{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T11:56:22Z","timestamp":1764330982447,"version":"3.37.3"},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"NSFC-Zhejiang Joint Fund for the Integration of Industrialization and Informatization","award":["U1509219"],"award-info":[{"award-number":["U1509219"]}]},{"DOI":"10.13039\/100007219","name":"Natural Science Foundation of Shanghai","doi-asserted-by":"publisher","award":["17ZR1408400"],"award-info":[{"award-number":["17ZR1408400"]}],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key R&D Program of China","award":["2017YFB0802302"],"award-info":[{"award-number":["2017YFB0802302"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61601129","11701179"],"award-info":[{"award-number":["61601129","11701179"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003399","name":"Science and Technology Commission of Shanghai Municipality","doi-asserted-by":"publisher","award":["18511105700"],"award-info":[{"award-number":["18511105700"]}],"id":[{"id":"10.13039\/501100003399","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shanghai Sailing Program","award":["17YF1404300"],"award-info":[{"award-number":["17YF1404300"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2879479","type":"journal-article","created":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T19:28:00Z","timestamp":1541446080000},"page":"70017-70024","source":"Crossref","is-referenced-by-count":41,"title":["A New Kind of Conditional Proxy Re-Encryption for Secure Cloud Storage"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3904-9245","authenticated-orcid":false,"given":"Peng","family":"Zeng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9208-5336","authenticated-orcid":false,"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"410","article-title":"Re-encryption verifiability: How to detect malicious activities of a proxy in proxy re-encryption","author":"ohata","year":"2015","journal-title":"Proc The Cryptographer s Track at RSA Conf"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/3-540-44598-6_14"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1016\/j.ins.2010.06.029"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/j.ins.2012.04.013"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/JCN.2013.000003"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1587\/transfun.E98.A.100"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/978-3-319-11203-9_15"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1016\/j.ins.2012.09.034"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/2897845.2897923"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1109\/TIFS.2015.2509912","article-title":"Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds","volume":"11","author":"yang","year":"2016","journal-title":"IEEE Trans Inf Forensics Security"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1142\/S0129054117400111"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TIT.2011.2104470"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"6191","DOI":"10.1007\/s00500-016-2177-z","article-title":"Adaptable key-policy attribute-based encryption with time interval","volume":"21","author":"ma","year":"2017","journal-title":"Soft Comput"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/1315245.1315269"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.ins.2010.08.017"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1007\/s10623-018-0462-9"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1002\/sec.1300"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/s00145-010-9077-7"},{"key":"ref7","first-page":"288","article-title":"Identity-based proxy re-encryption","author":"green","year":"2007","journal-title":"Proc Int Conf Theory Appl Cryptograph Techn"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/1127345.1127346"},{"key":"ref9","first-page":"357","article-title":"CCA-secure proxy re-encryption without pairings","author":"shao","year":"2009","journal-title":"Public Key Cryptography - PKC'07"},{"key":"ref1","first-page":"127","article-title":"Divertible protocols and atomic proxy cryptography","author":"blaze","year":"1998","journal-title":"Proc Int Conf Theory Appl Cryptograph Techn"},{"key":"ref20","first-page":"3455","article-title":"Re-encryption based data forwarding in an erasure-coded cloud storage system","volume":"13","author":"abirami","year":"2017","journal-title":"Global Journal of Pure and Applied Mathematics"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/ACCESS.2018.2852784"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/TSC.2018.2850344"},{"key":"ref24","first-page":"322","article-title":"Conditional proxy re-encryption secure against chosen-ciphertext attack","author":"weng","year":"2009","journal-title":"Proc Int Symp Computers and Commun"},{"key":"ref23","first-page":"130","article-title":"Type-based proxy re-encryption and its construction","volume":"5365","author":"tang","year":"2008","journal-title":"Proc Int Conf Cryptol India"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1093\/comjnl\/bxv050"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/INFCOMW.2014.6849289"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08522029.pdf?arnumber=8522029","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T20:33:35Z","timestamp":1694032415000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8522029\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2879479","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2018]]}}}