{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T12:45:41Z","timestamp":1649162741029},"reference-count":31,"publisher":"Oxford University Press (OUP)","issue":"4","license":[{"start":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T00:00:00Z","timestamp":1508889600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4,1]]},"DOI":"10.1093\/comjnl\/bxx088","type":"journal-article","created":{"date-parts":[[2017,9,9]],"date-time":"2017-09-09T03:16:45Z","timestamp":1504927005000},"page":"512-525","source":"Crossref","is-referenced-by-count":1,"title":["Criteria-Based Encryption"],"prefix":"10.1093","volume":"61","author":[{"given":"Tran Viet Xuan","family":"Phuong","sequence":"first","affiliation":[{"name":"Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, Faculty of Engineering and Information Sciences, University of Wollongong, Australia"}]},{"given":"Guomin","family":"Yang","sequence":"additional","affiliation":[{"name":"Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, Faculty of Engineering and Information Sciences, University of Wollongong, Australia"}]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[{"name":"Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, Faculty of Engineering and Information Sciences, University of Wollongong, Australia"}]}],"member":"286","published-online":{"date-parts":[[2017,10,25]]},"reference":[{"key":"key\n\t\t\t\t20180329074333_bxx088C1","author":"Abdalla","year":"2015"},{"key":"key\n\t\t\t\t20180329074333_bxx088C2","author":"Abdalla","year":"2017"},{"key":"key\n\t\t\t\t20180329074333_bxx088C3","author":"Agrawal","year":"2015"},{"key":"key\n\t\t\t\t20180329074333_bxx088C4","author":"Agrawal","year":"2011"},{"key":"key\n\t\t\t\t20180329074333_bxx088C5","author":"Agrawal","year":"2011"},{"key":"key\n\t\t\t\t20180329074333_bxx088C6","author":"Agrawal","year":"2013"},{"key":"key\n\t\t\t\t20180329074333_bxx088C7","author":"Attrapadung","year":"2011"},{"key":"key\n\t\t\t\t20180329074333_bxx088C8","author":"Bethencourt","year":"2007"},{"key":"key\n\t\t\t\t20180329074333_bxx088C9","author":"Boneh","year":"2004"},{"key":"key\n\t\t\t\t20180329074333_bxx088C10","author":"Boneh","year":"2001"},{"key":"key\n\t\t\t\t20180329074333_bxx088C11","author":"Boneh","year":"2011"},{"key":"key\n\t\t\t\t20180329074333_bxx088C12","author":"Boneh","year":"2007"},{"key":"key\n\t\t\t\t20180329074333_bxx088C13","first-page":"373","volume-title":"Design, Codes and Cryptography","author":"Caro","year":"2013"},{"key":"key\n\t\t\t\t20180329074333_bxx088C14","author":"Caro","year":"2013"},{"key":"key\n\t\t\t\t20180329074333_bxx088C15","author":"Cheung","year":"2007"},{"key":"key\n\t\t\t\t20180329074333_bxx088C16","author":"Garg","year":"2013"},{"key":"key\n\t\t\t\t20180329074333_bxx088C17","author":"Goldwasser","year":"2014"},{"key":"key\n\t\t\t\t20180329074333_bxx088C18","author":"Goyal","year":"2008"},{"key":"key\n\t\t\t\t20180329074333_bxx088C19","author":"Goyal","year":"2006"},{"key":"key\n\t\t\t\t20180329074333_bxx088C20","author":"Katz","year":"2008"},{"key":"key\n\t\t\t\t20180329074333_bxx088C21","author":"Lewko","year":"2010"},{"key":"key\n\t\t\t\t20180329074333_bxx088C22","author":"Lewko","year":"2012"},{"key":"key\n\t\t\t\t20180329074333_bxx088C23","author":"Nishide","year":"2008"},{"key":"key\n\t\t\t\t20180329074333_bxx088C24","author":"Okamoto","year":"2012"},{"key":"key\n\t\t\t\t20180329074333_bxx088C25","author":"Ostrovsky","year":"2007"},{"key":"key\n\t\t\t\t20180329074333_bxx088C26","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/s10623-010-9405-9","article-title":"Inner product encryption under standard assumption","volume":"58","author":"Park","year":"2011","journal-title":"Designs, Codes and Cryptography"},{"key":"key\n\t\t\t\t20180329074333_bxx088C27","author":"Sahai","year":"2005"},{"key":"key\n\t\t\t\t20180329074333_bxx088C28","author":"Shamir","year":"1985"},{"key":"key\n\t\t\t\t20180329074333_bxx088C29","author":"Shi","year":"2008"},{"key":"key\n\t\t\t\t20180329074333_bxx088C30","author":"Waters","year":"2011"},{"key":"key\n\t\t\t\t20180329074333_bxx088C31","author":"Zhou","year":"2010"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/4\/512\/24509642\/bxx088.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,29]],"date-time":"2018-03-29T11:43:39Z","timestamp":1522323819000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/4\/512\/4430306"}},"subtitle":[],"editor":[{"given":"Bogdan","family":"Warinschi","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2017,10,25]]},"references-count":31,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2017,10,25]]},"published-print":{"date-parts":[[2018,4,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxx088","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,4]]},"published":{"date-parts":[[2017,10,25]]}}}