{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T15:13:39Z","timestamp":1773414819945,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T00:00:00Z","timestamp":1697846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2022M713206"],"award-info":[{"award-number":["2022M713206"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102035"],"award-info":[{"award-number":["62102035"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,21]]},"DOI":"10.1145\/3583780.3615090","type":"proceedings-article","created":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T07:45:26Z","timestamp":1697874326000},"page":"3371-3380","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Towards Dynamic and Reliable Private Key Management for Hierarchical Access Structure in Decentralized Storage"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4268-6712","authenticated-orcid":false,"given":"Yifang","family":"Zhang","sequence":"first","affiliation":[{"name":"Beijing Normal University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2649-1819","authenticated-orcid":false,"given":"Mingyue","family":"Wang","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9078-7462","authenticated-orcid":false,"given":"Yu","family":"Guo","sequence":"additional","affiliation":[{"name":"Beijing Normal University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2401-6499","authenticated-orcid":false,"given":"Fangda","family":"Guo","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3133172"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2725953"},{"key":"e_1_3_2_1_3_1","volume-title":"Patrick PC Lee, and Wenjing Lou. Secure deduplication with efficient and reliable convergent key management","author":"Li Jin","year":"2013","unstructured":"Jin Li , Xiaofeng Chen , Mingqiang Li , Jingwei Li , Patrick PC Lee, and Wenjing Lou. Secure deduplication with efficient and reliable convergent key management . IEEE transactions on parallel and distributed systems, 25(6):1615--1625, 2013 . Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick PC Lee, and Wenjing Lou. Secure deduplication with efficient and reliable convergent key management. IEEE transactions on parallel and distributed systems, 25(6):1615--1625, 2013."},{"key":"e_1_3_2_1_4_1","volume-title":"Mpss: mobile proactive secret sharing. ACM Transactions on Information and System Security (TISSEC), 13(4):1-- 32","author":"Schultz David","year":"2010","unstructured":"David Schultz , Barbara Liskov , and Moses Liskov . Mpss: mobile proactive secret sharing. ACM Transactions on Information and System Security (TISSEC), 13(4):1-- 32 , 2010 . David Schultz, Barbara Liskov, and Moses Liskov. Mpss: mobile proactive secret sharing. ACM Transactions on Information and System Security (TISSEC), 13(4):1-- 32, 2010."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44750-4_27"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363203"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.07.032"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.01.053"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00063"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_11_1","first-page":"339","volume-title":"Proactive secret sharing or: How to cope with perpetual leakage. In annual international cryptology conference","author":"Herzberg Amir","year":"1995","unstructured":"Amir Herzberg , Stanislaw Jarecki , Hugo Krawczyk , and Moti Yung . Proactive secret sharing or: How to cope with perpetual leakage. In annual international cryptology conference , pages 339 -- 352 . Springer , 1995 . Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, and Moti Yung. Proactive secret sharing or: How to cope with perpetual leakage. In annual international cryptology conference, pages 339--352. Springer, 1995."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00067"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.09.003"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-006-0334-8"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2016.2581147"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3067468"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3081826"},{"key":"e_1_3_2_1_18_1","article-title":"Aggregation service for federated learning: An efficient, secure, and more resilient realization","author":"Zheng Yifeng","year":"2022","unstructured":"Yifeng Zheng , Shangqi Lai , Yi Liu , Xingliang Yuan , Xun Yi , and Cong Wang . Aggregation service for federated learning: An efficient, secure, and more resilient realization . IEEE Transactions on Dependable and Secure Computing , 2022 . Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, and Cong Wang. Aggregation service for federated learning: An efficient, secure, and more resilient realization. IEEE Transactions on Dependable and Secure Computing, 2022.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.3031061"},{"issue":"4","key":"e_1_3_2_1_20_1","first-page":"1893","article-title":"Towards private, robust, and verifiable crowdsensing systems via public blockchains","volume":"18","author":"Cai Chengjun","year":"2019","unstructured":"Chengjun Cai , Yifeng Zheng , Yuefeng Du , Zhan Qin , and Cong Wang . Towards private, robust, and verifiable crowdsensing systems via public blockchains . IEEE Transactions on Dependable and Secure Computing , 18 ( 4 ): 1893 -- 1907 , 2019 . Chengjun Cai, Yifeng Zheng, Yuefeng Du, Zhan Qin, and Cong Wang. Towards private, robust, and verifiable crowdsensing systems via public blockchains. IEEE Transactions on Dependable and Secure Computing, 18(4):1893--1907, 2019.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3114719"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS47774.2020.00023"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_11"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.10.040"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49175-2_2"}],"event":{"name":"CIKM '23: The 32nd ACM International Conference on Information and Knowledge Management","location":"Birmingham United Kingdom","acronym":"CIKM '23","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 32nd ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583780.3615090","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3583780.3615090","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:56Z","timestamp":1750178216000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3583780.3615090"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,21]]},"references-count":26,"alternative-id":["10.1145\/3583780.3615090","10.1145\/3583780"],"URL":"https:\/\/doi.org\/10.1145\/3583780.3615090","relation":{},"subject":[],"published":{"date-parts":[[2023,10,21]]},"assertion":[{"value":"2023-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}