{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T14:14:51Z","timestamp":1762956891212,"version":"3.40.4"},"reference-count":4,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,4,26]],"date-time":"2022-04-26T00:00:00Z","timestamp":1650931200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,4,26]],"date-time":"2022-04-26T00:00:00Z","timestamp":1650931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s11704-022-1555-1","type":"journal-article","created":{"date-parts":[[2022,4,26]],"date-time":"2022-04-26T18:07:42Z","timestamp":1650996462000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A privacy-preserving group encryption scheme with identity exposure"],"prefix":"10.1007","volume":"16","author":[{"given":"Chuan-Kun","family":"Wu","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,26]]},"reference":[{"key":"1555_CR1","doi-asserted-by":"crossref","unstructured":"Chaum D, van Heyst E. Group signatures. In: Proceedings of 1991 Workshop on the Theory and Application of Cryptographic Techniques. 1991, 257\u2013265","DOI":"10.1007\/3-540-46416-6_22"},{"key":"1555_CR2","doi-asserted-by":"crossref","unstructured":"Bresson E, Stern J, Szydlo M. Threshold ring signatures and applications to ad-hoc groups. In: Proceedings of the 22nd Annual International Cryptology Conference Santa Barbara. 2002, 465\u2013480","DOI":"10.1007\/3-540-45708-9_30"},{"key":"1555_CR3","doi-asserted-by":"publisher","first-page":"12736","DOI":"10.1109\/ACCESS.2018.2810810","volume":"6","author":"L Zhang","year":"2018","unstructured":"Zhang L, Liang P, Mu Y. Improving privacy-preserving and security for decentralized key-policy attributed-based encryption. IEEE Access, 2018, 6: 12736\u201312745","journal-title":"IEEE Access"},{"issue":"1","key":"1555_CR4","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/TETCI.2020.2993841","volume":"6","author":"T Zhou","year":"2022","unstructured":"Zhou T, Shen J, He D, Vijayakumar P, Kumar N. Human-in-the-loop-aided privacy-preserving scheme for smart healthcare. IEEE Transactions on Emerging Topics in Computational Intelligence, 2022, 6(1): 6\u201315","journal-title":"IEEE Transactions on Emerging Topics in Computational Intelligence"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-022-1555-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11704-022-1555-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-022-1555-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T07:42:10Z","timestamp":1744184530000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11704-022-1555-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,26]]},"references-count":4,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["1555"],"URL":"https:\/\/doi.org\/10.1007\/s11704-022-1555-1","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"type":"print","value":"2095-2228"},{"type":"electronic","value":"2095-2236"}],"subject":[],"published":{"date-parts":[[2022,4,26]]},"assertion":[{"value":"8 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"165823"}}