{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:34:18Z","timestamp":1772908458724,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF Award","award":["CNS-1445424"],"award-info":[{"award-number":["CNS-1445424"]}]},{"name":"ERC Project aSCEND","award":["H2020 639554"],"award-info":[{"award-number":["H2020 639554"]}]},{"name":"Google PhD Fellowship"},{"name":"ONR","award":["Grants N000141210914"],"award-info":[{"award-number":["Grants N000141210914"]}]},{"name":"ONR","award":["N000141512750"],"award-info":[{"award-number":["N000141512750"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134088","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"647-664","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Attribute-Based Encryption in the Generic Group Model"],"prefix":"10.1145","author":[{"given":"Miguel","family":"Ambrona","sequence":"first","affiliation":[{"name":"IMDEA Software Institute &amp; Universidad Politecnica de Madrid, Madrid, Spain"}]},{"given":"Gilles","family":"Barthe","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain"}]},{"given":"Romain","family":"Gay","sequence":"additional","affiliation":[{"name":"ENS, Paris, France"}]},{"given":"Hoeteck","family":"Wee","sequence":"additional","affiliation":[{"name":"CNRS &amp; ENS, Paris, France"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","unstructured":"M. Abe G. Fuchsbauer J. Groth K. Haralambiev and M. Ohkubo. Structure-preserving signatures and commitments to group elements. In T. Rabin editor CRYPTO 2010 volume 6223 of LNCS pages 209--236. Springer Heidelberg Aug. 2010. 10.1007\/978-3-642-14623-7_12","DOI":"10.1007\/978-3-642-14623-7_12"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","unstructured":"M. Abe J. Groth K. Haralambiev and M. Ohkubo. Optimal structure-preserving signatures in asymmetric bilinear groups. In P. Rogaway editor CRYPTO 2011 volume 6841 of LNCS pages 649--666. Springer Heidelberg Aug. 2011. 10.1007\/978-3-642-22792-9_37","DOI":"10.1007\/978-3-642-22792-9_37"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","unstructured":"M. Abe J. Groth and M. Ohkubo. Separating short structure-preserving signatures from non-interactive assumptions. In D. H. Lee and X. Wang editors ASIACRYPT 2011 volume 7073 of LNCS pages 628--646. Springer Heidelberg Dec. 2011. 10.1007\/978-3-642-25385-0_34","DOI":"10.1007\/978-3-642-25385-0_34"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","unstructured":"M. Abe J. Groth M. Ohkubo and M. Tibouchi. Unified minimal and selectively randomizable structure-preserving signatures. In Y. Lindell editor TCC 2014 volume 8349 of LNCS pages 688--712. Springer Heidelberg Feb. 2014. 10.1007\/978-3-642-54242-8_29","DOI":"10.1007\/978-3-642-54242-8_29"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"S. Agrawal and M. Chase. A study of pair encodings: Predicate encryption in prime order groups. In E. Kushilevitz and T. Malkin editors TCC 2016-A Part II volume 9563 of LNCS pages 259--288. Springer Heidelberg Jan. 2016.","DOI":"10.1007\/978-3-662-49099-0_10"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56620-7_22"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0057-3"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516718"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046628"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_29"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_2"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"N. Attrapadung. Dual system encryption via doubly selective security: Framework fully secure functional encryption for regular languages and more. In P. Q. Nguyen and E. Oswald editors EUROCRYPT 2014 volume 8441 of LNCS pages 557--577. Springer Heidelberg May 2014.","DOI":"10.1007\/978-3-642-55220-5_31"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","unstructured":"N. Attrapadung. Dual system encryption framework in prime-order groups via computational pair encodings. In J. H. Cheon and T. Takagi editors ASIACRYPT 2016 Part II volume 10032 of LNCS pages 591--623. Springer Heidelberg Dec. 2016. 10.1007\/978-3-662-53890-6_20","DOI":"10.1007\/978-3-662-53890-6_20"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","unstructured":"N. Attrapadung B. Libert and E. de Panafieu. Expressive key-policy attribute-based encryption with constant-size ciphertexts. In D. Catalano N. Fazio R. Gennaro and A. Nicolosi editors PKC 2011 volume 6571 of LNCS pages 90--108. Springer Heidelberg Mar. 2011. 10.1007\/978-3-642-19379-8_6","DOI":"10.1007\/978-3-642-19379-8_6"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592585"},{"key":"e_1_3_2_2_16_1","volume-title":"Practical functional encryption for bilinear forms. IACR Cryptology ePrint Archive","author":"Baltico C. E. Z.","year":"2016","unstructured":"C. E. Z. Baltico, D. Catalano, and D. Fiore. Practical functional encryption for bilinear forms. IACR Cryptology ePrint Archive, 2016:1104, 2016."},{"key":"e_1_3_2_2_17_1","volume-title":"Practical functional encryption for quadratic functions with applications to predicate encryption. IACR Cryptology ePrint Archive","author":"Baltico C. E. Z.","year":"2017","unstructured":"C. E. Z. Baltico, D. Catalano, D. Fiore, and R. Gay. Practical functional encryption for quadratic functions with applications to predicate encryption. IACR Cryptology ePrint Archive, 2017:151, 2017."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.112"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25984-8_29"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","unstructured":"G. Barthe E. Fagerholm D. Fiore J. C. Mitchell A. Scedrov and B. Schmidt. Automated analysis of cryptographic assumptions in generic group models. In J. A. Garay and R. Gennaro editors CRYPTO 2014 Part I volume 8616 of LNCS pages 95--112. Springer Heidelberg Aug. 2014. 10.1007\/978-3-662-44371-2_6","DOI":"10.1007\/978-3-662-44371-2_6"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"G. Barthe E. Fagerholm D. Fiore A. Scedrov B. Schmidt and M. Tibouchi. Strongly-optimal structure preserving signatures from type II pairings: Synthesis and lower bounds. In J. Katz editor Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography Gaithersburg MD USA March 30 - April 1 2015 Proceedings volume 9020 of Lecture Notes in Computer Science pages 355--376. Springer 2015.","DOI":"10.1007\/978-3-662-46447-2_16"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"G. Barthe E. Fagerholm D. Fiore A. Scedrov B. Schmidt and M. Tibouchi. Strongly-optimal structure preserving signatures from type II pairings: Synthesis and lower bounds. In J. Katz editor PKC 2015 volume 9020 of LNCS pages 355--376. Springer Heidelberg Mar. \/ Apr. 2015.","DOI":"10.1007\/978-3-662-46447-2_16"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","unstructured":"G. Barthe B. Gr\u00e9goire S. Heraud and S. Zanella B\u00e9guelin. Computer-aided security proofs for the working cryptographer. In P. Rogaway editor CRYPTO 2011 volume 6841 of LNCS pages 71--90. Springer Heidelberg Aug. 2011. 10.1007\/978-3-642-22792-9_5","DOI":"10.1007\/978-3-642-22792-9_5"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813697"},{"key":"e_1_3_2_2_25_1","volume-title":"Technion - Israel Institute of Technology","author":"Beimel A.","year":"1996","unstructured":"A. Beimel. Secure Schemes for Secret Sharing and Key Distribution. Ph.D., Technion - Israel Institute of Technology, 1996."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","unstructured":"D. Boneh and X. Boyen. Efficient selective-ID secure identity based encryption without random oracles. In C. Cachin and J. Camenisch editors EUROCRYPT 2004 volume 3027 of LNCS pages 223--238. Springer Heidelberg May 2004. 10.1007\/978-3-540-24676-3_14","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","unstructured":"D. Boneh and X. Boyen. Secure identity based encryption without random oracles. In M. Franklin editor CRYPTO 2004 volume 3152 of LNCS pages 443--459. Springer Heidelberg Aug. 2004. 10.1007\/978-3-540-28628-8_27","DOI":"10.1007\/978-3-540-28628-8_27"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","unstructured":"D. Boneh X. Boyen and E.-J. Goh. Hierarchical identity based encryption with constant size ciphertext. In R. Cramer editor EUROCRYPT 2005 volume 3494 of LNCS pages 440--456. Springer Heidelberg May 2005. 10.1007\/11426639_26","DOI":"10.1007\/11426639_26"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","unstructured":"D. Boneh and M. K. Franklin. Identity-based encryption from the Weil pairing. In J. Kilian editor CRYPTO 2001 volume 2139 of LNCS pages 213--229. Springer Heidelberg Aug. 2001. 10.1007\/3-540-44647-8_13","DOI":"10.1007\/3-540-44647-8_13"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"X. Boyen. Miniature CCA2 PK encryption: Tight security without redundancy. In K. Kurosawa editor ASIACRYPT 2007 volume 4833 of LNCS pages 485--501. Springer Heidelberg Dec. 2007.","DOI":"10.1007\/978-3-540-76900-2_30"},{"key":"e_1_3_2_2_32_1","series-title":"LNCS","first-page":"39","volume-title":"PAIRING","author":"Boyen X.","year":"2008","unstructured":"X. Boyen. The uber-assumption family (invited talk). In S. D. Galbraith and K. G. Paterson, editors, PAIRING 2008, volume 5209 of LNCS, pages 39--56. Springer, Heidelberg, Sept. 2008."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","unstructured":"E. Brier J.-S. Coron T. Icart D. Madore H. Randriam and M. Tibouchi. Efficient indifferentiable hashing into ordinary elliptic curves. In T. Rabin editor CRYPTO 2010 volume 6223 of LNCS pages 237--254. Springer Heidelberg Aug. 2010. 10.1007\/978-3-642-14623-7_13","DOI":"10.1007\/978-3-642-14623-7_13"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"crossref","unstructured":"M. Chase and S. Meiklejohn. D\u00e9j\u00e0 Q: Using dual systems to revisit q-type assumptions. In P. Q. Nguyen and E. Oswald editors EUROCRYPT 2014 volume 8441 of LNCS pages 622--639. Springer Heidelberg May 2014.","DOI":"10.1007\/978-3-642-55220-5_34"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","unstructured":"S. Chatterjee and A. Menezes. Type 2 structure-preserving signature schemes revisited. In T. Iwata and J. H. Cheon editors ASIACRYPT 2015 Part I volume 9452 of LNCS pages 286--310. Springer Heidelberg Nov. \/ Dec. 2015. 10.1007\/978-3-662-48797-6_13","DOI":"10.1007\/978-3-662-48797-6_13"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","unstructured":"J. Chen R. Gay and H. Wee. Improved dual system ABE in prime-order groups via predicate encodings. In E. Oswald and M. Fischlin editors EUROCRYPT 2015 Part II volume 9057 of LNCS pages 595--624. Springer Heidelberg Apr. 2015. 10.1007\/978-3-662-46803-6_20","DOI":"10.1007\/978-3-662-46803-6_20"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"crossref","unstructured":"J. Chen and H. Wee. Fully (almost) tightly secure IBE and dual system groups. In R. Canetti and J. A. Garay editors CRYPTO 2013 Part II volume 8043 of LNCS pages 435--460. Springer Heidelberg Aug. 2013.","DOI":"10.1007\/978-3-642-40084-1_25"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45325-3_32"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","unstructured":"C. Gentry. Practical identity-based encryption without random oracles. In S. Vaudenay editor EUROCRYPT 2006 volume 4004 of LNCS pages 445--464. Springer Heidelberg May \/ June 2006. 10.1007\/11761679_27","DOI":"10.1007\/11761679_27"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_22"},{"key":"e_1_3_2_2_43_1","volume-title":"California","author":"Hamburg M.","year":"2011","unstructured":"M. Hamburg. Spatial Encryption. Ph.D. Thesis, Stanford University, California, 2011."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491224.2491237"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCT.1993.336536"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","unstructured":"J. Katz A. Sahai and B. Waters. Predicate encryption supporting disjunctions polynomial equations and inner products. In N. P. Smart editor EUROCRYPT 2008 volume 4965 of LNCS pages 146--162. Springer Heidelberg Apr. 2008. 10.1007\/978-3-540-78967-3_9","DOI":"10.1007\/978-3-540-78967-3_9"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"crossref","unstructured":"A. B. Lewko T. Okamoto A. Sahai K. Takashima and B. Waters. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In H. Gilbert editor EUROCRYPT 2010 volume 6110 of LNCS pages 62--91. Springer Heidelberg May 2010.","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","unstructured":"A. B. Lewko and B. Waters. New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In D. Micciancio editor TCC 2010 volume 5978 of LNCS pages 455--479. Springer Heidelberg Feb. 2010. 10.1007\/978-3-642-11799-2_27","DOI":"10.1007\/978-3-642-11799-2_27"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","unstructured":"A. B. Lewko and B. Waters. Unbounded HIBE and attribute-based encryption. In K. G. Paterson editor EUROCRYPT 2011 volume 6632 of LNCS pages 547--567. Springer Heidelberg May 2011. 10.1007\/978-3-642-20465-4_30","DOI":"10.1007\/978-3-642-20465-4_30"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755697"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/11586821_1"},{"key":"e_1_3_2_2_52_1","volume-title":"New explicit conditions of elliptic curve traces for fr-reduction","author":"Miyaji A.","year":"2001","unstructured":"A. Miyaji, M. Nakabayashi, and S. TAKANO. New explicit conditions of elliptic curve traces for fr-reduction, 2001."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02113297"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","unstructured":"T. Okamoto and K. Takashima. Hierarchical predicate encryption for inner-products. In M. Matsui editor ASIACRYPT 2009 volume 5912 of LNCS pages 214--231. Springer Heidelberg Dec. 2009. 10.1007\/978-3-642-10366-7_13","DOI":"10.1007\/978-3-642-10366-7_13"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","unstructured":"T. Okamoto and K. Takashima. Fully secure functional encryption with general relations from the decisional linear assumption. In T. Rabin editor CRYPTO 2010 volume 6223 of LNCS pages 191--208. Springer Heidelberg Aug. 2010. 10.1007\/978-3-642-14623-7_11","DOI":"10.1007\/978-3-642-14623-7_11"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"crossref","unstructured":"T. Okamoto and K. Takashima. Adaptively attribute-hiding (hierarchical) inner product encryption. In D. Pointcheval and T. Johansson editors EUROCRYPT 2012 volume 7237 of LNCS pages 591--608. Springer Heidelberg Apr. 2012.","DOI":"10.1007\/978-3-642-29011-4_35"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516672"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","unstructured":"A. Sahai and B. R. Waters. Fuzzy identity-based encryption. In R. Cramer editor EUROCRYPT 2005 volume 3494 of LNCS pages 457--473. Springer Heidelberg May 2005. 10.1007\/11426639_27","DOI":"10.1007\/11426639_27"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"crossref","unstructured":"A. Shamir. Identity-based cryptosystems and signature schemes. In G. R. Blakley and D. Chaum editors CRYPTO'84 volume 196 of LNCS pages 47--53. Springer Heidelberg Aug. 1984.","DOI":"10.1007\/3-540-39568-7_5"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","unstructured":"V. Shoup. Lower bounds for discrete logarithms and related problems. In W. Fumy editor EUROCRYPT'97 volume 1233 of LNCS pages 256--266. Springer Heidelberg May 1997. 10.1007\/3-540-69053-0_18","DOI":"10.1007\/3-540-69053-0_18"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"crossref","unstructured":"B. Waters. Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. In S. Halevi editor CRYPTO 2009 volume 5677 of LNCS pages 619--636. Springer Heidelberg Aug. 2009.","DOI":"10.1007\/978-3-642-03356-8_36"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"crossref","unstructured":"B. Waters. Ciphertext-policy attribute-based encryption: An expressive efficient and provably secure realization. In D. Catalano N. Fazio R. Gennaro and A. Nicolosi editors PKC 2011 volume 6571 of LNCS pages 53--70. Springer Heidelberg Mar. 2011.","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","unstructured":"H. Wee. Dual system encryption via predicate encodings. In Y. Lindell editor TCC 2014 volume 8349 of LNCS pages 616--637. Springer Heidelberg Feb. 2014. 10.1007\/978-3-642-54242-8_26","DOI":"10.1007\/978-3-642-54242-8_26"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"crossref","unstructured":"H. Wee. D\u00e9j\u00e0 Q: Encore! Un petit IBE. In E. Kushilevitz and T. Malkin editors TCC 2016-A Part II volume 9563 of LNCS pages 237--258. Springer Heidelberg Jan. 2016.","DOI":"10.1007\/978-3-662-49099-0_9"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134088","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134088","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134088","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:03Z","timestamp":1750212663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134088"}},"subtitle":["Automated Proofs and New Constructions"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":63,"alternative-id":["10.1145\/3133956.3134088","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134088","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}