{"id":"https://openalex.org/W2091156317","doi":"https://doi.org/10.1007/s11227-014-1234-6","title":"LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces","display_name":"LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces","publication_year":2014,"publication_date":"2014-06-19","ids":{"openalex":"https://openalex.org/W2091156317","doi":"https://doi.org/10.1007/s11227-014-1234-6","mag":"2091156317"},"language":"en","primary_location":{"id":"doi:10.1007/s11227-014-1234-6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11227-014-1234-6","pdf_url":null,"source":{"id":"https://openalex.org/S32326811","display_name":"The Journal of Supercomputing","issn_l":"0920-8542","issn":["0920-8542","1573-0484"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Journal of Supercomputing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077290356","display_name":"Mingwu Zhang","orcid":"https://orcid.org/0000-0001-8551-8826"},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]},{"id":"https://openalex.org/I74525822","display_name":"Hubei University of Technology","ror":"https://ror.org/02d3fj342","country_code":"CN","type":"education","lineage":["https://openalex.org/I74525822"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mingwu Zhang","raw_affiliation_strings":["School of Computer Sciences, Hubei University of Technology, Wuhan, 430068, P. R. China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, P. R. China","School of Computer Sciences, Hubei University of Technology, Wuhan, P. R. China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Sciences, Hubei University of Technology, Wuhan, 430068, P. R. China","institution_ids":["https://openalex.org/I74525822","https://openalex.org/I196699116"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, P. R. China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Computer Sciences, Hubei University of Technology, Wuhan, P. R. China","institution_ids":["https://openalex.org/I74525822"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P. R. China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103162139","display_name":"Chunzhi Wang","orcid":"https://orcid.org/0000-0002-9620-3421"},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]},{"id":"https://openalex.org/I74525822","display_name":"Hubei University of Technology","ror":"https://ror.org/02d3fj342","country_code":"CN","type":"education","lineage":["https://openalex.org/I74525822"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunzhi Wang","raw_affiliation_strings":["School of Computer Sciences, Hubei University of Technology, Wuhan, 430068, P. R. China","School of Computer Sciences, Hubei University of Technology, Wuhan, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Sciences, Hubei University of Technology, Wuhan, 430068, P. R. China","institution_ids":["https://openalex.org/I74525822","https://openalex.org/I196699116"]},{"raw_affiliation_string":"School of Computer Sciences, Hubei University of Technology, Wuhan, P. R. China","institution_ids":["https://openalex.org/I74525822"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076022836","display_name":"Kirill Morozov","orcid":"https://orcid.org/0009-0006-4443-083X"},"institutions":[{"id":"https://openalex.org/I135598925","display_name":"Kyushu University","ror":"https://ror.org/00p4k0j84","country_code":"JP","type":"education","lineage":["https://openalex.org/I135598925"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kirill Morozov","raw_affiliation_strings":["Institute of Mathematics for Industry, Kyushu University, Fukuoka, 819-0395, Japan","Institute of Mathematics for Industry, Kyushu University, Fukuoka, Japan"],"affiliations":[{"raw_affiliation_string":"Institute of Mathematics for Industry, Kyushu University, Fukuoka, 819-0395, Japan","institution_ids":["https://openalex.org/I135598925"]},{"raw_affiliation_string":"Institute of Mathematics for Industry, Kyushu University, Fukuoka, Japan","institution_ids":["https://openalex.org/I135598925"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5077290356"],"corresponding_institution_ids":["https://openalex.org/I196699116","https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I74525822"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":null,"fwci":0.424,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.75752592,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"70","issue":"3","first_page":"1405","last_page":"1432"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8293168544769287},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6128675937652588},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.524472713470459},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4859953820705414},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.4817473888397217},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47056055068969727},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.46535640954971313},{"id":"https://openalex.org/keywords/affine-transformation","display_name":"Affine transformation","score":0.4643922448158264},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.45110100507736206},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4460938572883606},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.4441169202327728},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.44050875306129456},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.38186994194984436},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3548277020454407},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.2672719955444336},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12692227959632874}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8293168544769287},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6128675937652588},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.524472713470459},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4859953820705414},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.4817473888397217},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47056055068969727},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.46535640954971313},{"id":"https://openalex.org/C92757383","wikidata":"https://www.wikidata.org/wiki/Q382497","display_name":"Affine transformation","level":2,"score":0.4643922448158264},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45110100507736206},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4460938572883606},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.4441169202327728},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.44050875306129456},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.38186994194984436},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3548277020454407},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2672719955444336},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12692227959632874},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11227-014-1234-6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11227-014-1234-6","pdf_url":null,"source":{"id":"https://openalex.org/S32326811","display_name":"The Journal of Supercomputing","issn_l":"0920-8542","issn":["0920-8542","1573-0484"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Journal of Supercomputing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W21456","https://openalex.org/W111085860","https://openalex.org/W151886262","https://openalex.org/W165774471","https://openalex.org/W177444027","https://openalex.org/W236432643","https://openalex.org/W1483177297","https://openalex.org/W1484751769","https://openalex.org/W1518187966","https://openalex.org/W1522101599","https://openalex.org/W1538349060","https://openalex.org/W1559904719","https://openalex.org/W1563217018","https://openalex.org/W1576892942","https://openalex.org/W1588518948","https://openalex.org/W1606729219","https://openalex.org/W1684724692","https://openalex.org/W1724472458","https://openalex.org/W1769443955","https://openalex.org/W1783296469","https://openalex.org/W1871488407","https://openalex.org/W1976536045","https://openalex.org/W1987129710","https://openalex.org/W1988452287","https://openalex.org/W2012454489","https://openalex.org/W2014186982","https://openalex.org/W2034313414","https://openalex.org/W2046871034","https://openalex.org/W2062479144","https://openalex.org/W2110740499","https://openalex.org/W2116556172","https://openalex.org/W2117459578","https://openalex.org/W2119711222","https://openalex.org/W2128740045","https://openalex.org/W2151471396","https://openalex.org/W2161214158","https://openalex.org/W2165342398","https://openalex.org/W2238048589","https://openalex.org/W2950229125","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2247198827","https://openalex.org/W3029439116","https://openalex.org/W2103782989","https://openalex.org/W4328132745","https://openalex.org/W2242943567","https://openalex.org/W2613850739","https://openalex.org/W2598311158","https://openalex.org/W2545146007","https://openalex.org/W2356981542","https://openalex.org/W3093625357"],"abstract_inverted_index":null,"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
