{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,16]],"date-time":"2025-11-16T06:29:40Z","timestamp":1763274580899,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science and Technology Council, Taiwan","award":["NSTC 112-2221-E-011 -094 -MY2, NSTC 112-2221-E-011 -092 -MY2, and NSTC 113-2634-F-011 -002 -MBK."],"award-info":[{"award-number":["NSTC 112-2221-E-011 -094 -MY2, NSTC 112-2221-E-011 -092 -MY2, and NSTC 113-2634-F-011 -002 -MBK."]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3691397","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"5006-5008","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Poster: Post-Quantum Identity-Based Matching Encryption with Revocable Decryption Key"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1050-6390","authenticated-orcid":false,"given":"Jheng-Jia","family":"Huang","sequence":"first","affiliation":[{"name":"Department of Information Management, National Taiwan University of Science and Technology, Taipei City, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8533-0345","authenticated-orcid":false,"given":"Guan-Yu","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Information Management, National Taiwan University of Science and Technology, Taipei City, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4622-4977","authenticated-orcid":false,"given":"Nai-Wei","family":"Lo","sequence":"additional","affiliation":[{"name":"Department of Information Management, National Taiwan University of Science and Technology, Taipei City, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"David Nu nez, and Daniele Venturi","author":"Ateniese Giuseppe","year":"2019","unstructured":"Giuseppe Ateniese, Danilo Francati, David Nu nez, and Daniele Venturi. 2019. Match Me if You Can: Matchmaking Encryption and Its Applications. In Advances in Cryptology -- CRYPTO 2019, Alexandra Boldyreva and Daniele Micciancio (Eds.). Springer International Publishing, Cham, 701--731."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22969-5_14"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-021-00880-w"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92518-5_19"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1049\/ise2.12116"},{"key":"e_1_3_2_1_6_1","volume-title":"Public-Key Cryptography -- PKC","author":"Katsumata Shuichi","year":"2019","unstructured":"Shuichi Katsumata, Takahiro Matsuda, and Atsushi Takayasu. 2019. Lattice-Based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance. In Public-Key Cryptography -- PKC 2019, Dongdai Lin and Kazue Sako (Eds.). Springer International Publishing, Cham, 441--471."},{"key":"e_1_3_2_1_7_1","unstructured":"Yuejun Wang Baocang Wang Qiqi Lai and Yu Zhan. 2022. Identity-based Matchmaking Encryption with Stronger Security and Instantiation on Lattices. Cryptology ePrint Archive Paper 2022\/1718. https:\/\/eprint.iacr.org\/2022\/1718 https:\/\/eprint.iacr.org\/2022\/1718."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3691397","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3691397","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:56:35Z","timestamp":1755842195000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3691397"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":7,"alternative-id":["10.1145\/3658644.3691397","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3691397","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}