{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:36:50Z","timestamp":1729618610448,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/icis.2017.7960007","type":"proceedings-article","created":{"date-parts":[[2017,6,29]],"date-time":"2017-06-29T17:18:28Z","timestamp":1498756708000},"page":"285-291","source":"Crossref","is-referenced-by-count":7,"title":["Privacy-preserving online\/offline and outsourced multi-authority attribute-based encryption"],"prefix":"10.1109","author":[{"given":"Jiaye","family":"Shao","sequence":"first","affiliation":[]},{"given":"Yanqin","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Qijin","family":"Ji","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/INFOCOM.2015.7218659"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TIFS.2015.2475723"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/978-3-540-70936-7_28"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/2414456.2414465"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1109\/TIFS.2014.2382297","article-title":"Improving privacy and security in decentralized ciphertext-policy attribute-based encryption","volume":"10","author":"han","year":"2015","journal-title":"IEEE Transactions on Information Forensics and Security"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/s00500-016-2330-8"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TPDS.2012.61"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/978-3-540-75551-7_7"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1007\/978-3-642-36362-7_11","article-title":"Attribute-based encryption with fast decryption","author":"hohenberger","year":"2013","journal-title":"Public-Key Cryptography - PKC 2013"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1343","DOI":"10.1109\/TIFS.2013.2271848","article-title":"Attribute-Based Encryption With Verifiable Outsourced Decryption","volume":"8","author":"lai","year":"2013","journal-title":"IEEE Transactions on Information Forensics and Security"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TDSC.2015.2499755"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/978-3-642-54631-0_17","article-title":"Online\/offline attribute-based encryption","author":"hohenberger","year":"2014","journal-title":"Public-Key Crvptographv-PKC) 2014"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/1180405.1180418"},{"key":"ref7","first-page":"568","article-title":"Decentralizing attribute-based encryption","author":"lewko","year":"2011","journal-title":"Proc EUROCRYPT"},{"key":"ref2","first-page":"523","article-title":"Outsourcing the decryption of ABE ciphertexts","author":"green","year":"2011","journal-title":"Proc Usenix Security Symposium"},{"key":"ref1","first-page":"457","article-title":"Fuzzy identity-based encryption","author":"sahai","year":"2005","journal-title":"Proc EUROCRYPT"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/SP.2007.11"}],"event":{"name":"2017 IEEE\/ACIS 16th International Conference on Computer and Information Science (ICIS)","start":{"date-parts":[[2017,5,24]]},"location":"Wuhan, China","end":{"date-parts":[[2017,5,26]]}},"container-title":["2017 IEEE\/ACIS 16th International Conference on Computer and Information Science (ICIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7951674\/7959951\/07960007.pdf?arnumber=7960007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,27]],"date-time":"2019-09-27T14:15:46Z","timestamp":1569593746000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7960007\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icis.2017.7960007","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}