{"id":"https://openalex.org/W2107081597","doi":"https://doi.org/10.1007/s10623-015-0131-1","title":"Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption","display_name":"Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption","publication_year":2015,"publication_date":"2015-09-07","ids":{"openalex":"https://openalex.org/W2107081597","doi":"https://doi.org/10.1007/s10623-015-0131-1","mag":"2107081597"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10623-015-0131-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10623-015-0131-1.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10623-015-0131-1.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029108964","display_name":"Tatsuaki Okamoto","orcid":"https://orcid.org/0000-0001-7803-812X"},"institutions":[{"id":"https://openalex.org/I2800381926","display_name":"Musashino Academia Musicae","ror":"https://ror.org/008bb2h75","country_code":"JP","type":"education","lineage":["https://openalex.org/I2800381926"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tatsuaki Okamoto","raw_affiliation_strings":["NTT, Musashino, Japan"],"affiliations":[{"raw_affiliation_string":"NTT, Musashino, Japan","institution_ids":["https://openalex.org/I2800381926"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010032290","display_name":"Katsuyuki Takashima","orcid":"https://orcid.org/0000-0001-5216-2229"},"institutions":[{"id":"https://openalex.org/I4210133125","display_name":"Mitsubishi Electric (Japan)","ror":"https://ror.org/033y26782","country_code":"JP","type":"company","lineage":["https://openalex.org/I1306287861","https://openalex.org/I4210133125"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Katsuyuki Takashima","raw_affiliation_strings":["Mitsubishi Electric, Kamakura, Japan#TAB#"],"affiliations":[{"raw_affiliation_string":"Mitsubishi Electric, Kamakura, Japan#TAB#","institution_ids":["https://openalex.org/I4210133125"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890,"provenance":"doaj"},"apc_paid":{"value":2290,"currency":"EUR","value_usd":2890,"provenance":"doaj"},"fwci":4.119,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":43,"citation_normalized_percentile":{"value":0.999968,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"77","issue":"2-3","first_page":"725","last_page":"771"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9922,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9907,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/constant","display_name":"Constant (computer programming)","score":0.7460958},{"id":"https://openalex.org/keywords/broadcast-encryption","display_name":"Broadcast encryption","score":0.5813583},{"id":"https://openalex.org/keywords/functional-encryption","display_name":"Functional encryption","score":0.4680362}],"concepts":[{"id":"https://openalex.org/C2777027219","wikidata":"https://www.wikidata.org/wiki/Q1284190","display_name":"Constant (computer programming)","level":2,"score":0.7460958},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.61455303},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6111558},{"id":"https://openalex.org/C2778281673","wikidata":"https://www.wikidata.org/wiki/Q4972106","display_name":"Broadcast encryption","level":4,"score":0.5813583},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.502687},{"id":"https://openalex.org/C2780746774","wikidata":"https://www.wikidata.org/wiki/Q17014981","display_name":"Functional encryption","level":4,"score":0.4680362},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.43296856},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.29067326},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24395597},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.20589933},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.1519543},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10623-015-0131-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10623-015-0131-1.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10623-015-0131-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10623-015-0131-1.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.79,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":31,"referenced_works":["https://openalex.org/W1484751769","https://openalex.org/W1498316612","https://openalex.org/W1511513446","https://openalex.org/W1522101599","https://openalex.org/W1538349060","https://openalex.org/W1546831026","https://openalex.org/W1564449568","https://openalex.org/W1596208550","https://openalex.org/W1601035152","https://openalex.org/W1601334779","https://openalex.org/W1724472458","https://openalex.org/W1769443955","https://openalex.org/W177444027","https://openalex.org/W1806049065","https://openalex.org/W1973801321","https://openalex.org/W2008701790","https://openalex.org/W2087000693","https://openalex.org/W2108072891","https://openalex.org/W2117616411","https://openalex.org/W2122119548","https://openalex.org/W2138001464","https://openalex.org/W2145255308","https://openalex.org/W2161214158","https://openalex.org/W2184303230","https://openalex.org/W2295764142","https://openalex.org/W2398218486","https://openalex.org/W2401547150","https://openalex.org/W2899558955","https://openalex.org/W2949293557","https://openalex.org/W2952321797","https://openalex.org/W50248066"],"related_works":["https://openalex.org/W4390331425","https://openalex.org/W4313446971","https://openalex.org/W2241383433","https://openalex.org/W2241147170","https://openalex.org/W2117616411","https://openalex.org/W2110903266","https://openalex.org/W2002568678","https://openalex.org/W1964433652","https://openalex.org/W1963456813","https://openalex.org/W1484751769"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3],"present":[4],"two":[5,88,144],"non-zero":[6],"inner-product":[7,90],"encryption":[8,91,120],"(NIPE)":[9],"schemes":[10,33,45,93,142],"that":[11,58,128],"are":[12],"adaptively":[13,60,78,105,130],"secure":[14,61,79,106,131],"under":[15,62,107,132],"a":[16,148,158],"standard":[17,26,82,113],"assumption,":[18,23],"the":[19,25,30,38,63,81,108,112,133,139,156],"decisional":[20],"linear":[21],"(DLIN)":[22],"in":[24,80,111,143],"model.":[27,83,114],"One":[28],"of":[29,95],"proposed":[31,140],"NIPE":[32,44],"features":[34,40],"constant-size":[35,41,53,56,71,74,98,101,123,126,153,163],"ciphertexts":[36,54,72,99,124],"and":[37,103,155],"other":[39,157],"secret-keys.":[42],"Our":[43],"imply":[46,116],"an":[47,117],"identity-based":[48,118],"revocation":[49],"(IBR)":[50],"system":[51,121],"with":[52,70,122,152,162],"or":[55,73,100,125],"secret-keys":[57,75,102,127],"is":[59,104,129,147],"DLIN":[64,109,134],"assumption.":[65,135],"Any":[66],"previous":[67],"IBR":[68],"scheme":[69,151,161],"was":[76],"not":[77],"This":[84],"paper":[85],"also":[86,137],"presents":[87],"zero":[89],"(ZIPE)":[92],"each":[94],"which":[96],"has":[97],"assumption":[110],"They":[115],"broadcast":[119],"We":[136],"extend":[138],"ZIPE":[141,150,160],"directions,":[145],"one":[146],"fully-attribute-hiding":[149],"secret-keys,":[154],"hierarchical":[159],"ciphertexts.":[164]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2107081597","counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":1}],"updated_date":"2024-12-11T08:20:39.028918","created_date":"2016-06-24"}