{"id":"https://openalex.org/W1804894162","doi":"https://doi.org/10.1007/978-3-642-31912-9_8","title":"Fully Secure Unidirectional Identity-Based Proxy Re-encryption","display_name":"Fully Secure Unidirectional Identity-Based Proxy Re-encryption","publication_year":2012,"publication_date":"2012-01-01","ids":{"openalex":"https://openalex.org/W1804894162","doi":"https://doi.org/10.1007/978-3-642-31912-9_8","mag":"1804894162"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-31912-9_8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-31912-9_8","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101913839","display_name":"Song Luo","orcid":"https://orcid.org/0000-0001-8767-3264"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I50632499","display_name":"Chongqing University of Technology","ror":"https://ror.org/04vgbd477","country_code":"CN","type":"education","lineage":["https://openalex.org/I50632499"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Song Luo","raw_affiliation_strings":["College of Computer Science and Engineering, Chongqing University of Technology, Chongqing, China","Institute of Software, School of Electronics Engineering and Computer Science, Peking University, China","Key Laboratory of High Confidence Software Technologies, (Peking University), Ministry of Education, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, Chongqing University of Technology, Chongqing, China","institution_ids":["https://openalex.org/I50632499"]},{"raw_affiliation_string":"Institute of Software, School of Electronics Engineering and Computer Science, Peking University, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I20231570"]},{"raw_affiliation_string":"Key Laboratory of High Confidence Software Technologies, (Peking University), Ministry of Education, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035938543","display_name":"Qingni Shen","orcid":"https://orcid.org/0000-0002-0605-6043"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingni Shen","raw_affiliation_strings":["School of Software and Microelectronics & MoE Key Lab of Network and Software Assurance, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Software and Microelectronics & MoE Key Lab of Network and Software Assurance, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103573831","display_name":"Zhong Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhong Chen","raw_affiliation_strings":["Institute of Software, School of Electronics Engineering and Computer Science, Peking University, China","Key Laboratory of High Confidence Software Technologies, (Peking University), Ministry of Education, China","School of Software and Microelectronics & MoE Key Lab of Network and Software Assurance, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software, School of Electronics Engineering and Computer Science, Peking University, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I20231570"]},{"raw_affiliation_string":"Key Laboratory of High Confidence Software Technologies, (Peking University), Ministry of Education, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"School of Software and Microelectronics & MoE Key Lab of Network and Software Assurance, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101913839"],"corresponding_institution_ids":["https://openalex.org/I20231570","https://openalex.org/I4210128818","https://openalex.org/I50632499"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":4.1235,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.94730702,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"109","last_page":"126"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9828000068664551,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.9547964334487915},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.8081637620925903},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7009158134460449},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6905297040939331},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.55832439661026},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5005667209625244},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.43292009830474854},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.4305029511451721},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.38128864765167236},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3534591794013977},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.31034404039382935}],"concepts":[{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.9547964334487915},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.8081637620925903},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7009158134460449},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6905297040939331},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.55832439661026},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5005667209625244},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.43292009830474854},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.4305029511451721},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38128864765167236},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3534591794013977},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.31034404039382935},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-642-31912-9_8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-642-31912-9_8","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W154766510","https://openalex.org/W197309333","https://openalex.org/W1484751769","https://openalex.org/W1495266644","https://openalex.org/W1500253167","https://openalex.org/W1522101599","https://openalex.org/W1532564510","https://openalex.org/W1546774120","https://openalex.org/W1557375247","https://openalex.org/W1569083856","https://openalex.org/W1590823599","https://openalex.org/W1592092778","https://openalex.org/W1603068992","https://openalex.org/W1798609567","https://openalex.org/W1890078278","https://openalex.org/W1990749678","https://openalex.org/W2074747440","https://openalex.org/W2114296987","https://openalex.org/W2114428623","https://openalex.org/W2117685508","https://openalex.org/W2133141035","https://openalex.org/W2139972841","https://openalex.org/W2152924492","https://openalex.org/W2159274726","https://openalex.org/W2166362740","https://openalex.org/W2339662170","https://openalex.org/W2475397807","https://openalex.org/W2477011922","https://openalex.org/W2490262601","https://openalex.org/W2506735936","https://openalex.org/W2619380141","https://openalex.org/W2619633776"],"related_works":["https://openalex.org/W2131846073","https://openalex.org/W114534093","https://openalex.org/W2383331906","https://openalex.org/W2516093999","https://openalex.org/W1582239555","https://openalex.org/W4223919663","https://openalex.org/W4225688985","https://openalex.org/W4285255193","https://openalex.org/W3031006976","https://openalex.org/W2042220809"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
