{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:29:35Z","timestamp":1772724575498,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,28]],"date-time":"2007-10-28T00:00:00Z","timestamp":1193529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,28]]},"DOI":"10.1145\/1315245.1315270","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"195-203","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":575,"title":["Attribute-based encryption with non-monotonic access structures"],"prefix":"10.1145","author":[{"given":"Rafail","family":"Ostrovsky","sequence":"first","affiliation":[{"name":"UCLA, Los Angeles, CA"}]},{"given":"Amit","family":"Sahai","sequence":"additional","affiliation":[{"name":"UCLA, Los Angeles, CA"}]},{"given":"Brent","family":"Waters","sequence":"additional","affiliation":[{"name":"SRI International, Menlo Park, CA"}]}],"member":"320","published-online":{"date-parts":[[2007,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Elementary Linear Algebra","author":"Anton H.","year":"2005","unstructured":"H. Anton and C. Rorres . Elementary Linear Algebra , 9 th Edition. 2005 . H. Anton and C. Rorres. Elementary Linear Algebra, 9th Edition. 2005.","edition":"9"},{"key":"e_1_3_2_1_3_1","series-title":"LNCS","first-page":"27","volume-title":"Advances in Cryptology - CRYPTO","author":"Benaloh J.","year":"1988","unstructured":"J. Benaloh and J. Leichter . Generalized Secret Sharing and Monotone Functions . In Advances in Cryptology - CRYPTO , volume 403 of LNCS , pages 27 -- 36 . Springer , 1988 . J. Benaloh and J. Leichter. Generalized Secret Sharing and Monotone Functions. In Advances in Cryptology - CRYPTO, volume 403 of LNCS, pages 27--36. Springer, 1988."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MARK.1979.8817296"},{"key":"e_1_3_2_1_6_1","series-title":"LNCS","first-page":"223","volume-title":"Advances in Cryptology - Eurocrypt","author":"Boneh D.","year":"2004","unstructured":"D. Boneh and X. Boyen . Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles . In Advances in Cryptology - Eurocrypt , volume 3027 of LNCS , pages 223 -- 238 . Springer , 2004 . D. Boneh and X. Boyen. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles. In Advances in Cryptology - Eurocrypt, volume 3027 of LNCS, pages 223--238. Springer, 2004."},{"key":"e_1_3_2_1_7_1","series-title":"LNCS","first-page":"213","volume-title":"Advances in Cryptology - CRYPTO","author":"Boneh D.","year":"2001","unstructured":"D. Boneh and M. Franklin . Identity Based Encryption from the Weil Pairing . In Advances in Cryptology - CRYPTO , volume 2139 of LNCS , pages 213 -- 229 . Springer , 2001 . D. Boneh and M. Franklin. Identity Based Encryption from the Weil Pairing. In Advances in Cryptology - CRYPTO, volume 2139 of LNCS, pages 213--229. Springer, 2001."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_16"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030104"},{"key":"e_1_3_2_1_10_1","first-page":"105","volume":"6","author":"Brickell E. F.","year":"1989","unstructured":"E. F. Brickell . Some ideal secret sharing schemes. Journal of Combinatorial Mathematics and Combinatorial Computing , 6 : 105 -- 113 , 1989 . E. F. Brickell. Some ideal secret sharing schemes. Journal of Combinatorial Mathematics and Combinatorial Computing, 6:105--113, 1989.","journal-title":"Journal of Combinatorial Mathematics and Combinatorial Computing"},{"key":"e_1_3_2_1_11_1","series-title":"LNCS","volume-title":"Advances in Cryptology - Eurocrypt","author":"Canetti R.","year":"2003","unstructured":"R. Canetti , S. Halevi , and J. Katz . A Forward-Secure Public-Key Encryption Scheme . In Advances in Cryptology - Eurocrypt , volume 2656 of LNCS . Springer , 2003 . R. Canetti, S. Halevi, and J. Katz. A Forward-Secure Public-Key Encryption Scheme. In Advances in Cryptology - Eurocrypt, volume 2656 of LNCS. Springer, 2003."},{"key":"e_1_3_2_1_12_1","series-title":"LNCS","first-page":"207","volume-title":"Advances in Cryptology - Eurocrypt","author":"Canetti R.","year":"2004","unstructured":"R. Canetti , S. Halevi , and J. Katz . Chosen Ciphertext Security from Identity Based Encryption . In Advances in Cryptology - Eurocrypt , volume 3027 of LNCS , pages 207 -- 222 . Springer , 2004 . R. Canetti, S. Halevi, and J. Katz. Chosen Ciphertext Security from Identity Based Encryption. In Advances in Cryptology - Eurocrypt, volume 3027 of LNCS, pages 207--222. Springer, 2004."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1760749.1760787"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315302"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/647995.742435"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_17_1","volume-title":"Secret Sharing Scheme Realizing General Access Structure","author":"Ito M.","year":"1987","unstructured":"M. Ito , A. Saito , and T. Nishizeki . Secret Sharing Scheme Realizing General Access Structure . In IEEE Globecom. IEEE , 1987 . M. Ito, A. Saito, and T. Nishizeki. Secret Sharing Scheme Realizing General Access Structure. In IEEE Globecom. IEEE, 1987."},{"key":"e_1_3_2_1_18_1","first-page":"1","volume-title":"Financial Cryptography","author":"Naor M.","year":"2000","unstructured":"M. Naor and B. Pinkas . Efficient trace and revoke schemes . In Financial Cryptography , pages 1 -- 20 , 2000 . M. Naor and B. Pinkas. Efficient trace and revoke schemes. In Financial Cryptography, pages 1--20, 2000."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180419"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1090\/mmono\/134"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_23_1","series-title":"LNCS","first-page":"37","volume-title":"Advances in Cryptology - CRYPTO","author":"Shamir A.","year":"1984","unstructured":"A. Shamir . Identity Based Cryptosystems and Signature Schemes . In Advances in Cryptology - CRYPTO , volume 196 of LNCS , pages 37 -- 53 . Springer , 1984 . A. Shamir. Identity Based Cryptosystems and Signature Schemes. In Advances in Cryptology - CRYPTO, volume 196 of LNCS, pages 37--53. Springer, 1984."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1767011.1767023"}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","location":"Alexandria Virginia USA","acronym":"CCS07","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 14th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1315245.1315270","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1315245.1315270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:12Z","timestamp":1750254972000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1315245.1315270"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,28]]},"references-count":23,"alternative-id":["10.1145\/1315245.1315270","10.1145\/1315245"],"URL":"https:\/\/doi.org\/10.1145\/1315245.1315270","relation":{},"subject":[],"published":{"date-parts":[[2007,10,28]]},"assertion":[{"value":"2007-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}