{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T03:24:29Z","timestamp":1769311469590,"version":"3.49.0"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2016,9,1]],"date-time":"2016-09-01T00:00:00Z","timestamp":1472688000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61133014"],"award-info":[{"award-number":["61133014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272413"],"award-info":[{"award-number":["61272413"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272534"],"award-info":[{"award-number":["61272534"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61300226"],"award-info":[{"award-number":["61300226"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472165"],"award-info":[{"award-number":["61472165"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Guangdong Provincial Natural Science Foundation","doi-asserted-by":"crossref","award":["S2013040014826"],"award-info":[{"award-number":["S2013040014826"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004602","name":"Program for New Century Excellent Talents in University","doi-asserted-by":"publisher","award":["NCET-12-0680"],"award-info":[{"award-number":["NCET-12-0680"]}],"id":[{"id":"10.13039\/501100004602","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Project of Science and Technology New Star of Guangzhou Pearl Rivel"},{"DOI":"10.13039\/501100010261","name":"Fok Ying Tung Education Foundation","doi-asserted-by":"crossref","award":["131066"],"award-info":[{"award-number":["131066"]}],"id":[{"id":"10.13039\/501100010261","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100013286","name":"Research Fund for the Doctoral Program of Higher Education of China","doi-asserted-by":"crossref","award":["20134401110011"],"award-info":[{"award-number":["20134401110011"]}],"id":[{"id":"10.13039\/501100013286","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100013286","name":"Research Fund for the Doctoral Program of Higher Education of China","doi-asserted-by":"crossref","award":["20134401120017"],"award-info":[{"award-number":["20134401120017"]}],"id":[{"id":"10.13039\/501100013286","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2016,9,1]]},"DOI":"10.1109\/tdsc.2015.2423669","type":"journal-article","created":{"date-parts":[[2015,4,16]],"date-time":"2015-04-16T19:12:24Z","timestamp":1429211544000},"page":"533-546","source":"Crossref","is-referenced-by-count":108,"title":["Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption"],"prefix":"10.1109","volume":"13","author":[{"given":"Xianping","family":"Mao","sequence":"first","affiliation":[]},{"given":"Junzuo","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Qixiang","family":"Mei","sequence":"additional","affiliation":[]},{"given":"Kefei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Weng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_26"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_25"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34129-8_17"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_33"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_33"},{"key":"ref35","first-page":"129","article-title":"Implementing gentry's fully-homomorphic encryption scheme","author":"gentry","year":"0","journal-title":"Proc 30th Annu Int Conf Theory Appl Cryptographic Tech Adv Cryptol"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0057-3"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315270"},{"key":"ref15","first-page":"23","article-title":"Collusion-resistant group key management using attribute-based encryption","author":"cheung","year":"2007","journal-title":"Group-Oriented Cryptographic Protocols Workshop"},{"key":"ref16","first-page":"62","article-title":"Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption","author":"lewko","year":"0","journal-title":"Proc 29th Annu Int Conf Theory Appl Cryptographic Tech"},{"key":"ref17","first-page":"20","article-title":"Distributed attribute-based encryption","author":"m\u00fcller","year":"0","journal-title":"Proc Int Conf Inf Security Cryptol"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_11"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755720"},{"key":"ref28","first-page":"162","article-title":"Attribute-based encryption with fast decryption","author":"hohenberger","year":"0","journal-title":"Proc 16th Int Conf Practice Theory Public-Key Cryptography"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2011.12.004"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_34"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.271"},{"key":"ref5","first-page":"34","article-title":"Outsourcing the decryption of abe ciphertexts","author":"green","year":"0","journal-title":"Proc 20th USENIX Conf Security"},{"key":"ref8","first-page":"1343","article-title":"Attribute-based encryption with verifiable outsourced decryption","volume":"8","author":"lai","year":"0","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276741"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19571-6_16"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"ref1","first-page":"457","article-title":"Fuzzy identity-based encryption","author":"sahai","year":"0","journal-title":"Proc 24th Int Cryptol Conf"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.203"},{"key":"ref22","first-page":"411","article-title":"Easier: Encryption-based access control in social networks with efficient revocation","author":"jahid","year":"0","journal-title":"Proc 6th ACM Symp Inf Comput Commun Security"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866414"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653678"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"ref26","author":"kang","year":"2005"},{"key":"ref25","first-page":"568","article-title":"Decentralizing attribute-based encryption","author":"lewko","year":"0","journal-title":"Proc 30th Annu Int Conf Theory Appl Cryptographic Tech Advances Cryptol"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/7557096\/07087379.pdf?arnumber=7087379","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T02:34:42Z","timestamp":1633919682000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7087379\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,1]]},"references-count":36,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2015.2423669","relation":{},"ISSN":["1545-5971"],"issn-type":[{"value":"1545-5971","type":"print"}],"subject":[],"published":{"date-parts":[[2016,9,1]]}}}