{"id":"https://openalex.org/W3162018903","doi":"https://doi.org/10.1515/jmc-2020-0039","title":"Revocable attribute-based proxy re-encryption","display_name":"Revocable attribute-based proxy re-encryption","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3162018903","doi":"https://doi.org/10.1515/jmc-2020-0039","mag":"3162018903"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2020-0039","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2020-0039/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2020-0039/pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000037502","display_name":"Fucai Luo","orcid":"https://orcid.org/0000-0001-7961-5750"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":true,"raw_author_name":"Fucai Luo","raw_affiliation_strings":["College of Science and Engineering, Ringgold Standard Institution, Hamad Bin Khalifa University , Qatar , Doha , Qatar"],"affiliations":[{"raw_affiliation_string":"College of Science and Engineering, Ringgold Standard Institution, Hamad Bin Khalifa University , Qatar , Doha , Qatar","institution_ids":["https://openalex.org/I4210144839"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002005849","display_name":"Saif Al\u2010Kuwari","orcid":"https://orcid.org/0000-0002-4402-7710"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Saif Al-Kuwari","raw_affiliation_strings":["College of Science and Engineering, Ringgold Standard Institution, Hamad Bin Khalifa University , Qatar , Doha , Qatar"],"affiliations":[{"raw_affiliation_string":"College of Science and Engineering, Ringgold Standard Institution, Hamad Bin Khalifa University , Qatar , Doha , Qatar","institution_ids":["https://openalex.org/I4210144839"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5000037502"],"corresponding_institution_ids":["https://openalex.org/I4210144839"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078,"provenance":"doaj"},"apc_paid":{"value":1000,"currency":"EUR","value_usd":1078,"provenance":"doaj"},"fwci":0.799,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":7,"citation_normalized_percentile":{"value":0.793627,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":83,"max":84},"biblio":{"volume":"15","issue":"1","first_page":"465","last_page":"482"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.996,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9929,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.8459076},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.77874416},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plain text","score":0.66160285},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.45939398},{"id":"https://openalex.org/keywords/plaintext-aware-encryption","display_name":"Plaintext-aware encryption","score":0.42473003}],"concepts":[{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.8459076},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.77874416},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7248054},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6954085},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.66160285},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.63622487},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.58579874},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5031349},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47560295},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.45939398},{"id":"https://openalex.org/C119133118","wikidata":"https://www.wikidata.org/wiki/Q7200761","display_name":"Plaintext-aware encryption","level":5,"score":0.42473003},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3067513},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07936853},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2020-0039","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2020-0039/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/912ee3b1a8d0415da0d832f4f92b95a1","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2020-0039","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2020-0039/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.66,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":47,"referenced_works":["https://openalex.org/W113457696","https://openalex.org/W1491152510","https://openalex.org/W1499766499","https://openalex.org/W1531898543","https://openalex.org/W1565128838","https://openalex.org/W1589625251","https://openalex.org/W1590823599","https://openalex.org/W1933165082","https://openalex.org/W1980669413","https://openalex.org/W1997745460","https://openalex.org/W2038761522","https://openalex.org/W2050109441","https://openalex.org/W2058785578","https://openalex.org/W2067095453","https://openalex.org/W2106116277","https://openalex.org/W2113717903","https://openalex.org/W2114664664","https://openalex.org/W2122973102","https://openalex.org/W21280657","https://openalex.org/W2146689436","https://openalex.org/W2168571148","https://openalex.org/W2186431254","https://openalex.org/W2266882507","https://openalex.org/W2292342272","https://openalex.org/W2296067100","https://openalex.org/W2407999481","https://openalex.org/W2506520897","https://openalex.org/W2591789642","https://openalex.org/W2592395199","https://openalex.org/W2612344685","https://openalex.org/W2756242929","https://openalex.org/W2766685577","https://openalex.org/W2774165115","https://openalex.org/W2782916932","https://openalex.org/W2789097676","https://openalex.org/W2902555428","https://openalex.org/W2912211337","https://openalex.org/W2949493693","https://openalex.org/W2949676398","https://openalex.org/W2979952026","https://openalex.org/W2991960977","https://openalex.org/W2998042248","https://openalex.org/W3004143931","https://openalex.org/W3082434477","https://openalex.org/W3114539824","https://openalex.org/W4299827018","https://openalex.org/W74973629"],"related_works":["https://openalex.org/W777049646","https://openalex.org/W4248847356","https://openalex.org/W2904864422","https://openalex.org/W2750857695","https://openalex.org/W2744624421","https://openalex.org/W2620043489","https://openalex.org/W2283031786","https://openalex.org/W2094124631","https://openalex.org/W2055974153","https://openalex.org/W1537844681"],"abstract_inverted_index":{"Abstract":[0],"Attribute-based":[1],"proxy":[2,10,20],"re-encryption":[3,11,22,84],"(ABPRE),":[4],"which":[5,118],"combines":[6],"the":[7,45,83,102,131,170,173,179,182,200,205],"notions":[8],"of":[9,104,133,146,172,181],"(PRE)":[12],"and":[13,73,112,136,164],"attribute-based":[14],"encryption":[15,106,110],"(ABE),":[16],"allows":[17],"a":[18,26,29,34,143],"semi-trusted":[19],"with":[21,207],"key":[23],"to":[24,59,76,123],"transform":[25],"ciphertext":[27,35],"under":[28,36],"particular":[30],"access":[31,38],"policy":[32,162,184],"into":[33],"another":[37],"policy,":[39],"without":[40],"revealing":[41],"any":[42],"information":[43],"about":[44],"underlying":[46],"plaintext.":[47],"This":[48],"primitive":[49],"is":[50,92,119,175,193],"very":[51],"useful":[52],"in":[53,62,74,101,125,199],"applications":[54],"where":[55,79,169],"encrypted":[56],"data":[57],"need":[58],"be":[60],"stored":[61],"untrusted":[63],"environments,":[64],"such":[65],"as":[66],"cloud":[67],"storage.":[68],"In":[69,186],"many":[70],"practical":[71],"applications,":[72],"order":[75],"address":[77],"scenarios":[78],"users":[80],"misbehave":[81],"or":[82],"keys":[85,174],"are":[86],"compromised,":[87],"an":[88,154],"efficient":[89,155],"revocation":[90,97,156],"mechanism":[91,98,157],"necessary":[93],"for":[94],"ABPRE.":[95,148],"Previously,":[96],"was":[99],"considered":[100],"settings":[103],"identity-based":[105],"(IBE),":[107],"ABE,":[108],"predicate":[109],"(PE),":[111],"broadcast":[113],"PRE,":[114],"but":[115,158],"not":[116,151],"ABPRE,":[117],"what":[120],"we":[121,141,188],"set":[122],"do":[124],"this":[126],"paper.":[127],"We":[128],"first":[129],"formalize":[130],"concept":[132],"revocable":[134,147],"ABPRE":[135],"its":[137],"security":[138],"model.":[139],"Then,":[140],"propose":[142],"lattice-based":[144],"instantiation":[145],"Our":[149],"scheme":[150,192],"only":[152,177],"supports":[153,160],"also":[159],"polynomial-depth":[161],"circuits":[163],"has":[165],"short":[166],"private":[167],"keys,":[168],"size":[171],"dependent":[176],"on":[178,204],"depth":[180],"supported":[183],"circuits.":[185],"addition,":[187],"prove":[189],"that":[190],"our":[191],"selectively":[194],"chosen-plaintext":[195],"attack":[196],"(CPA)":[197],"secure":[198],"standard":[201],"model,":[202],"based":[203],"learning":[206],"errors":[208],"assumption.":[209]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3162018903","counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1}],"updated_date":"2025-01-04T15:44:38.220898","created_date":"2021-05-24"}