{"id":"https://openalex.org/W2984732579","doi":"https://doi.org/10.1093/comjnl/bxz114","title":"Server-aided Revocable IBE with Identity Reuse","display_name":"Server-aided Revocable IBE with Identity Reuse","publication_year":2019,"publication_date":"2019-11-13","ids":{"openalex":"https://openalex.org/W2984732579","doi":"https://doi.org/10.1093/comjnl/bxz114","mag":"2984732579"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxz114","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxz114","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045869182","display_name":"Xuecheng Ma","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuecheng Ma","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008820992","display_name":"Dongdai Lin","orcid":"https://orcid.org/0000-0002-3951-7889"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dongdai Lin","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5008820992"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.13678962,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"63","issue":"4","first_page":"620","last_page":"632"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6983955502510071},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.6504570245742798},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6377947330474854},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5881662368774414},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.5740160942077637},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.5203213691711426},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5151335000991821},{"id":"https://openalex.org/keywords/broadcast-encryption","display_name":"Broadcast encryption","score":0.4781266748905182},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.47190481424331665},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.45419150590896606},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4442695081233978},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.4205038547515869}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6983955502510071},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.6504570245742798},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6377947330474854},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5881662368774414},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.5740160942077637},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.5203213691711426},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5151335000991821},{"id":"https://openalex.org/C2778281673","wikidata":"https://www.wikidata.org/wiki/Q4972106","display_name":"Broadcast encryption","level":4,"score":0.4781266748905182},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.47190481424331665},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.45419150590896606},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4442695081233978},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.4205038547515869},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxz114","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxz114","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1882683931","display_name":null,"funder_award_id":"61936008","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5361398898","display_name":null,"funder_award_id":"61872359","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W1980669413","https://openalex.org/W1983370494","https://openalex.org/W2002489790","https://openalex.org/W2028500276","https://openalex.org/W2051524609","https://openalex.org/W2164696360","https://openalex.org/W2215783493","https://openalex.org/W2238702843","https://openalex.org/W2536385812","https://openalex.org/W2604735844","https://openalex.org/W2729240356","https://openalex.org/W2745460575","https://openalex.org/W2782916932","https://openalex.org/W2790332478","https://openalex.org/W2901116722","https://openalex.org/W2918343059","https://openalex.org/W2950491701","https://openalex.org/W3016414667","https://openalex.org/W4230895451","https://openalex.org/W4295185391","https://openalex.org/W6609405457","https://openalex.org/W6628785129","https://openalex.org/W6629862473","https://openalex.org/W6631784476","https://openalex.org/W6632857890","https://openalex.org/W6633628863","https://openalex.org/W6634010886","https://openalex.org/W6635412825","https://openalex.org/W6638064307","https://openalex.org/W6638318936","https://openalex.org/W6671828919","https://openalex.org/W6676101523","https://openalex.org/W6677065915","https://openalex.org/W6677104901","https://openalex.org/W6678504847","https://openalex.org/W6684086746","https://openalex.org/W6686064534","https://openalex.org/W6697112710","https://openalex.org/W6714670662","https://openalex.org/W6722291236","https://openalex.org/W6728926595","https://openalex.org/W6729415082","https://openalex.org/W6730388634","https://openalex.org/W6734350371","https://openalex.org/W6734382472","https://openalex.org/W6753049463","https://openalex.org/W6764142831","https://openalex.org/W6776018892"],"related_works":["https://openalex.org/W2241715175","https://openalex.org/W2653510227","https://openalex.org/W1604247182","https://openalex.org/W783558444","https://openalex.org/W2089253004","https://openalex.org/W2114712434","https://openalex.org/W2075972269","https://openalex.org/W3094714434","https://openalex.org/W2952781863","https://openalex.org/W2113976983"],"abstract_inverted_index":{"Abstract":[0],"Efficient":[1],"key":[2,37,65,78,114,131,180,185,196,204,207,218,222,239],"revocation":[3],"in":[4,21,41,248],"Identity-based":[5],"Encryption":[6],"(IBE)":[7],"has":[8],"been":[9],"a":[10,177,226],"both":[11],"fundamental":[12],"and":[13,24,49,70,89,117,205,219,237,245],"critical":[14],"problem":[15],"when":[16,188],"deploying":[17],"an":[18],"IBE":[19,30],"system":[20,172],"practice.":[22],"Boneh":[23],"Franklin":[25],"proposed":[26,51],"the":[27,34,42,52,58,62,71,85,91,101,107,158,163,182,201,215,220,243,249],"first":[28,53],"revocable":[29],"(RIBE)":[31],"scheme":[32,259],"where":[33,61,106],"size":[35,63,72,108],"of":[36,44,64,73,87,93,103,109,165],"updates":[38,66,208],"is":[39,67,79,115,230,265],"linear":[40],"number":[43,86,92],"users.":[45,95],"Then,":[46],"Boldyreva,":[47],"Goyal":[48],"Kumar":[50],"scalable":[54],"RIBE":[55,105,166,258],"by":[56,150],"using":[57,151],"tree-based":[59],"approach":[60],"$O(r\\log":[68],"(N/r))$":[69],"every":[74,110,130],"user\u2019s":[75,111],"long-term":[76,112],"secret":[77,113,141,154,179,184,190,203,217],"$O(\\log":[80],"N)$":[81],"with":[82,124,167,260],"$N$":[83],"being":[84],"users":[88,118,134,174],"$r$":[90],"revoked":[94,144,153,216],"Recently,":[96],"Qin":[97],"et":[98],"al.":[99],"presented":[100],"notion":[102,164],"server-aided":[104,257],"$O(1),$":[116],"do":[119],"not":[120],"need":[121],"to":[122,256],"communicate":[123],"Key":[125],"Generator":[126],"Center":[127],"(KGC)":[128],"during":[129],"updates.":[132,223],"However,":[133],"must":[135],"change":[136],"their":[137,140,152,189],"identities":[138],"once":[139],"keys":[142,191],"are":[143,192],"as":[145],"they":[146],"cannot":[147,211],"decrypt":[148],"ciphertexts":[149],"keys.":[155],"To":[156],"address":[157],"above":[159],"problem,":[160],"we":[161,253],"formalize":[162],"identity":[168,261],"reuse.":[169],"In":[170],"our":[171],"model,":[173],"can":[175,197],"obtain":[176],"new":[178,206,221],"called":[181],"reuse":[183,202,262],"from":[186,200,214],"KGC":[187],"revoked.":[193],"The":[194],"decryption":[195,238],"be":[198,212],"derived":[199,213],"while":[209],"it":[210,255],"We":[224],"present":[225],"concrete":[227],"construction":[228],"that":[229,264],"secure":[231],"against":[232],"adaptive-ID":[233],"chosen":[234],"plaintext":[235],"attacks":[236,241],"exposure":[240],"under":[242],"$\\mathsf{ADDH}1$":[244],"$\\mathsf{DDH}2$":[246],"assumptions":[247],"standard":[250],"model.":[251],"Furthermore,":[252],"extend":[254],"property":[263],"more":[266],"suitable":[267],"for":[268],"lightweight":[269],"devices.":[270]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
