{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T00:50:44Z","timestamp":1768783844402,"version":"3.49.0"},"reference-count":18,"publisher":"Oxford University Press (OUP)","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["The Computer Journal"],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1093\/comjnl\/bxv100","type":"journal-article","created":{"date-parts":[[2015,11,13]],"date-time":"2015-11-13T01:38:52Z","timestamp":1447378732000},"page":"970-982","source":"Crossref","is-referenced-by-count":36,"title":["A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles: Table 1."],"prefix":"10.1093","volume":"59","author":[{"given":"Chunpeng","family":"Ge","sequence":"first","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]},{"given":"Jiandong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhiqiu","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Liming","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Yongjun","family":"Ren","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2015,11,12]]},"reference":[{"key":"2016072903344346000_59.7.970.1","doi-asserted-by":"crossref","unstructured":"Sahai A. and Waters B. (2005) Fuzzy Identity-based Encryption. Proc. Eurocrypt 2005, Aarhus, Denmark, May 22\u201326, pp. 457\u2013473. Springer, Berlin.","DOI":"10.1007\/11426639_27"},{"key":"2016072903344346000_59.7.970.2","doi-asserted-by":"crossref","unstructured":"Goyal V. , Pandey O. , Sahai A. and Waters B. (2006) Attribute-based Encryption for Fine-grained Access Control of Encrypted Data. Proc. ACM CCS 2006, Alexandria, VA, USA, October 30\u2013November 3, pp. 89\u201398. ACM, New York.","DOI":"10.1145\/1180405.1180418"},{"key":"2016072903344346000_59.7.970.3","doi-asserted-by":"crossref","unstructured":"Blaze M. , Bleumer G. and Strauss M. (1998) Divertible Protocols and Atomic Proxy Cryptography. Proc. EUROCRYPT 1998, Finland, May 31\u2013June 4, pp. 127\u2013144. Springer, Berlin.","DOI":"10.1007\/BFb0054122"},{"key":"2016072903344346000_59.7.970.4","doi-asserted-by":"crossref","unstructured":"Weng J. , Deng R.H. and Chu C. (2009) Conditional Proxy Re-encryption Secure Against Chosen-ciphertext Attack. Proc. 4th Int. ACM Symp. Information, Computer and Communications Security 2009, Sydeny, Australia, March 10\u201312, pp. 322\u2013332. ACM, New York.","DOI":"10.1145\/1533057.1533100"},{"key":"2016072903344346000_59.7.970.5","unstructured":"Ateniese G. , Fu K. , Green M. and Hohenberger S. (2005) Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. Proc. 12th Annual Network and Distributed System Security Symp. 2005, San Diego, CA, USA, February 3\u20134, pp. 29\u201344. ACM, New York."},{"key":"2016072903344346000_59.7.970.6","doi-asserted-by":"crossref","unstructured":"Liang X. , Cao Z. , Lin H. and Shao J. (2009) Attribute-Based Proxy Re-Encryption with Delegating Capabilities. Proc. ASIACCS 2009, Sydney, Australia, March 10\u201312, pp. 276\u2013286. ACM, New York.","DOI":"10.1145\/1533057.1533094"},{"key":"2016072903344346000_59.7.970.7","doi-asserted-by":"crossref","unstructured":"Liang K.T. , Fang L. , Wong D.S. and Susilo W. (2013) A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security. Proc. 5th Int. Conf. Intelligent Networking and Collaborative Systems 2013, Xi'an, China, September 9\u201313, pp. 552\u2013559. IEEE Computer Society, Washington, DC, USA.","DOI":"10.1109\/INCoS.2013.103"},{"key":"2016072903344346000_59.7.970.8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.06.045"},{"key":"2016072903344346000_59.7.970.9","doi-asserted-by":"crossref","unstructured":"Green M. and Ateniese G. (2007) Identity-based Proxy Re-encryption. Proc. ACNS 2007, Zhuhai, China, June 5\u20138, pp. 288\u2013306. Springer, Berlin.","DOI":"10.1007\/978-3-540-72738-5_19"},{"key":"2016072903344346000_59.7.970.10","doi-asserted-by":"crossref","unstructured":"Canetti R. , Goldreich O. and Halevi S. (1998) The Random Oracle Methodology, Revisited. Proc. 30th Annual ACM Symp. Theory of Computing, STOC 1998, Texas, USA, May 23\u201326, pp. 209\u2013218. ACM, New York.","DOI":"10.1145\/276698.276741"},{"key":"2016072903344346000_59.7.970.11","doi-asserted-by":"crossref","unstructured":"Boneh D. and Boyen X. (2004) Efficient Selective-ID Based Encryption Without Random Oracles. Proc. EUROCRYPT 2004 Interlaken, Switzerland, May 2-6, pp. 223\u2013238. Springer, Berlin.","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"2016072903344346000_59.7.970.12","doi-asserted-by":"crossref","unstructured":"Boneh D. and Franklin M. (2001) Identity-based Encryption from the Weil Pairing. Proc. CRYPTO 2001, Santa Barbara, CA, USA, August 19\u201323, pp. 231\u2013229. Springer, Berlin.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"2016072903344346000_59.7.970.13","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-010-0047-3"},{"key":"2016072903344346000_59.7.970.14","unstructured":"Canetti R. , Halevi S. and Katz J. (1999) Chosen-ciphertext Security from Identity-based Encryption. Proc. PKC 1999, Kamakura, Japan, May 21\u201323, pp. 53\u201368. Springer, Berlin."},{"key":"2016072903344346000_59.7.970.15","doi-asserted-by":"crossref","unstructured":"Canetti R. and Hohenberger S. (2007) Chosen-ciphertext Secure Proxy Re-encryption. Proc. 14th ACM Conf. Computer and Comuniation, Security 2007, October 29-31\u2013November 1, pp. 185\u2013194. ACM, New York.","DOI":"10.1145\/1315245.1315269"},{"key":"2016072903344346000_59.7.970.16","doi-asserted-by":"crossref","unstructured":"Libert B. and Vergnaud D. (2008) Unidirectional Chosen-ciphertext Secure Proxy Re-encryption. Proc. PKC 2008, Barcelona, Spain, March 9\u201312, pp. 360\u2013379. Springer, Berlin.","DOI":"10.1007\/978-3-540-78440-1_21"},{"key":"2016072903344346000_59.7.970.17","unstructured":"Fujisaki E. and Okamota T. (2004) How to Enhance the Security of Public-key Encryption at Minimum Cost. Proc. Eurocrypt 2004, Interlaken, Switzerland, May 2\u20136, pp. 207\u2013222. Springer, Berlin."},{"key":"2016072903344346000_59.7.970.18","unstructured":"Shao J. (2008) Proxy Re-cryptography Revisited (in Chinese). Academic Journal Online Publication. Integrated Database."}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/59\/7\/970\/8037993\/bxv100.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,26]],"date-time":"2022-05-26T01:23:25Z","timestamp":1653528205000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article-lookup\/doi\/10.1093\/comjnl\/bxv100"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,12]]},"references-count":18,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2016,7,28]]},"published-print":{"date-parts":[[2016,7]]}},"alternative-id":["10.1093\/comjnl\/bxv100"],"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxv100","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,12]]}}}