{"id":"https://openalex.org/W2107081597","doi":"https://doi.org/10.1007/s10623-015-0131-1","title":"Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption","display_name":"Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption","publication_year":2015,"publication_date":"2015-09-07","ids":{"openalex":"https://openalex.org/W2107081597","doi":"https://doi.org/10.1007/s10623-015-0131-1","mag":"2107081597"},"language":"en","primary_location":{"id":"doi:10.1007/s10623-015-0131-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10623-015-0131-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10623-015-0131-1.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10623-015-0131-1.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029108964","display_name":"Tatsuaki Okamoto","orcid":"https://orcid.org/0000-0001-7803-812X"},"institutions":[{"id":"https://openalex.org/I200641316","display_name":"Musashino University","ror":"https://ror.org/04bcbax71","country_code":"JP","type":"education","lineage":["https://openalex.org/I200641316"]},{"id":"https://openalex.org/I2800381926","display_name":"Musashino Academia Musicae","ror":"https://ror.org/008bb2h75","country_code":"JP","type":"education","lineage":["https://openalex.org/I2800381926"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Tatsuaki Okamoto","raw_affiliation_strings":["NTT, Musashino, Tokyo, Japan","NTT, Musashino, Japan"],"affiliations":[{"raw_affiliation_string":"NTT, Musashino, Tokyo, Japan","institution_ids":["https://openalex.org/I200641316"]},{"raw_affiliation_string":"NTT, Musashino, Japan","institution_ids":["https://openalex.org/I2800381926"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010032290","display_name":"Katsuyuki Takashima","orcid":"https://orcid.org/0000-0001-5216-2229"},"institutions":[{"id":"https://openalex.org/I4210133125","display_name":"Mitsubishi Electric (Japan)","ror":"https://ror.org/033y26782","country_code":"JP","type":"company","lineage":["https://openalex.org/I1306287861","https://openalex.org/I4210133125"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Katsuyuki Takashima","raw_affiliation_strings":["Mitsubishi Electric, Kamakura, Kanagawa, Japan","Mitsubishi Electric, Kamakura, Japan#TAB#"],"affiliations":[{"raw_affiliation_string":"Mitsubishi Electric, Kamakura, Kanagawa, Japan","institution_ids":["https://openalex.org/I4210133125"]},{"raw_affiliation_string":"Mitsubishi Electric, Kamakura, Japan#TAB#","institution_ids":["https://openalex.org/I4210133125"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5029108964"],"corresponding_institution_ids":["https://openalex.org/I200641316","https://openalex.org/I2800381926"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":{"value":2290,"currency":"EUR","value_usd":2890},"fwci":6.2313,"has_fulltext":true,"cited_by_count":44,"citation_normalized_percentile":{"value":0.96456637,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"77","issue":"2-3","first_page":"725","last_page":"771"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/constant","display_name":"Constant (computer programming)","score":0.7460957765579224},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6145530343055725},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6111558079719543},{"id":"https://openalex.org/keywords/broadcast-encryption","display_name":"Broadcast encryption","score":0.5813583135604858},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5026869773864746},{"id":"https://openalex.org/keywords/functional-encryption","display_name":"Functional encryption","score":0.4680362045764923},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4329685568809509},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.29067325592041016},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24395596981048584},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.20589932799339294},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.1519542932510376}],"concepts":[{"id":"https://openalex.org/C2777027219","wikidata":"https://www.wikidata.org/wiki/Q1284190","display_name":"Constant (computer programming)","level":2,"score":0.7460957765579224},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6145530343055725},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6111558079719543},{"id":"https://openalex.org/C2778281673","wikidata":"https://www.wikidata.org/wiki/Q4972106","display_name":"Broadcast encryption","level":4,"score":0.5813583135604858},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5026869773864746},{"id":"https://openalex.org/C2780746774","wikidata":"https://www.wikidata.org/wiki/Q17014981","display_name":"Functional encryption","level":4,"score":0.4680362045764923},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4329685568809509},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.29067325592041016},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24395596981048584},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.20589932799339294},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.1519542932510376},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/s10623-015-0131-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10623-015-0131-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10623-015-0131-1.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.359.6616","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.359.6616","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://eprint.iacr.org/2011/648.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.400.8232","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.8232","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://eprint.iacr.org/2011/648.pdf","raw_type":"text"}],"best_oa_location":{"id":"doi:10.1007/s10623-015-0131-1","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10623-015-0131-1","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10623-015-0131-1.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7900000214576721,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2107081597.pdf","grobid_xml":"https://content.openalex.org/works/W2107081597.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W50248066","https://openalex.org/W177444027","https://openalex.org/W1484751769","https://openalex.org/W1498316612","https://openalex.org/W1511513446","https://openalex.org/W1522101599","https://openalex.org/W1538349060","https://openalex.org/W1546831026","https://openalex.org/W1564449568","https://openalex.org/W1596208550","https://openalex.org/W1601035152","https://openalex.org/W1601334779","https://openalex.org/W1724472458","https://openalex.org/W1769443955","https://openalex.org/W1806049065","https://openalex.org/W1973801321","https://openalex.org/W2008701790","https://openalex.org/W2087000693","https://openalex.org/W2108072891","https://openalex.org/W2117616411","https://openalex.org/W2122119548","https://openalex.org/W2138001464","https://openalex.org/W2145255308","https://openalex.org/W2161214158","https://openalex.org/W2184303230","https://openalex.org/W2295764142","https://openalex.org/W2398218486","https://openalex.org/W2401547150","https://openalex.org/W2899558955","https://openalex.org/W2949293557","https://openalex.org/W2952321797"],"related_works":["https://openalex.org/W4390331425","https://openalex.org/W2110903266","https://openalex.org/W2241147170","https://openalex.org/W1963456813","https://openalex.org/W2002568678","https://openalex.org/W4313446971","https://openalex.org/W1964433652","https://openalex.org/W2117616411","https://openalex.org/W2241383433","https://openalex.org/W1484751769"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3],"present":[4],"two":[5,88,144],"non-zero":[6],"inner-product":[7,90],"encryption":[8,91,120],"(NIPE)":[9],"schemes":[10,33,45,93,142],"that":[11,58,128],"are":[12],"adaptively":[13,60,78,105,130],"secure":[14,61,79,106,131],"under":[15,62,107,132],"a":[16,148,158],"standard":[17,26,82,113],"assumption,":[18,23],"the":[19,25,30,38,63,81,108,112,133,139,156],"decisional":[20],"linear":[21],"(DLIN)":[22],"in":[24,80,111,143],"model.":[27,83,114],"One":[28],"of":[29,95],"proposed":[31,140],"NIPE":[32,44],"features":[34,40],"constant-size":[35,41,53,56,71,74,98,101,123,126,153,163],"ciphertexts":[36,54,72,99,124],"and":[37,103,155],"other":[39,157],"secret-keys.":[42],"Our":[43],"imply":[46,116],"an":[47,117],"identity-based":[48,118],"revocation":[49],"(IBR)":[50],"system":[51,121],"with":[52,70,122,152,162],"or":[55,73,100,125],"secret-keys":[57,75,102,127],"is":[59,104,129,147],"DLIN":[64,109,134],"assumption.":[65,135],"Any":[66],"previous":[67],"IBR":[68],"scheme":[69,151,161],"was":[76],"not":[77],"This":[84],"paper":[85],"also":[86,137],"presents":[87],"zero":[89],"(ZIPE)":[92],"each":[94],"which":[96],"has":[97],"assumption":[110],"They":[115],"broadcast":[119],"We":[136],"extend":[138],"ZIPE":[141,150,160],"directions,":[145],"one":[146],"fully-attribute-hiding":[149],"secret-keys,":[154],"hierarchical":[159],"ciphertexts.":[164]},"counts_by_year":[{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
