{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:13:01Z","timestamp":1750306381538,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,30]],"date-time":"2016-05-30T00:00:00Z","timestamp":1464566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Key Techniques for Privacy Preserving Cloud User Data, National High Technology Research and Development Program of China","award":["2015AA016008"],"award-info":[{"award-number":["2015AA016008"]}]},{"name":"Data Privacy Preserving System for Financial Information Security, International Exchange and Cooperation Foundation of Shenzhen City, China","award":["GJHZ20140422173959303"],"award-info":[{"award-number":["GJHZ20140422173959303"]}]},{"name":"Guangdong Provincial Key Laboratory of High Performance Computing","award":["[2013]82"],"award-info":[{"award-number":["[2013]82"]}]},{"name":"Distinguished Young Scholars Fund of Department of Education","award":["Yq2013126"],"award-info":[{"award-number":["Yq2013126"]}]},{"name":"Natural Science Foundation of Guangdong Province for Distinguished Young Scholars","award":["2014A030306020"],"award-info":[{"award-number":["2014A030306020"]}]},{"name":"Attribute-Based Encryption with Security Mediator, National Natural Science Foundation of China","award":["61402136"],"award-info":[{"award-number":["61402136"]}]},{"name":"Attributed-Based Encryption with User Revocation, Natural Science Foundation of Guangdong Province, China","award":["2014A030313697"],"award-info":[{"award-number":["2014A030313697"]}]},{"name":"Secure Storage for Sensitive Data in Cloud Computing","award":["61472091"],"award-info":[{"award-number":["61472091"]}]},{"name":"Research on Post-processing for High-speed Quantum Key Distribution, Natural Science Foundation of Guangdong Province, China","award":["2014A030310205"],"award-info":[{"award-number":["2014A030310205"]}]},{"name":"Efficient Post-processing for High-speed Quantum key Distribution Using Polar Codes and Combinatorial Group Testing, National Natural Science Foundation of China","award":["61401176"],"award-info":[{"award-number":["61401176"]}]},{"name":"Public Service Platform of Mobile Internet Application Security Industry of Shenzhen Development and Reform Commission","award":["[2012]900"],"award-info":[{"award-number":["[2012]900"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,30]]},"DOI":"10.1145\/2897845.2897919","type":"proceedings-article","created":{"date-parts":[[2016,5,27]],"date-time":"2016-05-27T12:37:36Z","timestamp":1464352656000},"page":"889-894","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Generic Construction of Publicly Verifiable Predicate Encryption"],"prefix":"10.1145","author":[{"given":"Chuting","family":"Tan","sequence":"first","affiliation":[{"name":"Harbin Institute of Technology Shenzhen Graduate School, Shenzhen, China"}]},{"given":"Zoe L.","family":"Jiang","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology Shenzhen Graduate School &amp; Guangdong Provincial Key Laboratory of High Performance Computing, Shenzhen, China"}]},{"given":"Xuan","family":"Wang","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology Shenzhen Graduate School, Shenzhen, China"}]},{"given":"S.M.","family":"Yiu","sequence":"additional","affiliation":[{"name":"The University of Hong Kong, Hong Kong, Hong Kong"}]},{"given":"Junbin","family":"Fang","sequence":"additional","affiliation":[{"name":"Jinan University, Guangzhou, China"}]},{"given":"Jin","family":"Li","sequence":"additional","affiliation":[{"name":"Guangzhou University, Guangzhou, China"}]},{"given":"Yabin","family":"Jin","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology Shenzhen Graduate School, Shenzhen, China"}]},{"given":"Jiajun","family":"Huang","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology Shenzhen Graduate School, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2016,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_13"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28914-9_24"},{"key":"e_1_3_2_1_4_1","unstructured":"S. Benabbas R. Gennaro and Y. Vahlis. Verifiable delegation of computation over large datasets. Advances in Cryptology (CRYPTO'11) 6841.   S. Benabbas R. Gennaro and Y. Vahlis. Verifiable delegation of computation over large datasets. Advances in Cryptology (CRYPTO'11) 6841."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_13"},{"key":"e_1_3_2_1_7_1","volume-title":"Public key encryption with keyword search. Advances in Cryptology-Eurocrypt","author":"Boneh D.","year":"2004","unstructured":"D. Boneh , G. D. Crescenzo , and R. Ostrovsky . Public key encryption with keyword search. Advances in Cryptology-Eurocrypt 2004 , 3017. D. Boneh, G. D. Crescenzo, and R. Ostrovsky. Public key encryption with keyword search. Advances in Cryptology-Eurocrypt 2004, 3017."},{"key":"e_1_3_2_1_8_1","unstructured":"D. Boneh and M. Franklin. Identity-based encryption from the weil pairing. Advances in Cryptology(CRYPTO'01) 2139.   D. Boneh and M. Franklin. Identity-based encryption from the weil pairing. Advances in Cryptology(CRYPTO'01) 2139."},{"key":"e_1_3_2_1_9_1","unstructured":"D. Boneh and B. Waters. Conjunctive subset and range queries on encrypted data. Theory of cryptography 4392.   D. Boneh and B. Waters. Conjunctive subset and range queries on encrypted data. Theory of cryptography 4392."},{"key":"e_1_3_2_1_10_1","volume-title":"cloud: A database-as-a-service for the cloud","author":"Curino C.","year":"2011","unstructured":"C. Curino , E. P. C. Jones , R. A. Popa , N. Malviya , E. Wu , S. Madden , H. Balakrishnan , and N. Z. Relational . cloud: A database-as-a-service for the cloud . 2011 . C. Curino, E. P. C. Jones, R. A. Popa, N. Malviya, E. Wu, S. Madden, H. Balakrishnan, and N. Z. Relational. cloud: A database-as-a-service for the cloud. 2011."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660366"},{"key":"e_1_3_2_1_12_1","unstructured":"R. Gennaro C. Gentry and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. Advances in Cryptology(CRYPTO'10) 6223.   R. Gennaro C. Gentry and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. Advances in Cryptology(CRYPTO'10) 6223."},{"key":"e_1_3_2_1_13_1","volume-title":"Predicate encryption for circuits from lwe. Theory of cryptography, page 29","author":"Gorbunov S.","year":"2015","unstructured":"S. Gorbunov , V. Vaikuntanathan , and H. Wee . Predicate encryption for circuits from lwe. Theory of cryptography, page 29 , 2015 . S. Gorbunov, V. Vaikuntanathan, and H. Wee. Predicate encryption for circuits from lwe. Theory of cryptography, page 29, 2015."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564717"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14992-4_13"},{"key":"e_1_3_2_1_17_1","volume-title":"Predicate encryption supporting disjunctions, polynomial equations, and inner products. Advances in Cryptology-EUROCRYPT","author":"Katz J.","year":"2008","unstructured":"J. Katz , A. Sahai , and B. Waters . Predicate encryption supporting disjunctions, polynomial equations, and inner products. Advances in Cryptology-EUROCRYPT 2008 , 4965. J. Katz, A. Sahai, and B. Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. Advances in Cryptology-EUROCRYPT 2008, 4965."},{"key":"e_1_3_2_1_18_1","unstructured":"J. Kilian. Improved efficient arguments. Advances in Cryptology (CRyPTO'95) 963.   J. Kilian. Improved efficient arguments. Advances in Cryptology (CRyPTO'95) 963."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.94"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.47"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.29"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/882494.884426"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962452"}],"event":{"name":"ASIA CCS '16: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Xi'an China","acronym":"ASIA CCS '16"},"container-title":["Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897845.2897919","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2897845.2897919","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:01Z","timestamp":1750223221000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897845.2897919"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,30]]},"references-count":23,"alternative-id":["10.1145\/2897845.2897919","10.1145\/2897845"],"URL":"https:\/\/doi.org\/10.1145\/2897845.2897919","relation":{},"subject":[],"published":{"date-parts":[[2016,5,30]]},"assertion":[{"value":"2016-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}