{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:08:56Z","timestamp":1730344136541,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.23919\/isita.2018.8664291","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T19:49:11Z","timestamp":1552333751000},"page":"707-711","source":"Crossref","is-referenced-by-count":2,"title":["Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption"],"prefix":"10.23919","author":[{"given":"Junrichiro","family":"Hayata","sequence":"first","affiliation":[]},{"given":"Masahito","family":"Ishizaka","sequence":"additional","affiliation":[]},{"given":"Yusuke","family":"Sakai","sequence":"additional","affiliation":[]},{"given":"Goichiro","family":"Hanaoka","sequence":"additional","affiliation":[]},{"given":"Kanta","family":"Matsuura","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218594"},{"key":"ref11","first-page":"1143","article-title":"?o?o?","author":"bost","year":"2016","journal-title":"Forward Secure Searchable Encryption ACM Conference on Computer and Communications Security"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"277","DOI":"10.5755\/j01.itc.43.3.6429","article-title":"A New Public Key Encryption with Conjunctive Field Keyword Search Scheme","volume":"43","author":"hwang","year":"2014","journal-title":"ITC"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/3839254"},{"key":"ref14","first-page":"47","article-title":"Identity-Based Cryptosystems and Signature Schemes","author":"shamir","year":"1984","journal-title":"Crypto"},{"key":"ref15","first-page":"213","article-title":"Identity-Based Encryption from the Weil Pairing","author":"boneh","year":"2001","journal-title":"Crypto"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref17","first-page":"205","article-title":"Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions","author":"abdalla","year":"2005","journal-title":"Crypto"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.09.013"},{"key":"ref19","first-page":"462","article-title":"VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data","author":"zheng","year":"2013","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref4","article-title":"Secure Indexes","volume":"216","author":"goh","year":"2003","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref3","article-title":"Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage","volume":"5","author":"iftekhar","year":"2015","journal-title":"Human-centric Computing and Information Sciences"},{"key":"ref6","first-page":"235","article-title":"Secure Keyword Search Using Bloom Filter with Specified Character Positions","author":"suga","year":"2012","journal-title":"ProvSec"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655025"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EIDWT.2013.69"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/978-3-642-39884-1_22","article-title":"Parallel and Dynamic Searchable Symmetric Encryption","author":"kamara","year":"2013","journal-title":"Financial Cryptography"},{"key":"ref2","first-page":"506","article-title":"Public Key Encryption with Keyword Search","author":"boneh","year":"2004","journal-title":"Eurocrypt"},{"key":"ref1","first-page":"44","article-title":"Practical Techniques for Searches on Encrypted Data","author":"song","year":"2000","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1504\/IJHPSA.2014.059867"},{"key":"ref20","first-page":"899","article-title":"Privacy-preserving Attribute Based Searchable Encryption","author":"chaudhari","year":"2015","journal-title":"IACR Cryptology ePrint Archive"}],"event":{"name":"2018 International Symposium on Information Theory and Its Applications (ISITA)","start":{"date-parts":[[2018,10,28]]},"location":"Singapore","end":{"date-parts":[[2018,10,31]]}},"container-title":["2018 International Symposium on Information Theory and Its Applications (ISITA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8660385\/8664205\/08664291.pdf?arnumber=8664291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T00:35:44Z","timestamp":1643243744000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8664291\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.23919\/isita.2018.8664291","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}