{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T19:03:11Z","timestamp":1770750191838,"version":"3.50.0"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2021YFB3101304"],"award-info":[{"award-number":["2021YFB3101304"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202193"],"award-info":[{"award-number":["62202193"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272186"],"award-info":[{"award-number":["62272186"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1109\/tdsc.2024.3481497","type":"journal-article","created":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T18:10:07Z","timestamp":1729102207000},"page":"2227-2242","source":"Crossref","is-referenced-by-count":8,"title":["Attribute-Based Access Control Encryption"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9223-8328","authenticated-orcid":false,"given":"Xiuhua","family":"Wang","sequence":"first","affiliation":[{"name":"Hubei Key Laboratory of Distributed System Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Mengyang","family":"Yu","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5308-5892","authenticated-orcid":false,"given":"Yaohui","family":"Wang","sequence":"additional","affiliation":[{"name":"Hubei Key Laboratory of Distributed System Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Yinjia","family":"Pi","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4268-4976","authenticated-orcid":false,"given":"Peng","family":"Xu","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6457-9478","authenticated-orcid":false,"given":"Shuai","family":"Wang","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Wireless Communications, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3934-7605","authenticated-orcid":false,"given":"Hai","family":"Jin","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Min","family":"Han","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2004.05.027"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315302"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13013-7_2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12475-9_18"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2914642.2914659"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653678"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53644-5_21"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54388-7_4"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00023"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92548-2_1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68914-0_7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_11"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488678"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.13"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_17"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_9"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3055504.3055509"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78372-3_16"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-14791-3_10"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT54713.2023.10206824"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26951-7_24"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-5449-9"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-019-2856-8"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54242-8_29"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12612-4_1"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_22"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_12"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-011-9593-3"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/10992672\/10720426.pdf?arnumber=10720426","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T19:37:28Z","timestamp":1747337848000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10720426\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5]]},"references-count":32,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2024.3481497","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5]]}}}