{"id":"https://openalex.org/W2906834146","doi":"https://doi.org/10.1109/access.2019.2890976","title":"Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing","display_name":"Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2906834146","doi":"https://doi.org/10.1109/access.2019.2890976","mag":"2906834146"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2890976","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2890976","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08601329.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08601329.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100324971","display_name":"Dawei Li","orcid":"https://orcid.org/0000-0003-1548-2666"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dawei Li","raw_affiliation_strings":["School of Electronic and Information Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100425107","display_name":"Jianwei Liu","orcid":"https://orcid.org/0000-0003-2965-3518"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianwei Liu","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022955566","display_name":"Qianhong Wu","orcid":"https://orcid.org/0000-0002-6407-4194"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianhong Wu","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083017828","display_name":"Zhenyu Guan","orcid":"https://orcid.org/0000-0002-3959-338X"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenyu Guan","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100324971"],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.445,"has_fulltext":true,"cited_by_count":17,"citation_normalized_percentile":{"value":0.86294507,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":"7","issue":null,"first_page":"11688","last_page":"11697"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.978600025177002,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.819042444229126},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6575493812561035},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6062732934951782},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.5730398893356323},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5107102394104004},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5056412220001221},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4697841703891754},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.468542218208313},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.45608752965927124},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4510641396045685},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4263169467449188},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41689470410346985},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33519038558006287},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3344365954399109},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.2071915566921234},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13951179385185242}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.819042444229126},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6575493812561035},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6062732934951782},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.5730398893356323},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5107102394104004},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5056412220001221},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4697841703891754},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.468542218208313},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.45608752965927124},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4510641396045685},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4263169467449188},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41689470410346985},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33519038558006287},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3344365954399109},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2071915566921234},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13951179385185242},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2019.2890976","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2890976","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08601329.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c5ab7192f51f4655b9e0806e68003e9f","is_oa":true,"landing_page_url":"https://doaj.org/article/c5ab7192f51f4655b9e0806e68003e9f","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 11688-11697 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2890976","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2890976","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08601329.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1023919524","display_name":null,"funder_award_id":", Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G118783498","display_name":null,"funder_award_id":"2017YFB0802502","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1948069149","display_name":null,"funder_award_id":"2017010","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2392328649","display_name":null,"funder_award_id":"61702028","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2702356746","display_name":null,"funder_award_id":"61702","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2828851236","display_name":null,"funder_award_id":"Grant 61532021","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2969959655","display_name":null,"funder_award_id":"61672083","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3435950671","display_name":null,"funder_award_id":"and Gr","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G3703817434","display_name":null,"funder_award_id":"61772538","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3704501742","display_name":null,"funder_award_id":"61532021","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G466649759","display_name":null,"funder_award_id":"2017Y","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G4713543433","display_name":null,"funder_award_id":"61402","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5219932531","display_name":null,"funder_award_id":"201701","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5817365084","display_name":null,"funder_award_id":"61402029","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6130843704","display_name":null,"funder_award_id":"61421120305162112006","funder_id":"https://openalex.org/F4320327655","funder_display_name":"Foundation of Science and Technology on Information Assurance Laboratory"},{"id":"https://openalex.org/G636642556","display_name":null,"funder_award_id":"61370190","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8195692176","display_name":null,"funder_award_id":"61472429","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8340078520","display_name":null,"funder_award_id":"2017YF","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8823009050","display_name":null,"funder_award_id":"2017YFB","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327655","display_name":"Foundation of Science and Technology on Information Assurance Laboratory","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2906834146.pdf","grobid_xml":"https://content.openalex.org/works/W2906834146.grobid-xml"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W2990606","https://openalex.org/W30039285","https://openalex.org/W162787226","https://openalex.org/W165895243","https://openalex.org/W177444027","https://openalex.org/W183416985","https://openalex.org/W1484539941","https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1524327560","https://openalex.org/W1531898543","https://openalex.org/W1546886278","https://openalex.org/W1682451491","https://openalex.org/W1684724692","https://openalex.org/W1763482972","https://openalex.org/W1904483788","https://openalex.org/W1976420017","https://openalex.org/W1994381408","https://openalex.org/W2035203720","https://openalex.org/W2076046175","https://openalex.org/W2086298846","https://openalex.org/W2097638666","https://openalex.org/W2101238246","https://openalex.org/W2101709669","https://openalex.org/W2108072891","https://openalex.org/W2114623221","https://openalex.org/W2138001464","https://openalex.org/W2139910984","https://openalex.org/W2161214158","https://openalex.org/W2168571148","https://openalex.org/W2231711433","https://openalex.org/W2344783839","https://openalex.org/W2554466145","https://openalex.org/W2565477418","https://openalex.org/W2565863608","https://openalex.org/W2583928538","https://openalex.org/W2766876924","https://openalex.org/W2773925271","https://openalex.org/W2889978686","https://openalex.org/W3128663643","https://openalex.org/W6637979471","https://openalex.org/W6677253087"],"related_works":["https://openalex.org/W2131846073","https://openalex.org/W4372269058","https://openalex.org/W114534093","https://openalex.org/W2383331906","https://openalex.org/W361351722","https://openalex.org/W4223919663","https://openalex.org/W1513098086","https://openalex.org/W2743419166","https://openalex.org/W2963348623","https://openalex.org/W2598311158"],"abstract_inverted_index":{"Fog":[0,35,89,133,177,258],"computing":[1],"enables":[2],"computation,":[3],"storage,":[4],"applications,":[5],"and":[6,14,46,114,160,173,222,225,250],"network":[7],"services":[8],"between":[9],"the":[10,15,20,25,28,124,137,151,171,174,187,199,205,208,215,226,230],"Internet":[11],"of":[12,27,57,61,139,153,176,190,207,214,233],"Things":[13],"cloud":[16],"servers":[17],"by":[18,108,120,146,219],"extending":[19],"Cloud":[21],"Computing":[22],"paradigm":[23],"to":[24,53,82,235,238,253],"edge":[26],"network.":[29],"When":[30],"protecting":[31],"information":[32],"security":[33,38,188],"in":[34,52,88,96,123,131,256],"computing,":[36,178],"advanced":[37],"with":[39,212],"low":[40],"latency,":[41],"wide-spread":[42],"geographical":[43,110],"distribution":[44],"support,":[45],"high":[47],"flexibility":[48],"should":[49],"be":[50,106,118,142,165,254],"taken":[51],"considertion":[54],"first,":[55],"because":[56],"its":[58],"huge":[59],"number":[60],"nodes.":[62],"In":[63,91,135],"this":[64,92,155,191],"paper,":[65],"we":[66,179,203],"propose":[67],"a":[68,181],"new":[69],"cryptographic":[70],"primitive,":[71,93,192],"named":[72],"CCA2":[73,239],"secure":[74,197],"publicly-verifiable":[75],"revocable":[76],"large-universe":[77],"multi-authority":[78],"attribute-based":[79],"encryption":[80],"(CCA2-PV-R-LU-MA-ABE),":[81],"achieve":[83],"flexible":[84],"fine-grained":[85],"access":[86],"control":[87],"computing.":[90,259],"end":[94],"nodes":[95,140],"fogs":[97],"generate":[98],"private":[99],"keys":[100],"from":[101],"multiple":[102],"authorities":[103],"that":[104,213,229],"might":[105],"differentiated":[107],"their":[109,115],"locations":[111],"or":[112,167],"functions,":[113],"attributes":[116],"can":[117,141,164],"denoted":[119],"any":[121],"strings":[122],"large":[125],"universe,":[126],"which":[127,193],"meets":[128],"diverse":[129],"needs":[130],"practical":[132,257],"applications.":[134],"addition,":[136],"accessibility":[138],"revoked":[143],"efficiently":[144],"even":[145],"resource-limited":[147],"devices.":[148],"To":[149],"ensure":[150],"validity":[152],"ciphertext,":[154],"primitive":[156,172],"supports":[157],"public":[158],"verification":[159],"only":[161],"valid":[162],"ciphertext":[163],"stored":[166],"transmitted.":[168],"Based":[169],"on":[170],"feature":[175],"construct":[180],"concrete":[182,210],"CCA2-PV-R-LU-MA-ABE":[183],"scheme.":[184,201],"We":[185],"define":[186],"model":[189],"is":[194,240,246],"much":[195],"more":[196],"than":[198],"CPA-secure":[200,217],"Finally,":[202],"compare":[204],"efficiency":[206,234],"proposed":[209,244],"scheme":[211,218,245],"existing":[216],"both":[220],"theoretical":[221],"experimental":[223],"analysis,":[224],"results":[227],"show":[228],"extra":[231],"consumption":[232],"improving":[236],"CPA":[237],"considerably":[241],"low.":[242],"The":[243],"highly":[247],"secure,":[248],"flexible,":[249],"efficient":[251],"enough":[252],"deployed":[255]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
