{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T19:12:52Z","timestamp":1770750772155,"version":"3.50.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T00:00:00Z","timestamp":1747958400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T00:00:00Z","timestamp":1747958400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,23]]},"DOI":"10.1109\/cniot65435.2025.11070748","type":"proceedings-article","created":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T17:41:09Z","timestamp":1752514869000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Attribute-Based Proxy Re-Encryption with Constant Size in Cloud Computing"],"prefix":"10.1109","author":[{"given":"Xiaodong","family":"Yang","sequence":"first","affiliation":[{"name":"Northwest Normal University,Dept. of Computer Science and Engineering,Lanzhou,China"}]},{"given":"Shuqian","family":"Lian","sequence":"additional","affiliation":[{"name":"Northwest Normal University,Dept. of Computer Science and Engineering,Lanzhou,China"}]},{"given":"Yaqi","family":"Wang","sequence":"additional","affiliation":[{"name":"Northwest Normal University,Dept. of Computer Science and Engineering,Lanzhou,China"}]},{"given":"Chen","family":"Chen","sequence":"additional","affiliation":[{"name":"Research Institute Co., Ltd.,Zhongbo Information Technology,Nanjing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2306383"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.111122026"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3154039"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-019-2856-8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2551238"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3265932"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.09.021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.11.006"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2977646"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2023.3326339"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3603165.3607460"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3386690"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2024.3352809"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110851"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2024.104956"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65277-7_29"}],"event":{"name":"2025 6th International Conference on Computing, Networks and Internet of Things (CNIOT)","location":"Shanghai, China","start":{"date-parts":[[2025,5,23]]},"end":{"date-parts":[[2025,5,25]]}},"container-title":["2025 6th International Conference on Computing, Networks and Internet of Things (CNIOT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11069441\/11069432\/11070748.pdf?arnumber=11070748","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T05:58:50Z","timestamp":1752559130000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11070748\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,23]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/cniot65435.2025.11070748","relation":{},"subject":[],"published":{"date-parts":[[2025,5,23]]}}}