{"id":"https://openalex.org/W2619368710","doi":"https://doi.org/10.1007/978-3-319-59463-7_6","title":"A BGN Type Outsourcing the Decryption of CP-ABE Ciphertexts","display_name":"A BGN Type Outsourcing the Decryption of CP-ABE Ciphertexts","publication_year":2017,"publication_date":"2017-05-26","ids":{"openalex":"https://openalex.org/W2619368710","doi":"https://doi.org/10.1007/978-3-319-59463-7_6","mag":"2619368710"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-59463-7_6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-59463-7_6","pdf_url":null,"source":{"id":"https://openalex.org/S4210216571","display_name":"Lecture notes on data engineering and communications technologies","issn_l":"2367-4512","issn":["2367-4512","2367-4520"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319972","host_organization_name":"Springer International Publishing","host_organization_lineage":["https://openalex.org/P4310319972","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer International Publishing","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes on Data Engineering and Communications Technologies","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080465388","display_name":"Li Zhenlin","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Li Zhenlin","raw_affiliation_strings":["Department of Electronic Technique, Engineering University of PAP, Xi\u2019an, Shaanxi, China","Key Laboratory of Information Security, Engineering College of PAP, Xi\u2019an, Shaanxi, China","Department of Electronic Technique, Engineering University of PAP, Xi'an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Technique, Engineering University of PAP, Xi\u2019an, Shaanxi, China","institution_ids":[]},{"raw_affiliation_string":"Key Laboratory of Information Security, Engineering College of PAP, Xi\u2019an, Shaanxi, China","institution_ids":[]},{"raw_affiliation_string":"Department of Electronic Technique, Engineering University of PAP, Xi'an, Shaanxi, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100349325","display_name":"Wei Zhang","orcid":"https://orcid.org/0000-0001-8289-8018"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang Wei","raw_affiliation_strings":["Key Laboratory of Information Security, Engineering College of PAP, Xi\u2019an, Shaanxi, China","Key Laboratory of Information Security, Engineering College of PAP, Xi'an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Information Security, Engineering College of PAP, Xi\u2019an, Shaanxi, China","institution_ids":[]},{"raw_affiliation_string":"Key Laboratory of Information Security, Engineering College of PAP, Xi'an, Shaanxi, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ding Yitao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ding Yitao","raw_affiliation_strings":["Key Laboratory of Information Security, Engineering College of PAP, Xi\u2019an, Shaanxi, China","Key Laboratory of Information Security, Engineering College of PAP, Xi'an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Information Security, Engineering College of PAP, Xi\u2019an, Shaanxi, China","institution_ids":[]},{"raw_affiliation_string":"Key Laboratory of Information Security, Engineering College of PAP, Xi'an, Shaanxi, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070841269","display_name":"Bai Ping","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bai Ping","raw_affiliation_strings":["Key Laboratory of Information Security, Engineering College of PAP, Xi\u2019an, Shaanxi, China","Key Laboratory of Information Security, Engineering College of PAP, Xi'an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Information Security, Engineering College of PAP, Xi\u2019an, Shaanxi, China","institution_ids":[]},{"raw_affiliation_string":"Key Laboratory of Information Security, Engineering College of PAP, Xi'an, Shaanxi, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5080465388"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07225117,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"54","last_page":"63"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7794318795204163},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.642450213432312},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6135898232460022},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5647954940795898},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5281457901000977},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.5245302319526672},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.48260223865509033},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.46207407116889954},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4379652738571167},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.42768383026123047},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.42592209577560425},{"id":"https://openalex.org/keywords/access-structure","display_name":"Access structure","score":0.4226807951927185},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.42086759209632874},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3466421663761139},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.27367597818374634},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2586822509765625},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13014823198318481},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.11725398898124695},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.11723822355270386},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.08682239055633545},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.061985015869140625}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7794318795204163},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.642450213432312},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6135898232460022},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5647954940795898},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5281457901000977},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.5245302319526672},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.48260223865509033},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.46207407116889954},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4379652738571167},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.42768383026123047},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.42592209577560425},{"id":"https://openalex.org/C2778950925","wikidata":"https://www.wikidata.org/wiki/Q4672474","display_name":"Access structure","level":4,"score":0.4226807951927185},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.42086759209632874},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3466421663761139},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.27367597818374634},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2586822509765625},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13014823198318481},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.11725398898124695},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.11723822355270386},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.08682239055633545},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.061985015869140625},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-59463-7_6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-59463-7_6","pdf_url":null,"source":{"id":"https://openalex.org/S4210216571","display_name":"Lecture notes on data engineering and communications technologies","issn_l":"2367-4512","issn":["2367-4512","2367-4520"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319972","host_organization_name":"Springer International Publishing","host_organization_lineage":["https://openalex.org/P4310319972","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer International Publishing","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes on Data Engineering and Communications Technologies","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7200000286102295}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W70096886","https://openalex.org/W1498316612","https://openalex.org/W1569083856","https://openalex.org/W1660562555","https://openalex.org/W1798609567","https://openalex.org/W1881831204","https://openalex.org/W1993341076","https://openalex.org/W2048543827","https://openalex.org/W2058410460","https://openalex.org/W2072695090","https://openalex.org/W2119137917","https://openalex.org/W2160390934","https://openalex.org/W2176756954","https://openalex.org/W2307601096","https://openalex.org/W2491308310","https://openalex.org/W2508395672","https://openalex.org/W2509962852","https://openalex.org/W2511018534","https://openalex.org/W2516873703","https://openalex.org/W3128663643","https://openalex.org/W4236019151","https://openalex.org/W4239968926","https://openalex.org/W4289126832"],"related_works":["https://openalex.org/W2947510282","https://openalex.org/W2363701519","https://openalex.org/W2292786713","https://openalex.org/W2788225348","https://openalex.org/W2553096087","https://openalex.org/W2530459946","https://openalex.org/W4316659877","https://openalex.org/W3111147403","https://openalex.org/W2282054813","https://openalex.org/W1663161527"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
