{"id":"https://openalex.org/W3100929064","doi":"https://doi.org/10.1155/2020/8834872","title":"AKC-Based Revocable ABE Schemes from LWE Assumption","display_name":"AKC-Based Revocable ABE Schemes from LWE Assumption","publication_year":2020,"publication_date":"2020-11-16","ids":{"openalex":"https://openalex.org/W3100929064","doi":"https://doi.org/10.1155/2020/8834872","mag":"3100929064"},"language":"en","primary_location":{"id":"doi:10.1155/2020/8834872","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8834872","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8834872.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/8834872.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064067464","display_name":"Leixiao Cheng","orcid":"https://orcid.org/0000-0002-7231-0636"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Leixiao Cheng","raw_affiliation_strings":["School of Mathematical Sciences, Fudan University, Shanghai 200433, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematical Sciences, Fudan University, Shanghai 200433, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080296449","display_name":"Fei Meng","orcid":"https://orcid.org/0000-0001-9445-1547"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fei Meng","raw_affiliation_strings":["Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Jinan, Shandong 250100, China","School of Mathematics, Shandong University, Jinan, Shandong 250100, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Jinan, Shandong 250100, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"School of Mathematics, Shandong University, Jinan, Shandong 250100, China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103261073","display_name":"Xianmeng Meng","orcid":null},"institutions":[{"id":"https://openalex.org/I59483232","display_name":"Shandong University of Finance and Economics","ror":"https://ror.org/02e2nnq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I59483232"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianmeng Meng","raw_affiliation_strings":["School of Mathematics, Shandong University of Finance and Economics, Jinan, Shandong 250014, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics, Shandong University of Finance and Economics, Jinan, Shandong 250014, China","institution_ids":["https://openalex.org/I59483232"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019671504","display_name":"Qixin Zhang","orcid":"https://orcid.org/0000-0002-3141-392X"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qixin Zhang","raw_affiliation_strings":["Tandon School of Engineering, New York University, New York City, USA"],"affiliations":[{"raw_affiliation_string":"Tandon School of Engineering, New York University, New York City, USA","institution_ids":["https://openalex.org/I57206974"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5080296449"],"corresponding_institution_ids":["https://openalex.org/I154099455","https://openalex.org/I4210132990"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.4078,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.70762488,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7271358966827393},{"id":"https://openalex.org/keywords/revocation-list","display_name":"Revocation list","score":0.7099298238754272},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6874459981918335},{"id":"https://openalex.org/keywords/learning-with-errors","display_name":"Learning with errors","score":0.6583272218704224},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5715430974960327},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5349031686782837},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5194801092147827},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.49229350686073303},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4913410246372223},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.46978655457496643},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.46764087677001953},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.42534810304641724},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4189223051071167},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37894511222839355},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.3046458065509796},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.25284624099731445},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.11483824253082275}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7271358966827393},{"id":"https://openalex.org/C147296133","wikidata":"https://www.wikidata.org/wiki/Q196765","display_name":"Revocation list","level":5,"score":0.7099298238754272},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6874459981918335},{"id":"https://openalex.org/C2779014939","wikidata":"https://www.wikidata.org/wiki/Q6510239","display_name":"Learning with errors","level":3,"score":0.6583272218704224},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5715430974960327},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5349031686782837},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5194801092147827},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.49229350686073303},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4913410246372223},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.46978655457496643},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.46764087677001953},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.42534810304641724},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4189223051071167},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37894511222839355},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.3046458065509796},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.25284624099731445},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.11483824253082275},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/8834872","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8834872","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8834872.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:6372c966c3a84499939be53f0485ba53","is_oa":true,"landing_page_url":"https://doaj.org/article/6372c966c3a84499939be53f0485ba53","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/8834872","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8834872","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8834872.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.47999998927116394,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[{"id":"https://openalex.org/G1467633583","display_name":null,"funder_award_id":"MMJJ20180210","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G279538958","display_name":null,"funder_award_id":"61672019","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G323530312","display_name":null,"funder_award_id":"6183201","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G37568934","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5733390078","display_name":null,"funder_award_id":"Grant nos.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7163822104","display_name":null,"funder_award_id":"61832012","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7935533444","display_name":null,"funder_award_id":"201802","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3100929064.pdf","grobid_xml":"https://content.openalex.org/works/W3100929064.grobid-xml"},"referenced_works_count":70,"referenced_works":["https://openalex.org/W21280657","https://openalex.org/W66767074","https://openalex.org/W74973629","https://openalex.org/W151792660","https://openalex.org/W153667495","https://openalex.org/W162787226","https://openalex.org/W190530026","https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1535624876","https://openalex.org/W1595022482","https://openalex.org/W1638904324","https://openalex.org/W1839785783","https://openalex.org/W1983370494","https://openalex.org/W1997993565","https://openalex.org/W2007466965","https://openalex.org/W2038761522","https://openalex.org/W2042220809","https://openalex.org/W2071825329","https://openalex.org/W2076046175","https://openalex.org/W2100847176","https://openalex.org/W2106116277","https://openalex.org/W2106970188","https://openalex.org/W2108072891","https://openalex.org/W2117582073","https://openalex.org/W2117616411","https://openalex.org/W2122973102","https://openalex.org/W2130410178","https://openalex.org/W2135205181","https://openalex.org/W2137147061","https://openalex.org/W2138001464","https://openalex.org/W2160608575","https://openalex.org/W2168676717","https://openalex.org/W2184323066","https://openalex.org/W2217128562","https://openalex.org/W2398538644","https://openalex.org/W2494078997","https://openalex.org/W2519173433","https://openalex.org/W2553376019","https://openalex.org/W2561675875","https://openalex.org/W2766685577","https://openalex.org/W2774165115","https://openalex.org/W2775711064","https://openalex.org/W2806302538","https://openalex.org/W2811025351","https://openalex.org/W2899601388","https://openalex.org/W2947797347","https://openalex.org/W2951585971","https://openalex.org/W2952300607","https://openalex.org/W2998533495","https://openalex.org/W3004143931","https://openalex.org/W3023478445","https://openalex.org/W3028822629","https://openalex.org/W3029607348","https://openalex.org/W3111297213","https://openalex.org/W3158841814","https://openalex.org/W4297991408","https://openalex.org/W6600892549","https://openalex.org/W6606233919","https://openalex.org/W6607747584","https://openalex.org/W6638969482","https://openalex.org/W6661037805","https://openalex.org/W6669917605","https://openalex.org/W6683392288","https://openalex.org/W6724049718","https://openalex.org/W6726936081","https://openalex.org/W6730204399","https://openalex.org/W6746094063","https://openalex.org/W6763439274","https://openalex.org/W6764375271"],"related_works":["https://openalex.org/W2948977325","https://openalex.org/W2398538644","https://openalex.org/W3094954003","https://openalex.org/W2045983470","https://openalex.org/W2946105297","https://openalex.org/W3022658964","https://openalex.org/W2321203572","https://openalex.org/W2751458639","https://openalex.org/W3208745782","https://openalex.org/W3168932674"],"abstract_inverted_index":{"The":[0,61,281],"emergence":[1],"of":[2,35,65,81,122,129,143,205,240,277,287],"quantum":[3,26,45],"computing":[4],"threatens":[5],"many":[6],"classical":[7],"cryptographic":[8],"schemes,":[9,131],"leading":[10],"to":[11,25,32,40,44,77,149,227,253,267],"the":[12,36,52,78,120,141,150,203,206,213,221,224,232,245,258,261,271,275,278,285],"innovations":[13],"in":[14,231,244,270],"public-key":[15,68],"cryptography":[16,19,29],"for":[17,67,110,260],"postquantum":[18],"primitives":[20],"and":[21,58,71,83,89,97,145,155,170,197,212,218,256],"protocols":[22,66,147],"that":[23],"resist":[24],"attacks.":[27],"Lattice-based":[28],"is":[30,208,216],"considered":[31],"be":[33,49,138,268],"one":[34],"promising":[37],"mathematical":[38],"approaches":[39],"achieving":[41,195],"security":[42],"resistant":[43],"attacks,":[46],"which":[47,186],"could":[48],"built":[50],"on":[51,87,140,153,163,192],"learning":[53],"with":[54,159],"errors":[55],"(LWE)":[56],"problem":[57],"its":[59,90,156],"variants.":[60],"fundamental":[62],"building":[63],"blocks":[64],"encryption":[69,135,181],"(PKE)":[70],"key":[72,94,99],"encapsulation":[73],"mechanism":[74],"(KEM)":[75],"submitted":[76,148],"National":[79],"Institute":[80],"Standards":[82],"Technology":[84],"(NIST)":[85],"based":[86,152],"LWE":[88,154,279],"variants":[91],"are":[92,107],"called":[93],"consensus":[95,100],"(KC)":[96],"asymmetric":[98],"(AKC)":[101],"by":[102,124,223],"Jin":[103],"et":[104],"al.":[105],"They":[106],"powerful":[108],"tools":[109],"constructing":[111],"PKE":[112,130],"schemes.":[113],"In":[114],"this":[115],"work,":[116],"we":[117,174],"further":[118],"demonstrate":[119],"power":[121],"KC/AKC":[123],"proposing":[125],"two":[126,176,282],"special":[127],"types":[128],"namely,":[132],"revocable":[133,178,234,247],"attribute-based":[134,180],"(RABE).":[136],"To":[137],"specific,":[139],"basis":[142],"AKC":[144],"PKE/KEM":[146],"NIST":[151],"variants,":[157],"combined":[158],"full-rank":[160],"difference,":[161],"trapdoor":[162],"lattices,":[164],"sampling":[165],"algorithms,":[166],"leftover":[167],"hash":[168],"lemma,":[169],"binary":[171],"tree":[172],"structure,":[173],"propose":[175],"directly":[177],"ciphertext-policy":[179],"(DR-ABE)":[182],"schemes":[183,265,283],"from":[184,210],"LWE,":[185],"support":[187],"flexible":[188],"threshold":[189],"access":[190],"policies":[191],"multivalued":[193],"attributes,":[194],"user-level":[196,233],"attribute-level":[198,246],"user":[199,230,243],"revocation,":[200],"respectively.":[201],"Specifically,":[202],"construction":[204],"ciphertext":[207,222],"derived":[209],"AKC,":[211],"revocation":[214],"list":[215],"defined":[217],"embedded":[219],"into":[220],"message":[225],"sender":[226],"revoke":[228,237],"a":[229,241],"scheme":[235],"or":[236],"some":[238],"attributes":[239],"certain":[242],"scheme.":[248],"We":[249],"also":[250],"discuss":[251],"how":[252],"outsource":[254],"decryption":[255],"reduce":[257],"workload":[259],"end":[262],"user.":[263],"Our":[264],"proved":[266],"secure":[269],"standard":[272],"model,":[273],"assuming":[274],"hardness":[276],"problem.":[280],"imply":[284],"versatility":[286],"KC/AKC.":[288]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
