{"id":"https://openalex.org/W2745460575","doi":"https://doi.org/10.1504/ijact.2017.10007294","title":"CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance","display_name":"CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2745460575","doi":"https://doi.org/10.1504/ijact.2017.10007294","mag":"2745460575"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijact.2017.10007294","pdf_url":null,"source":{"id":"https://openalex.org/S55392106","display_name":"International Journal of Applied Cryptography","issn_l":"1753-0563","issn":["1753-0563","1753-0571"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034689340","display_name":"Junji Shikata","orcid":"https://orcid.org/0000-0003-2861-359X"},"institutions":[{"id":"https://openalex.org/I180203408","display_name":"Yokohama National University","ror":"https://ror.org/03zyp6p76","country_code":"JP","type":"funder","lineage":["https://openalex.org/I180203408"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Junji Shikata","raw_affiliation_strings":["Graduate School of Environment and Information Sciences, Yokohama National University, Japan","Institute of Advanced Sciences, Yokohama National University, 79-7 Tokiwadai, Hodogaya-ku, Yokohama, 240-8501, Japan"],"affiliations":[{"raw_affiliation_string":"Institute of Advanced Sciences, Yokohama National University, 79-7 Tokiwadai, Hodogaya-ku, Yokohama, 240-8501, Japan","institution_ids":["https://openalex.org/I180203408"]},{"raw_affiliation_string":"Graduate School of Environment and Information Sciences, Yokohama National University, Japan","institution_ids":["https://openalex.org/I180203408"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102008652","display_name":"Yohei Watanabe","orcid":"https://orcid.org/0000-0003-4028-8603"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yohei Watanabe","raw_affiliation_strings":["Graduate School of Informatics and Engineering, The University of Electro-Communications 1-5-1 Chofugaoka, Chofu, Tokyo, 182-8585, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Informatics and Engineering, The University of Electro-Communications 1-5-1 Chofugaoka, Chofu, Tokyo, 182-8585, Japan","institution_ids":["https://openalex.org/I20529979"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063464437","display_name":"Yuu Ishida","orcid":null},"institutions":[{"id":"https://openalex.org/I180203408","display_name":"Yokohama National University","ror":"https://ror.org/03zyp6p76","country_code":"JP","type":"funder","lineage":["https://openalex.org/I180203408"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yuu Ishida","raw_affiliation_strings":["Graduate School of Environment and Information Sciences, Yokohama National University, 79-7 Tokiwadai, Hodogaya-ku, Yokohama, 240-8501, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Environment and Information Sciences, Yokohama National University, 79-7 Tokiwadai, Hodogaya-ku, Yokohama, 240-8501, Japan","institution_ids":["https://openalex.org/I180203408"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.134,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.742605,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":86,"max":87},"biblio":{"volume":"3","issue":"3","first_page":"288","last_page":"288"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9945,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9836,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.70923686},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.6018239},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plain text","score":0.46177113}],"concepts":[{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.70923686},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6692481},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.6018239},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5265565},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5095065},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.46177113},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.46083763},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39492065},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.36726674},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3430006},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.2501743},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.14449802},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijact.2017.10007294","pdf_url":null,"source":{"id":"https://openalex.org/S55392106","display_name":"International Journal of Applied Cryptography","issn_l":"1753-0563","issn":["1753-0563","1753-0571"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4310649982","https://openalex.org/W4292571928","https://openalex.org/W4292493860","https://openalex.org/W4236344152","https://openalex.org/W4235894667","https://openalex.org/W2997530193","https://openalex.org/W2942137924","https://openalex.org/W2767823571","https://openalex.org/W2620043489","https://openalex.org/W2011667854"],"abstract_inverted_index":{"Key":[0],"revocation":[1,18],"functionality":[2,19],"is":[3,51,61,105,126,166],"important":[4],"for":[5],"identity-based":[6,138],"encryption":[7],"(IBE)":[8],"to":[9],"manage":[10],"users":[11],"dynamically.":[12],"Revocable":[13],"IBE":[14,114],"(RIBE)":[15],"realises":[16],"such":[17],"with":[20,46,91],"scalability.":[21],"In":[22,78],"PKC":[23],"2013,":[24],"Seo":[25],"and":[26,40,59,95,143,157,172],"Emura":[27],"first":[28,43,82,94,171],"considered":[29],"decryption":[30],"key":[31,139],"exposure":[32],"resistance":[33],"(DKER)":[34],"as":[35],"a":[36,107,111,120,136,146,150,158],"new":[37],"realistic":[38],"threat,":[39],"proposed":[41],"the":[42,129,155,170,178],"RIBE":[44,49,64,89,152],"scheme":[45,50,65,115,125,153,165],"DKER.":[47,92],"Their":[48],"adaptively":[52,66,87],"secure":[53,67],"against":[54,68],"chosen":[55,69],"plaintext":[56],"attacks":[57,71],"(CPA),":[58],"there":[60],"no":[62],"concrete":[63],"ciphertext":[70,179],"(CCA)":[72],"even":[73],"without":[74],"DKER":[75],"so":[76],"far.":[77],"this":[79],"paper,":[80],"we":[81,133,144],"propose":[83,135],"three":[84],"constructions":[85],"of":[86,149,177],"CCA-secure":[88,121,151],"schemes":[90,97],"The":[93,123,163],"second":[96,173],"are":[98],"based":[99],"on":[100],"an":[101],"existing":[102],"transformation,":[103,109],"which":[104],"called":[106],"BCHK":[108],"that":[110],"CPA-secure":[112],"hierarchical":[113],"can":[116],"be":[117],"transformed":[118],"into":[119],"scheme.":[122],"third":[124,164],"constructed":[127],"via":[128],"KEM/DEM":[130],"framework.":[131],"Specifically,":[132],"newly":[134],"revocable":[137],"encapsulation":[140,160],"mechanism":[141,161],"(RIB-KEM),":[142],"show":[145],"generic":[147],"construction":[148],"from":[154],"RIB-KEM":[156],"data":[159],"(DEM).":[162],"more":[167],"efficient":[168],"than":[169],"ones":[174],"in":[175],"terms":[176],"size.":[180]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2745460575","counts_by_year":[{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1}],"updated_date":"2025-04-16T01:21:21.014998","created_date":"2017-08-31"}