{"id":"https://openalex.org/W2785302923","doi":"https://doi.org/10.1145/3136825.3136877","title":"A universal cloud user revocation scheme with key-escrow resistance for ciphertext-policy attribute-based access control","display_name":"A universal cloud user revocation scheme with key-escrow resistance for ciphertext-policy attribute-based access control","publication_year":2017,"publication_date":"2017-10-13","ids":{"openalex":"https://openalex.org/W2785302923","doi":"https://doi.org/10.1145/3136825.3136877","mag":"2785302923"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3136825.3136877","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049534988","display_name":"Nazatul Haque Sultan","orcid":"https://orcid.org/0000-0003-4076-5553"},"institutions":[{"id":"https://openalex.org/I1317621060","display_name":"Indian Institute of Technology Guwahati","ror":"https://ror.org/0022nd079","country_code":"IN","type":"funder","lineage":["https://openalex.org/I1317621060"]},{"id":"https://openalex.org/I4210089896","display_name":"Indian Institute of Information Technology Guwahati","ror":"https://ror.org/00bb9ch64","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210089896"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nazatul Haque Sultan","raw_affiliation_strings":["IIIT Guwahati, India"],"affiliations":[{"raw_affiliation_string":"IIIT Guwahati, India","institution_ids":["https://openalex.org/I1317621060","https://openalex.org/I4210089896"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047753580","display_name":"Ferdous Ahmed Barbhuiya","orcid":"https://orcid.org/0000-0001-8247-9171"},"institutions":[{"id":"https://openalex.org/I4210089896","display_name":"Indian Institute of Information Technology Guwahati","ror":"https://ror.org/00bb9ch64","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210089896"]},{"id":"https://openalex.org/I1317621060","display_name":"Indian Institute of Technology Guwahati","ror":"https://ror.org/0022nd079","country_code":"IN","type":"funder","lineage":["https://openalex.org/I1317621060"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ferdous Ahmed Barbhuiya","raw_affiliation_strings":["IIIT Guwahati, India"],"affiliations":[{"raw_affiliation_string":"IIIT Guwahati, India","institution_ids":["https://openalex.org/I4210089896","https://openalex.org/I1317621060"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060928888","display_name":"Nityananda Sarma","orcid":"https://orcid.org/0000-0001-8288-1080"},"institutions":[{"id":"https://openalex.org/I126601174","display_name":"Tezpur University","ror":"https://ror.org/005x56091","country_code":"IN","type":"funder","lineage":["https://openalex.org/I126601174"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nityananda Sarma","raw_affiliation_strings":["Tezpur University, India"],"affiliations":[{"raw_affiliation_string":"Tezpur University, India","institution_ids":["https://openalex.org/I126601174"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.374,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":6,"citation_normalized_percentile":{"value":0.553942,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":81,"max":82},"biblio":{"volume":null,"issue":null,"first_page":"11","last_page":"18"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9928,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9902,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-escrow","display_name":"Key escrow","score":0.9369825},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.88047814}],"concepts":[{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.9369825},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.88047814},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7886199},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7171653},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6909274},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.66664916},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.640326},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6157636},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5427317},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.50975674},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47583985},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41977036},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.35239005},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.05943966},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3136825.3136877","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":23,"referenced_works":["https://openalex.org/W1498316612","https://openalex.org/W1511886987","https://openalex.org/W1763482972","https://openalex.org/W1978731185","https://openalex.org/W2042220809","https://openalex.org/W2076046175","https://openalex.org/W2077055139","https://openalex.org/W2090658700","https://openalex.org/W2099111195","https://openalex.org/W2106806183","https://openalex.org/W2108072891","https://openalex.org/W2108653485","https://openalex.org/W2113857797","https://openalex.org/W2116626915","https://openalex.org/W2131725908","https://openalex.org/W2160608575","https://openalex.org/W2171574715","https://openalex.org/W2325737963","https://openalex.org/W2331349420","https://openalex.org/W2477329965","https://openalex.org/W2507677966","https://openalex.org/W2521994905","https://openalex.org/W756877705"],"related_works":["https://openalex.org/W777049646","https://openalex.org/W4292493860","https://openalex.org/W4248847356","https://openalex.org/W4235894667","https://openalex.org/W3150092547","https://openalex.org/W3129009230","https://openalex.org/W2767823571","https://openalex.org/W2744624421","https://openalex.org/W2744512280","https://openalex.org/W2620043489"],"abstract_inverted_index":{"Cloud":[0],"storage":[1],"service":[2],"allows":[3],"its":[4],"users":[5],"to":[6,41,75],"store":[7],"and":[8,52,102,126],"share":[9],"data":[10,18],"in":[11,54,114,122],"a":[12,67],"cloud":[13],"environment.":[14],"To":[15],"secure":[16,101],"the":[17,84,110,115],"from":[19],"unauthorized":[20],"entities":[21],"while":[22],"sharing,":[23],"cryptographic":[24],"mechanisms":[25],"are":[26,56],"used.":[27],"Ciphertext-Policy":[28],"Attribute-Based":[29],"Encryption":[30],"(CP-ABE)":[31],"is":[32,99],"one":[33],"such":[34],"mechanism,":[35],"which":[36],"has":[37,86],"been":[38,87],"widely":[39],"used":[40],"achieve":[42],"fine-grained":[43],"access":[44,72],"control":[45,73],"over":[46],"encrypted":[47],"data.":[48],"However,":[49],"user":[50,78],"revocation":[51,105],"keyescrow,":[53],"CP-ABE,":[55],"still":[57],"remaining":[58],"as":[59],"challenging":[60],"problems.":[61],"In":[62],"this":[63],"paper,":[64],"we":[65],"propose":[66],"key-escrow":[68],"resistant":[69],"CP-ABE":[70],"based":[71],"scheme":[74,85],"provide":[76],"efficient":[77],"revocation.":[79],"The":[80,93],"security":[81,94],"analysis":[82,95],"of":[83,124],"done":[88],"using":[89],"Information":[90],"Theory":[91],"Tools.":[92],"establishes":[96],"that":[97,118],"it":[98,119],"unconditionally":[100],"provides":[103],"any-wise":[104],"capability.":[106],"Moreover,":[107],"comparison":[108],"with":[109],"other":[111],"notable":[112],"works":[113],"area":[116],"shows":[117],"outperforms":[120],"them":[121],"terms":[123],"computational":[125],"communication":[127],"overheads.":[128]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2785302923","counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-03-18T16:06:11.481715","created_date":"2018-02-02"}