{"id":"https://openalex.org/W58502220","doi":"https://doi.org/10.1007/978-3-319-12475-9_18","title":"Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts","display_name":"Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W58502220","doi":"https://doi.org/10.1007/978-3-319-12475-9_18","mag":"58502220"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-12475-9_18","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-12475-9_18","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100629240","display_name":"Yinghui Zhang","orcid":"https://orcid.org/0000-0002-5764-3272"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yinghui Zhang","raw_affiliation_strings":["National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, 710121, P.R. China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100096, P.R. China","National Engineering Laboratory for Wireless Security, Xi'an University of Posts and Telecommunications, Xi'an, 710121, P.R. China"],"affiliations":[{"raw_affiliation_string":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, 710121, P.R. China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100096, P.R. China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"National Engineering Laboratory for Wireless Security, Xi'an University of Posts and Telecommunications, Xi'an, 710121, P.R. China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081385202","display_name":"Dong Zheng","orcid":"https://orcid.org/0000-0002-8343-3914"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dong Zheng","raw_affiliation_strings":["National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, 710121, P.R. China","National Engineering Laboratory for Wireless Security, Xi'an University of Posts and Telecommunications, Xi'an, 710121, P.R. China"],"affiliations":[{"raw_affiliation_string":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, 710121, P.R. China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"National Engineering Laboratory for Wireless Security, Xi'an University of Posts and Telecommunications, Xi'an, 710121, P.R. China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100352393","display_name":"Xiaofeng Chen","orcid":"https://orcid.org/0009-0001-7227-7725"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofeng Chen","raw_affiliation_strings":["State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi\u2019an, 710071, P.R. China","State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, 710071, P.R. China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi\u2019an, 710071, P.R. China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, 710071, P.R. China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100364819","display_name":"Jin Li","orcid":"https://orcid.org/0000-0003-0385-8793"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jin Li","raw_affiliation_strings":["School of Computer Science, Guangzhou University, Guangzhou, 510006, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Guangzhou University, Guangzhou, 510006, P.R. China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024453724","display_name":"Hui Li","orcid":"https://orcid.org/0000-0001-8310-7169"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Li","raw_affiliation_strings":["State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi\u2019an, 710071, P.R. China","State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, 710071, P.R. China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi\u2019an, 710071, P.R. China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Service Networks (ISN), Xidian University, Xi'an, 710071, P.R. China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100629240"],"corresponding_institution_ids":["https://openalex.org/I4210136859","https://openalex.org/I4210156404"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":7.2385,"has_fulltext":false,"cited_by_count":75,"citation_normalized_percentile":{"value":0.97505626,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"259","last_page":"273"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9858999848365784,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.8066641092300415},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.7875430583953857},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.7557563781738281},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7484334707260132},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6242461204528809},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5818816423416138},{"id":"https://openalex.org/keywords/constant","display_name":"Constant (computer programming)","score":0.5119937062263489},{"id":"https://openalex.org/keywords/bilinear-interpolation","display_name":"Bilinear interpolation","score":0.5090593695640564},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.47341829538345337},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4722316265106201},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.4400676190853119},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.4187171161174774},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3198915123939514},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2141980528831482},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.195363849401474},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.18112751841545105}],"concepts":[{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.8066641092300415},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.7875430583953857},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.7557563781738281},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7484334707260132},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6242461204528809},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5818816423416138},{"id":"https://openalex.org/C2777027219","wikidata":"https://www.wikidata.org/wiki/Q1284190","display_name":"Constant (computer programming)","level":2,"score":0.5119937062263489},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.5090593695640564},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.47341829538345337},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4722316265106201},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.4400676190853119},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.4187171161174774},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3198915123939514},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2141980528831482},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.195363849401474},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.18112751841545105},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-12475-9_18","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-12475-9_18","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.41999998688697815}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W70096886","https://openalex.org/W86792954","https://openalex.org/W165895243","https://openalex.org/W177097556","https://openalex.org/W183416985","https://openalex.org/W251244672","https://openalex.org/W1496212871","https://openalex.org/W1498316612","https://openalex.org/W1513551553","https://openalex.org/W1549397354","https://openalex.org/W1558439324","https://openalex.org/W1596208550","https://openalex.org/W1769443955","https://openalex.org/W1904620209","https://openalex.org/W1939350519","https://openalex.org/W1974267799","https://openalex.org/W1982949197","https://openalex.org/W1990413350","https://openalex.org/W2034382123","https://openalex.org/W2076046175","https://openalex.org/W2093800398","https://openalex.org/W2101709669","https://openalex.org/W2108072891","https://openalex.org/W2113976134","https://openalex.org/W2117595303","https://openalex.org/W2117616411","https://openalex.org/W2125974812","https://openalex.org/W2138001464","https://openalex.org/W2167296203","https://openalex.org/W2405551720","https://openalex.org/W2479809369","https://openalex.org/W2490262601","https://openalex.org/W2491574786","https://openalex.org/W2505860479","https://openalex.org/W2981554290","https://openalex.org/W3015814275","https://openalex.org/W3035112273","https://openalex.org/W4238724643"],"related_works":["https://openalex.org/W2131846073","https://openalex.org/W114534093","https://openalex.org/W2383331906","https://openalex.org/W1906282778","https://openalex.org/W1939781145","https://openalex.org/W1558439324","https://openalex.org/W4388469158","https://openalex.org/W1554299772","https://openalex.org/W2809908797","https://openalex.org/W165895243"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":11},{"year":2015,"cited_by_count":4}],"updated_date":"2026-04-11T08:14:18.477133","created_date":"2025-10-10T00:00:00"}
