{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:28:47Z","timestamp":1773512927299,"version":"3.50.1"},"reference-count":34,"publisher":"Oxford University Press (OUP)","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["The Computer Journal"],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1093\/comjnl\/bxv101","type":"journal-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:28:08Z","timestamp":1448317688000},"page":"983-1004","source":"Crossref","is-referenced-by-count":52,"title":["Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe"],"prefix":"10.1093","volume":"59","author":[{"given":"Zhen","family":"Liu","sequence":"first","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2015,11,23]]},"reference":[{"key":"2016072903344354000_59.7.983.1","doi-asserted-by":"crossref","unstructured":"Sahai A. and Waters B. (2005) Fuzzy Identity-based Encryption. Proc. EUROCRYPT 2005, Aarhus, Denmark, May 22\u201326, pp. 457\u2013473. Springer, Berlin.","DOI":"10.1007\/11426639_27"},{"key":"2016072903344354000_59.7.983.2","doi-asserted-by":"crossref","unstructured":"Goyal V. , Pandey O. , Sahai A. and Waters B. (2006) Attribute-based Encryption for Fine-grained Access Control of Encrypted Data. Proc. CCS 2006, Alexandria, VA, USA, October 30\u2013November 3, pp. 89\u201398. ACM, New York.","DOI":"10.1145\/1180405.1180418"},{"key":"2016072903344354000_59.7.983.3","doi-asserted-by":"crossref","unstructured":"Bethencourt J. , Sahai A. and Waters B. (2007) Ciphertext-policy Attribute-based Encryption. 2007 IEEE Symp. Security and Privacy (S&P 2007), Oakland, CA, USA, May 20\u201323, pp. 321\u2013334. IEEE Computer Society, Los Alamitos.","DOI":"10.1109\/SP.2007.11"},{"key":"2016072903344354000_59.7.983.4","doi-asserted-by":"crossref","unstructured":"Cheung L. and Newport C. C. (2007) Provably Secure Ciphertext Policy ABE. Proc. CCS 2007, Alexandria, VA, USA, October 28\u201331, pp. 456\u2013465. ACM, New York.","DOI":"10.1145\/1315245.1315302"},{"key":"2016072903344354000_59.7.983.5","doi-asserted-by":"crossref","unstructured":"Goyal V. , Jain A. , Pandey O. and Sahai A. (2008) Bounded Ciphertext Policy Attribute based Encryption. ICALP (2) 2008, Reykjavik, Iceland, July 7\u201311, pp. 579\u2013591. Springer, Berlin.","DOI":"10.1007\/978-3-540-70583-3_47"},{"key":"2016072903344354000_59.7.983.6","doi-asserted-by":"crossref","unstructured":"Waters B. (2011) Ciphertext-policy Attribute-based Encryption: An Expressive, Efficient, and Provably Secure Realization. Proc. PKC 2011, Taormina, Italy, March 6\u20139, pp. 53\u201370. Springer, Berlin.","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"2016072903344354000_59.7.983.7","doi-asserted-by":"crossref","unstructured":"Lewko A. B. , Okamoto T. , Sahai A. , Takashima K. and Waters B. (2010) Fully Secure Functional Encryption: Attribute-based Encryption and (Hierarchical) Inner Product Encryption. Proc. EUROCRYPT 2010, French Riviera, May 30\u2013June 3, pp. 62\u201391. Springer, Berlin.","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"2016072903344354000_59.7.983.8","doi-asserted-by":"crossref","unstructured":"Okamoto T. and Takashima K. (2010) Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption. Proc. CRYPTO 2010, Santa Barbara, CA, USA, August 15\u201319, pp. 191\u2013208. Springer, Berlin.","DOI":"10.1007\/978-3-642-14623-7_11"},{"key":"2016072903344354000_59.7.983.9","doi-asserted-by":"crossref","unstructured":"Herranz J. , Laguillaumie F. and R\u00e0fols C. (2010) Constant Size Ciphertexts in Threshold Attribute-based Encryption. Proc. PKC 2010, Paris, France, May 26\u201328, pp. 19\u201334. Springer, Berlin.","DOI":"10.1007\/978-3-642-13013-7_2"},{"key":"2016072903344354000_59.7.983.10","doi-asserted-by":"crossref","unstructured":"Lewko A. B. and Waters B. (2012) New Proof Methods for Attribute-based Encryption: Achieving Full Security through Selective Techniques. Proc. CRYPTO 2012, Santa Barbara, CA, USA, August 19\u201323, pp. 180\u2013198. Springer, Berlin.","DOI":"10.1007\/978-3-642-32009-5_12"},{"key":"2016072903344354000_59.7.983.11","doi-asserted-by":"crossref","unstructured":"Hohenberger S. and Waters B. (2013) Attribute-based Encryption with Fast Decryption. Proc. PKC 2013, Nara, Japan, February 26\u2013March 1, pp. 162\u2013179. Springer, Berlin.","DOI":"10.1007\/978-3-642-36362-7_11"},{"key":"2016072903344354000_59.7.983.12","doi-asserted-by":"crossref","unstructured":"Hohenberger S. and Waters B. (2014) Online\/offline Attribute-based Encryption. Proc. PKC 2014, Buenos Aires, Argentina, March 26\u201328, pp. 293\u2013310. Springer, Berlin.","DOI":"10.1007\/978-3-642-54631-0_17"},{"key":"2016072903344354000_59.7.983.13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223683"},{"key":"2016072903344354000_59.7.983.14","doi-asserted-by":"crossref","unstructured":"Liu Z. , Cao Z. and Wong D. S. (2013) Blackbox Traceable CP-ABE: How to Catch People Leaking their Keys by Selling Decryption Devices on Ebay. Proc. CCS'13, Berlin, Germany, November 4\u20138, pp. 475\u2013486. ACM, New York.","DOI":"10.1145\/2508859.2516683"},{"key":"2016072903344354000_59.7.983.15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2363562"},{"key":"2016072903344354000_59.7.983.16","doi-asserted-by":"crossref","unstructured":"Deng H. , Wu Q. , Qin B. , Mao J. , Liu X. , Zhang L. and Shi W. (2014) Who is Touching My Cloud. Proc. ESORICS 2014, Part I, Wroclaw, Poland, September 7\u201311, pp. 362\u2013379. Springer, Berlin.","DOI":"10.1007\/978-3-319-11203-9_21"},{"key":"2016072903344354000_59.7.983.17","doi-asserted-by":"crossref","unstructured":"Sahai A. , Seyalioglu H. and Waters B. (2012) Dynamic Credentials and Ciphertext Delegation for Attribute-based Encryption. Proc. CRYPTO 2012, Santa Barbara, CA, USA, August 19\u201323, pp. 199\u2013217. Springer, Berlin.","DOI":"10.1007\/978-3-642-32009-5_13"},{"key":"2016072903344354000_59.7.983.18","doi-asserted-by":"crossref","unstructured":"Attrapadung N. and Imai H. (2009) Conjunctive Broadcast and Attribute-based Encryption. Proc. Pairing 2009, Palo Alto, CA, USA, August 12\u201314, pp. 248\u2013265. Springer, Berlin.","DOI":"10.1007\/978-3-642-03298-1_16"},{"key":"2016072903344354000_59.7.983.19","doi-asserted-by":"crossref","unstructured":"Ostrovsky R. , Sahai A. and Waters B. (2007) Attribute-based Encryption with Non-monotonic Access Structures. Proc. CCS 2007, Alexandria, VA, USA, October 28\u201331, pp. 195\u2013203. ACM, New York.","DOI":"10.1145\/1315245.1315270"},{"key":"2016072903344354000_59.7.983.20","doi-asserted-by":"crossref","unstructured":"Okamoto T. and Takashima K. (2012) Fully Secure Unbounded Inner-product and Attribute-based Encryption. Proc. ASIACRYPT 2012, Beijing, China, December 2\u20136, pp. 349\u2013366. Springer, Berlin.","DOI":"10.1007\/978-3-642-34961-4_22"},{"key":"2016072903344354000_59.7.983.21","doi-asserted-by":"crossref","unstructured":"Rouselakis Y. and Waters B. (2013) Practical Constructions and New Proof Methods for Large Universe Attribute-based Encryption. Proc. CCS'13, Berlin, Germany, November 4\u20138, pp. 463\u2013474. ACM, New York.","DOI":"10.1145\/2508859.2516672"},{"key":"2016072903344354000_59.7.983.22","doi-asserted-by":"crossref","unstructured":"Liu Z. and Wong D. S. (2015) Practical Ciphertext-policy Attribute-based Encryption: Traitor Tracing, Revocation, and Large Universe. Proc. ACNS 2015, New York, NY, USA, June 2\u20135, pp. 127\u2013146. Springer, Switzerland.","DOI":"10.1007\/978-3-319-28166-7_7"},{"key":"2016072903344354000_59.7.983.23","doi-asserted-by":"crossref","unstructured":"Garg S. , Kumarasubramanian A. , Sahai A. and Waters B. (2010) Building Efficient Fully Collusion-resilient Traitor Tracing and Revocation Schemes. Proc. CCS 2010, Chicago, IL, USA, October 4\u20138, pp. 121\u2013130. ACM, New York.","DOI":"10.1145\/1866307.1866322"},{"key":"2016072903344354000_59.7.983.24","doi-asserted-by":"crossref","unstructured":"Lewko A. B. (2012) Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting. Proc. EUROCRYPT 2012, Cambridge, UK, April 15\u201319, pp. 318\u2013335. Springer, Berlin.","DOI":"10.1007\/978-3-642-29011-4_20"},{"key":"2016072903344354000_59.7.983.25","unstructured":"Katz J. and Schr\u00f6der D. (2011) Tracing Insider Attacks in the Context of Predicate Encryption Schemes. ACITA 2011, September. https:\/\/www.usukita.org\/node\/1779 ."},{"key":"2016072903344354000_59.7.983.26","doi-asserted-by":"crossref","unstructured":"Boneh D. , Sahai A. and Waters B. (2006) Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. Proc. EUROCRYPT 2006, St. Petersburg, Russia, May 28\u2013June 1, pp. 573\u2013592. Springer, Berlin.","DOI":"10.1007\/11761679_34"},{"key":"2016072903344354000_59.7.983.27","doi-asserted-by":"crossref","unstructured":"Boneh D. and Waters B. (2006) A Fully Collusion Resistant Broadcast, Trace, and Revoke System. Proc. CCS 2006, Alexandria, VA, USA, October 30\u2013November 3, pp. 211\u2013220. ACM, New York.","DOI":"10.1145\/1180405.1180432"},{"key":"2016072903344354000_59.7.983.28","doi-asserted-by":"crossref","unstructured":"Boneh D. and Franklin M. K. (1999) An Efficient Public Key Traitor Tracing Scheme. Proc. CRYPTO'99, Santa Barbara, CA, USA, August 15\u201319, pp. 338\u2013353. Springer, Berlin.","DOI":"10.1007\/3-540-48405-1_22"},{"key":"2016072903344354000_59.7.983.29","doi-asserted-by":"crossref","unstructured":"Naor D. , Naor M. and Lotspiech J. (2001) Revocation and Tracing Schemes for Stateless Receivers. Proc. CRYPTO 2001, Santa Barbara, CA, USA, August 19\u201323, pp. 41\u201362. Springer, Berlin.","DOI":"10.1007\/3-540-44647-8_3"},{"key":"2016072903344354000_59.7.983.30","doi-asserted-by":"crossref","unstructured":"Lewko A. and Waters B. (2012) New proof methods for attribute-based encryption: achieving full security through selective techniques. Cryptology ePrint Archive, Report 2012\/326. http:\/\/eprint.iacr.org\/ .","DOI":"10.1007\/978-3-642-32009-5_12"},{"key":"2016072903344354000_59.7.983.31","doi-asserted-by":"crossref","unstructured":"Shoup V. (1997) Lower Bounds for Discrete Logarithms and Related Problems. Proc. EUROCRYPT'97, Konstanz, Germany, May 11\u201315, pp. 256\u2013266. Springer, Berlin.","DOI":"10.1007\/3-540-69053-0_18"},{"key":"2016072903344354000_59.7.983.32","doi-asserted-by":"crossref","unstructured":"Boneh D. , Boyen X. and Goh E. (2005) Hierarchical Identity based Encryption with Constant Size Ciphertext. Proc. EUROCRYPT 2005, Aarhus, Denmark, May 22\u201326, pp. 440\u2013456. Springer, Berlin.","DOI":"10.1007\/11426639_26"},{"key":"2016072903344354000_59.7.983.33","doi-asserted-by":"crossref","unstructured":"Katz J. , Sahai A. and Waters B. (2008) Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. Proc. EUROCRYPT 2008, Istanbul, Turkey, April 13\u201317, pp. 146\u2013162. Springer, Berlin.","DOI":"10.1007\/978-3-540-78967-3_9"},{"key":"2016072903344354000_59.7.983.34","unstructured":"Beimel A. (1996) Secure schemes for secret sharing and key distribution. PhD Thesis, Israel Institute of Technology, Technion, Haifa, Israel."}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/59\/7\/983\/8038003\/bxv101.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T17:01:32Z","timestamp":1567357292000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article-lookup\/doi\/10.1093\/comjnl\/bxv101"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,23]]},"references-count":34,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2016,7,28]]},"published-print":{"date-parts":[[2016,7]]}},"alternative-id":["10.1093\/comjnl\/bxv101"],"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxv101","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,23]]}}}