{"id":"https://openalex.org/W2982130125","doi":"https://doi.org/10.1007/978-981-15-0758-8_3","title":"A Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud Sharing","display_name":"A Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud Sharing","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2982130125","doi":"https://doi.org/10.1007/978-981-15-0758-8_3","mag":"2982130125"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-15-0758-8_3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-15-0758-8_3","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007024735","display_name":"Juyan Li","orcid":"https://orcid.org/0000-0003-2721-2655"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I1300757298","display_name":"Heilongjiang University of Science and Technology","ror":"https://ror.org/030xwyx96","country_code":"CN","type":"education","lineage":["https://openalex.org/I1300757298"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Juyan Li","raw_affiliation_strings":["College of Data Science and Technology, Heilongjiang University, Harbin, 150080, People\u2019s Republic of China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, People\u2019s Republic of China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, People\u2019s Republic of China","College of Data Science and Technology, Heilongjiang University, Harbin, People\u2019s Republic of China"],"affiliations":[{"raw_affiliation_string":"College of Data Science and Technology, Heilongjiang University, Harbin, 150080, People\u2019s Republic of China","institution_ids":["https://openalex.org/I1300757298"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, People\u2019s Republic of China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, People\u2019s Republic of China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"College of Data Science and Technology, Heilongjiang University, Harbin, People\u2019s Republic of China","institution_ids":["https://openalex.org/I1300757298"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101770865","display_name":"Chunguang Ma","orcid":"https://orcid.org/0000-0003-4988-7856"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunguang Ma","raw_affiliation_strings":["College of Computer Science and Technology, Harbin Engineering University, Harbin, 150001, People\u2019s Republic of China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, People\u2019s Republic of China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, People\u2019s Republic of China","College of Computer Science and Technology, Harbin Engineering University, Harbin, People\u2019s Republic of China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin, 150001, People\u2019s Republic of China","institution_ids":["https://openalex.org/I151727225"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, People\u2019s Republic of China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, People\u2019s Republic of China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"College of Computer Science and Technology, Harbin Engineering University, Harbin, People\u2019s Republic of China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100614380","display_name":"Kejia Zhang","orcid":"https://orcid.org/0000-0001-9715-6076"},"institutions":[{"id":"https://openalex.org/I1300757298","display_name":"Heilongjiang University of Science and Technology","ror":"https://ror.org/030xwyx96","country_code":"CN","type":"education","lineage":["https://openalex.org/I1300757298"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kejia Zhang","raw_affiliation_strings":["College of Data Science and Technology, Heilongjiang University, Harbin, 150080, People\u2019s Republic of China","College of Data Science and Technology, Heilongjiang University, Harbin, People\u2019s Republic of China"],"affiliations":[{"raw_affiliation_string":"College of Data Science and Technology, Heilongjiang University, Harbin, 150080, People\u2019s Republic of China","institution_ids":["https://openalex.org/I1300757298"]},{"raw_affiliation_string":"College of Data Science and Technology, Heilongjiang University, Harbin, People\u2019s Republic of China","institution_ids":["https://openalex.org/I1300757298"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100614380"],"corresponding_institution_ids":["https://openalex.org/I1300757298"],"apc_list":null,"apc_paid":null,"fwci":0.5513,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.70290698,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"32","last_page":"46"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.847209632396698},{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.8381385803222656},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.7061593532562256},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6626954078674316},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.597352147102356},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4980623722076416},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48031848669052124},{"id":"https://openalex.org/keywords/malleability","display_name":"Malleability","score":0.4745279848575592},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.47048476338386536},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.41253477334976196},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3686192035675049},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3208826184272766},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.24393045902252197}],"concepts":[{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.847209632396698},{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.8381385803222656},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.7061593532562256},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6626954078674316},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.597352147102356},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4980623722076416},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48031848669052124},{"id":"https://openalex.org/C100980136","wikidata":"https://www.wikidata.org/wiki/Q4668956","display_name":"Malleability","level":4,"score":0.4745279848575592},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.47048476338386536},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.41253477334976196},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3686192035675049},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3208826184272766},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.24393045902252197},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-981-15-0758-8_3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-15-0758-8_3","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W73325731","https://openalex.org/W74973629","https://openalex.org/W1498316612","https://openalex.org/W1536707697","https://openalex.org/W1582239555","https://openalex.org/W1582733026","https://openalex.org/W1890078278","https://openalex.org/W1993032872","https://openalex.org/W2061949491","https://openalex.org/W2067095453","https://openalex.org/W2077052428","https://openalex.org/W2078586025","https://openalex.org/W2089528989","https://openalex.org/W2099908358","https://openalex.org/W2116361063","https://openalex.org/W2122973102","https://openalex.org/W2130410178","https://openalex.org/W2138001464","https://openalex.org/W2491697371","https://openalex.org/W2531399365","https://openalex.org/W2787060144","https://openalex.org/W2898717253","https://openalex.org/W2899765597"],"related_works":["https://openalex.org/W1582239555","https://openalex.org/W2981554290","https://openalex.org/W2578698843","https://openalex.org/W2539919741","https://openalex.org/W4223919663","https://openalex.org/W4225688985","https://openalex.org/W4285255193","https://openalex.org/W1574326402","https://openalex.org/W3031006976","https://openalex.org/W2042220809"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
