{"id":"https://openalex.org/W2616983526","doi":"https://doi.org/10.1007/978-3-319-59463-7_60","title":"Improved Online/Offline Attribute Based Encryption and More","display_name":"Improved Online/Offline Attribute Based Encryption and More","publication_year":2017,"publication_date":"2017-05-26","ids":{"openalex":"https://openalex.org/W2616983526","doi":"https://doi.org/10.1007/978-3-319-59463-7_60","mag":"2616983526"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-59463-7_60","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-59463-7_60","pdf_url":null,"source":{"id":"https://openalex.org/S4210216571","display_name":"Lecture notes on data engineering and communications technologies","issn_l":"2367-4512","issn":["2367-4512","2367-4520"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319972","host_organization_name":"Springer International Publishing","host_organization_lineage":["https://openalex.org/P4310319972","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer International Publishing","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes on Data Engineering and Communications Technologies","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102846084","display_name":"Jindan Zhang","orcid":"https://orcid.org/0000-0002-1499-8460"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]},{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I4210118093","display_name":"Xianyang Normal University","ror":"https://ror.org/01r45yt97","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210118093"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jindan Zhang","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, China","State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an, China","Xianyang Vocational Technical College, Xianyang, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Xianyang Vocational Technical College, Xianyang, China","institution_ids":["https://openalex.org/I4210118093"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053622471","display_name":"Baocang Wang","orcid":"https://orcid.org/0000-0002-2554-4464"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Baocang Wang","raw_affiliation_strings":["School of Telecommunications Engineering, Xidian University, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"School of Telecommunications Engineering, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049151787","display_name":"Xu An Wang","orcid":"https://orcid.org/0000-0003-2070-4913"},"institutions":[{"id":"https://openalex.org/I4210131919","display_name":"Xi'an University of Technology","ror":"https://ror.org/038avdt50","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210131919"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xu An Wang","raw_affiliation_strings":["Department of Electronic Technology, Key, Engineering University of CAPF, Xi\u2019an, Xizang, China","Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, China","Key Laboratory of Cryptology and Information Security, Engineering University of CAPF, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Technology, Key, Engineering University of CAPF, Xi\u2019an, Xizang, China","institution_ids":["https://openalex.org/I4210131919"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"Key Laboratory of Cryptology and Information Security, Engineering University of CAPF, Xi\u2019an, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102846084"],"corresponding_institution_ids":["https://openalex.org/I149594827","https://openalex.org/I4210118093","https://openalex.org/I5343935"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0678698,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"603","last_page":"610"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/modular-exponentiation","display_name":"Modular exponentiation","score":0.8239142894744873},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7668812274932861},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7133095264434814},{"id":"https://openalex.org/keywords/exponentiation","display_name":"Exponentiation","score":0.6862579584121704},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6698707342147827},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.6019971370697021},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5810925364494324},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5009090900421143},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.49889421463012695},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.49826550483703613},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4440827965736389},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4327964782714844},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.36807912588119507},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3282637894153595},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.2194250524044037},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.18514388799667358},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1801057755947113},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.15217432379722595},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13245800137519836},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11955833435058594}],"concepts":[{"id":"https://openalex.org/C152763109","wikidata":"https://www.wikidata.org/wiki/Q1228841","display_name":"Modular exponentiation","level":4,"score":0.8239142894744873},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7668812274932861},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7133095264434814},{"id":"https://openalex.org/C81539297","wikidata":"https://www.wikidata.org/wiki/Q33456","display_name":"Exponentiation","level":2,"score":0.6862579584121704},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6698707342147827},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.6019971370697021},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5810925364494324},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5009090900421143},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.49889421463012695},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.49826550483703613},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4440827965736389},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4327964782714844},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36807912588119507},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3282637894153595},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.2194250524044037},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.18514388799667358},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1801057755947113},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.15217432379722595},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13245800137519836},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11955833435058594},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-59463-7_60","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-59463-7_60","pdf_url":null,"source":{"id":"https://openalex.org/S4210216571","display_name":"Lecture notes on data engineering and communications technologies","issn_l":"2367-4512","issn":["2367-4512","2367-4520"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319972","host_organization_name":"Springer International Publishing","host_organization_lineage":["https://openalex.org/P4310319972","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer International Publishing","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes on Data Engineering and Communications Technologies","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W7678451","https://openalex.org/W70096886","https://openalex.org/W1898753656","https://openalex.org/W1974267799","https://openalex.org/W2039877753","https://openalex.org/W2044772384","https://openalex.org/W2058701727","https://openalex.org/W2080327443","https://openalex.org/W2086058948","https://openalex.org/W2086298846","https://openalex.org/W2118348041","https://openalex.org/W2294480648","https://openalex.org/W2407486123"],"related_works":["https://openalex.org/W4235485585","https://openalex.org/W670148","https://openalex.org/W1507420113","https://openalex.org/W4242613270","https://openalex.org/W2107014706","https://openalex.org/W28274153","https://openalex.org/W2736837562","https://openalex.org/W2020808628","https://openalex.org/W2113040119","https://openalex.org/W2566433365"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
