{"id":"https://openalex.org/W2810590775","doi":"https://doi.org/10.1093/comjnl/bxy063","title":"Bounded Revocable and Outsourceable ABE for Secure Data Sharing","display_name":"Bounded Revocable and Outsourceable ABE for Secure Data Sharing","publication_year":2018,"publication_date":"2018-06-18","ids":{"openalex":"https://openalex.org/W2810590775","doi":"https://doi.org/10.1093/comjnl/bxy063","mag":"2810590775"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxy063","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxy063","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005934640","display_name":"Baodong Qin","orcid":"https://orcid.org/0000-0001-7617-5462"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Baodong Qin","raw_affiliation_strings":["National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, PR China","State Key Laboratory of Cryptology, Beijing, PR China"],"affiliations":[{"raw_affiliation_string":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, PR China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, PR China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043944595","display_name":"Qinglan Zhao","orcid":"https://orcid.org/0000-0002-4780-8598"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qinglan Zhao","raw_affiliation_strings":["National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, PR China"],"affiliations":[{"raw_affiliation_string":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, PR China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101955694","display_name":"Dong Zheng","orcid":"https://orcid.org/0000-0002-3860-2037"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dong Zheng","raw_affiliation_strings":["National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, PR China","Westone Cryptologic Research Center, Beijing, PR China"],"affiliations":[{"raw_affiliation_string":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, PR China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"Westone Cryptologic Research Center, Beijing, PR China","institution_ids":["https://openalex.org/I4210132990"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101955694"],"corresponding_institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I4210136859"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.3258,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.66698303,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"61","issue":"8","first_page":"1259","last_page":"1268"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/elgamal-encryption","display_name":"ElGamal encryption","score":0.768692135810852},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7537896633148193},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.624536395072937},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5966534614562988},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5486517548561096},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.5438194870948792},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5109216570854187},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.48639705777168274},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4699532985687256},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4627181887626648},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4600321054458618},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33304738998413086},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.11521691083908081},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07936319708824158}],"concepts":[{"id":"https://openalex.org/C11045955","wikidata":"https://www.wikidata.org/wiki/Q1162410","display_name":"ElGamal encryption","level":4,"score":0.768692135810852},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7537896633148193},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.624536395072937},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5966534614562988},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5486517548561096},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.5438194870948792},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5109216570854187},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.48639705777168274},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4699532985687256},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4627181887626648},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4600321054458618},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33304738998413086},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.11521691083908081},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07936319708824158}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxy063","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxy063","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1592970380","display_name":null,"funder_award_id":"61502400","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2329625983","display_name":null,"funder_award_id":"61602378","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1980669413","https://openalex.org/W2002489790","https://openalex.org/W2034382123","https://openalex.org/W2154205416","https://openalex.org/W2160878415","https://openalex.org/W2164604747","https://openalex.org/W2169046918","https://openalex.org/W2238904460","https://openalex.org/W2323162780","https://openalex.org/W2419558894","https://openalex.org/W2536385812","https://openalex.org/W2566433365","https://openalex.org/W3108505487","https://openalex.org/W6645435897","https://openalex.org/W6650849009","https://openalex.org/W6652258832","https://openalex.org/W6658890704","https://openalex.org/W6676429145","https://openalex.org/W6682418590","https://openalex.org/W6684535713","https://openalex.org/W6700689056","https://openalex.org/W6717759073","https://openalex.org/W6728826778","https://openalex.org/W6731780392"],"related_works":["https://openalex.org/W2744624421","https://openalex.org/W4248847356","https://openalex.org/W777049646","https://openalex.org/W2131846073","https://openalex.org/W4372269058","https://openalex.org/W2174969786","https://openalex.org/W2620043489","https://openalex.org/W4235894667","https://openalex.org/W4292493860","https://openalex.org/W2767823571"],"abstract_inverted_index":{"With":[0],"the":[1,22,36,79,107,142,163],"progress":[2],"of":[3,35,81,109,185],"cloud":[4,16,31,113,129],"computing,":[5,114],"many":[6,65],"users":[7],"hope":[8],"in":[9],"time":[10,75,165],"to":[11,30,54,92,105,116,180],"upload":[12],"their":[13],"data":[14,45,61],"into":[15,137],"for":[17,39,59],"sharing.":[18],"For":[19,68],"sensitive":[20],"data,":[21],"owner":[23],"must":[24],"encrypt":[25],"it":[26,29,63,89,178],"before":[27],"sending":[28],"server.":[32],"The":[33,127,147],"state":[34],"art":[37],"method":[38,104],"fine-grained":[40],"access":[41,96],"control":[42,117],"on":[43],"encrypted":[44],"is":[46,52,90],"attribute-based":[47],"encryption":[48,85,160],"(ABE).":[49],"Though":[50],"ABE":[51,110,135],"believed":[53],"be":[55],"an":[56],"outstanding":[57],"technique":[58],"secure":[60],"sharing,":[62],"has":[64],"efficiency":[66],"drawbacks.":[67],"example,":[69],"its":[70],"ciphertext":[71],"size":[72],"and":[73,86,88,115,162],"decryption":[74,108,120,164,175],"increase":[76],"linearly":[77],"with":[78,182],"number":[80,184],"attributes":[82],"used":[83],"during":[84],"decryption,":[87],"hard":[91],"revoke":[93,173],"a":[94,103,118,123,157],"user\u2019s":[95,119,134,143,174],"ability.":[97,176],"In":[98],"this":[99],"paper,":[100],"we":[101],"propose":[102],"outsource":[106],"via":[111,141],"public":[112,128,144],"capacity":[121],"through":[122,156],"bounded":[124,183],"revocation":[125],"technique.":[126],"server":[130],"can":[131,172],"transform":[132],"any":[133],"ciphertexts":[136,140,149,154],"short":[138],"ElGamal-type":[139,152],"transformation":[145],"key.":[146],"transformed":[148],"are":[150],"actually":[151],"identity-based":[153,159],"obtained":[155],"bounded-collision":[158],"scheme,":[161],"only":[166],"requires":[167],"one":[168],"exponentiation.":[169],"Our":[170],"scheme":[171],"But":[177],"limits":[179],"scenario":[181],"revocation.":[186]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
