{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T02:59:31Z","timestamp":1770346771964,"version":"3.49.0"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2015,3,1]],"date-time":"2015-03-01T00:00:00Z","timestamp":1425168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61300213"],"award-info":[{"award-number":["61300213"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005272","name":"National Center for International Joint Research on E-Business Information Processing","doi-asserted-by":"crossref","award":["2013B01035"],"award-info":[{"award-number":["2013B01035"]}],"id":[{"id":"10.13039\/501100005272","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Jiangsu Provincial Key Laboratory of E-Business, Nanjing University of Finance and Economics, China"},{"name":"Australia Research Council through the Discovery Project","award":["DP130101383"],"award-info":[{"award-number":["DP130101383"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/tifs.2014.2382297","type":"journal-article","created":{"date-parts":[[2014,12,19]],"date-time":"2014-12-19T08:15:57Z","timestamp":1418976957000},"page":"665-678","source":"Crossref","is-referenced-by-count":127,"title":["Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption"],"prefix":"10.1109","volume":"10","author":[{"family":"Jinguang Han","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1562-5105","authenticated-orcid":false,"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]},{"family":"Yi Mu","sequence":"additional","affiliation":[]},{"family":"Jianying Zhou","sequence":"additional","affiliation":[]},{"family":"Man Ho Allen Au","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76900-2_16"},{"key":"ref30","first-page":"196","article-title":"Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data","volume":"5443","author":"camenisch","year":"2009","journal-title":"Public Key Cryptography"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"ref11","first-page":"568","article-title":"Decentralizing attribute-based encryption","volume":"6632","author":"lewko","year":"2011","journal-title":"Advances in Cryptology"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653678"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.50"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/978-3-319-02726-5_26","article-title":"Privacy-preserving decentralized ciphertext-policy attribute-based encryption with fully hidden access structure","volume":"8233","author":"qian","year":"2013","journal-title":"Information and Communications Security"},{"key":"ref15","first-page":"386","article-title":"Multi-authority ciphertext-policy attribute-based encryption with accountability","author":"li","year":"2011","journal-title":"Proceedings of the 6th ASIACCS"},{"key":"ref16","first-page":"19","article-title":"Constant size ciphertexts in threshold attribute-based encryption","volume":"6056","author":"herranz","year":"2010","journal-title":"Public Key Cryptography"},{"key":"ref17","first-page":"426","article-title":"Secure threshold multi authority attribute based encryption without a central authority","volume":"5365","author":"lin","year":"2008","journal-title":"Progress in Cryptology"},{"key":"ref18","first-page":"295","article-title":"Secure distributed key generation for discrete-log based cryptosystems","volume":"1592","author":"gennaro","year":"1999","journal-title":"Advances in Cryptology"},{"key":"ref19","first-page":"354","article-title":"Robust threshold DSS signatures","volume":"1070","author":"gennaro","year":"1996","journal-title":"Advances in Cryptology"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1007\/BFb0052252","article-title":"Efficient group signature schemes for large groups","volume":"1294","author":"camenisch","year":"1997","journal-title":"Advances in Cryptology"},{"key":"ref4","first-page":"321","article-title":"Ciphertext-policy attribute-based encryption","author":"bethencourt","year":"2007","journal-title":"Proc IEEE Symp SP"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_9"},{"key":"ref3","first-page":"457","article-title":"Fuzzy identity-based encryption","volume":"3494","author":"sahai","year":"2005","journal-title":"Advances in Cryptology"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref29","first-page":"234","article-title":"Efficient protocols for set membership and range proofs","volume":"5350","author":"camenisch","year":"2008","journal-title":"Advances in Cryptology"},{"key":"ref5","first-page":"456","article-title":"Provably secure ciphertext policy ABE","author":"cheung","year":"2007","journal-title":"Proc 14th ACM CCS"},{"key":"ref8","first-page":"62","article-title":"Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption","volume":"6110","author":"lewko","year":"2010","journal-title":"Advances in Cryptology"},{"key":"ref7","first-page":"195","article-title":"Attribute-based encryption with non-monotonic access structures","author":"ostrovsky","year":"2007","journal-title":"Proc 14th ACM CCS"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653734"},{"key":"ref9","first-page":"53","article-title":"Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization","volume":"6571","author":"waters","year":"2011","journal-title":"Public Key Cryptography"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_5"},{"key":"ref20","first-page":"20","article-title":"Distributed attribute-based encryption","volume":"5461","author":"m\u00fcller","year":"2008","journal-title":"Information Security and Cryptology"},{"key":"ref22","first-page":"327","article-title":"Distributed pseudo-random functions and KDCs","volume":"1592","author":"naor","year":"1999","journal-title":"Advances in Cryptology"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23822-2_16"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/978-3-540-27809-2_21","article-title":"An efficient and usable multi-show non-transferable anonymous credential system","volume":"3110","author":"persiano","year":"2004","journal-title":"Financial Cryptography"},{"key":"ref23","first-page":"93","article-title":"An efficient system for non-transferable anonymous credentials with optional anonymity revocation","volume":"2045","author":"camenisch","year":"2001","journal-title":"Advances in Cryptology"},{"key":"ref26","article-title":"Secure schemes for secret sharing and key distribution","author":"beime","year":"1996"},{"key":"ref25","first-page":"56","article-title":"Short signatures without random oracles","volume":"3027","author":"boneh","year":"2004","journal-title":"Advances in Cryptology"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7019030\/06987293.pdf?arnumber=6987293","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:27:54Z","timestamp":1642004874000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6987293\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":31,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2014.2382297","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3]]}}}