{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T11:54:43Z","timestamp":1764330883639},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2014,10,1]],"date-time":"2014-10-01T00:00:00Z","timestamp":1412121600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2014,10,1]]},"DOI":"10.1109\/tcc.2014.2353053","type":"journal-article","created":{"date-parts":[[2014,8,28]],"date-time":"2014-08-28T18:32:36Z","timestamp":1409250756000},"page":"409-421","source":"Crossref","is-referenced-by-count":31,"title":["Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model"],"prefix":"10.1109","volume":"2","author":[{"given":"Tatsuaki","family":"Okamoto","sequence":"first","affiliation":[]},{"given":"Katsuyuki","family":"Takashima","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","first-page":"568","article-title":"Decentralizing attribute-based encryption","volume":"6632","author":"lewko","year":"0","journal-title":"Proc 30th Annu Int Conf Theory Appl Cryptograph Techn Adv Cryptol"},{"key":"ref30","first-page":"560","article-title":"Delegating capabilities in predicate encryption systems","volume":"5126","author":"shi","year":"0","journal-title":"Proc 35th Int Colloq Automata Lang Program"},{"key":"ref10","first-page":"198","article-title":"Threshold attribute-based signatures and their application to anonymous credential systems","volume":"5580","author":"shahandashti","year":"0","journal-title":"Proc 2nd Int Conf Cryptol Africa"},{"key":"ref11","first-page":"2","article-title":"Fuzzy identity based signature","volume":"2008","author":"yang","year":"2008","journal-title":"IACR Cryptology ePrint"},{"key":"ref12","first-page":"224","article-title":"Revocable attribute-based signatures with adaptive security in the standard model","volume":"6737","author":"escala","year":"0","journal-title":"Proc 4th Int Conf Cryptol Africa"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_24"},{"key":"ref14","first-page":"51","article-title":"Short attribute-based signatures for threshold predicates","volume":"7178","author":"herranz","year":"0","journal-title":"Proc CT-RSA"},{"key":"ref15","first-page":"57","article-title":"Homomorphic encryption and signatures from vector decomposition","volume":"5209","author":"okamoto","year":"0","journal-title":"Proc 2nd Int Conf Pairing-Based Cryptography"},{"key":"ref16","first-page":"214","article-title":"Hierarchical predicate encryption for inner-products","volume":"5912","author":"okamoto","year":"0","journal-title":"Proc 15th Int Conf Theory Appl Cryptol Inf Security Adv Cryptol"},{"key":"ref17","first-page":"62","article-title":"Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption","volume":"6110","author":"lewko","year":"0","journal-title":"Proc 29th Ann Int Conf Theory Appl Cryptograph Techn"},{"key":"ref18","first-page":"191","article-title":"Fully secure functional encryption with general relations from the decisional linear assumption","volume":"6223","author":"okamoto","year":"0","journal-title":"Proc 30th Annu Conf Adv Cryptol"},{"key":"ref19","first-page":"700","article-title":"Efficient attribute-based signatures for non-monotone predicates in the standard model","volume":"2011","author":"okamoto","year":"2011","journal-title":"IACR Cryptology ePrint"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/4372.4373"},{"key":"ref4","first-page":"159","article-title":"Attribute based group signatures","volume":"2007","author":"khader","year":"2007","journal-title":"IACR Cryptology ePrint"},{"key":"ref27","first-page":"56","article-title":"Signature schemes and anonymous credentials from bilinear maps","volume":"3152","author":"camenisch","year":"0","journal-title":"Proc 24th Annu Int Cryptol Conf"},{"key":"ref3","first-page":"509","article-title":"Attribute-based signature scheme","author":"guo","year":"2008","journal-title":"Proc Int Soc Autom"},{"key":"ref6","first-page":"60","article-title":"Attribute-based signature and its applications","author":"li","year":"0","journal-title":"Proc 5th ACM Symp Inf Comput Commun Security"},{"key":"ref29","article-title":"Secure schemes for secret sharing and key distribution","author":"beimel","year":"1996"},{"key":"ref5","first-page":"241","article-title":"Attribute based group signature with revocation","volume":"2007","author":"khader","year":"2007","journal-title":"IACR Cryptology ePrint"},{"key":"ref8","first-page":"328","article-title":"Attribute-based signatures: Achieving attribute-privacy and collusion-resistance","volume":"2008","author":"maji","year":"2008","journal-title":"IACR Cryptology ePrint"},{"key":"ref7","first-page":"394","article-title":"Attribute-based ring signatures","volume":"2008","author":"li","year":"2008","journal-title":"IACR Cryptology ePrint"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"ref9","first-page":"376","article-title":"Attribute-based signatures","author":"maji","year":"0","journal-title":"Proc CT-RSA"},{"key":"ref1","first-page":"35","article-title":"Efficient attribute-based signatures for non-monotone predicates in the standard model","volume":"6571","author":"okamoto","year":"0","journal-title":"Proc 14th Int Conf Practice Theory Public Key Cryptography"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_28"},{"key":"ref22","first-page":"210","article-title":"Mesh signatures","volume":"4515","author":"boyen","year":"0","journal-title":"Proc 26th Annu Int Conf Theory Appl Cryptograph Techn"},{"key":"ref21","first-page":"552","article-title":"How to leak a secret","volume":"2248","author":"rivest","year":"0","journal-title":"Proc 7th Int Conf Theory Appl Cryptol Inf Security Adv Cryptol"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78524-8_20"},{"key":"ref23","first-page":"108","article-title":"Randomizable proofs and delegatable anonymous credentials","volume":"5677","author":"belenkiy","year":"0","journal-title":"Proc 29th Annu Int Cryptol Conf"},{"key":"ref26","first-page":"93","article-title":"An efficient system for non-transferable anonymous credentials with optional anonymity revocation","volume":"2045","author":"camenisch","year":"0","journal-title":"Proc Int Conf Theory Appl Cryptograph Techn Adv Cryptol"},{"key":"ref25","first-page":"345","article-title":"Efficient attributes for anonymous credentials","year":"0","journal-title":"Proc 15th ACM Conf Comput Commun Security"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245519\/7024233\/06887292.pdf?arnumber=6887292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:29:02Z","timestamp":1642004942000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6887292\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,1]]},"references-count":31,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2014.2353053","relation":{},"ISSN":["2168-7161"],"issn-type":[{"value":"2168-7161","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,1]]}}}