{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:29:12Z","timestamp":1775579352156,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["101054911? REWORC"],"award-info":[{"award-number":["101054911? REWORC"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["EXC 2092 CASA - 390781972"],"award-info":[{"award-number":["EXC 2092 CASA - 390781972"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560699","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"2491-2504","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["FABEO"],"prefix":"10.1145","author":[{"given":"Doreen","family":"Riepel","sequence":"first","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum, Bochum, Germany"}]},{"given":"Hoeteck","family":"Wee","sequence":"additional","affiliation":[{"name":"NTT Research, Sunnyvale, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Shashank Agrawal and Melissa Chase. 2017a. Attribute-based Encryption. https:\/\/github.com\/sagrawal87\/ABE.  Shashank Agrawal and Melissa Chase. 2017a. Attribute-based Encryption. https:\/\/github.com\/sagrawal87\/ABE."},{"key":"e_1_3_2_1_2_1","volume-title":"FAME: Fast Attribute-based Message Encryption. In ACM CCS","author":"Agrawal Shashank","year":"2017","unstructured":"Shashank Agrawal and Melissa Chase . 2017 b. FAME: Fast Attribute-based Message Encryption. In ACM CCS 2017, , Bhavani M. Thuraisingham, David Evans , Tal Malkin, and Dongyan Xu (Eds.). ACM Press , 665--682. https:\/\/doi.org\/10.1145\/3133956.3134014 10.1145\/3133956.3134014 Shashank Agrawal and Melissa Chase. 2017b. FAME: Fast Attribute-based Message Encryption. In ACM CCS 2017, , Bhavani M. Thuraisingham, David Evans, Tal Malkin, and Dongyan Xu (Eds.). ACM Press, 665--682. https:\/\/doi.org\/10.1145\/3133956.3134014"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56620-7_22"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0057-3"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046628"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134088"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_31"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53890-6_20"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592585"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92068-5_20"},{"key":"e_1_3_2_1_11_1","volume-title":"ACM CCS 93, , Dorothy E","author":"Bellare Mihir","unstructured":"Mihir Bellare and Phillip Rogaway . 1993. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols . In ACM CCS 93, , Dorothy E . Denning, Raymond Pyle, Ravi Ganesan, Ravi S. Sandhu, and Victoria Ashby (Eds.). ACM Press , 62--73. https:\/\/doi.org\/10.1145\/168588.168596 10.1145\/168588.168596 Mihir Bellare and Phillip Rogaway. 1993. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In ACM CCS 93, , Dorothy E. Denning, Raymond Pyle, Ravi Ganesan, Ravi S. Sandhu, and Victoria Ashby (Eds.). ACM Press, 62--73. https:\/\/doi.org\/10.1145\/168588.168596"},{"key":"e_1_3_2_1_12_1","volume-title":"Ciphertext-Policy Attribute-Based Encryption. In 2007 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 321--334","author":"Bethencourt John","year":"2007","unstructured":"John Bethencourt , Amit Sahai , and Brent Waters . 2007 . Ciphertext-Policy Attribute-Based Encryption. In 2007 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 321--334 . https:\/\/doi.org\/10.1109\/SP.2007.11 10.1109\/SP.2007.11 John Bethencourt, Amit Sahai, and Brent Waters. 2007. Ciphertext-Policy Attribute-Based Encryption. In 2007 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 321--334. https:\/\/doi.org\/10.1109\/SP.2007.11"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_23"},{"key":"e_1_3_2_1_14_1","volume-title":"Hierarchical Identity Based Encryption with Constant Size Ciphertext. In EUROCRYPT 2005 (LNCS ), Ronald Cramer (Ed.)","volume":"3494","author":"Boneh Dan","year":"2005","unstructured":"Dan Boneh , Xavier Boyen , and Eu-Jin Goh . 2005 . Hierarchical Identity Based Encryption with Constant Size Ciphertext. In EUROCRYPT 2005 (LNCS ), Ronald Cramer (Ed.) , Vol. 3494 . Springer, Heidelberg, 440--456. https:\/\/doi.org\/10.1007\/11426639_26 10.1007\/11426639_26 Dan Boneh, Xavier Boyen, and Eu-Jin Goh. 2005. Hierarchical Identity Based Encryption with Constant Size Ciphertext. In EUROCRYPT 2005 (LNCS ), Ronald Cramer (Ed.), Vol. 3494. Springer, Heidelberg, 440--456. https:\/\/doi.org\/10.1007\/11426639_26"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53890-6_22"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_20"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54365-8_9"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_25"},{"key":"e_1_3_2_1_19_1","volume-title":"Security Analysis of the Strong Diffie-Hellman Problem. In EUROCRYPT 2006 (LNCS ), Serge Vaudenay (Ed.)","volume":"4004","author":"Cheon Jung Hee","year":"2006","unstructured":"Jung Hee Cheon . 2006 . Security Analysis of the Strong Diffie-Hellman Problem. In EUROCRYPT 2006 (LNCS ), Serge Vaudenay (Ed.) , Vol. 4004 . Springer, Heidelberg, 1--11. https:\/\/doi.org\/10.1007\/11761679_1 10.1007\/11761679_1 Jung Hee Cheon. 2006. Security Analysis of the Strong Diffie-Hellman Problem. In EUROCRYPT 2006 (LNCS ), Serge Vaudenay (Ed.), Vol. 4004. Springer, Heidelberg, 1--11. https:\/\/doi.org\/10.1007\/11761679_1"},{"key":"e_1_3_2_1_20_1","volume-title":"Applied Cryptography and Network Security","author":"Chhatrapati Arush","unstructured":"Arush Chhatrapati , Susan Hohenberger , James Trombo , and Satyanarayana Vusirikala . 2022. A Performance Evaluation of Pairing-Based Broadcast Encryption Systems . In Applied Cryptography and Network Security . Springer International Publishing . Arush Chhatrapati, Susan Hohenberger, James Trombo, and Satyanarayana Vusirikala. 2022. A Performance Evaluation of Pairing-Based Broadcast Encryption Systems. In Applied Cryptography and Network Security. Springer International Publishing."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i2.192-239"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75248-4_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-021-09388-x"},{"key":"e_1_3_2_1_24_1","volume-title":"Wood","author":"Faz-Hern\u00e1ndez Armando","year":"2022","unstructured":"Armando Faz-Hern\u00e1ndez , Sam Scott , Nick Sullivan , Riad S. Wahby , and Christopher A . Wood . 2022 . Hashing to Elliptic Curves . https:\/\/datatracker.ietf.org\/doc\/draft-irtf-cfrg-hash-to-curve\/. Armando Faz-Hern\u00e1ndez, Sam Scott, Nick Sullivan, Riad S. Wahby, and Christopher A. Wood. 2022. Hashing to Elliptic Curves. https:\/\/datatracker.ietf.org\/doc\/draft-irtf-cfrg-hash-to-curve\/."},{"key":"e_1_3_2_1_25_1","volume-title":"Practical Identity-Based Encryption Without Random Oracles. In EUROCRYPT 2006 (LNCS ), Serge Vaudenay (Ed.)","volume":"4004","author":"Gentry Craig","year":"2006","unstructured":"Craig Gentry . 2006 . Practical Identity-Based Encryption Without Random Oracles. In EUROCRYPT 2006 (LNCS ), Serge Vaudenay (Ed.) , Vol. 4004 . Springer, Heidelberg, 445--464. https:\/\/doi.org\/10.1007\/11761679_27 10.1007\/11761679_27 Craig Gentry. 2006. Practical Identity-Based Encryption Without Random Oracles. In EUROCRYPT 2006 (LNCS ), Serge Vaudenay (Ed.), Vol. 4004. Springer, Heidelberg, 445--464. https:\/\/doi.org\/10.1007\/11761679_27"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96881-0_4"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53890-6_21"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26951-7_25"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45727-3_10"},{"key":"e_1_3_2_1_30_1","volume-title":"Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. In ACM CCS 2006","author":"Goyal Vipul","year":"2006","unstructured":"Vipul Goyal , Omkant Pandey , Amit Sahai , and Brent Waters . 2006 . Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. In ACM CCS 2006 , , Ari Juels, Rebecca N. Wright, and Sabrina De Capitani di Vimercati (Eds.). ACM Press, 89--98. https:\/\/doi.org\/10.1145\/1 180405.1180418 Available as Cryptology ePrint Archive Report 2006\/309. 10.1145\/1180405.1180418 Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. 2006. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. In ACM CCS 2006, , Ari Juels, Rebecca N. Wright, and Sabrina De Capitani di Vimercati (Eds.). ACM Press, 89--98. https:\/\/doi.org\/10.1145\/1180405.1180418 Available as Cryptology ePrint Archive Report 2006\/309."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"e_1_3_2_1_33_1","volume-title":"The Multi-user Security of GCM","author":"Hoang Viet Tung","year":"2019","unstructured":"Viet Tung Hoang , Stefano Tessaro , and Aishwarya Thiruvengadam . 2018. The Multi-user Security of GCM , Revisited : Tight Bounds for Nonce Randomization. In ACM CCS 2019 , , David Lie, Mohammad Mannan, Michael Backes, and XiaoFeng Wang (Eds.). ACM Press , 1429--1440. https:\/\/doi.org\/10.1145\/3243734.3243816 10.1145\/3243734.3243816 Viet Tung Hoang, Stefano Tessaro, and Aishwarya Thiruvengadam. 2018. The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization. In ACM CCS 2019, , David Lie, Mohammad Mannan, Michael Backes, and XiaoFeng Wang (Eds.). ACM Press, 1429--1440. https:\/\/doi.org\/10.1145\/3243734.3243816"},{"key":"e_1_3_2_1_34_1","volume-title":"Multi-ciphertext Setting. In PKC 2015 (LNCS ), , Jonathan Katz (Ed.)","volume":"9020","author":"Hofheinz Dennis","year":"2015","unstructured":"Dennis Hofheinz , Jessica Koch , and Christoph Striecks . 2015 . Identity-Based Encryption with (Almost) Tight Security in the Multi-instance , Multi-ciphertext Setting. In PKC 2015 (LNCS ), , Jonathan Katz (Ed.) , Vol. 9020 . Springer, Heidelberg, 799--822. https:\/\/doi.org\/10.1007\/978--3--662--46447--2_36 10.1007\/978--3--662--46447--2_36 Dennis Hofheinz, Jessica Koch, and Christoph Striecks. 2015. Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting. In PKC 2015 (LNCS ), , Jonathan Katz (Ed.), Vol. 9020. Springer, Heidelberg, 799--822. https:\/\/doi.org\/10.1007\/978--3--662--46447--2_36"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491224.2491237"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_20"},{"key":"e_1_3_2_1_37_1","volume-title":"EUROCRYPT","volume":"11476","author":"Kowalczyk Lucas","year":"2019","unstructured":"Lucas Kowalczyk and Hoeteck Wee . 2019 . Compact Adaptively Secure ABE for $mathsfNC^1$ from k-Lin . In EUROCRYPT 2019, Part I (LNCS ), Yuval Ishai and Vincent Rijmen (Eds.) , Vol. 11476 . Springer, Heidelberg, 3--33. https:\/\/doi.org\/10.1007\/978--3-030--17653--2_1 10.1007\/978--3-030--17653--2_1 Lucas Kowalczyk and Hoeteck Wee. 2019. Compact Adaptively Secure ABE for $mathsfNC^1$ from k-Lin. In EUROCRYPT 2019, Part I (LNCS ), Yuval Ishai and Vincent Rijmen (Eds.), Vol. 11476. Springer, Heidelberg, 3--33. https:\/\/doi.org\/10.1007\/978--3-030--17653--2_1"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45374-9_6"},{"key":"e_1_3_2_1_39_1","volume-title":"Unbounded HIBE and Attribute-Based Encryption. In EUROCRYPT 2011 (LNCS ), , Kenneth G. Paterson (Ed.)","volume":"6632","author":"Allison","year":"2046","unstructured":"Allison B. Lewko and Brent Waters. 2011 . Unbounded HIBE and Attribute-Based Encryption. In EUROCRYPT 2011 (LNCS ), , Kenneth G. Paterson (Ed.) , Vol. 6632 . Springer, Heidelberg, 547--567. https:\/\/doi.org\/10.1007\/978--3--642-- 2046 5--4_30 10.1007\/978--3--642--20465--4_30 Allison B. Lewko and Brent Waters. 2011. Unbounded HIBE and Attribute-Based Encryption. In EUROCRYPT 2011 (LNCS ), , Kenneth G. Paterson (Ed.), Vol. 6632. Springer, Heidelberg, 547--567. https:\/\/doi.org\/10.1007\/978--3--642--20465--4_30"},{"key":"e_1_3_2_1_40_1","volume-title":"CRYPTO 2012 (LNCS ), , Reihaneh Safavi-Naini and Ran Canetti (Eds.)","volume":"7417","author":"Allison","year":"2009","unstructured":"Allison B. Lewko and Brent Waters. 2012. New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques . In CRYPTO 2012 (LNCS ), , Reihaneh Safavi-Naini and Ran Canetti (Eds.) , Vol. 7417 . Springer, Heidelberg, 180--198. https:\/\/doi.org\/10.1007\/978--3--642--3 2009 --5_12 10.1007\/978--3--642--32009--5_12 Allison B. Lewko and Brent Waters. 2012. New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques. In CRYPTO 2012 (LNCS ), , Reihaneh Safavi-Naini and Ran Canetti (Eds.), Vol. 7417. Springer, Heidelberg, 180--198. https:\/\/doi.org\/10.1007\/978--3--642--32009--5_12"},{"key":"e_1_3_2_1_41_1","volume-title":"Willy Susilo, Dongqing Xie, and Kui Ren.","author":"Li Jin","year":"2010","unstructured":"Jin Li , Man Ho Au , Willy Susilo, Dongqing Xie, and Kui Ren. 2010 . Attribute-based signature and its applications. In ASIACCS 10, , Dengguo Feng, David A. Basin, and Peng Liu (Eds.). ACM Press , 60--69. Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, and Kui Ren. 2010. Attribute-based signature and its applications. In ASIACCS 10, , Dengguo Feng, David A. Basin, and Peng Liu (Eds.). ACM Press, 60--69."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45727-3_9"},{"key":"e_1_3_2_1_43_1","volume-title":"10th IMA International Conference on Cryptography and Coding (LNCS ), , Nigel P. Smart (Ed.)","volume":"3796","author":"Maurer Ueli M.","year":"2005","unstructured":"Ueli M. Maurer . 2005 . Abstract Models of Computation in Cryptography (Invited Paper) . In 10th IMA International Conference on Cryptography and Coding (LNCS ), , Nigel P. Smart (Ed.) , Vol. 3796 . Springer, Heidelberg, 1--12. Ueli M. Maurer. 2005. Abstract Models of Computation in Cryptography (Invited Paper). In 10th IMA International Conference on Cryptography and Coding (LNCS ), , Nigel P. Smart (Ed.), Vol. 3796. Springer, Heidelberg, 1--12."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Doreen Riepel and Hoeteck Wee. 2022. https:\/\/github.com\/DoreenRiepel\/FABEO.  Doreen Riepel and Hoeteck Wee. 2022. https:\/\/github.com\/DoreenRiepel\/FABEO.","DOI":"10.1145\/3548606.3560699"},{"key":"e_1_3_2_1_45_1","volume-title":"Fuzzy Identity-Based Encryption. In EUROCRYPT 2005 (LNCS ), , Ronald Cramer (Ed.)","volume":"3494","author":"Sahai Amit","unstructured":"Amit Sahai and Brent R. Waters . 2005 . Fuzzy Identity-Based Encryption. In EUROCRYPT 2005 (LNCS ), , Ronald Cramer (Ed.) , Vol. 3494 . Springer, Heidelberg, 457--473. https:\/\/doi.org\/10.1007\/11426639_27 10.1007\/11426639_27 Amit Sahai and Brent R. Waters. 2005. Fuzzy Identity-Based Encryption. In EUROCRYPT 2005 (LNCS ), , Ronald Cramer (Ed.), Vol. 3494. Springer, Heidelberg, 457--473. https:\/\/doi.org\/10.1007\/11426639_27"},{"key":"e_1_3_2_1_46_1","unstructured":"Yumi Sakemi Tetsutaro Kobayashi Tsunekazu Saito and Riad Wahby. 2021. Pairing-Friendly Curves. Internet-Draft https:\/\/datatracker.ietf.org\/doc\/draft-irtf-cfrg-pairing-friendly-curves\/.  Yumi Sakemi Tetsutaro Kobayashi Tsunekazu Saito and Riad Wahby. 2021. Pairing-Friendly Curves. Internet-Draft https:\/\/datatracker.ietf.org\/doc\/draft-irtf-cfrg-pairing-friendly-curves\/."},{"key":"e_1_3_2_1_47_1","volume-title":"EUROCRYPT'97 (LNCS )","author":"Shoup Victor","unstructured":"Victor Shoup . 1997. Lower Bounds for Discrete Logarithms and Related Problems . In EUROCRYPT'97 (LNCS ) , Walter Fumy (Ed.), Vol. 1233 . Springer , Heidelberg , 256--266. https:\/\/doi.org\/10.1007\/3--540--69053-0_18 10.1007\/3--540--69053-0_18 Victor Shoup. 1997. Lower Bounds for Discrete Logarithms and Related Problems. In EUROCRYPT'97 (LNCS ), Walter Fumy (Ed.), Vol. 1233. Springer, Heidelberg, 256--266. https:\/\/doi.org\/10.1007\/3--540--69053-0_18"},{"key":"e_1_3_2_1_48_1","unstructured":"Nick Sullivan. 2017. Geo Key Manager: How It Works. https:\/\/blog.cloudflare.com\/geo-key-manager-how-it-works\/.  Nick Sullivan. 2017. Geo Key Manager: How It Works. https:\/\/blog.cloudflare.com\/geo-key-manager-how-it-works\/."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45374-9_1"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_36"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"e_1_3_2_1_52_1","volume-title":"Functional Encryption for Regular Languages. In CRYPTO 2012 (LNCS ), , Reihaneh Safavi-Naini and Ran Canetti (Eds.)","volume":"7417","author":"Waters Brent","year":"2012","unstructured":"Brent Waters . 2012 . Functional Encryption for Regular Languages. In CRYPTO 2012 (LNCS ), , Reihaneh Safavi-Naini and Ran Canetti (Eds.) , Vol. 7417 . Springer, Heidelberg, 218--235. https:\/\/doi.org\/10.1007\/978--3--642--3 2009--5_14 10.1007\/978--3--642--32009--5_14 Brent Waters. 2012. Functional Encryption for Regular Languages. In CRYPTO 2012 (LNCS ), , Reihaneh Safavi-Naini and Ran Canetti (Eds.), Vol. 7417. Springer, Heidelberg, 218--235. https:\/\/doi.org\/10.1007\/978--3--642--32009--5_14"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54242-8_26"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560699","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560699","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:59Z","timestamp":1750182539000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560699"}},"subtitle":["Fast Attribute-Based Encryption with Optimal Security"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":52,"alternative-id":["10.1145\/3548606.3560699","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560699","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}