{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:05:15Z","timestamp":1775912715903,"version":"3.50.1"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB2701500"],"award-info":[{"award-number":["2022YFB2701500"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Cryptologic Science Fund of China","award":["2025NCSF01009"],"award-info":[{"award-number":["2025NCSF01009"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62572295"],"award-info":[{"award-number":["62572295"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272043"],"award-info":[{"award-number":["62272043"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Major Program of Shandong Provincial Natural Science Foundation for the Fundamental Research","award":["ZR2022ZD03"],"award-info":[{"award-number":["ZR2022ZD03"]}]},{"DOI":"10.13039\/501100015973","name":"Yangtze Delta Region Institute of Tsinghua University, Zhejiang","doi-asserted-by":"publisher","award":["LZZLX24F007"],"award-info":[{"award-number":["LZZLX24F007"]}],"id":[{"id":"10.13039\/501100015973","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3601444","type":"journal-article","created":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:29:25Z","timestamp":1755800965000},"page":"9625-9640","source":"Crossref","is-referenced-by-count":4,"title":["Controllable Access Control in Permissioned Blockchains via Controllable Threshold Proxy Re-Encryption"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-9785-208X","authenticated-orcid":false,"given":"Wenzhong","family":"Li","sequence":"first","affiliation":[{"name":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0551-0455","authenticated-orcid":false,"given":"Zhaoyang","family":"Xie","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1366-8256","authenticated-orcid":false,"given":"Shengli","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0134-2874","authenticated-orcid":false,"given":"Yunxiao","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Computer Science, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5865-3408","authenticated-orcid":false,"given":"Haibin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Yangtze Delta Region Institute of Tsinghua University, Jiaxing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/bfb0054122"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05171-6_13"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2018.2877601"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00015-8_2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35362-8_16"},{"key":"ref7","volume-title":"Threshold Proxy Re-Encryption","author":"Dehua Zhou","year":"2014"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05366-6_29"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17259-6_10"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102411"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05221-3"},{"issue":"2","key":"ref12","first-page":"151","article-title":"Identity-based proxy re-encryption with threshold multi-proxy","volume":"27","author":"Cao","year":"2010","journal-title":"J. Natural Sci. Heilongjiang Univ."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1631\/fitee.2000366"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119900"},{"issue":"1","key":"ref15","first-page":"44","article-title":"Certificateless threshold-based conditional proxy re-encryption scheme","volume":"46","author":"Li","year":"2023","journal-title":"J. Beijing Univ. Posts Telecommun."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2005.9"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS51746.2020.00039"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-5101-3_1"},{"key":"ref19","first-page":"173","article-title":"Practical Byzantine fault tolerance","volume-title":"Proc. OSDI","author":"Castro"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02641-7_21"},{"issue":"2","key":"ref21","first-page":"140","article-title":"Improving the security of an efficient unidirectional proxy re-encryption scheme","volume":"1","author":"Canard","year":"2011","journal-title":"J. Internet Serv. Inf. Secur."},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78440-1_21"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533100"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/asiajcis.2014.11"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89754-5_11"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02620-1_23"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2012.08.017"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22540-6_49"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/infcomw.2014.6849289"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxv050"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/glocom.2010.5684045"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88428-4_8"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962419"},{"key":"ref34","first-page":"813","article-title":"Provably secure certificate-based conditional proxy re-encryption","volume":"32","author":"Li","year":"2016","journal-title":"J. Inf. Sci. Eng."},{"key":"ref35","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1007\/978-3-642-28914-9_23","article-title":"Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices","volume":"7194","author":"Chandran","year":"2012","journal-title":"Theory of Cryptography\u20149th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19\u201321, 2012. Proceedings"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28914-9_23"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-8736-8_7"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-57728-4_6"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jco.2004.01.002"},{"key":"ref40","first-page":"417","article-title":"Correlation-resistant storage via keyword-searchable encryption","volume":"2005","author":"Ballard","year":"2005","journal-title":"IACR"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2008.2006431"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559348"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417262"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2023.i4.393-419"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_12"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/11133453.pdf?arnumber=11133453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T17:45:03Z","timestamp":1758217503000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11133453\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3601444","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}