{"id":"https://openalex.org/W2982129646","doi":"https://doi.org/10.1007/s10623-019-00686-x","title":"A multi-authority approach to various predicate encryption types","display_name":"A multi-authority approach to various predicate encryption types","publication_year":2019,"publication_date":"2019-10-25","ids":{"openalex":"https://openalex.org/W2982129646","doi":"https://doi.org/10.1007/s10623-019-00686-x","mag":"2982129646"},"language":"en","primary_location":{"id":"doi:10.1007/s10623-019-00686-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10623-019-00686-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10623-019-00686-x.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10623-019-00686-x.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024532239","display_name":"Tim van de Kamp","orcid":"https://orcid.org/0000-0002-9794-9882"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Tim van de Kamp","raw_affiliation_strings":["University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056553463","display_name":"Peter Andreas","orcid":"https://orcid.org/0000-0003-2929-5001"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Andreas Peter","raw_affiliation_strings":["University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111432433","display_name":"Willem Jonker","orcid":"https://orcid.org/0009-0009-7028-2967"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Willem Jonker","raw_affiliation_strings":["University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5024532239"],"corresponding_institution_ids":["https://openalex.org/I94624287"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":{"value":2290,"currency":"EUR","value_usd":2890},"fwci":0.1445,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.5917711,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"88","issue":"2","first_page":"363","last_page":"390"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9800999760627747,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7566779851913452},{"id":"https://openalex.org/keywords/predicate","display_name":"Predicate (mathematical logic)","score":0.7204748392105103},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7014634609222412},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.6049045324325562},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.601041853427887},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.5835686326026917},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5494474768638611},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5167393088340759},{"id":"https://openalex.org/keywords/deterministic-encryption","display_name":"Deterministic encryption","score":0.4161291718482971},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3033266067504883},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.18898946046829224},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.11532023549079895}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7566779851913452},{"id":"https://openalex.org/C140146324","wikidata":"https://www.wikidata.org/wiki/Q1144319","display_name":"Predicate (mathematical logic)","level":2,"score":0.7204748392105103},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7014634609222412},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.6049045324325562},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.601041853427887},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.5835686326026917},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5494474768638611},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5167393088340759},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.4161291718482971},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3033266067504883},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.18898946046829224},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.11532023549079895}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s10623-019-00686-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10623-019-00686-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10623-019-00686-x.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/e16ae3ce-e0b2-4d6a-af1e-148fcec09295","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/e16ae3ce-e0b2-4d6a-af1e-148fcec09295","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"van de Kamp, T, Peter, A & Jonker, W 2020, 'A multi-authority approach to various predicate encryption types', Designs, codes and cryptography, vol. 88, no. 2, pp. 363\u2013390. https://doi.org/10.1007/s10623-019-00686-x","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1007/s10623-019-00686-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10623-019-00686-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10623-019-00686-x.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.800000011920929}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321800","display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","ror":"https://ror.org/04jsz6e67"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2982129646.pdf","grobid_xml":"https://content.openalex.org/works/W2982129646.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W65874733","https://openalex.org/W71234479","https://openalex.org/W137962550","https://openalex.org/W148801026","https://openalex.org/W154883872","https://openalex.org/W177444027","https://openalex.org/W1484751769","https://openalex.org/W1498316612","https://openalex.org/W1522101599","https://openalex.org/W1589843374","https://openalex.org/W1596208550","https://openalex.org/W1682451491","https://openalex.org/W1763482972","https://openalex.org/W1860948751","https://openalex.org/W1896261913","https://openalex.org/W1976420017","https://openalex.org/W2101238246","https://openalex.org/W2117685508","https://openalex.org/W2118743760","https://openalex.org/W2152924492","https://openalex.org/W2181434278","https://openalex.org/W2211075457","https://openalex.org/W2231711433","https://openalex.org/W2238048589","https://openalex.org/W2514843297","https://openalex.org/W2553733191","https://openalex.org/W2603048639","https://openalex.org/W2608091826","https://openalex.org/W2753879715","https://openalex.org/W2789365089","https://openalex.org/W2887159137"],"related_works":["https://openalex.org/W4245054042","https://openalex.org/W1993945719","https://openalex.org/W2389178160","https://openalex.org/W2355986883","https://openalex.org/W2545514196","https://openalex.org/W4387429380","https://openalex.org/W2383771631","https://openalex.org/W3211136635","https://openalex.org/W4387191618","https://openalex.org/W2545608624"],"abstract_inverted_index":{"Abstract":[0],"We":[1,74],"propose":[2],"a":[3,33,36,63,79,92,107,150],"generic":[4,93],"construction":[5],"for":[6,70],"fully":[7,118],"secure":[8,119],"decentralized":[9,58],"multiauthority":[10,15],"predicate":[11,16,103,109,155],"encryption.":[12],"In":[13,56],"such":[14],"encryption":[17,104,110,114,156],"scheme,":[18],"ciphertexts":[19],"are":[20,116,146],"associated":[21],"with":[22],"one":[23],"or":[24],"more":[25],"predicates":[26,44],"from":[27],"various":[28,102],"authorities":[29],"and":[30,66,140],"only":[31],"if":[32],"user":[34,49],"has":[35],"set":[37],"of":[38,78,152],"decryption":[39,68],"keys":[40,69],"that":[41,96],"evaluates":[42],"all":[43],"to":[45,52,99,148],"true":[46],",":[47],"the":[48,54,76,126],"is":[50],"able":[51,147],"recover":[53],"message.":[55],"our":[57,142],"system,":[59],"anyone":[60],"can":[61],"create":[62,149],"new":[64],"authority":[65],"issue":[67],"their":[71],"own":[72],"predicates.":[73],"introduce":[75],"concept":[77],"multi-authority":[80,108,135,154],"admissible":[81,136],"pair":[82,137],"encoding":[83,138],"scheme":[84],"and,":[85],"based":[86],"on":[87],"these":[88],"encodings,":[89],"we":[90,145],"give":[91],"conversion":[94,143],"algorithm":[95],"allows":[97],"us":[98],"easily":[100],"combine":[101],"schemes":[105,115,139],"into":[106],"variant.":[111],"The":[112],"resulting":[113],"proven":[117],"under":[120],"standard":[121],"subgroup":[122],"decision":[123],"assumptions":[124],"in":[125],"random":[127],"oracle":[128],"model.":[129],"Finally,":[130],"by":[131],"instantiating":[132],"several":[133],"concrete":[134],"applying":[141],"algorithm,":[144],"variety":[151],"novel":[153],"schemes.":[157]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
