{"id":"https://openalex.org/W3199853483","doi":"https://doi.org/10.1007/s11042-021-11286-0","title":"Efficient access control with traceability and user revocation in IoT","display_name":"Efficient access control with traceability and user revocation in IoT","publication_year":2021,"publication_date":"2021-08-01","ids":{"openalex":"https://openalex.org/W3199853483","doi":"https://doi.org/10.1007/s11042-021-11286-0","mag":"3199853483"},"language":"en","primary_location":{"id":"doi:10.1007/s11042-021-11286-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11042-021-11286-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11042-021-11286-0.pdf","source":{"id":"https://openalex.org/S110206669","display_name":"Multimedia Tools and Applications","issn_l":"1380-7501","issn":["1380-7501","1573-7721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Multimedia Tools and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s11042-021-11286-0.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103103320","display_name":"Yi Wu","orcid":"https://orcid.org/0000-0001-9248-3430"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Wu","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100349325","display_name":"Wei Zhang","orcid":"https://orcid.org/0000-0001-8289-8018"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Zhang","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100643589","display_name":"Hu Xiong","orcid":"https://orcid.org/0000-0001-6137-6667"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hu Xiong","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045032131","display_name":"Zhiguang Qin","orcid":"https://orcid.org/0000-0001-6745-6377"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiguang Qin","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043276911","display_name":"Kuo\u2010Hui Yeh","orcid":"https://orcid.org/0000-0003-0598-761X"},"institutions":[{"id":"https://openalex.org/I33096239","display_name":"National Dong Hwa University","ror":"https://ror.org/00mng9617","country_code":"TW","type":"education","lineage":["https://openalex.org/I33096239"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Kuo-Hui Yeh","raw_affiliation_strings":["Department of Information Management, National Dong Hwa University, Hualien, Taiwan, ROC"],"affiliations":[{"raw_affiliation_string":"Department of Information Management, National Dong Hwa University, Hualien, Taiwan, ROC","institution_ids":["https://openalex.org/I33096239"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100349325"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":1.2238,"has_fulltext":true,"cited_by_count":10,"citation_normalized_percentile":{"value":0.83450623,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"80","issue":"20","first_page":"31487","last_page":"31508"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8533179759979248},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.7777955532073975},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.7359199523925781},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6958576440811157},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6345317959785461},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.5411043167114258},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5146158933639526},{"id":"https://openalex.org/keywords/revocation-list","display_name":"Revocation list","score":0.4233064651489258},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.42019549012184143},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4151241183280945},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4025900363922119},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3553422689437866},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.1126776933670044},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10115888714790344}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8533179759979248},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.7777955532073975},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7359199523925781},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6958576440811157},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6345317959785461},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.5411043167114258},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5146158933639526},{"id":"https://openalex.org/C147296133","wikidata":"https://www.wikidata.org/wiki/Q196765","display_name":"Revocation list","level":5,"score":0.4233064651489258},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.42019549012184143},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4151241183280945},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4025900363922119},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3553422689437866},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.1126776933670044},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10115888714790344}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11042-021-11286-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11042-021-11286-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11042-021-11286-0.pdf","source":{"id":"https://openalex.org/S110206669","display_name":"Multimedia Tools and Applications","issn_l":"1380-7501","issn":["1380-7501","1573-7721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Multimedia Tools and Applications","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s11042-021-11286-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11042-021-11286-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11042-021-11286-0.pdf","source":{"id":"https://openalex.org/S110206669","display_name":"Multimedia Tools and Applications","issn_l":"1380-7501","issn":["1380-7501","1573-7721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Multimedia Tools and Applications","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5400000214576721,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3199853483.pdf","grobid_xml":"https://content.openalex.org/works/W3199853483.grobid-xml"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W70096886","https://openalex.org/W1498316612","https://openalex.org/W1531898543","https://openalex.org/W1558439324","https://openalex.org/W1582962879","https://openalex.org/W1905774212","https://openalex.org/W1982946433","https://openalex.org/W1997993565","https://openalex.org/W2054235151","https://openalex.org/W2080999623","https://openalex.org/W2086642346","https://openalex.org/W2087280674","https://openalex.org/W2108072891","https://openalex.org/W2117616411","https://openalex.org/W2117797270","https://openalex.org/W2119137917","https://openalex.org/W2138001464","https://openalex.org/W2146985619","https://openalex.org/W2403036368","https://openalex.org/W2405210915","https://openalex.org/W2477329965","https://openalex.org/W2588583715","https://openalex.org/W2918343059","https://openalex.org/W2933122424","https://openalex.org/W2972158899"],"related_works":["https://openalex.org/W2743419166","https://openalex.org/W2530833777","https://openalex.org/W2905494324","https://openalex.org/W3107181524","https://openalex.org/W3046724157","https://openalex.org/W2604548591","https://openalex.org/W3003746906","https://openalex.org/W2437257926","https://openalex.org/W2474451079","https://openalex.org/W4240635429"],"abstract_inverted_index":{"Abstract":[0],"With":[1],"the":[2,70,82,93,97,105,112,116,132,137,145,171,178,190,207,212,223,231,246,257],"universality":[3],"and":[4,73,152,162,192,218,250],"availability":[5],"of":[6,8,24,53,56,75,79,139,225,259],"Internet":[7,78],"Things":[9],"(IoT),":[10],"data":[11,57,209],"privacy":[12],"protection":[13],"in":[14,36,44,77,85,123,141,166,197,211],"IoT":[15,37],"has":[16,177,252],"become":[17],"a":[18,22,66,148],"hot":[19],"issue.":[20],"As":[21],"branch":[23],"attribute-based":[25,30,156],"encryption":[26,31,157],"(ABE),":[27],"ciphertext":[28,154,161,217],"policy":[29,155],"(CP-ABE)":[32],"is":[33,65,87,102,120,164,243],"widely":[34],"used":[35],"to":[38,61,107,131,206,255],"offer":[39],"flexible":[40],"one-to-many":[41],"encryption.":[42],"However,":[43],"IoT,":[45],"different":[46],"mobile":[47,62,118],"devices":[48],"share":[49],"messages":[50],"collected,":[51],"transmission":[52],"large":[54],"amounts":[55],"brings":[58],"huge":[59],"burdens":[60],"devices.":[63],"Efficiency":[64],"bottleneck":[67],"which":[68],"restricts":[69],"wide":[71],"application":[72,138],"adoption":[74],"CP-ABE":[76,86,140],"things.":[80],"Besides,":[81],"decryption":[83,235],"key":[84,98,163,219],"shared":[88],"by":[89,144],"multiple":[90],"users":[91,183,194],"with":[92,159,170],"same":[94],"attribute,":[95],"once":[96],"disclosure":[99],"occurs,":[100],"it":[101],"non-trivial":[103],"for":[104,241],"system":[106,191],"tell":[108],"who":[109],"maliciously":[110],"leaked":[111],"key.":[113],"Moreover,":[114],"if":[115],"malicious":[117],"device":[119],"not":[121,220],"revoked":[122,196],"time,":[124,198],"more":[125],"security":[126,248],"threats":[127],"will":[128],"be":[129,185],"brought":[130],"system.":[133],"These":[134],"problems":[135],"hinder":[136],"IoT.":[142],"Motivated":[143],"actual":[146],"need,":[147],"scheme":[149,158,176],"called":[150],"traceable":[151],"revocable":[153],"constant-size":[160],"proposed":[165,175],"this":[167],"paper.":[168],"Compared":[169],"existing":[172],"schemes,":[173],"our":[174,260],"following":[179],"advantages:":[180],"(1)":[181],"Malicious":[182],"can":[184],"traced;":[186],"(2)":[187],"Users":[188],"exiting":[189],"misbehaving":[193],"are":[195],"so":[199],"that":[200],"they":[201],"no":[202],"longer":[203],"have":[204],"access":[205],"encrypted":[208],"stored":[210],"cloud":[213],"server;":[214],"(3)":[215],"Constant-size":[216],"only":[221],"improve":[222],"efficiency":[224],"transmission,":[226],"but":[227],"also":[228],"greatly":[229],"reduce":[230],"time":[232],"spent":[233],"on":[234],"operation;":[236],"(4)":[237],"The":[238],"storage":[239],"overhead":[240],"traceability":[242],"constant.":[244],"Finally,":[245],"formal":[247],"proof":[249],"experiment":[251],"been":[253],"conducted":[254],"demonstrate":[256],"feasibility":[258],"scheme.":[261]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
