{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T04:24:03Z","timestamp":1768278243670,"version":"3.49.0"},"reference-count":34,"publisher":"Oxford University Press (OUP)","issue":"8","license":[{"start":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T00:00:00Z","timestamp":1528675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8,1]]},"DOI":"10.1093\/comjnl\/bxy062","type":"journal-article","created":{"date-parts":[[2018,5,23]],"date-time":"2018-05-23T07:07:15Z","timestamp":1527059235000},"page":"1240-1251","source":"Crossref","is-referenced-by-count":15,"title":["Identity-Based Broadcast Encryption for Inner Products"],"prefix":"10.1093","volume":"61","author":[{"given":"Jianchang","family":"Lai","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Nanjing Normal University, Nanjing, China"},{"name":"Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, NSW, Australia"}]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[{"name":"Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, NSW, Australia"}]},{"given":"Fuchun","family":"Guo","sequence":"additional","affiliation":[{"name":"Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, NSW, Australia"}]},{"given":"Peng","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"given":"Sha","family":"Ma","sequence":"additional","affiliation":[{"name":"College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China"}]}],"member":"286","published-online":{"date-parts":[[2018,6,11]]},"reference":[{"key":"key\n\t\t\t\t20180724123910_bxy062C1","first-page":"480","article-title":"Broadcast Encryption","author":"Fiat","year":"1994"},{"key":"key\n\t\t\t\t20180724123910_bxy062C2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-76900-2_12","article-title":"Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys","author":"Delerabl\u00e9e","year":"2007"},{"key":"key\n\t\t\t\t20180724123910_bxy062C3","article-title":"Identity-Based Broadcast Encryption","author":"Sakai","year":"2007"},{"key":"key\n\t\t\t\t20180724123910_bxy062C4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-01001-9_10","article-title":"Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)","author":"Gentry","year":"2009"},{"key":"key\n\t\t\t\t20180724123910_bxy062C5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-30057-8_13","article-title":"Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model","author":"Libert","year":"2012"},{"key":"key\n\t\t\t\t20180724123910_bxy062C6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-44371-2_12","article-title":"Low Overhead Broadcast Encryption from Multilinear Maps","author":"Boneh","year":"2014"},{"key":"key\n\t\t\t\t20180724123910_bxy062C7","article-title":"Simple Functional Encryption Schemes for","author":"Abdalla","year":"2015"},{"key":"key\n\t\t\t\t20180724123910_bxy062C8","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-00457-5_27","article-title":"Predicate Privacy in Encryption Systems","author":"Shen","year":"2009"},{"key":"key\n\t\t\t\t20180724123910_bxy062C9","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-34961-4_22","article-title":"Fully Secure Unbounded Inner-product and Attribute-based Encryption","author":"Okamoto","year":"2012"},{"key":"key\n\t\t\t\t20180724123910_bxy062C10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-14623-7_11","article-title":"Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption","author":"Okamoto","year":"2010"},{"key":"key\n\t\t\t\t20180724123910_bxy062C11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-46447-2_35","article-title":"On the Practical Security of Inner Product Functional Encryption","author":"Agrawal","year":"2015"},{"key":"key\n\t\t\t\t20180724123910_bxy062C12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-40084-1_26","article-title":"Function-Private Identity-based Encryption: Hiding the Function in Functional Encryption","author":"Boneh","year":"2013"},{"key":"key\n\t\t\t\t20180724123910_bxy062C13","article-title":"Function-Private Functional Encryption in the","author":"Brakerski","year":"2015"},{"key":"key\n\t\t\t\t20180724123910_bxy062C14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-48797-6_20","article-title":"Function-Hiding Inner Product Encryption","author":"Bishop","year":"2015"},{"key":"key\n\t\t\t\t20180724123910_bxy062C15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-49384-7_7","article-title":"Functional Encryption for Inner Product with Full Function Privacy","author":"Datta","year":"2016"},{"key":"key\n\t\t\t\t20180724123910_bxy062C16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-56620-7_21","article-title":"Multi-input Inner-Product Functional Encryption from Pairings","author":"Abdalla","year":"2017"},{"key":"key\n\t\t\t\t20180724123910_bxy062C17","first-page":"432","article-title":"Two-Input Functional Encryption for Inner Products from Bilinear Maps","author":"Lee","year":"2016"},{"key":"key\n\t\t\t\t20180724123910_bxy062C18","first-page":"440","article-title":"Function-Hiding Inner Product Encryption is Practical","author":"Kim","year":"2016"},{"key":"key\n\t\t\t\t20180724123910_bxy062C19","doi-asserted-by":"crossref","DOI":"10.1007\/11426639_26","article-title":"Hierarchical Identity Based Encryption with Constant Size Ciphertext","author":"Boneh","year":"2005"},{"key":"key\n\t\t\t\t20180724123910_bxy062C20","doi-asserted-by":"crossref","DOI":"10.1007\/11535218_16","article-title":"Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys","author":"Boneh","year":"2005"},{"key":"key\n\t\t\t\t20180724123910_bxy062C21","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-39568-7_5","article-title":"Identity-Based Cryptosystems and Signature Schemes","author":"Shamir","year":"1985"},{"key":"key\n\t\t\t\t20180724123910_bxy062C22","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-44647-8_13","article-title":"Identity-Based Encryption from the Weil Pairing","author":"Boneh","year":"2001"},{"key":"key\n\t\t\t\t20180724123910_bxy062C23","doi-asserted-by":"crossref","DOI":"10.1007\/11889663_4","article-title":"Privacy in Encrypted Content Distribution using Private Broadcast Encryption","author":"Barth","year":"2006"},{"key":"key\n\t\t\t\t20180724123910_bxy062C24","doi-asserted-by":"crossref","DOI":"10.1007\/11761679_34","article-title":"Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys","author":"Boneh","year":"2006"},{"key":"key\n\t\t\t\t20180724123910_bxy062C25","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-30057-8_14","article-title":"Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts","author":"Fazio","year":"2012"},{"key":"key\n\t\t\t\t20180724123910_bxy062C26","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-04852-9_4","article-title":"Broadcast Steganography","author":"Fazio","year":"2014"},{"key":"key\n\t\t\t\t20180724123910_bxy062C27","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-36373-3_12","article-title":"Lower Bounds for Private Broadcast Encryption","author":"Kiayias","year":"2013"},{"key":"key\n\t\t\t\t20180724123910_bxy062C28","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-53015-3_12","article-title":"Fully Secure Functional Encryption for Inner Products, from Standard Assumptions","author":"Agrawal","year":"2016"},{"key":"key\n\t\t\t\t20180724123910_bxy062C29","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-55220-5_32","article-title":"Multi-input Functional Encryption","author":"Goldwasser","year":"2014"},{"key":"key\n\t\t\t\t20180724123910_bxy062C30","first-page":"425","article-title":"Multi-input Inner-product Functional Encryption from Pairings","author":"Abdalla","year":"2016"},{"key":"key\n\t\t\t\t20180724123910_bxy062C31","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-54388-7_2","article-title":"Cca-Secure Inner-Product Functional Encryption from Projective Hash Functions","author":"Benhamouda","year":"2017"},{"key":"key\n\t\t\t\t20180724123910_bxy062C32","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-19571-6_16","article-title":"Functional Encryption: Definitions and Challenges","author":"Boneh","year":"2011"},{"key":"key\n\t\t\t\t20180724123910_bxy062C33","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/s001450010010","article-title":"Kangaroos, monopoly and discrete logarithms","volume":"13","author":"Pollard","year":"2000","journal-title":"J. Cryptol."},{"key":"key\n\t\t\t\t20180724123910_bxy062C34","doi-asserted-by":"crossref","DOI":"10.1007\/11761679_27","article-title":"Practical Identity-based Encryption without Random Oracles","author":"Gentry","year":"2006"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/8\/1240\/25209251\/bxy062.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T06:44:14Z","timestamp":1571381054000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/8\/1240\/5035766"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,11]]},"references-count":34,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2018,6,11]]},"published-print":{"date-parts":[[2018,8,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy062","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,8]]},"published":{"date-parts":[[2018,6,11]]}}}