{"id":"https://openalex.org/W7123347667","doi":"https://doi.org/10.1109/access.2026.3651866","title":"Constructing Identity-Based Revocation Schemes for Efficient Generation of Ciphertexts","display_name":"Constructing Identity-Based Revocation Schemes for Efficient Generation of Ciphertexts","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7123347667","doi":"https://doi.org/10.1109/access.2026.3651866"},"language":null,"primary_location":{"id":"doi:10.1109/access.2026.3651866","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3651866","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2026.3651866","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5122855562","display_name":"Jung Yeon Hwang","orcid":null},"institutions":[{"id":"https://openalex.org/I165677929","display_name":"Sungshin Women's University","ror":"https://ror.org/0500xzf72","country_code":"KR","type":"education","lineage":["https://openalex.org/I165677929"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Jung Yeon Hwang","raw_affiliation_strings":["School of Mathematics, Statistics and Data Science, Sungshin Women&#x2019;s University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"School of Mathematics, Statistics and Data Science, Sungshin Women&#x2019;s University, Seoul, South Korea","institution_ids":["https://openalex.org/I165677929"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005057967","display_name":"J. S. Park","orcid":null},"institutions":[{"id":"https://openalex.org/I157264075","display_name":"Sangmyung University","ror":"https://ror.org/01x4whx42","country_code":"KR","type":"education","lineage":["https://openalex.org/I157264075"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jong Hwan Park","raw_affiliation_strings":["Department of Computer Science, Sangmyung University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Sangmyung University, Seoul, South Korea","institution_ids":["https://openalex.org/I157264075"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5122855562"],"corresponding_institution_ids":["https://openalex.org/I165677929"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08608415,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":null,"first_page":"7730","last_page":"7743"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.8457000255584717,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.8457000255584717,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.029600000008940697,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.027000000700354576,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.8949000239372253},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.7967000007629395},{"id":"https://openalex.org/keywords/broadcast-encryption","display_name":"Broadcast encryption","score":0.7161999940872192},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7041000127792358},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.6459000110626221},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.44929999113082886},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4449999928474426},{"id":"https://openalex.org/keywords/bilinear-interpolation","display_name":"Bilinear interpolation","score":0.4212999939918518}],"concepts":[{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.8949000239372253},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7967000007629395},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7202000021934509},{"id":"https://openalex.org/C2778281673","wikidata":"https://www.wikidata.org/wiki/Q4972106","display_name":"Broadcast encryption","level":4,"score":0.7161999940872192},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7041000127792358},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.6459000110626221},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.44929999113082886},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4449999928474426},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.4212999939918518},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.4129999876022339},{"id":"https://openalex.org/C182776695","wikidata":"https://www.wikidata.org/wiki/Q840661","display_name":"Ciphertext indistinguishability","level":5,"score":0.4041000008583069},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37709999084472656},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3418999910354614},{"id":"https://openalex.org/C2780746774","wikidata":"https://www.wikidata.org/wiki/Q17014981","display_name":"Functional encryption","level":4,"score":0.3301999866962433},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.3230000138282776},{"id":"https://openalex.org/C119133118","wikidata":"https://www.wikidata.org/wiki/Q7200761","display_name":"Plaintext-aware encryption","level":5,"score":0.3206000030040741},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.31310001015663147},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2939000129699707},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.29260000586509705},{"id":"https://openalex.org/C147296133","wikidata":"https://www.wikidata.org/wiki/Q196765","display_name":"Revocation list","level":5,"score":0.288100004196167},{"id":"https://openalex.org/C101454708","wikidata":"https://www.wikidata.org/wiki/Q17106019","display_name":"Standard Model (mathematical formulation)","level":3,"score":0.28220000863075256},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.2775999903678894},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.259799987077713},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.2526000142097473}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/access.2026.3651866","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3651866","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/access.2026.3651866","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3651866","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5989478230476379}],"awards":[{"id":"https://openalex.org/G5138419776","display_name":null,"funder_award_id":"Grant of 2021","funder_id":"https://openalex.org/F4320326654","funder_display_name":"Sungshin Women\u2019s University"},{"id":"https://openalex.org/G7454128159","display_name":null,"funder_award_id":"KRIT-CT-24-001","funder_id":"https://openalex.org/F2292562827","funder_display_name":"Korea Research Institute for Defense Technology Planning and Advancement"}],"funders":[{"id":"https://openalex.org/F2292562827","display_name":"Korea Research Institute for Defense Technology Planning and Advancement","ror":null},{"id":"https://openalex.org/F4320326654","display_name":"Sungshin Women\u2019s University","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W55405330","https://openalex.org/W1522268755","https://openalex.org/W1601035152","https://openalex.org/W1606094057","https://openalex.org/W1769443955","https://openalex.org/W1793265733","https://openalex.org/W1805549252","https://openalex.org/W1806049065","https://openalex.org/W1905774212","https://openalex.org/W2053797511","https://openalex.org/W2087000693","https://openalex.org/W2097638666","https://openalex.org/W2116556172","https://openalex.org/W2152924492","https://openalex.org/W2168571148","https://openalex.org/W2336582372","https://openalex.org/W2404581315","https://openalex.org/W2475324355","https://openalex.org/W2494571191","https://openalex.org/W2536385812","https://openalex.org/W2919415037","https://openalex.org/W3013896566","https://openalex.org/W3158027359","https://openalex.org/W4200030394","https://openalex.org/W4238634196","https://openalex.org/W4396657293","https://openalex.org/W4409852052"],"related_works":[],"abstract_inverted_index":{"Asymmetric":[0],"broadcast":[1],"encryption":[2,126,152,219],"(ABE)":[3],"allows":[4],"a":[5,17,40,101,107,139,148,165,192,200,213],"sender,":[6,41],"given":[7],"the":[8,88,117,173,225],"public":[9,102],"keys":[10],"or":[11,121],"identities":[12],"of":[13,25,116,119,203,209],"recipients,":[14],"to":[15,97,138,211],"encrypt":[16],"message":[18],"such":[19],"that":[20,74,111,142,182],"only":[21],"an":[22],"authorized":[23],"subset":[24],"users":[26,198],"can":[27],"decrypt":[28],"it.":[29],"In":[30],"fully":[31],"asymmetric":[32,188],"settings,":[33],"where":[34],"any":[35],"user":[36],"may":[37],"act":[38],"as":[39,100],"ciphertext":[42,46,77,226],"generation":[43,78],"time":[44],"and":[45,62,130,146,156,199],"size":[47,227],"become":[48],"critical":[49],"performance":[50],"metrics.":[51],"However,":[52],"most":[53],"existing":[54,187],"ABE":[55,72],"schemes":[56,84,160,184,206],"impose":[57],"substantial":[58],"sender-side":[59],"computational":[60],"costs":[61],"scale":[63],"poorly":[64],"with":[65,178,194],"system":[66,193],"size.":[67,158],"This":[68],"paper":[69],"presents":[70],"new":[71],"constructions":[73,217],"achieve":[75],"fast":[76],"while":[79,223],"maintaining":[80],"compact":[81],"ciphertexts.":[82],"Our":[83],"are":[85,161],"built":[86],"upon":[87],"identity-based":[89],"revocation":[90,189,201],"(IBR)":[91],"framework,":[92],"enabling":[93],"each":[94],"user's":[95],"identity":[96],"serve":[98],"directly":[99],"key.":[103],"We":[104,133],"first":[105],"propose":[106],"basic":[108],"IBR":[109],"scheme":[110],"produces":[112],"constant-size":[113],"ciphertexts":[114],"independent":[115],"number":[118],"recipients":[120],"revoked":[122],"users,":[123],"achieving":[124],"efficient":[125],"through":[127],"optimized":[128],"hash-to-point":[129],"aggregation":[131],"techniques.":[132],"then":[134],"extend":[135],"this":[136],"design":[137],"tree-based":[140],"construction":[141],"supports":[143],"large-scale":[144],"systems":[145],"offers":[147],"practical":[149],"trade-off":[150],"among":[151],"cost,":[153],"decryption":[154],"efficiency,":[155],"secret-key":[157],"Both":[159],"proven":[162],"CPA-secure":[163],"under":[164],"modified":[166],"Decisional":[167],"Bilinear":[168],"Diffie\u2013Hellman":[169],"(mDBDH)":[170],"assumption":[171],"in":[172],"random-oracle":[174],"model.":[175],"Extensive":[176],"experiments":[177],"concrete":[179],"parameters":[180],"demonstrate":[181],"our":[183,216],"significantly":[185],"outperform":[186],"approaches.":[190],"For":[191],"10<sup":[195,231],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[196,232],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">6</sup>":[197],"rate":[202],"1:5\u20133%,":[204],"prior":[205],"require":[207],"tens":[208],"seconds":[210,222],"generate":[212],"ciphertext,":[214],"whereas":[215],"complete":[218],"within":[220],"1:6":[221],"keeping":[224],"nearly":[228],"constant":[229],"(below":[230],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup>":[233],"KB).":[234]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-14T00:00:00"}
