{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:43:51Z","timestamp":1761324231361,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T00:00:00Z","timestamp":1562025600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSW Cyber Security Network"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,2]]},"DOI":"10.1145\/3321705.3329825","type":"proceedings-article","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T12:53:20Z","timestamp":1562676800000},"page":"55-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing"],"prefix":"10.1145","author":[{"given":"Jongkil","family":"Kim","sequence":"first","affiliation":[{"name":"University of Wollongong, Wollongong, Australia"}]},{"given":"Seyit","family":"Camtepe","sequence":"additional","affiliation":[{"name":"CSIRO, Marsfield, Australia"}]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[{"name":"University of Wollongong, Wollongong, Australia"}]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[{"name":"CSIRO, Marsfield, Australia"}]},{"given":"Joonsang","family":"Baek","sequence":"additional","affiliation":[{"name":"University of Wollongong, Wollongong, Australia"}]}],"member":"320","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_16"},{"key":"e_1_3_2_1_2_1","volume-title":"Fog Computing: A Platform for Internet of Things and Analytics. In Big Data and Internet of Things: A Roadmap for Smart Environments.","author":"Bonomi Flavio","year":"2014","unstructured":"Flavio Bonomi , Rodolfo A. Milito , Preethi Natarajan , and Jiang Zhu . 2014 . Fog Computing: A Platform for Internet of Things and Analytics. In Big Data and Internet of Things: A Roadmap for Smart Environments. Vol. 546 . Springer , 169--186. Flavio Bonomi, Rodolfo A. Milito, Preethi Natarajan, and Jiang Zhu. 2014. Fog Computing: A Platform for Internet of Things and Analytics. In Big Data and Internet of Things: A Roadmap for Smart Environments. Vol. 546. Springer, 169--186."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"volume-title":"ASIACRYPT (Lecture Notes in Computer Science)","author":"Delerabl\u00e9e C\u00e9cile","key":"e_1_3_2_1_4_1","unstructured":"C\u00e9cile Delerabl\u00e9e . 2007. Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys . In ASIACRYPT (Lecture Notes in Computer Science) , Kaoru Kurosawa (Ed.), Vol. 4833 . Springer , 200--215. C\u00e9cile Delerabl\u00e9e. 2007. Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys. In ASIACRYPT (Lecture Notes in Computer Science), Kaoru Kurosawa (Ed.), Vol. 4833. Springer, 200--215."},{"key":"e_1_3_2_1_5_1","volume-title":"Public Key Broadcast Encryption for Stateless Receivers. In Digital Rights Management Workshop (Lecture Notes in Computer Science), Joan Feigenbaum (Ed.)","volume":"2696","author":"Dodis Yevgeniy","year":"2002","unstructured":"Yevgeniy Dodis and Nelly Fazio . 2002 . Public Key Broadcast Encryption for Stateless Receivers. In Digital Rights Management Workshop (Lecture Notes in Computer Science), Joan Feigenbaum (Ed.) , Vol. 2696 . Springer, 61--80. Yevgeniy Dodis and Nelly Fazio. 2002. Public Key Broadcast Encryption for Stateless Receivers. In Digital Rights Management Workshop (Lecture Notes in Computer Science), Joan Feigenbaum (Ed.), Vol. 2696. Springer, 61--80."},{"volume-title":"CRYPTO (Lecture Notes in Computer Science), Douglas R","author":"Fiat Amos","key":"e_1_3_2_1_6_1","unstructured":"Amos Fiat and Moni Naor . 1993. Broadcast Encryption . In CRYPTO (Lecture Notes in Computer Science), Douglas R . Stinson (Ed.), Vol. 773 . Springer , 480--491. Amos Fiat and Moni Naor. 1993. Broadcast Encryption. In CRYPTO (Lecture Notes in Computer Science), Douglas R. Stinson (Ed.), Vol. 773. Springer, 480--491."},{"volume-title":"EUROCRYPT (Lecture Notes in Computer Science)","author":"Gentry Craig","key":"e_1_3_2_1_7_1","unstructured":"Craig Gentry and Brent Waters . 2009. Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) . In EUROCRYPT (Lecture Notes in Computer Science) , Antoine Joux (Ed.), Vol. 5479 . Springer , 171--188. Craig Gentry and Brent Waters. 2009. Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). In EUROCRYPT (Lecture Notes in Computer Science), Antoine Joux (Ed.), Vol. 5479. Springer, 171--188."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_9_1","volume-title":"Outsourcing the Decryption of ABE Ciphertexts. In 20th USENIX Security Symposium","author":"Green Matthew","year":"2011","unstructured":"Matthew Green , Susan Hohenberger , and Brent Waters . 2011 . Outsourcing the Decryption of ABE Ciphertexts. In 20th USENIX Security Symposium , San Francisco, CA, USA, August 8--12 , 2011, Proceedings. USENIX Association. Matthew Green, Susan Hohenberger, and Brent Waters. 2011. Outsourcing the Decryption of ABE Ciphertexts. In 20th USENIX Security Symposium, San Francisco, CA, USA, August 8--12, 2011, Proceedings. USENIX Association."},{"key":"e_1_3_2_1_10_1","volume-title":"Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage. In 11th IEEE International Conference on Cloud Computing, CLOUD 2018","author":"Hahn Changhee","year":"2018","unstructured":"Changhee Hahn , Hyunsoo Kwon , and Junbeom Hur . 2018 . Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage. In 11th IEEE International Conference on Cloud Computing, CLOUD 2018 , San Francisco, CA, USA, July 2--7 , 2018. IEEE Computer Society, 920--923. Changhee Hahn, Hyunsoo Kwon, and Junbeom Hur. 2018. Toward Trustworthy Delegation: Verifiable Outsourced Decryption with Tamper-Resistance in Public Cloud Storage. In 11th IEEE International Conference on Cloud Computing, CLOUD 2018, San Francisco, CA, USA, July 2--7, 2018. IEEE Computer Society, 920--923."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948132"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04873-4_4"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2271848"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40367-0_14"},{"key":"e_1_3_2_1_15_1","unstructured":"J. Li Y. Wang Y. Zhang and J. Han. 2018. Full Verifiability for Outsourced Decryption in Attribute Based Encryption. IEEE Transactions on Services Computing (2018) 1--1.  J. Li Y. Wang Y. Zhang and J. Han. 2018. Full Verifiability for Outsourced Decryption in Attribute Based Encryption. IEEE Transactions on Services Computing (2018) 1--1."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_13"},{"volume-title":"CRYPTO (Lecture Notes in Computer Science)","author":"Naor Dalit","key":"e_1_3_2_1_18_1","unstructured":"Dalit Naor , Moni Naor , and Jeffery Lotspiech . 2001. Revocation and Tracing Schemes for Stateless Receivers . In CRYPTO (Lecture Notes in Computer Science) , Joe Kilian (Ed.), Vol. 2139 . Springer , 41--62. Dalit Naor, Moni Naor, and Jeffery Lotspiech. 2001. Revocation and Tracing Schemes for Stateless Receivers. In CRYPTO (Lecture Notes in Computer Science), Joe Kilian (Ed.), Vol. 2139. Springer, 41--62."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2410137"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"e_1_3_2_1_21_1","first-page":"217","article-title":"Identity-Based Broadcast Encryption","volume":"2007","author":"Sakai Ryuichi","year":"2007","unstructured":"Ryuichi Sakai and Jun Furukawa . 2007 . Identity-Based Broadcast Encryption . IACR Cryptology ePrint Archive , Vol. 2007 (2007), 217 . Ryuichi Sakai and Jun Furukawa. 2007. Identity-Based Broadcast Encryption. IACR Cryptology ePrint Archive, Vol. 2007 (2007), 217.","journal-title":"IACR Cryptology ePrint Archive"},{"volume-title":"CRYPTO (Lecture Notes in Computer Science)","author":"Shamir Adi","key":"e_1_3_2_1_22_1","unstructured":"Adi Shamir . 1984. Identity-Based Cryptosystems and Signature Schemes . In CRYPTO (Lecture Notes in Computer Science) , G. R. Blakley and David Chaum (Eds.), Vol. 196 . Springer , 47--53. Adi Shamir. 1984. Identity-Based Cryptosystems and Signature Schemes. In CRYPTO (Lecture Notes in Computer Science), G. R. Blakley and David Chaum (Eds.), Vol. 196. Springer, 47--53."},{"key":"e_1_3_2_1_23_1","volume-title":"The Wall Street Journal","volume":"5","author":"Wakabayashi Daisuke","year":"2014","unstructured":"Daisuke Wakabayashi . 2014 . Tim Cook Says Apple to Add Security Alerts for iCloud Users . The Wall Street Journal , Vol. 5 (2014). Daisuke Wakabayashi. 2014. Tim Cook Says Apple to Add Security Alerts for iCloud Users. The Wall Street Journal, Vol. 5 (2014)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.02.001"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897853"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2014.7033259"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.10.028"}],"event":{"name":"Asia CCS '19: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Auckland New Zealand","acronym":"Asia CCS '19"},"container-title":["Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321705.3329825","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3321705.3329825","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:39Z","timestamp":1750204479000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321705.3329825"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,2]]},"references-count":26,"alternative-id":["10.1145\/3321705.3329825","10.1145\/3321705"],"URL":"https:\/\/doi.org\/10.1145\/3321705.3329825","relation":{},"subject":[],"published":{"date-parts":[[2019,7,2]]},"assertion":[{"value":"2019-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}