{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:16:33Z","timestamp":1775067393300,"version":"3.50.1"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2017YFB0902904"],"award-info":[{"award-number":["2017YFB0902904"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2018YFB0704000"],"award-info":[{"award-number":["2018YFB0704000"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2019QY(Y)0602"],"award-info":[{"award-number":["2019QY(Y)0602"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902123"],"award-info":[{"award-number":["61902123"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972058"],"award-info":[{"award-number":["61972058"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61932011"],"award-info":[{"award-number":["61932011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972019"],"award-info":[{"award-number":["61972019"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872130"],"award-info":[{"award-number":["61872130"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862012"],"award-info":[{"award-number":["61862012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772191"],"award-info":[{"award-number":["61772191"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702028"],"award-info":[{"award-number":["61702028"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772538"],"award-info":[{"award-number":["61772538"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672083"],"award-info":[{"award-number":["61672083"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["91646203"],"award-info":[{"award-number":["91646203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2019M662769"],"award-info":[{"award-number":["2019M662769"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Key Projects of Hunan Province","award":["2015TP1004"],"award-info":[{"award-number":["2015TP1004"]}]},{"name":"Science and Technology Key Projects of Hunan Province","award":["2018TP2023"],"award-info":[{"award-number":["2018TP2023"]}]},{"name":"Science and Technology Key Projects of Hunan Province","award":["2018TP3001"],"award-info":[{"award-number":["2018TP3001"]}]},{"name":"Science and Technology Key Projects of Hunan Province","award":["2019GK2082"],"award-info":[{"award-number":["2019GK2082"]}]},{"DOI":"10.13039\/501100011496","name":"Science and Technology Key Projects of Changsha City","doi-asserted-by":"publisher","award":["kq1801008"],"award-info":[{"award-number":["kq1801008"]}],"id":[{"id":"10.13039\/501100011496","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011496","name":"Science and Technology Key Projects of Changsha City","doi-asserted-by":"publisher","award":["kq1804008"],"award-info":[{"award-number":["kq1804008"]}],"id":[{"id":"10.13039\/501100011496","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Cryptography Development Fund","award":["MMJJ20170106"],"award-info":[{"award-number":["MMJJ20170106"]}]},{"DOI":"10.13039\/501100004750","name":"Aeronautical Science Foundation of China","doi-asserted-by":"publisher","award":["2017ZC51038"],"award-info":[{"award-number":["2017ZC51038"]}],"id":[{"id":"10.13039\/501100004750","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012558","name":"Foundation of Science and Technology on Information Assurance Laboratory","doi-asserted-by":"publisher","award":["61421120305162112006"],"award-info":[{"award-number":["61421120305162112006"]}],"id":[{"id":"10.13039\/501100012558","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001381","name":"Singapore National Research Foundation","doi-asserted-by":"publisher","award":["NRF2018NCR-NSOE004-0001"],"award-info":[{"award-number":["NRF2018NCR-NSOE004-0001"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001961","name":"AXA Research Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001961","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004607","name":"Guangxi Natural Science Foundation","doi-asserted-by":"publisher","award":["2019GXNSFFA245015"],"award-info":[{"award-number":["2019GXNSFFA245015"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004607","name":"Guangxi Natural Science Foundation","doi-asserted-by":"publisher","award":["AD19245048"],"award-info":[{"award-number":["AD19245048"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/tifs.2020.2985532","type":"journal-article","created":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T19:59:19Z","timestamp":1585943959000},"page":"3168-3180","source":"Crossref","is-referenced-by-count":110,"title":["Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud"],"prefix":"10.1109","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0089-0870","authenticated-orcid":false,"given":"Hua","family":"Deng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0877-3887","authenticated-orcid":false,"given":"Zheng","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Qianhong","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3959-338X","authenticated-orcid":false,"given":"Zhenyu","family":"Guan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3491-8146","authenticated-orcid":false,"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0951-8880","authenticated-orcid":false,"given":"Yujue","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yunya","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"440","article-title":"Hierarchical identity based encryption with constant size ciphertext","author":"boneh","year":"2005","journal-title":"Adv Cryptology"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9005-7"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2876849"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714632"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40367-0_14"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxx060"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897848"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-017-1045-x"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054122"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78440-1_21"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2714166"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2877601"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73489-5_13"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1918","DOI":"10.1109\/TIFS.2015.2435697","article-title":"Security analysis on One-to-Many order preserving encryption-based cloud data search","volume":"10","author":"li","year":"2015","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2346023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2017.2709318"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"ref29","first-page":"288","article-title":"Hybrid proxy re-encryption scheme for attribute-based encryption","author":"mizuno","year":"2009","journal-title":"Proc Int Conf Inf Security Cryptol"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2017.2762296"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2596286"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2016.2545668"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2528500"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76900-2_12"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_19"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11203-9_15"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75496-1_13"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.11.016"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2417544"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1109\/TIFS.2015.2509912","article-title":"Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for E-health clouds","volume":"11","author":"yang","year":"2016","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-018-0462-9"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8833568\/09056799.pdf?arnumber=9056799","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T13:54:18Z","timestamp":1695995658000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9056799\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/tifs.2020.2985532","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}