{"id":"https://openalex.org/W4385555728","doi":"https://doi.org/10.1007/s00145-023-09479-x","title":"Fine-Grained Secure Attribute-Based Encryption","display_name":"Fine-Grained Secure Attribute-Based Encryption","publication_year":2023,"publication_date":"2023-08-03","ids":{"openalex":"https://openalex.org/W4385555728","doi":"https://doi.org/10.1007/s00145-023-09479-x"},"language":"en","primary_location":{"id":"doi:10.1007/s00145-023-09479-x","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s00145-023-09479-x","pdf_url":null,"source":{"id":"https://openalex.org/S190936789","display_name":"Journal of Cryptology","issn_l":"0933-2790","issn":["0933-2790","1432-1378"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101993448","display_name":"Yuyu Wang","orcid":"https://orcid.org/0000-0002-1198-1903"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuyu Wang","raw_affiliation_strings":["University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005999583","display_name":"Jiaxin Pan","orcid":"https://orcid.org/0000-0002-7459-6850"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Jiaxin Pan","raw_affiliation_strings":["Department of Mathematical Sciences, NTNU - Norwegian University of Science and Technology, Trondheim, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Mathematical Sciences, NTNU - Norwegian University of Science and Technology, Trondheim, Norway","institution_ids":["https://openalex.org/I204778367"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100402120","display_name":"Yu Chen","orcid":"https://orcid.org/0000-0003-2553-1281"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]},{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yu Chen","raw_affiliation_strings":["Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, 266237, China","School of Cyber Science and Technology, Shandong University, Qingdao, 266237, China","State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, China","School of Cyber Science and Technology, Shandong University, Qingdao, China","State Key Laboratory of Cryptology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, 266237, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, 266237, China","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I154099455"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, China","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100402120"],"corresponding_institution_ids":["https://openalex.org/I154099455","https://openalex.org/I4210132990","https://openalex.org/I80143920"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":null,"fwci":1.4132,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.85052919,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"36","issue":"4","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6700803637504578},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6426769495010376},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5934051871299744},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5693196058273315},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.498079776763916},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.4798252582550049},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4736790955066681},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.4600076973438263},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4316653907299042},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.43049031496047974},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.410600483417511},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3110139071941376},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2704433500766754}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6700803637504578},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6426769495010376},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5934051871299744},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5693196058273315},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.498079776763916},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.4798252582550049},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4736790955066681},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.4600076973438263},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4316653907299042},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.43049031496047974},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.410600483417511},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3110139071941376},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2704433500766754},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s00145-023-09479-x","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s00145-023-09479-x","pdf_url":null,"source":{"id":"https://openalex.org/S190936789","display_name":"Journal of Cryptology","issn_l":"0933-2790","issn":["0933-2790","1432-1378"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W115773529","https://openalex.org/W148801026","https://openalex.org/W835751452","https://openalex.org/W1484751769","https://openalex.org/W1490394993","https://openalex.org/W1522101599","https://openalex.org/W1569083856","https://openalex.org/W1576892942","https://openalex.org/W1797206029","https://openalex.org/W1860948751","https://openalex.org/W1896261913","https://openalex.org/W1954882695","https://openalex.org/W2009994177","https://openalex.org/W2047925852","https://openalex.org/W2070678975","https://openalex.org/W2104952158","https://openalex.org/W2133203144","https://openalex.org/W2138001464","https://openalex.org/W2138805158","https://openalex.org/W2139143226","https://openalex.org/W2141395382","https://openalex.org/W2145255308","https://openalex.org/W2152924492","https://openalex.org/W2164988972","https://openalex.org/W2494954630","https://openalex.org/W2551629986","https://openalex.org/W2805218201","https://openalex.org/W2884510571","https://openalex.org/W2989927824","https://openalex.org/W3048880789","https://openalex.org/W3164394840","https://openalex.org/W3187909356","https://openalex.org/W4285274098","https://openalex.org/W4320154868"],"related_works":["https://openalex.org/W2414747139","https://openalex.org/W2077900604","https://openalex.org/W1802397081","https://openalex.org/W2086770216","https://openalex.org/W2157130609","https://openalex.org/W4387697456","https://openalex.org/W2100244348","https://openalex.org/W1553510179","https://openalex.org/W4387429380","https://openalex.org/W1993945719"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
