{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T13:38:28Z","timestamp":1648906708134},"reference-count":8,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2016]]},"DOI":"10.1587\/transinf.2016edl8042","type":"journal-article","created":{"date-parts":[[2016,6,30]],"date-time":"2016-06-30T19:09:12Z","timestamp":1467313752000},"page":"1933-1936","source":"Crossref","is-referenced-by-count":1,"title":["Security of Cloud-Based Revocable Identity-Based Proxy Re-Encryption Scheme"],"prefix":"10.1587","volume":"E99.D","author":[{"given":"Seunghwan","family":"PARK","sequence":"first","affiliation":[{"name":"Center for Information and Security Technologies, Korea University"}]},{"given":"Dong Hoon","family":"LEE","sequence":"additional","affiliation":[{"name":"Center for Information and Security Technologies, Korea University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] A. Boldyreva, V. Goyal, and V. Kumar, \u201cIdentity-based encryption with efficient revocation,\u201d In P. Ning, P.F. Syverson, and S. Jha, editors, ACM Conference on Computer and Communications Security, pp.417-426, ACM, 2008.","DOI":"10.1145\/1455770.1455823"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] D. Boneh and M.K. Franklin, \u201cIdentity-based encryption from the weil pairing,\u201d In J. Kilian, editor, CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pp.213-229, Springer, 2001.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] K. Lee, S.G. Choi, D.H. Lee, J.H. Park, and M. Yung, \u201cSelf-updatable encryption: Time constrained access control with hidden attributes and better efficiency,\u201d In K. Sako and P. Sarkar, editors, ASIACRYPT 2013, volume 8269 of Lecture Notes in Computer Science, pp.235-254, Springer, 2013.","DOI":"10.1007\/978-3-642-42033-7_13"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] K. Liang, J.K. Liu, D.S. Wong, and W. Susilo, \u201cAn efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing,\u201d In M. Kutylowski and J. Vaidya, editors, ESORICS 2014, volume 8712 of Lecture Notes in Computer Science, pp.257-272, Springer, 2014.","DOI":"10.1007\/978-3-319-11203-9_15"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] D. Naor, M. Naor, and J. Lotspiech, \u201cRevocation and tracing schemes for stateless receivers,\u201d In J. Kilian, editor, CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pp.41-62, Springer, 2001.","DOI":"10.1007\/3-540-44647-8_3"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] S. Park, K. Lee, and D.H. Lee, \u201cNew constructions of revocable identity-based encryption from multilinear maps,\u201d IEEE Trans. Inf. Forensics Security, vol.10, no.8, pp.1564-1577, 2015.","DOI":"10.1109\/TIFS.2015.2419180"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] A. Sahai, H. Seyalioglu, and B. Waters, \u201cDynamic credentials and ciphertext delegation for attribute-based encryption,\u201d In R. Safavi-Naini and R. Canetti, editors, CRYPTO 2012, volume 7417 of Lecture Notes in Computer Science, pp.199-217, Springer, 2012.","DOI":"10.1007\/978-3-642-32009-5_13"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] J.H. Seo and K. Emura, \u201cRevocable identity-based encryption revisited: Security model and construction,\u201d In K. Kurosawa and G. Hanaoka, editors, PKC 2013, volume 7778 of Lecture Notes in Computer Science, pp.216-234, Springer, 2013.","DOI":"10.1007\/978-3-642-36362-7_14"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E99.D\/7\/E99.D_2016EDL8042\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T13:33:47Z","timestamp":1498311227000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E99.D\/7\/E99.D_2016EDL8042\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":8,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2016]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2016edl8042","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}