{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:01:19Z","timestamp":1750309279370,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,22]]},"DOI":"10.1145\/3641584.3641807","type":"proceedings-article","created":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T22:44:43Z","timestamp":1718405083000},"page":"1479-1484","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Verifiable Conditional Broadcast Proxy Re-encryption Based on Certificateless Public Key Scheme"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8937-433X","authenticated-orcid":false,"given":"Sheping","family":"Zhai","sequence":"first","affiliation":[{"name":"Department of computing, Xi'an University of Posts&amp;Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8891-7474","authenticated-orcid":false,"given":"Xianjing","family":"Lu","sequence":"additional","affiliation":[{"name":"Department of computing, Xi'an University of Posts&amp;Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-4044-9087","authenticated-orcid":false,"given":"Haonan","family":"Nie","sequence":"additional","affiliation":[{"name":"Department of computing, Xi'an University of Posts&amp;Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5183-8990","authenticated-orcid":false,"given":"Rui","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of computing, Xi'an University of Posts&amp;Telecommunications, China"}]}],"member":"320","published-online":{"date-parts":[[2024,6,14]]},"reference":[{"issue":"22","key":"e_1_3_2_1_1_1","first-page":"5","article-title":"Digital strategy constructs a new pattern of China's digital economy [J]","volume":"40","year":"2022","unstructured":"CHEN Y,WU C N. Digital strategy constructs a new pattern of China's digital economy [J]. Science & Technology Review, 2022, 40(22): 5-11.","journal-title":"Science & Technology Review"},{"volume-title":"Divertible protocols and atomic proxy cryptography[C]\/\/ In: Advances in Cryptology\u2014Eurocrypt","year":"1998","key":"e_1_3_2_1_2_1","unstructured":"BLAZE M, BLEUMER G, STRAUSS M. Divertible protocols and atomic proxy cryptography[C]\/\/ In: Advances in Cryptology\u2014Eurocrypt 1998. Springer Berlin Heidelberg, 1998: 127\u2013144."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/17445760.2018.1439491"},{"volume-title":"USA","key":"e_1_3_2_1_4_1","unstructured":"QIAN X, YANG Z, WANG S h, A no-pairing proxy re-encryption scheme for data sharing in untrusted cloud[C]\/\/ The 5th International Conference on Artificial Intelligence and Security, New York, USA, 2019: 85\u201396."},{"key":"e_1_3_2_1_5_1","volume-title":"Conditional proxy broadcast re-encryption[C]\/\/ Australasian Conference on Information Security and Privacy","author":"Chu C K","year":"2009","unstructured":"Chu C K, Weng J, Chow S S, Conditional proxy broadcast re-encryption[C]\/\/ Australasian Conference on Information Security and Privacy, Springer, 2009: 327-342."},{"key":"e_1_3_2_1_6_1","first-page":"445","article-title":"An Efficient Broadcast Encryption Supporting Designation and Revocation Mechanisms[J].","volume":"2019","author":"Zhu Y","unstructured":"Zhu Y,Yu R,Chen E. An Efficient Broadcast Encryption Supporting Designation and Revocation Mechanisms[J].Chinese Journal of Electronics,2019,28(03):445-456.","journal-title":"Chinese Journal of Electronics"},{"key":"e_1_3_2_1_7_1","unstructured":"Wang Z Du R. Certificateless public key cryptography based provable data possession scheme in edge environment[J] Journal on Communications 2022 43(07):62-72."},{"key":"e_1_3_2_1_8_1","first-page":"2022","author":"Kim W B","year":"2022","unstructured":"Kim W B, Kim S H, Seo D, Certificateless Group to Many Broadcast Proxy Reencryptions for Data Sharing towards Multiple Parties in IoTs[J]. Wireless Communications and Mobile Computing, 2022, 2022.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/app12094353"},{"issue":"01","key":"e_1_3_2_1_10_1","first-page":"44","volume":"46","author":"Li Z","year":"2023","unstructured":"Li Z, Zhang L, Zhao H. Certificateless Threshold \u2212 Based Conditional Proxy Re-Encryption Scheme [J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(01): 44-49+83.","journal-title":"Journal of Beijing University of Posts and Telecommunications"},{"key":"e_1_3_2_1_11_1","article-title":"Revocable identity-based broadcast proxy re-encryption for data sharing in clouds","volume":"18","author":"Ge C","year":"2019","unstructured":"Ge C, Fang L, \"Revocable identity-based broadcast proxy re-encryption for data sharing in clouds,\" IEEE Transactions on Dependable and Secure Computing, vol. 18, 2019","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"5","key":"e_1_3_2_1_12_1","first-page":"797","article-title":"A novel proxy re-encryption scheme based on identity property and stateless broadcast encryption under cloud environment","volume":"21","author":"Yin H.","year":"2019","unstructured":"S. Yin, H. Li, and L. Teng, \"A novel proxy re-encryption scheme based on identity property and stateless broadcast encryption under cloud environment,\" International Journal of Network Security, vol. 21, no. 5, pp. 797\u2013803, 2019.","journal-title":"International Journal of Network Security"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2982422"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102411"},{"key":"e_1_3_2_1_15_1","volume-title":"Rsa-based collusion resistant quorum controlled proxy re-encryption scheme for distributed secure communication[C]\/\/International Conference on Distributed Computing and Internet Technology","author":"Patil S M","year":"2019","unstructured":"Patil S M, Purushothama B R. Rsa-based collusion resistant quorum controlled proxy re-encryption scheme for distributed secure communication[C]\/\/International Conference on Distributed Computing and Internet Technology. Cham: Springer International Publishing, 2019: 349-363."},{"key":"e_1_3_2_1_16_1","first-page":"606","article-title":"An Efficient Key-Insulated Proxy Re-Encryption Scheme in Certificateless Cryptography [J]","volume":"2018","author":"He L","unstructured":"He L, Lu Z,Geng Z . An Efficient Key-Insulated Proxy Re-Encryption Scheme in Certificateless Cryptography [J]. Journal of University of Electronic Science and Technology of China,2018,47(04):606-61.","journal-title":"Journal of University of Electronic Science and Technology of China"}],"event":{"name":"AIPR 2023: 2023 6th International Conference on Artificial Intelligence and Pattern Recognition","acronym":"AIPR 2023","location":"Xiamen China"},"container-title":["2023 6th International Conference on Artificial Intelligence and Pattern Recognition (AIPR)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641584.3641807","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3641584.3641807","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:05Z","timestamp":1750291385000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641584.3641807"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,22]]},"references-count":16,"alternative-id":["10.1145\/3641584.3641807","10.1145\/3641584"],"URL":"https:\/\/doi.org\/10.1145\/3641584.3641807","relation":{},"subject":[],"published":{"date-parts":[[2023,9,22]]},"assertion":[{"value":"2024-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}