{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:04:28Z","timestamp":1771700668714,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,3,22]],"date-time":"2011-03-22T00:00:00Z","timestamp":1300752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["60970144"],"award-info":[{"award-number":["60970144"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental Research Funds for the Central Universities","award":["K50510010003"],"award-info":[{"award-number":["K50510010003"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,3,22]]},"DOI":"10.1145\/1966913.1966964","type":"proceedings-article","created":{"date-parts":[[2011,4,7]],"date-time":"2011-04-07T09:36:11Z","timestamp":1302168971000},"page":"386-390","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":107,"title":["Multi-authority ciphertext-policy attribute-based encryption with accountability"],"prefix":"10.1145","author":[{"given":"Jin","family":"Li","sequence":"first","affiliation":[{"name":"Guangzhou University, Guangzhou, P.R. China"}]},{"given":"Qiong","family":"Huang","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Hong Kong"}]},{"given":"Xiaofeng","family":"Chen","sequence":"additional","affiliation":[{"name":"Xidian University"}]},{"given":"Sherman S. M.","family":"Chow","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, Ontario, Canada"}]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Hong Kong"}]},{"given":"Dongqing","family":"Xie","sequence":"additional","affiliation":[{"name":"Guangzhou University, P.R. China"}]}],"member":"320","published-online":{"date-parts":[[2011,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_26"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_3_2_1_3_1","series-title":"LNCS","first-page":"515","volume-title":"TCC","author":"Chase M.","year":"2007","unstructured":"M. Chase . Multi-Authority Attribute Based Encryption . In TCC , volume 4392 of LNCS , pages 515 -- 534 , 2007 . M. Chase. Multi-Authority Attribute Based Encryption. In TCC, volume 4392 of LNCS, pages 515--534, 2007."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653678"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315302"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_8_1","unstructured":"M. J. Hinek S. Jiang R. Safavi-Naini and S. F. Shahandashti. Attribute-Based Encryption with Key Cloning Protection. Cryptology ePrint 2008\/478.  M. J. Hinek S. Jiang R. Safavi-Naini and S. F. Shahandashti. Attribute-Based Encryption with Key Cloning Protection. Cryptology ePrint 2008\/478."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.01.008"},{"key":"e_1_3_2_1_10_1","volume-title":"A 2 BE: Accountable Attribute-Based Encryption for Abuse Free Access Control. Cryptology ePrint 2009\/118","author":"Li J.","year":"2009","unstructured":"J. Li , K. Ren , and K. Kim . A 2 BE: Accountable Attribute-Based Encryption for Abuse Free Access Control. Cryptology ePrint 2009\/118 , 2009 . J. Li, K. Ren, and K. Kim. A 2 BE: Accountable Attribute-Based Encryption for Abuse Free Access Control. Cryptology ePrint 2009\/118, 2009."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04474-8_28"},{"key":"e_1_3_2_1_12_1","series-title":"LNCS","first-page":"111","volume-title":"ACNS","author":"Nishide T.","year":"2008","unstructured":"T. Nishide , K. Yoneyama , and K. Ohta . Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structure . In ACNS , volume 5037 of LNCS , pages 111 -- 129 , 2008 . Journal version appeared in IEICE Transactions 92-A(1): 22--32 (2009). T. Nishide, K. Yoneyama, and K. Ohta. Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structure. In ACNS, volume 5037 of LNCS, pages 111--129, 2008. Journal version appeared in IEICE Transactions 92-A(1): 22--32 (2009)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05284-2_18"}],"event":{"name":"ASIA CCS '11: 6th ACM Symposium on Information, Compuer and Communications Security","location":"Hong Kong China","acronym":"ASIA CCS '11","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1966913.1966964","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1966913.1966964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:25Z","timestamp":1750243945000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1966913.1966964"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3,22]]},"references-count":13,"alternative-id":["10.1145\/1966913.1966964","10.1145\/1966913"],"URL":"https:\/\/doi.org\/10.1145\/1966913.1966964","relation":{},"subject":[],"published":{"date-parts":[[2011,3,22]]},"assertion":[{"value":"2011-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}