{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T01:25:12Z","timestamp":1648689912716},"reference-count":0,"publisher":"IOS Press","license":[{"start":{"date-parts":[[2021,12,22]],"date-time":"2021-12-22T00:00:00Z","timestamp":1640131200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,22]]},"abstract":"<jats:p>Accountable authority identity-based encryption (A-IBE) is an extension of identity-based encryption (IBE) in which private key\u2019s source can be traced, i.e., whether the key comes from a private key generator or a user. SM9 is an official cryptography standard of China which defines a practical IBE scheme. In this paper, we construct a practical A-IBE scheme from the SM9-IBE scheme. Our A-IBE scheme has public traceability and is proven secure if the based SM9-IBE scheme is secure. Compared with other A-IBE schemes, our A-IBE scheme has better efficiency in encryption and decryption.<\/jats:p>","DOI":"10.3233\/faia210432","type":"book-chapter","created":{"date-parts":[[2021,12,29]],"date-time":"2021-12-29T10:31:13Z","timestamp":1640773873000},"source":"Crossref","is-referenced-by-count":0,"title":["A New Identity-Based Encryption Scheme with Accountable Authority Based on SM9"],"prefix":"10.3233","author":[{"given":"Ke","family":"Wang","sequence":"first","affiliation":[{"name":"Key Laboratory of High Confidence Software Technologies (Peking University), MoE, Beijing, China"},{"name":"Department of Computer Science and Technology, EECS, Peking University, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yuan","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Chongqing University of Technology, Chongqing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Song","family":"Luo","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Chongqing University of Technology, Chongqing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhi","family":"Guan","sequence":"additional","affiliation":[{"name":"Key Laboratory of High Confidence Software Technologies (Peking University), MoE, Beijing, China"},{"name":"National Engineering Research Center for Software Engineering, Peking University, Beijing, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"7437","container-title":["Frontiers in Artificial Intelligence and Applications","Proceedings of CECNet 2021"],"original-title":[],"link":[{"URL":"https:\/\/ebooks.iospress.nl\/pdf\/doi\/10.3233\/FAIA210432","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,29]],"date-time":"2021-12-29T10:31:15Z","timestamp":1640773875000},"score":1,"resource":{"primary":{"URL":"https:\/\/ebooks.iospress.nl\/doi\/10.3233\/FAIA210432"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,22]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/faia210432","relation":{},"ISSN":["0922-6389","1879-8314"],"issn-type":[{"value":"0922-6389","type":"print"},{"value":"1879-8314","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,22]]}}}