{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:15Z","timestamp":1750221075324,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3230848","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme"],"prefix":"10.1145","author":[{"given":"Masoomeh","family":"Sepehri","sequence":"first","affiliation":[{"name":"Universit\u00e0 degli Studi di Milano, Milan, Italy"}]},{"given":"Alberto","family":"Trombetta","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi dell'Insubria, Varese, Italy"}]},{"given":"Maryam","family":"Sepehri","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi di Milano, Milan, Italy"}]},{"given":"Ernesto","family":"Damiani","sequence":"additional","affiliation":[{"name":"Cyber-Physical Systems Center, Khalifa University, Abu Dhabi, UAE, Universit\u00e0 degli Studi di Milano, Milan, Italy"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2732516.2732525"},{"volume-title":"Identity-Based Encryption from the Weil Pairing","author":"Boneh Dan","key":"e_1_3_2_1_2_1","unstructured":"Dan Boneh and Matt Franklin . 2001. Identity-Based Encryption from the Weil Pairing . Springer Berlin Heidelberg , Berlin, Heidelberg , 213--229. Dan Boneh and Matt Franklin. 2001. Identity-Based Encryption from the Weil Pairing. Springer Berlin Heidelberg, Berlin, Heidelberg, 213--229."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653678"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36095-4_4"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2451736.2451747"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315302"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11925-5_11"},{"volume-title":"A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length","author":"Emura Keita","key":"e_1_3_2_1_8_1","unstructured":"Keita Emura , Atsuko Miyaji , Akito Nomura , Kazumasa Omote , and Masakazu Soshi . 2009. A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length . Springer Berlin Heidelberg , Berlin, Heidelberg , 13--23. Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, and Masakazu Soshi. 2009. A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length. Springer Berlin Heidelberg, Berlin, Heidelberg, 13--23."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_19"},{"key":"e_1_3_2_1_11_1","volume-title":"Outsourcing the Decryption of ABE Ciphertexts. In 20th USENIX Security Symposium","author":"Green Matthew","year":"2011","unstructured":"Matthew Green , Susan Hohenberger , and Brent Waters . 2011 . Outsourcing the Decryption of ABE Ciphertexts. In 20th USENIX Security Symposium , San Francisco, CA, USA , August 8-12, 2011, Proceedings. USENIX Association. http:\/\/static.usenix.org\/events\/sec11\/tech\/full_papers\/Green.pdf Matthew Green, Susan Hohenberger, and Brent Waters. 2011. Outsourcing the Decryption of ABE Ciphertexts. In 20th USENIX Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings. USENIX Association. http:\/\/static.usenix.org\/events\/sec11\/tech\/full_papers\/Green.pdf"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-008-0522-5"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2749439"},{"volume-title":"Polynomial Equations, and Inner Products","author":"Katz Jonathan","key":"e_1_3_2_1_14_1","unstructured":"Jonathan Katz , Amit Sahai , and Brent Waters . 2008. Predicate Encryption Supporting Disjunctions , Polynomial Equations, and Inner Products . Springer Berlin Heidelberg , Berlin, Heidelberg , 146--162. Jonathan Katz, Amit Sahai, and Brent Waters. 2008. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. Springer Berlin Heidelberg, Berlin, Heidelberg, 146--162."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2526000"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533094"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1948352.1948389"},{"key":"e_1_3_2_1_18_1","volume-title":"Pairing Based Cryptography library. (June","author":"Lynn Ben","year":"2007","unstructured":"Ben Lynn . 2007. Pairing Based Cryptography library. (June 2007 ). http:\/\/crypto.stanford.edu\/pbc\/. Ben Lynn. 2007. Pairing Based Cryptography library. (June 2007). http:\/\/crypto.stanford.edu\/pbc\/."},{"key":"e_1_3_2_1_19_1","first-page":"54","article-title":"Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts","volume":"80","author":"Mambo Masahiro","year":"1997","unstructured":"Masahiro Mambo and Eiji Okamoto . 1997 . Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts . IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences 80A , 1 (1997), 54 -- 63 . http:\/\/ci.nii.ac.jp\/naid\/110003207677\/ Masahiro Mambo and Eiji Okamoto. 1997. Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts. IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences 80A, 1 (1997), 54--63. http:\/\/ci.nii.ac.jp\/naid\/110003207677\/","journal-title":"IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences"},{"volume-title":"Hierarchical Predicate Encryption for Inner-Products","author":"Okamoto Tatsuaki","key":"e_1_3_2_1_20_1","unstructured":"Tatsuaki Okamoto and Katsuyuki Takashima . 2009. Hierarchical Predicate Encryption for Inner-Products . Springer Berlin Heidelberg , Berlin, Heidelberg , 214--231. Tatsuaki Okamoto and Katsuyuki Takashima. 2009. Hierarchical Predicate Encryption for Inner-Products. Springer Berlin Heidelberg, Berlin, Heidelberg, 214--231."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-010-9405-9"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.6109\/jicce.2012.10.1.053"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.530"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3104049"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.635"},{"volume-title":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom). 711--718","author":"Wu R.","key":"e_1_3_2_1_27_1","unstructured":"R. Wu , G. J. Ahn , and H. Hu . 2012. Secure sharing of electronic health records in clouds . In 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom). 711--718 . R. Wu, G. J. Ahn, and H. Hu. 2012. Secure sharing of electronic health records in clouds. In 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom). 711--718."}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"],"location":"Hamburg Germany","acronym":"ARES 2018"},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3230848","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3230848","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:31Z","timestamp":1750208251000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3230848"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":27,"alternative-id":["10.1145\/3230833.3230848","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3230848","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}