{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T22:38:14Z","timestamp":1770590294552,"version":"3.49.0"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2016,2,1]],"date-time":"2016-02-01T00:00:00Z","timestamp":1454284800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Chinese National Key Basic Research Program","award":["2012CB315905"],"award-info":[{"award-number":["2012CB315905"]}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61370190"],"award-info":[{"award-number":["61370190"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61173154"],"award-info":[{"award-number":["61173154"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472429"],"award-info":[{"award-number":["61472429"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402029"],"award-info":[{"award-number":["61402029"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272501"],"award-info":[{"award-number":["61272501"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61202465"],"award-info":[{"award-number":["61202465"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61321064"],"award-info":[{"award-number":["61321064"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61003214"],"award-info":[{"award-number":["61003214"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004826","name":"Beijing Natural Science Foundation","doi-asserted-by":"publisher","award":["4132056"],"award-info":[{"award-number":["4132056"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["14XNLF02"],"award-info":[{"award-number":["14XNLF02"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004260","name":"Renmin University of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004260","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Beijing Key Laboratory of Trusted Computing"},{"name":"DwB"},{"name":"Inter-Trust"},{"name":"CLARUS"},{"name":"Spanish Government","award":["TSI-020302-2010-153"],"award-info":[{"award-number":["TSI-020302-2010-153"]}]},{"name":"Spanish Government","award":["TIN2011-27076-C03-01"],"award-info":[{"award-number":["TIN2011-27076-C03-01"]}]},{"name":"Catalan Government","award":["2014 SGR 537"],"award-info":[{"award-number":["2014 SGR 537"]}]},{"DOI":"10.13039\/501100011730","name":"Templeton World Charity Foundation","doi-asserted-by":"crossref","award":["TWCF0095"],"award-info":[{"award-number":["TWCF0095"]}],"id":[{"id":"10.13039\/501100011730","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["12ZR1443500"],"award-info":[{"award-number":["12ZR1443500"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shanghai Chen Guang Program","award":["12CG24"],"award-info":[{"award-number":["12CG24"]}]},{"DOI":"10.13039\/501100003399","name":"Science and Technology Commission of Shanghai Municipality","doi-asserted-by":"publisher","award":["13JC1403500"],"award-info":[{"award-number":["13JC1403500"]}],"id":[{"id":"10.13039\/501100003399","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003741","name":"ICREA-Acad\u00e8mia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003741","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Catalan Government"},{"name":"Google Faculty Research Award"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2016,2,1]]},"DOI":"10.1109\/tc.2015.2419662","type":"journal-article","created":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T20:43:02Z","timestamp":1428093782000},"page":"466-479","source":"Crossref","is-referenced-by-count":38,"title":["Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts"],"prefix":"10.1109","volume":"65","author":[{"given":"Qianhong","family":"Wu","sequence":"first","affiliation":[]},{"given":"Bo","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Josep","family":"Domingo-Ferrer","sequence":"additional","affiliation":[]},{"given":"Oriol","family":"Farras","sequence":"additional","affiliation":[]},{"given":"Jesus A.","family":"Manjon","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"511","article-title":"Efficient Tree-based revocation in groups of low-state devices","author":"goodrich","year":"0","journal-title":"Proc 24th Annu Int Cryptol Conf"},{"key":"ref38","author":"wallner","year":"1999","journal-title":"RFC 2627"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"1411","DOI":"10.1109\/TPDS.2008.23","article-title":"A key management scheme using deployment knowledge for wireless sensor networks","volume":"19","author":"yu","year":"2008","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.061410.100084"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110311"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110313"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/90.836475"},{"key":"ref36","first-page":"1","article-title":"Efficient trace and revoke schemes","author":"naor","year":"0","journal-title":"Proc 4th Int Conf Financial Cryptography"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.923666"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.2005415"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2009.88"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70241"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2159001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056542"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_40"},{"key":"ref20","first-page":"321","article-title":"Dynamic group Diffie-Hellman key exchange under standard assumptions","author":"bresson","year":"0","journal-title":"Proc Int Conf Theory Appl Cryptographic Techn"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916725"},{"key":"ref21","first-page":"255","article-title":"Provably authenticated group Diffie-Hellman key exchange","author":"bresson","year":"0","journal-title":"Proc ACM Conf Computer Commun Secur"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12678-9_21"},{"key":"ref23","first-page":"245","article-title":"Constant-round authenticated group key exchange for dynamic groups","author":"kim","year":"0","journal-title":"Proc Conf Theory Appl Cryptol Inform Secur Adv Cryptol"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1109\/TNET.2012.2208201","article-title":"Fast transmission to remote cooperative groups: A new key management paradigm","volume":"21","author":"wu","year":"2013","journal-title":"IEEE\/ACM Trans Netw"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.128"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_6"},{"key":"ref51","author":"scott","year":"2011"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.882851"},{"key":"ref11","first-page":"161","article-title":"Round-optimal contributory conference key agreement","author":"boyd","year":"0","journal-title":"Proc 6th Int Workshop Pract Theory Public Key Cryptography"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928959"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_47"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.920224"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/12.995447"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/TDSC.2004.31","article-title":"Identity-based fault-tolerant conference key agreement","volume":"1","author":"yi","year":"2004","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref16","first-page":"275","article-title":"A secure and efficient conference key distribution system","author":"burmester","year":"0","journal-title":"Proc Workshop the Theory and Application of Cryptographic Techniques"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0312-y"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/324\/05731"},{"key":"ref19","first-page":"290","article-title":"Provably authenticated group Diffie-Hellman key exchange&#x2014;The dynamic case","author":"bresson","year":"0","journal-title":"Proc Conf Theory Appl Cryptol Inform Secur Adv Cryptol"},{"key":"ref4","year":"2014"},{"key":"ref3","first-page":"153","article-title":"Asymmetric group key agreement","author":"wu","year":"0","journal-title":"Proc EUROCRYPT"},{"key":"ref6","first-page":"166","article-title":"Decentralized dynamic broadcast encryption","author":"phan","year":"2011","journal-title":"Proc 8th Int Conf Security Cryptography Netw"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1199073"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/71.877936"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54631-0_4"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984337"},{"key":"ref46","first-page":"533","article-title":"Fully Key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits","author":"boneh","year":"0","journal-title":"Proc 33rd Annu Int Conf Theory Appl Cryptographic Techn"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.23"},{"key":"ref48","first-page":"207","article-title":"Chosen-ciphertext security from Identity-based encryption","author":"canetti","year":"0","journal-title":"Proc Int Conf Theory Appl Cryptographic Techn"},{"key":"ref47","first-page":"440","article-title":"Hierarchical identity based encryption with constant size ciphertext","author":"boneh","year":"0","journal-title":"Proc 24th Annu Int Conf Theory Appl Cryptographic Techn"},{"key":"ref42","first-page":"258","article-title":"Collusion resistant broadcast encryption with short ciphertexts and private keys","author":"boneh","year":"0","journal-title":"Proc 25th Annu Int Conf Adv Cryptol"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.40"},{"key":"ref44","first-page":"171","article-title":"Adaptive security in broadcast encryption systems (with short ciphertexts)","author":"gentry","year":"0","journal-title":"Proc Int Conf Theory Appl Cryptograph Tech Adv Cryptol"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2008.919940"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/12\/7379026\/7079389.pdf?arnumber=7079389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:58:14Z","timestamp":1642003094000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7079389\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,1]]},"references-count":51,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tc.2015.2419662","relation":{},"ISSN":["0018-9340"],"issn-type":[{"value":"0018-9340","type":"print"}],"subject":[],"published":{"date-parts":[[2016,2,1]]}}}