{"id":"https://openalex.org/W2806937398","doi":"https://doi.org/10.1109/ispa/iucc.2017.00097","title":"A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy","display_name":"A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy","publication_year":2017,"publication_date":"2017-12-01","ids":{"openalex":"https://openalex.org/W2806937398","doi":"https://doi.org/10.1109/ispa/iucc.2017.00097","mag":"2806937398"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ispa/iucc.2017.00097","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101887977","display_name":"Fang Qi","orcid":"https://orcid.org/0000-0003-2227-9340"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fang Qi","raw_affiliation_strings":["School of Information Science and Engineering, Central South University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100343450","display_name":"Ke Li","orcid":"https://orcid.org/0000-0001-7200-4244"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Li","raw_affiliation_strings":["School of Information Science and Engineering, Central South University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003760707","display_name":"Zhe Tang","orcid":"https://orcid.org/0000-0002-8592-0505"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhe Tang","raw_affiliation_strings":["School of Information Science and Engineering, Central South University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.076,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":3,"citation_normalized_percentile":{"value":0.469922,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":75,"max":77},"biblio":{"volume":null,"issue":null,"first_page":"607","last_page":"613"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9975,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.83096725},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7900252},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7654569},{"id":"https://openalex.org/C31170391","wikidata":"https://www.wikidata.org/wiki/Q188619","display_name":"Hierarchy","level":2,"score":0.6844898},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.58734477},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5342466},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.5244377},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47425452},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.46893218},{"id":"https://openalex.org/C75814411","wikidata":"https://www.wikidata.org/wiki/Q4818714","display_name":"Attribute domain","level":3,"score":0.4454094},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.42562062},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3193502},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.20902076},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.16138157},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.12879607},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11853716},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C34447519","wikidata":"https://www.wikidata.org/wiki/Q179522","display_name":"Market economy","level":1,"score":0.0},{"id":"https://openalex.org/C111012933","wikidata":"https://www.wikidata.org/wiki/Q3137210","display_name":"Rough set","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ispa/iucc.2017.00097","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.65,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":20,"referenced_works":["https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1524327560","https://openalex.org/W1763482972","https://openalex.org/W1923841234","https://openalex.org/W2003850925","https://openalex.org/W2020753934","https://openalex.org/W2022024040","https://openalex.org/W2086642346","https://openalex.org/W2150386397","https://openalex.org/W2152924492","https://openalex.org/W2160262242","https://openalex.org/W2294107196","https://openalex.org/W2313383357","https://openalex.org/W2345277316","https://openalex.org/W2368943972","https://openalex.org/W2470298330","https://openalex.org/W2528277418","https://openalex.org/W2529523863","https://openalex.org/W3128663643"],"related_works":["https://openalex.org/W4300978562","https://openalex.org/W4283160672","https://openalex.org/W4247536566","https://openalex.org/W4241418540","https://openalex.org/W3119814709","https://openalex.org/W2725786787","https://openalex.org/W2404647514","https://openalex.org/W2018477250","https://openalex.org/W1667647204","https://openalex.org/W1508895727"],"abstract_inverted_index":{"The":[0,38],"existing":[1],"attribute":[2,6,26,34,72,76,81,85,116],"based":[3,27,35,143],"encryption":[4,36],"with":[5],"hierarchy":[7],"program":[8],"has":[9],"only":[10],"one":[11],"authority,":[12,44],"which":[13,87],"causes":[14],"serious":[15],"performance":[16,131],"bottlenecks.":[17],"In":[18],"order":[19,104],"to":[20,105],"solve":[21],"the":[22,41,47,53,58,65,68,71,80,84,90,127,135,139,145,149],"problem":[23],"in":[24,67,103,148],"hierarchical":[25,33,120],"encryption,":[28],"we":[29,108,124],"proposes":[30],"a":[31,110],"multi-authority":[32],"scheme.":[37,136],"scheme":[39],"removes":[40],"trusted":[42],"central":[43],"and":[45,56,74,83,92,130],"prevents":[46],"communication":[48],"between":[49],"authorities,":[50],"thereby":[51],"ensuring":[52],"users'":[54],"privacy":[55],"improving":[57],"system":[59,69],"performance.":[60],"We":[61],"require":[62],"that":[63,89],"all":[64],"attributes":[66,94,102],"construct":[70],"trees,":[73],"any":[75],"is":[77],"represented":[78],"by":[79,118],"trees":[82,117],"path,":[86],"ensure":[88],"users":[91],"ciphertexts":[93],"quickly":[95],"matching.":[96],"A":[97],"user":[98],"must":[99],"have":[100],"satisfactory":[101],"decrypt.":[106],"Additionally,":[107],"propose":[109],"more":[111],"reasonable":[112],"way":[113],"of":[114,134,141],"dividing":[115],"using":[119],"clustering":[121],"algorithm.":[122],"Finally,":[123],"give":[125],"out":[126],"correctness":[128],"analysis":[129,133],"comparison":[132],"It":[137],"meets":[138],"security":[140],"IND-sAtr-CPA":[142],"on":[144],"DBDH":[146],"assumption":[147],"standard":[150],"model.":[151]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2806937398","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-01-04T14:06:27.148382","created_date":"2018-06-13"}