{"id":"https://openalex.org/W2992684972","doi":"https://doi.org/10.1007/s11416-020-00366-8","title":"Advanced attribute-based encryption protocol based on the modified secret sharing scheme","display_name":"Advanced attribute-based encryption protocol based on the modified secret sharing scheme","publication_year":2020,"publication_date":"2020-08-28","ids":{"openalex":"https://openalex.org/W2992684972","doi":"https://doi.org/10.1007/s11416-020-00366-8","mag":"2992684972"},"language":"en","primary_location":{"id":"doi:10.1007/s11416-020-00366-8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11416-020-00366-8","pdf_url":null,"source":{"id":"https://openalex.org/S2764922190","display_name":"Journal of Computer Virology and Hacking Techniques","issn_l":"2263-8733","issn":["2263-8733"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Virology and Hacking Techniques","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1912.03009","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"M. A. Kudinov","orcid":null},"institutions":[{"id":"https://openalex.org/I4210139586","display_name":"Russian Quantum Center","ror":"https://ror.org/03v8t4025","country_code":"RU","type":"facility","lineage":["https://openalex.org/I4210139586"]},{"id":"https://openalex.org/I177537411","display_name":"Bauman Moscow State Technical University","ror":"https://ror.org/00pb8h375","country_code":"RU","type":"education","lineage":["https://openalex.org/I177537411"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"M. A. Kudinov","raw_affiliation_strings":["Bauman Moscow State Technical University, Moscow, Russia, 105005","Russian Quantum Center, Skolkovo, Moscow, Russia, 143025"],"affiliations":[{"raw_affiliation_string":"Bauman Moscow State Technical University, Moscow, Russia, 105005","institution_ids":["https://openalex.org/I177537411"]},{"raw_affiliation_string":"Russian Quantum Center, Skolkovo, Moscow, Russia, 143025","institution_ids":["https://openalex.org/I4210139586"]}]},{"author_position":"middle","author":{"id":null,"display_name":"A. A. Chilikov","orcid":null},"institutions":[{"id":"https://openalex.org/I153845743","display_name":"Moscow Institute of Physics and Technology","ror":"https://ror.org/00v0z9322","country_code":"RU","type":"education","lineage":["https://openalex.org/I153845743"]},{"id":"https://openalex.org/I177537411","display_name":"Bauman Moscow State Technical University","ror":"https://ror.org/00pb8h375","country_code":"RU","type":"education","lineage":["https://openalex.org/I177537411"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"A. A. Chilikov","raw_affiliation_strings":["Bauman Moscow State Technical University, Moscow, Russia, 105005","Moscow Institute of Physics and Technology, Dolgoprudny, Moscow Region, Russia, 141700"],"affiliations":[{"raw_affiliation_string":"Bauman Moscow State Technical University, Moscow, Russia, 105005","institution_ids":["https://openalex.org/I177537411"]},{"raw_affiliation_string":"Moscow Institute of Physics and Technology, Dolgoprudny, Moscow Region, Russia, 141700","institution_ids":["https://openalex.org/I153845743"]}]},{"author_position":"middle","author":{"id":null,"display_name":"E. O. Kiktenko","orcid":null},"institutions":[{"id":"https://openalex.org/I4210139586","display_name":"Russian Quantum Center","ror":"https://ror.org/03v8t4025","country_code":"RU","type":"facility","lineage":["https://openalex.org/I4210139586"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"E. O. Kiktenko","raw_affiliation_strings":["Russian Quantum Center, Skolkovo, Moscow, Russia, 143025"],"affiliations":[{"raw_affiliation_string":"Russian Quantum Center, Skolkovo, Moscow, Russia, 143025","institution_ids":["https://openalex.org/I4210139586"]}]},{"author_position":"last","author":{"id":null,"display_name":"A. K. Fedorov","orcid":null},"institutions":[{"id":"https://openalex.org/I4210139586","display_name":"Russian Quantum Center","ror":"https://ror.org/03v8t4025","country_code":"RU","type":"facility","lineage":["https://openalex.org/I4210139586"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"A. K. Fedorov","raw_affiliation_strings":["Russian Quantum Center, Skolkovo, Moscow, Russia, 143025"],"affiliations":[{"raw_affiliation_string":"Russian Quantum Center, Skolkovo, Moscow, Russia, 143025","institution_ids":["https://openalex.org/I4210139586"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I177537411","https://openalex.org/I4210139586"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":null,"fwci":0.2719,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.62137646,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"16","issue":"4","first_page":"333","last_page":"341"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9538999795913696,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9538999795913696,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.008200000040233135,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.006800000090152025,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.6327000260353088},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6244999766349792},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5388000011444092},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.4855000078678131},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.48100000619888306},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.4733999967575073},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.4465000033378601},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4259999990463257},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.4133000075817108}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7911999821662903},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.6327000260353088},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6244999766349792},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5388000011444092},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.4855000078678131},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.48100000619888306},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.4733999967575073},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.4465000033378601},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4259999990463257},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.4133000075817108},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4050999879837036},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.4027999937534332},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3912999927997589},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.3846000134944916},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.366100013256073},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.35359999537467957},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.351500004529953},{"id":"https://openalex.org/C2778950925","wikidata":"https://www.wikidata.org/wiki/Q4672474","display_name":"Access structure","level":4,"score":0.3467999994754791},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.33660000562667847},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.32839998602867126},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.3215999901294708},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3061999976634979},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.29510000348091125},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.2831000089645386},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.2718000113964081},{"id":"https://openalex.org/C69254412","wikidata":"https://www.wikidata.org/wiki/Q6554302","display_name":"Link encryption","level":4,"score":0.271699994802475},{"id":"https://openalex.org/C50230483","wikidata":"https://www.wikidata.org/wiki/Q2108226","display_name":"Pre-shared key","level":5,"score":0.2703999876976013},{"id":"https://openalex.org/C131672422","wikidata":"https://www.wikidata.org/wiki/Q852594","display_name":"Provable security","level":3,"score":0.2696000039577484},{"id":"https://openalex.org/C184660509","wikidata":"https://www.wikidata.org/wiki/Q462624","display_name":"Shared secret","level":3,"score":0.2605000138282776}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s11416-020-00366-8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11416-020-00366-8","pdf_url":null,"source":{"id":"https://openalex.org/S2764922190","display_name":"Journal of Computer Virology and Hacking Techniques","issn_l":"2263-8733","issn":["2263-8733"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Virology and Hacking Techniques","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1912.03009","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1912.03009","pdf_url":"https://arxiv.org/pdf/1912.03009","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1912.03009","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1912.03009","pdf_url":"https://arxiv.org/pdf/1912.03009","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4285237426","display_name":null,"funder_award_id":"18-37-20033","funder_id":"https://openalex.org/F4320321079","funder_display_name":"Russian Foundation for Basic Research"}],"funders":[{"id":"https://openalex.org/F4320321079","display_name":"Russian Foundation for Basic Research","ror":"https://ror.org/02mh1ke95"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1498316612","https://openalex.org/W1532961226","https://openalex.org/W1548880861","https://openalex.org/W1603068992","https://openalex.org/W1905774212","https://openalex.org/W2052267638","https://openalex.org/W2097638666","https://openalex.org/W2099000090","https://openalex.org/W2117685508","https://openalex.org/W2122866249","https://openalex.org/W2138001464","https://openalex.org/W2152924492","https://openalex.org/W2171440248"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2019-12-13T00:00:00"}
