{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:03:22Z","timestamp":1730232202121,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1109\/icc45855.2022.9838811","type":"proceedings-article","created":{"date-parts":[[2022,8,11]],"date-time":"2022-08-11T19:37:11Z","timestamp":1660246631000},"page":"4408-4413","source":"Crossref","is-referenced-by-count":2,"title":["Secure and Flexible Data Sharing for Distributed Storage with Efficient Key Management"],"prefix":"10.1109","author":[{"given":"Liang","family":"Xue","sequence":"first","affiliation":[{"name":"University of Waterloo,Department of Electrical and Computer Engineering,Waterloo,Canada,N2L 3G1"}]},{"given":"Dongxiao","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Waterloo,Department of Electrical and Computer Engineering,Waterloo,Canada,N2L 3G1"}]},{"given":"Cheng","family":"Huang","sequence":"additional","affiliation":[{"name":"University of Waterloo,Department of Electrical and Computer Engineering,Waterloo,Canada,N2L 3G1"}]},{"given":"Xuemin Sherman","family":"Shen","sequence":"additional","affiliation":[{"name":"University of Waterloo,Department of Electrical and Computer Engineering,Waterloo,Canada,N2L 3G1"}]},{"given":"Weihua","family":"Zhuang","sequence":"additional","affiliation":[{"name":"University of Waterloo,Department of Electrical and Computer Engineering,Waterloo,Canada,N2L 3G1"}]},{"given":"Rob","family":"Sun","sequence":"additional","affiliation":[{"name":"Huawei Technologies Canada,Ottawa,Canada,K2K 3J1"}]},{"given":"Bidi","family":"Ying","sequence":"additional","affiliation":[{"name":"Huawei Technologies Canada,Ottawa,Canada,K2K 3J1"}]}],"member":"263","reference":[{"year":"0","key":"ref10","article-title":"Miracl library"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"article-title":"Key-policy ABE with delegation of rights","year":"2021","author":"cecile delerablee","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2020.2969868"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxaa082"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78372-7_22"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64840-4_18"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64840-4_20"},{"key":"ref18","first-page":"68","article-title":"(R) CCA secure updatable encryption with integrity protection","author":"kloo\u00df","year":"2019","journal-title":"Proc Annual International Conference on Theory and Applications of Cryptographic Techniques"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000666"},{"year":"0","key":"ref3","article-title":"Filecoin"},{"key":"ref6","first-page":"440","article-title":"Hierarchical identity based encryption with constant size ciphertext","author":"boneh","year":"2005","journal-title":"International Conference an the Theory and Applications of Cryptographic Techniques"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"ref8","first-page":"268","article-title":"Puncture&#x2019;em all: Stronger updatable encryption with no-directional key updates","volume":"2021","author":"slamanig","year":"2021","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93387-0_27"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102397"},{"journal-title":"Sia Simple Decentralized Storage","year":"2014","author":"vorick","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64381-2_13"}],"event":{"name":"ICC 2022 - IEEE International Conference on Communications","start":{"date-parts":[[2022,5,16]]},"location":"Seoul, Korea, Republic of","end":{"date-parts":[[2022,5,20]]}},"container-title":["ICC 2022 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9837954\/9838246\/09838811.pdf?arnumber=9838811","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T20:06:27Z","timestamp":1663013187000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9838811\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icc45855.2022.9838811","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]}}}