{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:01:53Z","timestamp":1773327713266,"version":"3.50.1"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&amp;D Program of China","award":["2020YFB1005900"],"award-info":[{"award-number":["2020YFB1005900"]}]},{"name":"Key Project Plan of Blockchain in Ministry of Education of the People&#x2019;s Republic of China","award":["2020KJ010802"],"award-info":[{"award-number":["2020KJ010802"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072051"],"award-info":[{"award-number":["62072051"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61976024"],"award-info":[{"award-number":["61976024"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972048"],"award-info":[{"award-number":["61972048"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1109\/jsyst.2021.3106701","type":"journal-article","created":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T20:09:23Z","timestamp":1631304563000},"page":"1460-1470","source":"Crossref","is-referenced-by-count":11,"title":["Public Key Encryption With Equality Test Supporting Flexible Designated Authorization in Cloud Storage"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0486-5960","authenticated-orcid":false,"given":"Hao","family":"Lin","sequence":"first","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1546-4364","authenticated-orcid":false,"given":"Fei","family":"Gao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Cryptology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0532-9783","authenticated-orcid":false,"given":"Hua","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Cryptology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1468-4701","authenticated-orcid":false,"given":"Zhengping","family":"Jin","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Cryptology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1278-1735","authenticated-orcid":false,"given":"Wenmin","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Cryptology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7142-9726","authenticated-orcid":false,"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Cryptology, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxz036"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2017.2781232"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2725953"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2899680"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2017.2759329"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.06.025"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.03.039"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986620"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9006-6"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2378592"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11925-5_9"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22497-3_25"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/sec.418"},{"key":"ref15","article-title":"Time-lock puzzles and timed-release crypto","author":"Rivest","year":"1996"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1504\/IJACT.2012.048079"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.09.025"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21548-4_3"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60055-0_9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.08.026"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.02.064"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.12.023"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.03.007"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2017.2734110"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-75"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2775741"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973459"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1137\/s0036144598347011"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21548-4_8"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31919-9_2"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxw033"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0057-3"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4267003\/9741436\/09535212.pdf?arnumber=9535212","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T22:45:40Z","timestamp":1705013140000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9535212\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":33,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2021.3106701","relation":{},"ISSN":["1932-8184","1937-9234","2373-7816"],"issn-type":[{"value":"1932-8184","type":"print"},{"value":"1937-9234","type":"electronic"},{"value":"2373-7816","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3]]}}}