in Cryptology-ASIACRYPT","author":"S Badrinarayanan","year":"2017","unstructured":"Badrinarayanan S, Garg S, Ishai Y, et al. Two-message witness indistinguishability and secure computation in the plain model from new assumptions. In: Proceedings of Advances in Cryptology-ASIACRYPT, Hong Kong, 2017. 275\u2013303"},{"key":"4214_CR7","volume-title":"Proceedings of the 30th Annual Network and Distributed System Security Symposium (NDSS 2023)","author":"V Madathil","year":"2023","unstructured":"Madathil V, Thyagarajan S A K, Vasilopoulos D, et, al. Cryptographic oracle-based conditional payments. In: Proceedings of the 30th Annual Network and Distributed System Security Symposium (NDSS 2023), San Diego, 2023"},{"key":"4214_CR8","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-030-64378-2_13","volume-title":"Proceedings of Theory of Cryptography (TCC 2020)","author":"F Benhamouda","year":"2020","unstructured":"Benhamouda F, Lin H. Mr NISC: multiparty reusable non-interactive secure computation. In: Proceedings of Theory of Cryptography (TCC 2020), Durham, 2020. 349\u2013378"},{"key":"4214_CR9","first-page":"151","volume-title":"Proceedings of Advances in Cryptology-ASIACRYPT","author":"M Campanelli","year":"2022","unstructured":"Campanelli M, David B, Khoshakhlagh H, et, al. Encryption to the future: a paradigm for sending secret messages to future (anonymous) committees. In: Proceedings of Advances in Cryptology-ASIACRYPT, Taipei, 2022. 151\u2013180"},{"key":"4214_CR10","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-031-47754-6_15","volume-title":"Proceedings of Financial Cryptography and Data Security","author":"N Dottling","year":"2024","unstructured":"Dottling N, Hanzlik L, Magri B, et, al. McFly: verifiable encryption to the future made practical. In: Proceedings of Financial Cryptography and Data Security, Willemstad, 2024. 252\u2013269"},{"key":"4214_CR11","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-319-39555-5_16","volume-title":"Proceedings of Applied Cryptography and Network Security","author":"H Abusalah","year":"2016","unstructured":"Abusalah H, Fuchsbauer G, Pietrzak K. Offline witness encryption. In: Proceedings of Applied Cryptography and Network Security, Guildford, 2016. 285\u2013303"},{"key":"4214_CR12","doi-asserted-by":"publisher","first-page":"5804","DOI":"10.1109\/TIFS.2023.3315526","volume":"18","author":"M W Zhang","year":"2023","unstructured":"Zhang M W, Chen S J, Shen J, et al. PrivacyEAFL: privacy-enhanced aggregation for federated learning in mobile crowd-sensing. IEEE Trans Inform Forensic Secur, 2023, 18: 5804\u20135816","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"4214_CR13","first-page":"132","volume-title":"Proceedings of Public-Key Cryptography","author":"M Campanelli","year":"2024","unstructured":"Campanelli M, Fiore D, Khoshakhlagh H. Witness encryption for succinct functional commitments and applications. In: Proceedings of Public-Key Cryptography, Sydney, 2024. 132\u2013167"},{"key":"4214_CR14","first-page":"776","volume-title":"Proceedings of Advances in Cryptology-CRYPTO","author":"O Barta","year":"2020","unstructured":"Barta O, Ishai Y, Ostrovsky R, et, al. On succinct arguments and witness encryption from groups. In: Proceedings of Advances in Cryptology-CRYPTO, 2020. 776\u2013806"},{"key":"4214_CR15","first-page":"535","volume-title":"Proceedings of Advances in Cryptology-CRYPTO","author":"R Tsabary","year":"2022","unstructured":"Tsabary R. Candidate witness encryption from lattice techniques. In: Proceedings of Advances in Cryptology-CRYPTO, Santa Barbara, 2022. 535\u2013559"},{"key":"4214_CR16","first-page":"195","volume-title":"Proceedings of Advances in Cryptology-ASIACRYPT","author":"V Vaikuntanathan","year":"2022","unstructured":"Vaikuntanathan V, Wee H, Wichs D. Witness encryption and null-IO from evasive LWE. In: Proceedings of Advances in Cryptology-ASIACRYPT, Taipei, 2022. 195\u2013221"},{"key":"4214_CR17","doi-asserted-by":"publisher","first-page":"1925","DOI":"10.1007\/s10623-024-01373-2","volume":"92","author":"T V X Phuong","year":"2024","unstructured":"Phuong T V X. Anonymous attribute-based broadcast encryption with hidden multiple access structures. Des Codes Cryptogr, 2024, 92: 1925\u20131945","journal-title":"Des Codes Cryptogr"},{"key":"4214_CR18","doi-asserted-by":"publisher","first-page":"2525","DOI":"10.1007\/s10623-018-0460-y","volume":"86","author":"D Derler","year":"2018","unstructured":"Derler D, Slamanig D. Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs. Des Codes Cryptogr, 2018, 86: 2525\u20132547","journal-title":"Des Codes Cryptogr"},{"key":"4214_CR19","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-031-22390-7_4","volume-title":"Proceedings of the 25th International Conference on Information Security","author":"Y Z Wang","year":"2022","unstructured":"Wang Y Z, Zhang M W. Witness encryption from smooth projective hashing system. In: Proceedings of the 25th International Conference on Information Security, Bali, 2022. 53\u201372"},{"key":"4214_CR20","first-page":"545","volume-title":"Proceedings of Symposium on Theory of Computing Conference","author":"S Gorbunov","year":"2013","unstructured":"Gorbunov S, Vaikuntanathan V, Wee H. Attribute-based encryption for circuits. In: Proceedings of Symposium on Theory of Computing Conference, New York, 2013. 545\u2013554"},{"key":"4214_CR21","first-page":"287","volume-title":"Proceedings of Public-Key Cryptography","author":"A Cohen","year":"2019","unstructured":"Cohen A. What about Bob? The inadequacy of CPA security for proxy reencryption. In: Proceedings of Public-Key Cryptography, Beijing, 2019. 287\u2013316"},{"key":"4214_CR22","first-page":"219","volume-title":"Proceedings of Public-Key Cryptography","author":"D Derler","year":"2018","unstructured":"Derler D, Krenn S, Lorunser T, et al. Revisiting proxy re-encryption: forward secrecy, improved security, and applications. In: Proceedings of Public-Key Cryptography, Rio de Janeiro, 2018. 219\u2013250"},{"key":"4214_CR23","first-page":"678","volume-title":"Proceedings of Advances in Cryptology-CRYPTO","author":"B Waters","year":"2015","unstructured":"Waters B. A punctured programming approach to adaptively secure functional encryption. In: Proceedings of Advances in Cryptology-CRYPTO, Santa Barbara, 2015. 678\u2013697"},{"key":"4214_CR24","first-page":"40","volume-title":"Proceedings of IEEE 54th Annual Symposium on Foundations of Computer Science","author":"S Garg","year":"2013","unstructured":"Garg S, Gentry C, Halevi S, et, al. Candidate indistinguishability obfuscation and functional encryption for all circuits. In: Proceedings of IEEE 54th Annual Symposium on Foundations of Computer Science, Berkeley, 2013. 40\u201349"},{"key":"4214_CR25","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1007\/978-3-662-46497-7_19","volume-title":"Proceedings of Theory of Cryptography (TCC 2015)","author":"R Canetti","year":"2015","unstructured":"Canetti R, Lin H, Tessaro S, et al. Obfuscation of probabilistic circuits and applications. In: Proceedings of Theory of Cryptography (TCC 2015), Warsaw, 2015. 468\u2013497"},{"key":"4214_CR26","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1007\/978-3-662-44371-2_29","volume-title":"Proceedings of Advances in Cryptology-CRYPTO 2014","author":"S Garg","year":"2014","unstructured":"Garg S, Gentry C, Halevi S, et, al. On the implausibility of differing inputs obfuscation and extractable witness encryption with auxiliary input. In: Proceedings of Advances in Cryptology-CRYPTO 2014, Santa Barbara, 2014. 518\u2013535"},{"key":"4214_CR27","first-page":"69","volume-title":"Proceedings of Public-Key Cryptography","author":"R Garg","year":"2024","unstructured":"Garg R, Goyal R, Lu G. Dynamic collusion functional encryption and multiauthority attribute-based encryption. In: Proceedings of Public-Key Cryptography, Sydney, 2024. 69\u2013104"},{"key":"4214_CR28","first-page":"9846","volume-title":"Proceedings of Service-Oriented and Cloud Computing (ESOCC 2016)","author":"S Fugkeaw","year":"2016","unstructured":"Fugkeaw S, Sato H. Updating policies in CP-ABE-based access control: an optimized and secure service. In: Proceedings of Service-Oriented and Cloud Computing (ESOCC 2016), Vienna, 2016. 9846"},{"key":"4214_CR29","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-642-54242-8_3","volume-title":"Proceedings of Theory of Cryptography","author":"E Boyle","year":"2014","unstructured":"Boyle E, Chung K M, Pass R. On extractability obfuscation. In: Proceedings of Theory of Cryptography, San Diego, 2014. 52\u201373"},{"key":"4214_CR30","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-030-21548-4_5","volume-title":"Proceedings of Information Security and Privacy (ACISP 2019)","author":"T Pal","year":"2019","unstructured":"Pal T, Dutta R. Offline witness encryption from witness PRF and randomized encoding in CRS model. In: Proceedings of Information Security and Privacy (ACISP 2019), Christchurch, 2019. 78\u201396"},{"key":"4214_CR31","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-030-57808-4_12","volume-title":"Proceedings of Applied Cryptography and Network Security (ACNS 2020)","author":"P Chvojka","year":"2020","unstructured":"Chvojka P, Jager T, Kakvi S A. Offline witness encryption with semi-adaptive security. In: Proceedings of Applied Cryptography and Network Security (ACNS 2020), Rome, 2020. 231\u2013250"},{"key":"4214_CR32","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-3-662-49099-0_16","volume-title":"Proceedings of Theory of Cryptography (TCC 2016)","author":"M Zhandry","year":"2016","unstructured":"Zhandry M. How to avoid obfuscation using witness PRFs. In: Proceedings of Theory of Cryptography (TCC 2016), Beijing, 2016. 421\u2013448"},{"key":"4214_CR33","first-page":"33","volume-title":"Proceedings of Advances in Cryptology-ASIACRYPT","author":"D D Nguyen","year":"2023","unstructured":"Nguyen D D, Phan D H, Pointcheval D. Verifiable decentralized multiclient functional encryption for inner product. In: Proceedings of Advances in Cryptology-ASIACRYPT, Guangzhou, 2023. 33\u201365"},{"key":"4214_CR34","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/s00145-023-09486-y","volume":"37","author":"V Cini","year":"2024","unstructured":"Cini V, Ramacher S, Slamanig D, et al. (Inner-Product) functional encryption with updatable ciphertexts. J Cryptol, 2024, 37: 8\u201347","journal-title":"J Cryptol"},{"key":"4214_CR35","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/S0022-0000(05)80043-1","volume":"49","author":"N Nisan","year":"1994","unstructured":"Nisan N, Wigderson A. Hardness vs randomness. J Comput Syst Sci, 1994, 49: 149\u2013167","journal-title":"J Comput Syst Sci"},{"key":"4214_CR36","first-page":"475","volume-title":"Proceedings of Symposium on Theory of Computing Conference (STOC\u201914)","author":"A Sahai","year":"2014","unstructured":"Sahai A, Waters B. How to use indistinguishability obfuscation: deniable encryption, and more. In: Proceedings of Symposium on Theory of Computing Conference (STOC\u201914), New York, 2014. 475\u2013484"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-024-4214-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-024-4214-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-024-4214-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T08:16:24Z","timestamp":1739434584000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-024-4214-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,10]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["4214"],"URL":"https:\/\/doi.org\/10.1007\/s11432-024-4214-0","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,10]]},"assertion":[{"value":"27 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 October 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"132109"}}