{"id":"https://openalex.org/W2413402773","doi":"https://doi.org/10.1080/10798587.2015.1120092","title":"Efficient Attribute-Based Encryption Schemes for Secure Communications in Cyber Defense","display_name":"Efficient Attribute-Based Encryption Schemes for Secure Communications in Cyber Defense","publication_year":2016,"publication_date":"2016-02-08","ids":{"openalex":"https://openalex.org/W2413402773","doi":"https://doi.org/10.1080/10798587.2015.1120092","mag":"2413402773"},"language":"en","primary_location":{"id":"doi:10.1080/10798587.2015.1120092","is_oa":false,"landing_page_url":"https://doi.org/10.1080/10798587.2015.1120092","pdf_url":null,"source":{"id":"https://openalex.org/S40639465","display_name":"Intelligent Automation & Soft Computing","issn_l":"1079-8587","issn":["1079-8587","2326-005X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Automation &amp; Soft Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101701563","display_name":"Yijun Mao","orcid":"https://orcid.org/0000-0001-8123-2564"},"institutions":[{"id":"https://openalex.org/I101479585","display_name":"South China Agricultural University","ror":"https://ror.org/05v9jqt67","country_code":"CN","type":"education","lineage":["https://openalex.org/I101479585"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yijun Mao","raw_affiliation_strings":["School of Information Science and Technology, Sun Yat-Sen University, Guangzhou, 510275, China; College of Mathematics and Informatics, South China Agricultural University, Guangzhou, 510640, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Sun Yat-Sen University, Guangzhou, 510275, China; College of Mathematics and Informatics, South China Agricultural University, Guangzhou, 510640, China","institution_ids":["https://openalex.org/I101479585"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100333755","display_name":"Yue Zhang","orcid":"https://orcid.org/0000-0002-7786-0231"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Zhang","raw_affiliation_strings":["National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, 710121, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, 710121, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079910881","display_name":"Min-Rong Chen","orcid":"https://orcid.org/0000-0001-9817-0267"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]},{"id":"https://openalex.org/I187400657","display_name":"South China Normal University","ror":"https://ror.org/01kq0pv72","country_code":"CN","type":"education","lineage":["https://openalex.org/I187400657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Min-Rong Chen","raw_affiliation_strings":["School of Computer Science, South China Normal University, Guangzhou, 510631, China; College of Information Engineering, Shenzhen University, Shenzhen, 518060, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, South China Normal University, Guangzhou, 510631, China; College of Information Engineering, Shenzhen University, Shenzhen, 518060, China","institution_ids":["https://openalex.org/I187400657","https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103248211","display_name":"Yongbiao Li","orcid":"https://orcid.org/0000-0002-4956-9316"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongbiao Li","raw_affiliation_strings":["Department of Computer Science Jinan University,Guangzhou,510632,China)"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science Jinan University,Guangzhou,510632,China)","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101416367","display_name":"Yiju Zhan","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiju Zhan","raw_affiliation_strings":["School of Engineering, Sun Yat\u2010sen University, Guangzhou 510275, China"],"affiliations":[{"raw_affiliation_string":"School of Engineering, Sun Yat\u2010sen University, Guangzhou 510275, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101701563"],"corresponding_institution_ids":["https://openalex.org/I101479585"],"apc_list":null,"apc_paid":null,"fwci":1.7139,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.88740813,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"22","issue":"3","first_page":"397","last_page":"403"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9166353344917297},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6746644973754883},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6278335452079773}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9166353344917297},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6746644973754883},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6278335452079773}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/10798587.2015.1120092","is_oa":false,"landing_page_url":"https://doi.org/10.1080/10798587.2015.1120092","pdf_url":null,"source":{"id":"https://openalex.org/S40639465","display_name":"Intelligent Automation & Soft Computing","issn_l":"1079-8587","issn":["1079-8587","2326-005X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Automation &amp; Soft Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5400000214576721,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W66767074","https://openalex.org/W177444027","https://openalex.org/W1484751769","https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1546774120","https://openalex.org/W1682451491","https://openalex.org/W1763482972","https://openalex.org/W1898753656","https://openalex.org/W1905774212","https://openalex.org/W1966691762","https://openalex.org/W1974267799","https://openalex.org/W1976420017","https://openalex.org/W2101709669","https://openalex.org/W2108072891","https://openalex.org/W2116556172","https://openalex.org/W2138001464","https://openalex.org/W2146689848","https://openalex.org/W2152924492","https://openalex.org/W2159339434","https://openalex.org/W2211075457","https://openalex.org/W2231711433","https://openalex.org/W2404809868","https://openalex.org/W2949293557"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2130043461","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"AbstractHow":[0],"to":[1,104,124],"securely":[2],"transmit":[3],"data":[4,128],"over":[5,129],"the":[6,28,47,53,57,60,72,96,106,113,126],"cyber":[7,13,130],"is":[8,68],"an":[9],"important":[10],"problem":[11],"in":[12,26,71,131],"defense.":[14],"In":[15],"this":[16],"paper,":[17],"we":[18],"propose":[19],"a":[20,80,87,92,132],"ciphertext-policy":[21],"attribute-based":[22],"encryption":[23],"(CP-ABE)":[24],"scheme,":[25],"which":[27],"messages":[29],"are":[30,39],"encrypted":[31],"together":[32],"with":[33,41],"access":[34,62],"policy,":[35],"while":[36],"secret":[37,48],"keys":[38,49,100],"associated":[40,61],"specified":[42],"sets":[43],"of":[44,98],"attributes,":[45],"and":[46,78,101,110],"can":[50,120],"correctly":[51],"decrypt":[52],"ciphertexts":[54],"only":[55],"when":[56],"attributes":[58],"satisfy":[59],"policy.":[63],"Our":[64],"proposed":[65],"CP-ABE":[66],"scheme":[67,114,119],"provably":[69],"secure":[70],"full":[73],"model":[74],"without":[75],"random":[76],"oracles,":[77],"has":[79],"tight":[81,88],"security":[82,89,94,108],"reduction.":[83],"We":[84],"stress":[85],"that":[86],"reduction":[90],"implies":[91],"higher":[93],"or":[95],"requirement":[97],"smaller":[99],"ciphertext":[102],"sizes":[103],"obtain":[105],"same":[107],"level,":[109],"thus":[111],"make":[112],"more":[115],"efficient.":[116],"Thus":[117],"our":[118],"be":[121],"efficiently":[122],"used":[123],"encrypt":[125],"transmitted":[127],"fine-grained":[133],"manner.":[134]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
