{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T00:37:38Z","timestamp":1768351058278,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,5,8]],"date-time":"2013-05-08T00:00:00Z","timestamp":1367971200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,5,8]]},"DOI":"10.1145\/2484313.2484381","type":"proceedings-article","created":{"date-parts":[[2013,5,14]],"date-time":"2013-05-14T12:15:27Z","timestamp":1368533727000},"page":"511-516","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":86,"title":["Anonymous attribute-based encryption supporting efficient decryption test"],"prefix":"10.1145","author":[{"given":"Yinghui","family":"Zhang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, China"}]},{"given":"Xiaofeng","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, China"}]},{"given":"Jin","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Educational Software, Guangzhou University, Guangzhou, China"}]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[{"name":"Department of Computer Science,City University of Hong Kong, Hong Kong, China"}]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, China"}]}],"member":"320","published-online":{"date-parts":[[2013,5,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_3_2_1_2_1","series-title":"LNCS","first-page":"535","volume-title":"Proc. of TCC'07, KNAW Trippenhuis Amsterdam, The Netherlands","author":"Boneh D.","year":"2007","unstructured":"D. Boneh and B. Waters . Conjunctive, subset, and range queries on encrypted data . In Proc. of TCC'07, KNAW Trippenhuis Amsterdam, The Netherlands , volume 4392 of LNCS , pages 535 -- 554 . Springer Berlin-Heidelberg , 2007 . D. Boneh and B. Waters. Conjunctive, subset, and range queries on encrypted data. In Proc. of TCC'07, KNAW Trippenhuis Amsterdam, The Netherlands, volume 4392 of LNCS, pages 535--554. Springer Berlin-Heidelberg, 2007."},{"key":"e_1_3_2_1_3_1","series-title":"LNCS","first-page":"207","volume-title":"Proc. of EUROCRYPT'04","author":"Canetti R.","year":"2004","unstructured":"R. Canetti , S. Halevi , and J. Katz . Chosen-ciphertext security from identity-based encryption . In Proc. of EUROCRYPT'04 , volume 3027 of LNCS , pages 207 -- 222 . Springer Berlin-Heidelberg , 2004 . R. Canetti, S. Halevi, and J. Katz. Chosen-ciphertext security from identity-based encryption. In Proc. of EUROCRYPT'04, volume 3027 of LNCS, pages 207--222. Springer Berlin-Heidelberg, 2004."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1145\/1653662.1653678","volume-title":"Proc. of CCS'09","author":"Chase M.","year":"2009","unstructured":"M. Chase and S. S. Chow . Improving privacy and security in multi-authority attribute-based encryption . In Proc. of CCS'09 , New York, NY, USA , pages 121 -- 130 . ACM Press . 2009 . 10.1145\/1653662.1653678 M. Chase and S. S. Chow. Improving privacy and security in multi-authority attribute-based encryption. In Proc. of CCS'09, New York, NY, USA, pages 121--130. ACM Press. 2009. 10.1145\/1653662.1653678"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1145\/1315245.1315302","volume-title":"Proc. of CCS'07","author":"Cheung L.","year":"2007","unstructured":"L. Cheung and C. Newport . Provably secure ciphertext policy abe . In Proc. of CCS'07 , New York, NY, USA , pages 456 -- 465 . ACM Press . 2007 . 10.1145\/1315245.1315302 L. Cheung and C. Newport. Provably secure ciphertext policy abe. In Proc. of CCS'07, New York, NY, USA, pages 456--465. ACM Press. 2007. 10.1145\/1315245.1315302"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1145\/1180405.1180418","volume-title":"Proc. of CCS'06","author":"Goyal V.","year":"2006","unstructured":"V. Goyal , O. Pandey , A. Sahai , and B. Waters . Attribute-based encryption for fine-grained access control of encrypted data . In Proc. of CCS'06 , New York, NY, USA , pages 89 -- 98 . ACM Press . 2006 . 10.1145\/1180405.1180418 V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. In Proc. of CCS'06, New York, NY, USA, pages 89--98. ACM Press. 2006. 10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_7_1","series-title":"LNCS","first-page":"579","volume-title":"Proc. of ICALP'08","author":"Goyal V.","year":"2008","unstructured":"V. Goyal , A. Jain , O. Pandey , and A. Sahai . Bounded ciphertext policy attribute based encryption . In Proc. of ICALP'08 , volume 5126 of LNCS , pages 579 -- 591 . Springer Berlin-Heidelberg , 2008 . 10.1007\/978-3-540-70583-3_47 V. Goyal, A. Jain, O. Pandey, and A. Sahai. Bounded ciphertext policy attribute based encryption. In Proc. of ICALP'08, volume 5126 of LNCS, pages 579--591. Springer Berlin-Heidelberg, 2008. 10.1007\/978-3-540-70583-3_47"},{"key":"e_1_3_2_1_8_1","first-page":"179","volume-title":"Proc. of NDSS'07","author":"Kapadia A.","year":"2007","unstructured":"A. Kapadia , P. P. Tsang , and S. W. Smith . Attribute-based publishing with hidden credentials and hidden policies . In Proc. of NDSS'07 , San Diego , California, USA, February 28-March 2, pages 179 -- 192 . The Internet Society , 2007 . A. Kapadia, P. P. Tsang, and S. W. Smith. Attribute-based publishing with hidden credentials and hidden policies. In Proc. of NDSS'07, San Diego, California, USA, February 28-March 2, pages 179--192. The Internet Society, 2007."},{"key":"e_1_3_2_1_9_1","series-title":"LNCS","first-page":"146","volume-title":"Proc. of EUROCRYPT'08","author":"Katz J.","year":"2008","unstructured":"J. Katz , A. Sahai , and B. Waters . Predicate encryption supporting disjunctions, polynomial equations, and inner products . In Proc. of EUROCRYPT'08 , volume 4965 of LNCS , pages 146 -- 162 . Springer Berlin-Heidelberg , 2008 . J. Katz, A. Sahai, and B. Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In Proc. of EUROCRYPT'08, volume 4965 of LNCS, pages 146--162. Springer Berlin-Heidelberg, 2008."},{"key":"e_1_3_2_1_10_1","series-title":"LNCS","first-page":"62","volume-title":"Proc. of EUROCRYPT'10","author":"Lewko A.","year":"2010","unstructured":"A. Lewko , T. Okamoto , A. Sahai , K. Takashima , and B. Waters . Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption . In Proc. of EUROCRYPT'10 , volume 6110 of LNCS , pages 62 -- 91 . Springer Berlin-Heidelberg , 2010 . 10.1007\/978-3-642-13190-5_4 A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In Proc. of EUROCRYPT'10, volume 6110 of LNCS, pages 62--91. Springer Berlin-Heidelberg, 2010. 10.1007\/978-3-642-13190-5_4"},{"key":"e_1_3_2_1_11_1","series-title":"LNCS","first-page":"111","volume-title":"Proc. of ACNS'08","author":"Nishide T.","year":"2008","unstructured":"T. Nishide , K. Yoneyama , and K. Ohta . Abe with partially hidden encryptor-specified access structure . In Proc. of ACNS'08 , New York, USA , June 3-6, volume 5037 of LNCS , pages 111 -- 129 . Springer Berlin-Heidelberg , 2008 . T. Nishide, K. Yoneyama, and K. Ohta. Abe with partially hidden encryptor-specified access structure. In Proc. of ACNS'08, New York, USA, June 3-6, volume 5037 of LNCS, pages 111--129. Springer Berlin-Heidelberg, 2008."},{"key":"e_1_3_2_1_12_1","series-title":"LNCS","first-page":"347","volume-title":"Proc. of ISC'09, Pisa, Italy, September 7-9","author":"Li J.","year":"2009","unstructured":"J. Li , K. Ren , B. Zhu , and Z. Wan . Privacy-aware attribute-based encryption with user accountability . In Proc. of ISC'09, Pisa, Italy, September 7-9 , volume 5735 of LNCS , pages 347 -- 362 . Springer Berlin-Heidelberg , 2009 . 10.1007\/978-3-642-04474-8_28 J. Li, K. Ren, B. Zhu, and Z. Wan. Privacy-aware attribute-based encryption with user accountability. In Proc. of ISC'09, Pisa, Italy, September 7-9, volume 5735 of LNCS, pages 347--362. Springer Berlin-Heidelberg, 2009. 10.1007\/978-3-642-04474-8_28"},{"key":"e_1_3_2_1_13_1","series-title":"LNCS","first-page":"191","volume-title":"Proc. of CRYPTO'10","author":"Okamoto T.","year":"2010","unstructured":"T. Okamoto and K. Takashima . Fully secure functional encryption with general relations from the decisional linear assumption . In Proc. of CRYPTO'10 , volume 6223 of LNCS , pages 191 -- 208 . Springer Berlin-Heidelberg , 2010 . T. Okamoto and K. Takashima. Fully secure functional encryption with general relations from the decisional linear assumption. In Proc. of CRYPTO'10, volume 6223 of LNCS, pages 191--208. Springer Berlin-Heidelberg, 2010."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1145\/1315245.1315270","volume-title":"Proc. of CCS'07","author":"Ostrovsky R.","year":"2007","unstructured":"R. Ostrovsky , A. Sahai , and B. Waters . Attribute-based encryption with non-monotonic access structures . In Proc. of CCS'07 , New York , pages 195 -- 203 . ACM Press . 2007 . 10.1145\/1315245.1315270 R. Ostrovsky, A. Sahai, and B. Waters. Attribute-based encryption with non-monotonic access structures. In Proc. of CCS'07, New York, pages 195--203. ACM Press. 2007. 10.1145\/1315245.1315270"},{"key":"e_1_3_2_1_15_1","series-title":"LNCS","first-page":"557","volume-title":"Proc. of EUROCRYPT'05","author":"Sahai A.","year":"2005","unstructured":"A. Sahai and B. Waters . Fuzzy identity-based encryption . In Proc. of EUROCRYPT'05 , volume 3494 of LNCS , pages 557 -- 557 . Springer Berlin-Heidelberg , 2005 . 10.1007\/11426639_27 A. Sahai and B. Waters. Fuzzy identity-based encryption. In Proc. of EUROCRYPT'05, volume 3494 of LNCS, pages 557--557. Springer Berlin-Heidelberg, 2005. 10.1007\/11426639_27"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.29"},{"key":"e_1_3_2_1_17_1","series-title":"LNCS","first-page":"53","volume-title":"Proc. of PKC'11","author":"Waters B.","year":"2011","unstructured":"B. Waters . Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization . In Proc. of PKC'11 , volume 6571 of LNCS , pages 53 -- 70 . Springer Berlin-Heidelberg , 2011 . B. Waters. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Proc. of PKC'11, volume 6571 of LNCS, pages 53--70. Springer Berlin-Heidelberg, 2011."},{"key":"e_1_3_2_1_18_1","series-title":"LNCS","first-page":"71","volume-title":"Proc. of PKC'11","author":"Yamada S.","year":"2011","unstructured":"S. Yamada , N. Attrapadung , G. Hanaoka , and N. Kunihiro . Generic constructions for chosen-ciphertext secure attribute based encryption . In Proc. of PKC'11 , volume 6571 of LNCS , pages 71 -- 89 . Springer Berlin-Heidelberg , 2011 . S. Yamada, N. Attrapadung, G. Hanaoka, and N. Kunihiro. Generic constructions for chosen-ciphertext secure attribute based encryption. In Proc. of PKC'11, volume 6571 of LNCS, pages 71--89. Springer Berlin-Heidelberg, 2011."},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. of NPSec'08","author":"Yu S.","year":"2008","unstructured":"S. Yu , K. Ren , and W. Lou . Attribute-based content distribution with hidden policy . In Proc. of NPSec'08 , Orlando, Florida, USA, pages 39--44. 2008 . S. Yu, K. Ren, and W. Lou. Attribute-based content distribution with hidden policy. In Proc. of NPSec'08, Orlando, Florida, USA, pages 39--44. 2008."},{"key":"e_1_3_2_1_20_1","series-title":"LNCS","first-page":"311","volume-title":"Proc. of Securecomm'09, Athens, Greece, September 14-17","author":"Yu S.","year":"2009","unstructured":"S. Yu , K. Ren , W. Lou , and J. Li . Defending against key abuse attacks in kp-abe enabled broadcast systems . In Proc. of Securecomm'09, Athens, Greece, September 14-17 , volume 19 of LNCS , pages 311 -- 329 . Springer Berlin-Heidelberg , 2009 . S. Yu, K. Ren, W. Lou, and J. Li. Defending against key abuse attacks in kp-abe enabled broadcast systems. In Proc. of Securecomm'09, Athens, Greece, September 14-17, volume 19 of LNCS, pages 311--329. Springer Berlin-Heidelberg, 2009."},{"key":"e_1_3_2_1_21_1","first-page":"261","volume-title":"Proc. of ASIACCS'10","author":"Yu S.","year":"2010","unstructured":"S. Yu , C. Wang , K. Ren , and W. Lou . Attribute based data sharing with attribute revocation . In Proc. of ASIACCS'10 , New York, NY, USA , pages 261 -- 270 . ACM Press . 2010 . 10.1145\/1755688.1755720 S. Yu, C. Wang, K. Ren, and W. Lou. Attribute based data sharing with attribute revocation. In Proc. of ASIACCS'10, New York, NY, USA, pages 261--270. ACM Press. 2010. 10.1145\/1755688.1755720"}],"event":{"name":"ASIA CCS '13: 8th ACM Symposium on Information, Computer and Communications Security","location":"Hangzhou China","acronym":"ASIA CCS '13","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2484313.2484381","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2484313.2484381","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:19Z","timestamp":1750235959000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2484313.2484381"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,8]]},"references-count":21,"alternative-id":["10.1145\/2484313.2484381","10.1145\/2484313"],"URL":"https:\/\/doi.org\/10.1145\/2484313.2484381","relation":{},"subject":[],"published":{"date-parts":[[2013,5,8]]},"assertion":[{"value":"2013-05-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}