{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T05:48:50Z","timestamp":1771307330262,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/iscisc.2013.6767342","type":"proceedings-article","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T19:25:49Z","timestamp":1395343549000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Attribute-based ring signatures: Security analysis and a new construction"],"prefix":"10.1109","author":[{"given":"Rahim","family":"Toluee","sequence":"first","affiliation":[]},{"given":"Maryam Rajabzadeh","family":"Asaar","sequence":"additional","affiliation":[]},{"given":"Mahmoud","family":"Salmasizadeh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1145\/1533057.1533102","article-title":"Provably secure and efficient bounded ciphertext policy attribute based encryption","author":"liang","year":"2009","journal-title":"Proc Fourth Int Symp on Information Computer and Communications Security 2009"},{"key":"22","author":"li","year":"0","journal-title":"Attribute-Based Ring Signatures"},{"key":"17","first-page":"579","article-title":"Bounded ciphertext policy attribute based encryption","volume":"5126","author":"goyal","year":"2008","journal-title":"ICALP 2008 Part II LNCS"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/IFCSTA.2009.43"},{"key":"18","first-page":"13","article-title":"EATL, A ciphertext-policy attribute- based encryption scheme with constant ciphertext length","volume":"5451","author":"emura","year":"2009","journal-title":"ISPEC 2009 LNCS"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2009.0189"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"16","first-page":"456","article-title":"Provably secure ciphertext policy ABE","author":"cheung","year":"2007","journal-title":"ACM CCS 2007"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"14","article-title":"Expressive key-policy attribute-based encryption with constant size ciphertexts","volume":"6571","author":"attrapadung","year":"2011","journal-title":"PKC 2011 LNCS"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.05.003"},{"key":"12","first-page":"457","article-title":"Fuzzy identity-based encryption","volume":"494","author":"sahai","year":"2005","journal-title":"LNCS EUROCRYPT"},{"key":"21","author":"maji","year":"0","journal-title":"Attribute Based Signatures Achieving Attribute Privacy and Collusion-Resistance"},{"key":"3","first-page":"164","article-title":"How to leak a secret: Theory and applications of ring signatures","volume":"3895","author":"rivest","year":"2006","journal-title":"Essays in Theoretical Computer Science In Memory of Shimon Even LNCS"},{"key":"20","first-page":"53","article-title":"Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization","volume":"6571","author":"waters","year":"2011","journal-title":"PKC 2011 LNCS"},{"key":"2","first-page":"257","article-title":"Group signature","volume":"547","author":"chaum","year":"1991","journal-title":"Proceedings of Eurocrypt 1991 LNCS"},{"key":"1","first-page":"552","article-title":"How to leak a secret","volume":"2248","author":"rivest","year":"2001","journal-title":"LNCS ASIACRYPT"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIAS.2006.295258"},{"key":"7","article-title":"Ring proxy signatures","volume":"25","author":"baodian","year":"2008","journal-title":"Journal of Electronics (China)"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/11807964_34"},{"key":"5","article-title":"Efficient identity based ring signature","volume":"3531","author":"chow","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"4","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/3-540-45708-9_30","article-title":"Threshold ring signatures and applications to ad-hoc groups","volume":"2442","author":"bresson","year":"2002","journal-title":"Lecture Notes in Computer Science"},{"key":"9","first-page":"187","article-title":"ID-based ring signature and proxy ring signature schemes from bilinear pairings","volume":"4","author":"awasthil","year":"2007","journal-title":"International Journal of Network Security"},{"key":"8","first-page":"104","article-title":"New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings","volume":"2003","author":"zhang","year":"2003","journal-title":"IACR Cryptology ePrint Archive"}],"event":{"name":"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)","location":"Yazd, Iran","start":{"date-parts":[[2013,8,29]]},"end":{"date-parts":[[2013,8,30]]}},"container-title":["2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6765549\/6767314\/06767342.pdf?arnumber=6767342","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,11]],"date-time":"2023-07-11T10:45:11Z","timestamp":1689072311000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6767342\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/iscisc.2013.6767342","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}