{"id":"https://openalex.org/W4292387385","doi":"https://doi.org/10.1109/access.2022.3200084","title":"Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds","display_name":"Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4292387385","doi":"https://doi.org/10.1109/access.2022.3200084"},"language":"en","primary_location":{"id":"doi:10.1109/access.2022.3200084","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3200084","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09862958.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09862958.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014636927","display_name":"Huidan Hu","orcid":"https://orcid.org/0000-0003-2601-9976"},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Huidan Hu","raw_affiliation_strings":["Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"],"raw_orcid":"https://orcid.org/0000-0003-2601-9976","affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023159259","display_name":"Zhenfu Cao","orcid":"https://orcid.org/0000-0002-5250-5030"},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenfu Cao","raw_affiliation_strings":["Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"],"raw_orcid":"https://orcid.org/0000-0002-5250-5030","affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077456653","display_name":"Xiaolei Dong","orcid":"https://orcid.org/0000-0002-5844-0223"},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaolei Dong","raw_affiliation_strings":["Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5014636927"],"corresponding_institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I66867065"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":2.9163,"has_fulltext":true,"cited_by_count":22,"citation_normalized_percentile":{"value":0.92062281,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"10","issue":null,"first_page":"87322","last_page":"87332"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7745943665504456},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6207399368286133},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5325751900672913},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.49496716260910034},{"id":"https://openalex.org/keywords/broadcast-encryption","display_name":"Broadcast encryption","score":0.4923142194747925},{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.46680691838264465},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4115101397037506},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3913995921611786},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.17624640464782715},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09075188636779785}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7745943665504456},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6207399368286133},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5325751900672913},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.49496716260910034},{"id":"https://openalex.org/C2778281673","wikidata":"https://www.wikidata.org/wiki/Q4972106","display_name":"Broadcast encryption","level":4,"score":0.4923142194747925},{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.46680691838264465},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4115101397037506},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3913995921611786},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.17624640464782715},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09075188636779785},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2022.3200084","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3200084","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09862958.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:2f677359b199440c895c5c60ec2b30b1","is_oa":true,"landing_page_url":"https://doaj.org/article/2f677359b199440c895c5c60ec2b30b1","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 10, Pp 87322-87332 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2022.3200084","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3200084","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09862958.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5042221404","display_name":null,"funder_award_id":"62132005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5736169107","display_name":null,"funder_award_id":"2020YFA0712300","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7959687564","display_name":null,"funder_award_id":"62172162","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8965963615","display_name":null,"funder_award_id":"2020YFA0712300","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4292387385.pdf","grobid_xml":"https://content.openalex.org/works/W4292387385.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W1498316612","https://openalex.org/W1512186075","https://openalex.org/W1559707925","https://openalex.org/W1590823599","https://openalex.org/W1694409916","https://openalex.org/W1738472778","https://openalex.org/W1890078278","https://openalex.org/W1905774212","https://openalex.org/W1933165082","https://openalex.org/W1963941691","https://openalex.org/W1997745460","https://openalex.org/W2067095453","https://openalex.org/W2114428623","https://openalex.org/W2138018104","https://openalex.org/W2152924492","https://openalex.org/W2159274726","https://openalex.org/W2252960952","https://openalex.org/W2266882507","https://openalex.org/W2563202219","https://openalex.org/W2588578061","https://openalex.org/W2623041174","https://openalex.org/W2789097676","https://openalex.org/W2895749865","https://openalex.org/W2912211337","https://openalex.org/W3013008354","https://openalex.org/W3013896566","https://openalex.org/W3082603309","https://openalex.org/W3112448806","https://openalex.org/W4238634196","https://openalex.org/W6691609386","https://openalex.org/W6730799923"],"related_works":["https://openalex.org/W2068013785","https://openalex.org/W2370868004","https://openalex.org/W2158897804","https://openalex.org/W2912211337","https://openalex.org/W2286370870","https://openalex.org/W139147767","https://openalex.org/W3173222018","https://openalex.org/W2951437155","https://openalex.org/W4391696929","https://openalex.org/W2739834677"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,6],"with":[2],"massive":[3],"storage":[4],"and":[5,121,155,160,169,178],"capabilities":[7],"has":[8],"become":[9],"widespread":[10],"in":[11,22],"actual":[12],"applications.":[13,24],"It":[14],"is":[15,74,98,153,176],"critical":[16],"to":[17,36,79,100],"ensure":[18],"secure":[19],"data":[20,57,69],"sharing":[21],"cloud-based":[23],"Currently,":[25],"numerous":[26],"identity-based":[27,93],"broadcast":[28,60,94,118,131,141],"proxy":[29,95,123],"re-encryption":[30,96,146],"(IB-BPRE)":[31],"schemes":[32,45],"have":[33],"been":[34],"proposed":[35],"resolve":[37],"the":[38,42,48,51,59,68,77,81,102,109,122,126,130,135,139,145,149,162],"privacy":[39],"issue.":[40,104],"However,":[41],"existing":[43],"IB-BPRE":[44,78],"cannot":[46],"reach":[47],"transformation":[49],"of":[50,83,164],"decryption":[52,127,136],"right":[53,128,137],"for":[54,76,129,138,157],"outsourced":[55],"encrypted":[56],"between":[58],"receiver":[61,119,132,142],"sets":[62,120],"(data":[63],"user":[64],"sets)":[65],"delegated":[66],"by":[67,144],"owner":[70],"(Alice)":[71],"because":[72],"it":[73],"difficult":[75],"hold":[80],"character":[82],"multi-hop.":[84],"Consequently,":[85],"a":[86],"new":[87],"cryptographic":[88],"primitive":[89],"called":[90],"autonomous":[91,113],"path":[92,114],"(APIB-BPRE)":[97],"presented":[99],"address":[101],"above":[103],"In":[105],"an":[106,112],"APIB-BPRE":[107,174],"scheme,":[108],"delegator":[110],"establishes":[111],"involving":[115],"preferred":[116],"multiple":[117],"can":[124],"convert":[125],"set":[133,143],"into":[134],"next":[140],"key":[147],"from":[148],"delegator.":[150],"This":[151],"solution":[152],"convenient":[154],"flexible":[156],"cloud":[158,165],"users":[159],"utilizes":[161],"benefits":[163],"computing.":[166],"The":[167],"evaluation":[168],"comparison":[170],"indicate":[171],"that":[172],"our":[173],"system":[175],"effective":[177],"practical.":[179]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
