{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T11:47:35Z","timestamp":1773834455043,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,30]],"date-time":"2016-05-30T00:00:00Z","timestamp":1464566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"China Scholarship Council"},{"name":"Research Fund for the Doctoral Program of Higher Education of China","award":["20134401110011"],"award-info":[{"award-number":["20134401110011"]}]},{"name":"National Science Foundation of China","award":["61272413 61133014 61472083 61272415 61472165"],"award-info":[{"award-number":["61272413 61133014 61472083 61272415 61472165"]}]},{"name":"Foundation for Distinguished Young Talents in Higher Education of Guangdong","award":["2012LYM 0027"],"award-info":[{"award-number":["2012LYM 0027"]}]},{"name":"the Fundamental Research Funds for the Central Universities","award":["11613106"],"award-info":[{"award-number":["11613106"]}]},{"name":"Program for New Century Excellent Talents in University","award":["NCET-12-0680"],"award-info":[{"award-number":["NCET-12-0680"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,30]]},"DOI":"10.1145\/2897845.2897879","type":"proceedings-article","created":{"date-parts":[[2016,5,27]],"date-time":"2016-05-27T12:37:36Z","timestamp":1464352656000},"page":"247-255","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":41,"title":["Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security"],"prefix":"10.1145","author":[{"given":"Kai","family":"He","sequence":"first","affiliation":[{"name":"Jinan University, Guangzhou , China"}]},{"given":"Jian","family":"Weng","sequence":"additional","affiliation":[{"name":"Jinan University, Guangzhou, China"}]},{"given":"Jia-Nan","family":"Liu","sequence":"additional","affiliation":[{"name":"Jinan University, Guangzhou, China"}]},{"given":"Joseph K.","family":"Liu","sequence":"additional","affiliation":[{"name":"Monash University, Clayton, Australia"}]},{"given":"Wei","family":"Liu","sequence":"additional","affiliation":[{"name":"Jinan University, Guangzhou, China"}]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2016,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_13"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30580-4_26"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11889663_4"},{"key":"e_1_3_2_1_4_1","first-page":"566","volume-title":"7th International Conference on the Theory and Application of Cryptology and Information Security","author":"Bellare M.","year":"2001","unstructured":"M. Bellare , A. Boldyreva , A. Desai , and D. Pointcheval . Key-privacy in public-key encryption. In Advances in Cryptology - ASIACRYPT 2001 , 7th International Conference on the Theory and Application of Cryptology and Information Security , Gold Coast, Australia , December 9-13, 2001 , Proceedings, pages 566 -- 582 , 2001. M. Bellare, A. Boldyreva, A. Desai, and D. Pointcheval. Key-privacy in public-key encryption. In Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pages 566--582, 2001."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/646763.706331"},{"key":"e_1_3_2_1_6_1","volume-title":"Hierarchical identity based encryption with constant size ciphertext. IACR Cryptology ePrint Archive","author":"Boneh D.","year":"2005","unstructured":"D. Boneh , X. Boyen , and E. Goh . Hierarchical identity based encryption with constant size ciphertext. IACR Cryptology ePrint Archive , 2005 :15, 2005. http:\/\/eprint.iacr.org\/2005\/015. D. Boneh, X. Boyen, and E. Goh. Hierarchical identity based encryption with constant size ciphertext. IACR Cryptology ePrint Archive, 2005:15, 2005. http:\/\/eprint.iacr.org\/2005\/015."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_16"},{"key":"e_1_3_2_1_8_1","volume-title":"USA","author":"Boneh D.","year":"2014","unstructured":"D. Boneh , B. Waters , and M. Zhandry . Low overhead broadcast encryption from multilinear maps. In Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA , USA , August 17-21, 2014 , Proceedings, Part I, pages 206--223 , 2014. D. Boneh, B. Waters, and M. Zhandry. Low overhead broadcast encryption from multilinear maps. In Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I, pages 206--223, 2014."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_17"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00468-1_12"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2011.5983948"},{"key":"e_1_3_2_1_12_1","first-page":"200","volume-title":"13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007","author":"Delerabl\u00e9e C.","year":"2007","unstructured":"C. Delerabl\u00e9e . Identity-based broadcast encryption with constant size ciphertexts and private keys. In Advances in Cryptology - ASIACRYPT 2007 , 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007 , Proceedings , pages 200 -- 215 , 2007 . C. Delerabl\u00e9e. Identity-based broadcast encryption with constant size ciphertexts and private keys. In Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pages 200--215, 2007."},{"key":"e_1_3_2_1_13_1","first-page":"39","volume-title":"First International Conference","author":"Delerabl\u00e9e C.","year":"2007","unstructured":"C. Delerabl\u00e9e , P. Paillier , and D. Pointcheval . Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. In Pairing-Based Cryptography - Pairing 2007 , First International Conference , Tokyo, Japan , July 2-4, 2007 , Proceedings, pages 39 -- 59 , 2007. C. Delerabl\u00e9e, P. Paillier, and D. Pointcheval. Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. In Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings, pages 39--59, 2007."},{"key":"e_1_3_2_1_14_1","first-page":"61","volume-title":"DRM 2002","author":"Dodis Y.","year":"2002","unstructured":"Y. Dodis and N. Fazio . Public key broadcast encryption for stateless receivers. In Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop , DRM 2002 , Washington, DC, USA , November 18, 2002 , Revised Papers, pages 61 -- 80 , 2002. Y. Dodis and N. Fazio. Public key broadcast encryption for stateless receivers. In Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers, pages 61--80, 2002."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/103418.103474"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_14"},{"key":"e_1_3_2_1_17_1","first-page":"480","volume-title":"Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993","author":"Fiat A.","year":"1993","unstructured":"A. Fiat and M. Naor . Broadcast encryption . In Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993 , Proceedings , pages 480 -- 491 , 1993 . A. Fiat and M. Naor. Broadcast encryption. In Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings, pages 480--491, 1993."},{"key":"e_1_3_2_1_18_1","first-page":"171","volume-title":"28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings","author":"Gentry C.","year":"2009","unstructured":"C. Gentry and B. Waters . Adaptive security in broadcast encryption systems (with short ciphertexts). In Advances in Cryptology - EUROCRYPT 2009 , 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings , pages 171 -- 188 , 2009 . C. Gentry and B. Waters. Adaptive security in broadcast encryption systems (with short ciphertexts). In Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, pages 171--188, 2009."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41674-3_62"},{"key":"e_1_3_2_1_20_1","first-page":"146","volume-title":"27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings","author":"Katz J.","year":"2008","unstructured":"J. Katz , A. Sahai , and B. Waters . Predicate encryption supporting disjunctions, polynomial equations, and inner products. In Advances in Cryptology - EUROCRYPT 2008 , 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings , pages 146 -- 162 , 2008 . J. Katz, A. Sahai, and B. Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings, pages 146--162, 2008."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2388156"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34883-9_12"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_13"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.906878"},{"issue":"2","key":"e_1_3_2_1_25_1","first-page":"71","article-title":"Adaptively secure broadcast encryption with short ciphertexts","volume":"14","author":"Malek B.","year":"2012","unstructured":"B. Malek and A. Miri . Adaptively secure broadcast encryption with short ciphertexts . I. J. Network Security , 14 ( 2 ): 71 -- 79 , 2012 . B. Malek and A. Miri. Adaptively secure broadcast encryption with short ciphertexts. I. J. Network Security, 14(2):71--79, 2012.","journal-title":"I. J. Network Security"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704277"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100273"},{"key":"e_1_3_2_1_28_1","first-page":"433","volume-title":"Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991","author":"Rackoff C.","year":"1991","unstructured":"C. Rackoff and D. R. Simon . Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack . In Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991 , Proceedings , pages 433 -- 444 , 1991 . C. Rackoff and D. R. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings, pages 433--444, 1991."},{"issue":"4","key":"e_1_3_2_1_29_1","first-page":"256","article-title":"Fully anonymous identity-based broadcast encryption without random oracles","volume":"16","author":"Ren Y.","year":"2014","unstructured":"Y. Ren , Z. Niu , and X. Zhang . Fully anonymous identity-based broadcast encryption without random oracles . I. J. Network Security , 16 ( 4 ): 256 -- 264 , 2014 . Y. Ren, Z. Niu, and X. Zhang. Fully anonymous identity-based broadcast encryption without random oracles. I. J. Network Security, 16(4):256--264, 2014.","journal-title":"I. J. Network Security"},{"key":"e_1_3_2_1_30_1","first-page":"47","volume-title":"Proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984","author":"Shamir A.","year":"1984","unstructured":"A. Shamir . Identity-based cryptosystems and signature schemes. In Advances in Cryptology , Proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984 , Proceedings , pages 47 -- 53 , 1984 . A. Shamir. Identity-based cryptosystems and signature schemes. In Advances in Cryptology, Proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings, pages 47--53, 1984."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.4018\/ijdcf.2014040103"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJIIDS.2013.056386"},{"key":"e_1_3_2_1_33_1","first-page":"258","volume-title":"CSS 2013, Zhangjiajie, China, November 13-15, 2013","author":"Zhang L.","year":"2013","unstructured":"L. Zhang , Q. Wu , and Y. Mu . Anonymous identity-based broadcast encryption with adaptive security. In Cyberspace Safety and Security - 5th International Symposium , CSS 2013, Zhangjiajie, China, November 13-15, 2013 , Proceedings , pages 258 -- 271 , 2013 . L. Zhang, Q. Wu, and Y. Mu. Anonymous identity-based broadcast encryption with adaptive security. In Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings, pages 258--271, 2013."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221893"}],"event":{"name":"ASIA CCS '16: ACM Asia Conference on Computer and Communications Security","location":"Xi'an China","acronym":"ASIA CCS '16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897845.2897879","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2897845.2897879","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:01Z","timestamp":1750223221000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897845.2897879"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,30]]},"references-count":34,"alternative-id":["10.1145\/2897845.2897879","10.1145\/2897845"],"URL":"https:\/\/doi.org\/10.1145\/2897845.2897879","relation":{},"subject":[],"published":{"date-parts":[[2016,5,30]]},"assertion":[{"value":"2016-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}