{"id":"https://openalex.org/W2903133238","doi":"https://doi.org/10.1093/comjnl/bxaa082","title":"On Enabling Attribute-Based Encryption to Be Traceable Against Traitors","display_name":"On Enabling Attribute-Based Encryption to Be Traceable Against Traitors","publication_year":2020,"publication_date":"2020-06-11","ids":{"openalex":"https://openalex.org/W2903133238","doi":"https://doi.org/10.1093/comjnl/bxaa082","mag":"2903133238"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxaa082","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxaa082","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100412015","display_name":"Zhen Liu","orcid":"https://orcid.org/0000-0001-9268-702X"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Liu","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai 200240, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai 200240, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Qiong Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I101479585","display_name":"South China Agricultural University","ror":"https://ror.org/05v9jqt67","country_code":"CN","type":"education","lineage":["https://openalex.org/I101479585"]},{"id":"https://openalex.org/I4210142539","display_name":"Guangdong Institute of Intelligent Manufacturing","ror":"https://ror.org/049jpjz09","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210142539"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qiong Huang","raw_affiliation_strings":["Guangzhou Key Laboratory of Intelligent Agriculture, Guangzhou 510642, China","South China Agricultural University, Guangzhou 510642, China"],"affiliations":[{"raw_affiliation_string":"Guangzhou Key Laboratory of Intelligent Agriculture, Guangzhou 510642, China","institution_ids":["https://openalex.org/I4210142539"]},{"raw_affiliation_string":"South China Agricultural University, Guangzhou 510642, China","institution_ids":["https://openalex.org/I101479585"]}]},{"author_position":"last","author":{"id":null,"display_name":"Duncan S Wong","orcid":null},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Duncan S Wong","raw_affiliation_strings":["CryptoBLK HKSAR, China"],"affiliations":[{"raw_affiliation_string":"CryptoBLK HKSAR, China","institution_ids":["https://openalex.org/I4210132990"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I101479585","https://openalex.org/I4210142539"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00463182,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"64","issue":"4","first_page":"575","last_page":"598"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.972599983215332,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7224960327148438},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6893572807312012},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6040703058242798}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7224960327148438},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6893572807312012},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6040703058242798}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1093/comjnl/bxaa082","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxaa082","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},{"id":"mag:2903133238","is_oa":false,"landing_page_url":"https://eprint.iacr.org/2018/963.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S2764847869","display_name":"IACR Cryptology ePrint Archive","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":["https://openalex.org/P4322614454"],"host_organization_lineage_names":["Cryptology ePrint Archive"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Cryptology ePrint Archive","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1496212871","https://openalex.org/W1510795740","https://openalex.org/W1982946433","https://openalex.org/W2031722321","https://openalex.org/W2080999623","https://openalex.org/W2117616411","https://openalex.org/W2888094362","https://openalex.org/W2911261396","https://openalex.org/W2968316219","https://openalex.org/W6601275006","https://openalex.org/W6606212940","https://openalex.org/W6607134063","https://openalex.org/W6622815979","https://openalex.org/W6629862473","https://openalex.org/W6630769539","https://openalex.org/W6637235962","https://openalex.org/W6639463212","https://openalex.org/W6655112649","https://openalex.org/W6671881089","https://openalex.org/W6675398331","https://openalex.org/W6676054806","https://openalex.org/W6680187243","https://openalex.org/W6683675922","https://openalex.org/W6684598495","https://openalex.org/W6688305814","https://openalex.org/W6689680602","https://openalex.org/W6697067390","https://openalex.org/W6697189027","https://openalex.org/W6742016034","https://openalex.org/W6753976483","https://openalex.org/W6755993146","https://openalex.org/W6756470722","https://openalex.org/W6764428857","https://openalex.org/W6765007275","https://openalex.org/W6788941387","https://openalex.org/W6790131382"],"related_works":["https://openalex.org/W3044033035","https://openalex.org/W1740981409","https://openalex.org/W3179157130","https://openalex.org/W2885543607","https://openalex.org/W2951397069","https://openalex.org/W1585972944","https://openalex.org/W1500101059","https://openalex.org/W2091353019","https://openalex.org/W2296559835","https://openalex.org/W2530094581","https://openalex.org/W3129130129","https://openalex.org/W2352821346","https://openalex.org/W2398379272","https://openalex.org/W2159274726","https://openalex.org/W1976420017","https://openalex.org/W1525463077","https://openalex.org/W3143259051","https://openalex.org/W2991733506","https://openalex.org/W1655672343","https://openalex.org/W1554781611"],"abstract_inverted_index":{"Abstract":[0],"Attribute-based":[1],"encryption":[2,8],"(ABE)":[3],"is":[4,64,100,156],"a":[5,47,61,107,129,177],"versatile":[6],"one-to-many":[7],"primitive,":[9],"which":[10,146],"enables":[11],"fine-grained":[12],"access":[13],"control":[14],"over":[15],"encrypted":[16],"data.":[17],"Due":[18],"to":[19,42,58,105,139,151,165,175,184],"its":[20,52],"promising":[21],"applications":[22],"in":[23,76,161],"practice,":[24],"ABE":[25,74,93,113,134,144,182],"schemes":[26,75,94,135,183],"with":[27,115],"high":[28],"efficiency,":[29],"security":[30],"and":[31,103],"expressivity":[32],"have":[33,106],"been":[34],"continuously":[35],"emerging.":[36],"On":[37],"the":[38,43,67,77,80,92,123,152,157,162,167],"other":[39],"hand,":[40],"due":[41],"nature":[44],"of":[45,69,91,110,131,159,169,179],"ABE,":[46],"malicious":[48,62],"user":[49,63],"may":[50],"abuse":[51],"decryption":[53],"privilege.":[54],"Therefore,":[55],"being":[56],"able":[57],"identify":[59],"such":[60],"crucial":[65],"towards":[66],"practicality":[68],"ABE.":[70],"Although":[71],"some":[72],"specific":[73],"literature":[78],"enjoys":[79],"tracing":[81],"function,":[82],"they":[83],"are":[84],"only":[85,148],"proceeded":[86],"case":[87],"by":[88],"case.":[89],"Most":[90],"do":[95],"not":[96],"support":[97,185],"traceability.":[98,116,186],"It":[99],"thus":[101],"meaningful":[102],"important":[104],"generic":[108],"way":[109,130],"equipping":[111],"any":[112],"scheme":[114],"In":[117],"this":[118],"work,":[119],"we":[120,127,172],"partially":[121],"solve":[122],"aforementioned":[124],"problem.":[125],"Namely,":[126],"propose":[128],"transforming":[132],"(non-traceable)":[133],"satisfying":[136],"certain":[137],"requirements":[138],"fully":[140],"collusion-resistant":[141],"black-box":[142],"traceable":[143],"schemes,":[145],"adds":[147],"$O(\\sqrt{\\mathcal{K}})$":[149],"elements":[150],"ciphertext":[153],"where":[154],"${\\mathcal{K}}$":[155],"number":[158],"users":[160],"system.":[163],"And":[164],"demonstrate":[166],"practicability":[168],"our":[170],"transformation,":[171],"show":[173],"how":[174],"convert":[176],"couple":[178],"existing":[180],"non-traceable":[181]},"counts_by_year":[],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2025-10-10T00:00:00"}
