{"id":"https://openalex.org/W2618713661","doi":"https://doi.org/10.1007/978-3-319-59463-7_20","title":"Outsourcing the Decryption of Ciphertexts for Predicate Encryption via Pallier Paradigm","display_name":"Outsourcing the Decryption of Ciphertexts for Predicate Encryption via Pallier Paradigm","publication_year":2017,"publication_date":"2017-05-26","ids":{"openalex":"https://openalex.org/W2618713661","doi":"https://doi.org/10.1007/978-3-319-59463-7_20","mag":"2618713661"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-59463-7_20","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-59463-7_20","pdf_url":null,"source":{"id":"https://openalex.org/S4210216571","display_name":"Lecture notes on data engineering and communications technologies","issn_l":"2367-4512","issn":["2367-4512","2367-4520"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319972","host_organization_name":"Springer International Publishing","host_organization_lineage":["https://openalex.org/P4310319972","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer International Publishing","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes on Data Engineering and Communications Technologies","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070841269","display_name":"Bai Ping","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Bai Ping","raw_affiliation_strings":["Department of Electronic Technique, Engineering University of PAP, Xi\u2019an Shaanxi, China","Department of Electronic Technique, Engineering University of PAP, Xi'an Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Technique, Engineering University of PAP, Xi\u2019an Shaanxi, China","institution_ids":[]},{"raw_affiliation_string":"Department of Electronic Technique, Engineering University of PAP, Xi'an Shaanxi, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100349330","display_name":"Wei Zhang","orcid":"https://orcid.org/0000-0002-3416-704X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang Wei","raw_affiliation_strings":["Key Laboratory of Information Security, Engineering College of PAP, Xi\u2019an Shaanxi, China","Key Laboratory of Information Security, Engineering College of PAP, Xi'an Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Information Security, Engineering College of PAP, Xi\u2019an Shaanxi, China","institution_ids":[]},{"raw_affiliation_string":"Key Laboratory of Information Security, Engineering College of PAP, Xi'an Shaanxi, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080465388","display_name":"Li Zhenlin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li Zhenlin","raw_affiliation_strings":["Department of Electronic Technique, Engineering University of PAP, Xi\u2019an Shaanxi, China","Department of Electronic Technique, Engineering University of PAP, Xi'an Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Technique, Engineering University of PAP, Xi\u2019an Shaanxi, China","institution_ids":[]},{"raw_affiliation_string":"Department of Electronic Technique, Engineering University of PAP, Xi'an Shaanxi, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049151787","display_name":"Xu An Wang","orcid":"https://orcid.org/0000-0003-2070-4913"},"institutions":[{"id":"https://openalex.org/I4210131919","display_name":"Xi'an University of Technology","ror":"https://ror.org/038avdt50","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131919"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xu An Wang","raw_affiliation_strings":["Department of Electronic Technology, Key, Engineering University of CAPF, Xi\u2019an, Xizang, China","Key Laboratory of Information Security, Engineering College of PAP, Xi\u2019an Shaanxi, China","Key Laboratory of Information Security, Engineering College of PAP, Xi'an Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Technology, Key, Engineering University of CAPF, Xi\u2019an, Xizang, China","institution_ids":["https://openalex.org/I4210131919"]},{"raw_affiliation_string":"Key Laboratory of Information Security, Engineering College of PAP, Xi\u2019an Shaanxi, China","institution_ids":[]},{"raw_affiliation_string":"Key Laboratory of Information Security, Engineering College of PAP, Xi'an Shaanxi, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5070841269"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0712214,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"199","last_page":"211"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.797695517539978},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.683466911315918},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6808228492736816},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.5765007734298706},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5356269478797913},{"id":"https://openalex.org/keywords/predicate","display_name":"Predicate (mathematical logic)","score":0.5310022830963135},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.511380136013031},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.49153169989585876},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.42814910411834717},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4236263632774353},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4170064628124237},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35820794105529785},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.31393325328826904},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.23769548535346985},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.19226670265197754},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.18235370516777039},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17314383387565613},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.11869436502456665},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.09517735242843628}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.797695517539978},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.683466911315918},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6808228492736816},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.5765007734298706},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5356269478797913},{"id":"https://openalex.org/C140146324","wikidata":"https://www.wikidata.org/wiki/Q1144319","display_name":"Predicate (mathematical logic)","level":2,"score":0.5310022830963135},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.511380136013031},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.49153169989585876},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.42814910411834717},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4236263632774353},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4170064628124237},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35820794105529785},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.31393325328826904},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.23769548535346985},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.19226670265197754},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.18235370516777039},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17314383387565613},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.11869436502456665},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09517735242843628},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-59463-7_20","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-59463-7_20","pdf_url":null,"source":{"id":"https://openalex.org/S4210216571","display_name":"Lecture notes on data engineering and communications technologies","issn_l":"2367-4512","issn":["2367-4512","2367-4520"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319972","host_organization_name":"Springer International Publishing","host_organization_lineage":["https://openalex.org/P4310319972","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer International Publishing","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes on Data Engineering and Communications Technologies","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W56544557","https://openalex.org/W70096886","https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1522101599","https://openalex.org/W1569083856","https://openalex.org/W1589843374","https://openalex.org/W1592092778","https://openalex.org/W1596208550","https://openalex.org/W1755636270","https://openalex.org/W2132089379","https://openalex.org/W2132172731","https://openalex.org/W2138001464","https://openalex.org/W2470717505","https://openalex.org/W2491308310","https://openalex.org/W2492228685","https://openalex.org/W2514486817","https://openalex.org/W3100960533","https://openalex.org/W3128663643"],"related_works":["https://openalex.org/W4316659877","https://openalex.org/W2607647996","https://openalex.org/W3035389378","https://openalex.org/W2793967262","https://openalex.org/W3118757263","https://openalex.org/W3045127875","https://openalex.org/W2805224345","https://openalex.org/W1995178318","https://openalex.org/W2795784040","https://openalex.org/W2996649609"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
