{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:17:54Z","timestamp":1740169074816,"version":"3.37.3"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502044"],"award-info":[{"award-number":["61502044"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["2015RC23"],"award-info":[{"award-number":["2015RC23"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2875069","type":"journal-article","created":{"date-parts":[[2018,10,9]],"date-time":"2018-10-09T18:52:43Z","timestamp":1539111163000},"page":"61163-61175","source":"Crossref","is-referenced-by-count":2,"title":["Delegation of Decryption Rights With Revocability From Learning With Errors"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2631-4193","authenticated-orcid":false,"given":"Wei","family":"Yin","sequence":"first","affiliation":[]},{"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0262-7678","authenticated-orcid":false,"given":"Kaitai","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Zhenfei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Liqun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hanbing","family":"Yan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0532-9783","authenticated-orcid":false,"given":"Hua","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"Improved proxy re-encryption schemes with applications to secure distributed storage","author":"ateniese","year":"2005","journal-title":"Proc Network and Distributed System Security Symp (NDSS)"},{"key":"ref11","first-page":"288","article-title":"Identity-based proxy re-encryption","volume":"4521","author":"green","year":"2007","journal-title":"Proc 6th Int Conf Appl Cryptogr Netw Secur (ACNS)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315269"},{"key":"ref13","first-page":"279","article-title":"Key-private proxy re-encryption","volume":"5473","author":"ateniese","year":"2009","journal-title":"Proc Cryptograph Track RSA Conf Topics Cryptol (CT-RSA)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2104470"},{"key":"ref15","first-page":"1","article-title":"Key-private proxy re-encryption under LWE","author":"aono","year":"2013","journal-title":"Proc 14th Int Conf Cryptol India Progr Cryptol (INDOCRYPT)"},{"key":"ref16","first-page":"700","article-title":"Trapdoors for lattices: Simpler, tighter, faster, smaller","volume":"7237","author":"micciancio","year":"2012","journal-title":"Proc 31st Annu Int Conf Theory Appl Cryptograph Techn Adv Cryptol (EUROCRYPT)"},{"key":"ref17","first-page":"29","article-title":"Proxy re-encryption based on learning with errors","volume":"1691","author":"keita","year":"2010","journal-title":"Proc Symp Cryptogr Inf Security"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1145\/2714576.2714585","article-title":"NTRUReEncrypt: An efficient proxy re-encryption scheme based on NTRU","author":"nu\u00f1ez","year":"2015","journal-title":"Proc 10th ACM Symp Inf Comput Commun Secur ASIA CCS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374407"},{"key":"ref4","first-page":"278","article-title":"Various proxy re-encryption schemes from lattices","author":"fan","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-013-9145-x"},{"key":"ref3","first-page":"77","article-title":"Proxy re-encryption from lattices","volume":"8383","author":"kirshanova","year":"2014","journal-title":"Proc 17th Int Conf Pract Theory Public-Key Cryptogr Buenos Aires Argentina Public-Key Cryptogr (PKC)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455823"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-016-0287-3"},{"key":"ref7","first-page":"216","article-title":"Revocable identity-based encryption revisited: Security model and construction","volume":"7778","author":"seo","year":"2013","journal-title":"Proc 16th Int Conf Pract Theory Public-Key Cryptogr (PKC)"},{"key":"ref2","first-page":"390","article-title":"Revocable identity-based encryption from lattices","volume":"7372","author":"chen","year":"2012","journal-title":"Proc Australas Conf Inf Secur Privacy (ACISP)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68637-0_19"},{"key":"ref1","first-page":"127","article-title":"Divertible protocols and atomic proxy cryptography","volume":"1403","author":"blaze","year":"1998","journal-title":"Proc Int Conf Theory Appl Cryptograph Techn Adv Cryptol (EUROCRYPT)"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1007\/978-1-4419-5906-5_417","article-title":"Lattice-based cryptography","author":"micciancio","year":"2011","journal-title":"Encyclopaedia of Cryptography and Security"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237838"},{"key":"ref21","volume":"671","author":"goldwasser","year":"2002","journal-title":"Complexity of Lattice Problems A Cryptographic Perspective"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"ref23","article-title":"Identity-based encryption from lattices in the standard model","author":"agrawal","year":"2009","journal-title":"Manuscript"},{"key":"ref26","first-page":"553","article-title":"Efficient lattice (H)IBE in the standard model","volume":"6110","author":"agrawal","year":"2010","journal-title":"Proc 29th Annu Int Conf Theory Appl Cryptograph Techn Adv Cryptol (EUROCRYPT)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539705447360"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08486948.pdf?arnumber=8486948","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T19:19:59Z","timestamp":1643224799000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8486948\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2875069","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2018]]}}}