{"id":"https://openalex.org/W3090551798","doi":"https://doi.org/10.1007/s11432-019-2856-8","title":"Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs","display_name":"Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs","publication_year":2020,"publication_date":"2020-07-15","ids":{"openalex":"https://openalex.org/W3090551798","doi":"https://doi.org/10.1007/s11432-019-2856-8","mag":"3090551798"},"language":"en","primary_location":{"id":"doi:10.1007/s11432-019-2856-8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11432-019-2856-8","pdf_url":null,"source":{"id":"https://openalex.org/S4210218743","display_name":"Science China Information Sciences","issn_l":"1674-733X","issn":["1674-733X","1869-1919"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Science China Information Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/Ciphertext-policy_attribute-based_proxy_re-encryption_via_constrained_PRFs/27816906","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082316109","display_name":"Zengpeng Li","orcid":"https://orcid.org/0000-0003-0758-7230"},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]},{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN","SG"],"is_corresponding":true,"raw_author_name":"Zengpeng Li","raw_affiliation_strings":["College of Computer Science and Technology, Qingdao University, Qingdao, 266071, China","Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang, 550025, China","ISTD Pillar, Singapore University of Technology and Design (SUTD), Singapore, 487372, Singapore"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Qingdao University, Qingdao, 266071, China","institution_ids":[]},{"raw_affiliation_string":"Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang, 550025, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"ISTD Pillar, Singapore University of Technology and Design (SUTD), Singapore, 487372, Singapore","institution_ids":["https://openalex.org/I152815399"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068070266","display_name":"Vishal Sharma","orcid":"https://orcid.org/0000-0001-7470-6506"},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Vishal Sharma","raw_affiliation_strings":["ISTD Pillar, Singapore University of Technology and Design (SUTD), Singapore, 487372, Singapore"],"affiliations":[{"raw_affiliation_string":"ISTD Pillar, Singapore University of Technology and Design (SUTD), Singapore, 487372, Singapore","institution_ids":["https://openalex.org/I152815399"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101770865","display_name":"Chunguang Ma","orcid":"https://orcid.org/0000-0003-4988-7856"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chunguang Ma","raw_affiliation_strings":["College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, 266590, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, 266590, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058584916","display_name":"Chunpeng Ge","orcid":"https://orcid.org/0000-0003-2629-7220"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]},{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU","CN"],"is_corresponding":false,"raw_author_name":"Chunpeng Ge","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 211106, China","School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, 2522, Australia"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 211106, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, 2522, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, 2522, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, 2522, Australia","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5082316109","https://openalex.org/A5101770865"],"corresponding_institution_ids":["https://openalex.org/I152815399","https://openalex.org/I178232147","https://openalex.org/I80143920"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":null,"fwci":1.6236,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.87472378,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"64","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.8751015663146973},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.7115943431854248},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5606908202171326},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.39840462803840637},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.31943580508232117},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27136069536209106}],"concepts":[{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.8751015663146973},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.7115943431854248},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5606908202171326},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.39840462803840637},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.31943580508232117},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27136069536209106},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/s11432-019-2856-8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11432-019-2856-8","pdf_url":null,"source":{"id":"https://openalex.org/S4210218743","display_name":"Science China Information Sciences","issn_l":"1674-733X","issn":["1674-733X","1869-1919"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Science China Information Sciences","raw_type":"journal-article"},{"id":"pmh:oai:ro.uow.edu.au:test2021-1101","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/test2021/92","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Test Series for Scopus Harvesting 2021","raw_type":"text"},{"id":"pmh:oai:figshare.com:article/27816906","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Ciphertext-policy_attribute-based_proxy_re-encryption_via_constrained_PRFs/27816906","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:pure.qub.ac.uk/portal:publications/eae6033a-bd08-4e4d-9e63-b42ee75115a0","is_oa":false,"landing_page_url":"https://pure.qub.ac.uk/en/publications/eae6033a-bd08-4e4d-9e63-b42ee75115a0","pdf_url":null,"source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Li , Z , Sharma , V , Ma , C , Ge , C &amp; Susilo , W 2020 , ' Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs ' , Science China Information Sciences , vol. 64 , no. 6 , pp. 1-2 . https://doi.org/10.1007/s11432-019-2856-8","raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/27816906","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Ciphertext-policy_attribute-based_proxy_re-encryption_via_constrained_PRFs/27816906","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1554247779","https://openalex.org/W1963071371","https://openalex.org/W1993060580","https://openalex.org/W2234439753","https://openalex.org/W2749326657","https://openalex.org/W2754162367","https://openalex.org/W2766396783","https://openalex.org/W2789097676","https://openalex.org/W2794501668"],"related_works":["https://openalex.org/W2792978874","https://openalex.org/W2370868004","https://openalex.org/W2396704985","https://openalex.org/W3042932947","https://openalex.org/W1972631883","https://openalex.org/W2068013785","https://openalex.org/W2997442751","https://openalex.org/W2516093999","https://openalex.org/W2035692780","https://openalex.org/W2156318122"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
