{"id":"https://openalex.org/W3003286954","doi":"https://doi.org/10.1109/access.2020.2969957","title":"Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things","display_name":"Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3003286954","doi":"https://doi.org/10.1109/access.2020.2969957","mag":"3003286954"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.2969957","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2969957","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08972455.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08972455.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051739014","display_name":"Mohammad Ali","orcid":"https://orcid.org/0000-0002-8685-0991"},"institutions":[{"id":"https://openalex.org/I158248296","display_name":"Amirkabir University of Technology","ror":"https://ror.org/04gzbav43","country_code":"IR","type":"education","lineage":["https://openalex.org/I158248296"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Mohammad Ali","raw_affiliation_strings":["Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I158248296"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006707476","display_name":"Mohammad\u2010Reza Sadeghi","orcid":"https://orcid.org/0000-0002-7676-4168"},"institutions":[{"id":"https://openalex.org/I158248296","display_name":"Amirkabir University of Technology","ror":"https://ror.org/04gzbav43","country_code":"IR","type":"education","lineage":["https://openalex.org/I158248296"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mohammad-Reza Sadeghi","raw_affiliation_strings":["Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran"],"raw_orcid":"https://orcid.org/0000-0002-7676-4168","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Amirkabir University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I158248296"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058120371","display_name":"Ximeng Liu","orcid":"https://orcid.org/0000-0002-4238-3295"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ximeng Liu","raw_affiliation_strings":["Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, Guangzhou, China","Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi\u2019an, China","Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an, China"],"raw_orcid":"https://orcid.org/0000-0002-4238-3295","affiliations":[{"raw_affiliation_string":"Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, Guangzhou, China","institution_ids":["https://openalex.org/I4210126530"]},{"raw_affiliation_string":"Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5051739014"],"corresponding_institution_ids":["https://openalex.org/I158248296"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":5.0318,"has_fulltext":true,"cited_by_count":52,"citation_normalized_percentile":{"value":0.96068075,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"8","issue":null,"first_page":"23951","last_page":"23964"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9753999710083008,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8291854858398438},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.7430711388587952},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6600000858306885},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6325264573097229},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.622672438621521},{"id":"https://openalex.org/keywords/delegation","display_name":"Delegation","score":0.5751022100448608},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5481904745101929},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5254977345466614},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.46769073605537415},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4675755798816681},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.44687068462371826},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.434670090675354},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.33286041021347046},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.18798106908798218},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06698763370513916}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8291854858398438},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.7430711388587952},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6600000858306885},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6325264573097229},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.622672438621521},{"id":"https://openalex.org/C86532276","wikidata":"https://www.wikidata.org/wiki/Q1184065","display_name":"Delegation","level":2,"score":0.5751022100448608},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5481904745101929},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5254977345466614},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.46769073605537415},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4675755798816681},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.44687068462371826},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.434670090675354},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.33286041021347046},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.18798106908798218},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06698763370513916},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2020.2969957","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2969957","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08972455.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f8b74a91b65443a7ae9a1f3537849254","is_oa":true,"landing_page_url":"https://doaj.org/article/f8b74a91b65443a7ae9a1f3537849254","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 23951-23964 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.2969957","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2969957","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08972455.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6399999856948853}],"awards":[{"id":"https://openalex.org/G3291271152","display_name":null,"funder_award_id":"U1804263","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4014782571","display_name":null,"funder_award_id":"2017B030301004","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8564054440","display_name":null,"funder_award_id":"61702105","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3003286954.pdf","grobid_xml":"https://content.openalex.org/works/W3003286954.grobid-xml"},"referenced_works_count":61,"referenced_works":["https://openalex.org/W71234479","https://openalex.org/W177444027","https://openalex.org/W1498316612","https://openalex.org/W1529664688","https://openalex.org/W1530181845","https://openalex.org/W1560389620","https://openalex.org/W1633238956","https://openalex.org/W1682451491","https://openalex.org/W1888960377","https://openalex.org/W1892798954","https://openalex.org/W1974267799","https://openalex.org/W1998586673","https://openalex.org/W2009497894","https://openalex.org/W2010109924","https://openalex.org/W2027848100","https://openalex.org/W2042220809","https://openalex.org/W2048543827","https://openalex.org/W2048862659","https://openalex.org/W2059315043","https://openalex.org/W2069463277","https://openalex.org/W2076046175","https://openalex.org/W2087280674","https://openalex.org/W2088645726","https://openalex.org/W2105103777","https://openalex.org/W2108072891","https://openalex.org/W2113857797","https://openalex.org/W2125871822","https://openalex.org/W2138001464","https://openalex.org/W2156092677","https://openalex.org/W2160262242","https://openalex.org/W2160979842","https://openalex.org/W2181009140","https://openalex.org/W2274330764","https://openalex.org/W2470298330","https://openalex.org/W2485472301","https://openalex.org/W2528277418","https://openalex.org/W2563480112","https://openalex.org/W2569439427","https://openalex.org/W2593472119","https://openalex.org/W2621249842","https://openalex.org/W2725302690","https://openalex.org/W2738798323","https://openalex.org/W2774471028","https://openalex.org/W2782004535","https://openalex.org/W2788404774","https://openalex.org/W2789560962","https://openalex.org/W2790705217","https://openalex.org/W2796172907","https://openalex.org/W2888094362","https://openalex.org/W2894566126","https://openalex.org/W2911261396","https://openalex.org/W2913409138","https://openalex.org/W2921870161","https://openalex.org/W2944935076","https://openalex.org/W2967320897","https://openalex.org/W2969910737","https://openalex.org/W2978372532","https://openalex.org/W2981797988","https://openalex.org/W3151351911","https://openalex.org/W4239945170","https://openalex.org/W6629862473"],"related_works":["https://openalex.org/W2390461322","https://openalex.org/W2541816218","https://openalex.org/W2383342098","https://openalex.org/W2356875817","https://openalex.org/W2383627585","https://openalex.org/W2397312625","https://openalex.org/W1573411099","https://openalex.org/W2130737100","https://openalex.org/W2312743476","https://openalex.org/W4248847356"],"abstract_inverted_index":{"The":[0],"Internet":[1],"of":[2,22,70,121,189],"Things":[3],"(IoT)":[4],"is":[5,24,50,60,116],"an":[6],"emerging":[7],"technology":[8],"that":[9],"can":[10,161],"benefit":[11],"from":[12],"cloud":[13,33,129],"infrastructure.":[14],"In":[15,91,107],"a":[16,20,32,61,100],"cloud-based":[17],"IoT":[18],"network,":[19],"variety":[21],"data":[23,38],"collected":[25],"by":[26,127,164],"smart":[27],"devices":[28],"and":[29,47,77,83,87,119,140,144,154,175,184],"transmitted":[30],"to":[31,52,64,94],"server.":[34,130],"However,":[35,68],"since":[36],"the":[37,54,113,122,128,133,170,181,186,190],"may":[39],"contain":[40],"sensitive":[41],"information":[42],"about":[43],"individuals,":[44],"providing":[45],"confidentiality":[46],"access":[48],"control":[49],"essential":[51],"protect":[53],"users'":[55],"privacy.":[56],"Attribute-based":[57],"encryption":[58,76],"(ABE)":[59],"promising":[62],"tool":[63],"provide":[65,74,169],"these":[66,96],"requirements.":[67],"most":[69,120],"ABE":[71,104],"schemes":[72],"neither":[73],"efficient":[75,84],"decryption":[78],"mechanisms":[79],"nor":[80],"offer":[81],"flexible":[82,139],"key":[85,142,152,166],"delegation":[86,143,153],"user":[88,114,145,155],"revocation":[89,146,156],"approaches.":[90],"this":[92],"paper,":[93],"address":[95],"issues,":[97],"we":[98,176],"propose":[99],"lightweight":[101],"revocable":[102],"hierarchical":[103,134],"(LW-RHABE)":[105],"scheme.":[106],"our":[108,136,150],"scheme,":[109,151],"computation":[110],"overhead":[111],"on":[112],"side":[115],"very":[117],"efficient,":[118],"computational":[123],"operations":[124],"are":[125],"performed":[126],"Also,":[131],"using":[132],"model,":[135],"scheme":[137],"offers":[138],"scalable":[141],"mechanisms.":[147],"Indeed,":[148],"in":[149,180],"associated":[157],"with":[158],"each":[159],"attribute":[160],"be":[162],"handled":[163],"several":[165],"authorities.":[167],"We":[168],"security":[171,179],"definition":[172],"for":[173],"LW-RHABE,":[174],"prove":[177],"its":[178],"standard":[182],"model":[183],"under":[185],"hardness":[187],"assumption":[188],"decisional":[191],"bilinear":[192],"Diffie-Hellman":[193],"(DBDH)":[194],"problem.":[195]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":12},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":5}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
