{"id":"https://openalex.org/W1990669752","doi":"https://doi.org/10.1109/cloudcom.2012.6427608","title":"An efficient key distribution scheme in cloud computing","display_name":"An efficient key distribution scheme in cloud computing","publication_year":2012,"publication_date":"2012-12-01","ids":{"openalex":"https://openalex.org/W1990669752","doi":"https://doi.org/10.1109/cloudcom.2012.6427608","mag":"1990669752"},"language":"en","primary_location":{"id":"doi:10.1109/cloudcom.2012.6427608","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cloudcom.2012.6427608","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"4th IEEE International Conference on Cloud Computing Technology and Science Proceedings","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101773404","display_name":"Chunming Tang","orcid":"https://orcid.org/0000-0001-8949-4323"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chunming Tang","raw_affiliation_strings":["School of Mathematics and Information Science, Key Laboratory of Mathematics and Interdisciplinary Sciences of Guangdong Higher Education Institutes, Guangzhou University, Guangzhou, China","School of Mathematics and Information Science, Guangzhou University, Guangzhou, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Information Science, Key Laboratory of Mathematics and Interdisciplinary Sciences of Guangdong Higher Education Institutes, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]},{"raw_affiliation_string":"School of Mathematics and Information Science, Guangzhou University, Guangzhou, P. R. China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082604341","display_name":"Xing Hu","orcid":"https://orcid.org/0000-0003-1930-0372"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]},{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Xing Hu","raw_affiliation_strings":["Department of Computer Science, City University of Hong Kong, Hong Kong, China","School of Mathematics and Information Science, Guangzhou University, Guangzhou, P. R. China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong, China","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"School of Mathematics and Information Science, Guangzhou University, Guangzhou, P. R. China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113580468","display_name":"Duncan S. Wong","orcid":null},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]},{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Duncan S. Wong","raw_affiliation_strings":["School of Mathematics and Information Science, Key Laboratory of Mathematics and Interdisciplinary Sciences of Guangdong Higher Education Institutes, Guangzhou University, Guangzhou, China","Department of Computer Science, City University of Hong Kong, Hong Kong,#TAB#"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Information Science, Key Laboratory of Mathematics and Interdisciplinary Sciences of Guangdong Higher Education Institutes, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]},{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong,#TAB#","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100856385","display_name":"Dingyi Pei","orcid":null},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dingyi Pei","raw_affiliation_strings":["School of Mathematics and Information Science, Key Laboratory of Mathematics and Interdisciplinary Sciences of Guangdong Higher Education Institutes, Guangzhou University, Guangzhou, China","School of Mathematics and Information Science, Guangzhou University, Guangzhou, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Information Science, Key Laboratory of Mathematics and Interdisciplinary Sciences of Guangdong Higher Education Institutes, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]},{"raw_affiliation_string":"School of Mathematics and Information Science, Guangzhou University, Guangzhou, P. R. China","institution_ids":["https://openalex.org/I37987034"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101773404"],"corresponding_institution_ids":["https://openalex.org/I37987034"],"apc_list":null,"apc_paid":null,"fwci":0.8563,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.77981669,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"6056","issue":null,"first_page":"557","last_page":"561"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8713499903678894},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8022162318229675},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.7495108842849731},{"id":"https://openalex.org/keywords/delegate","display_name":"Delegate","score":0.7379181981086731},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5848962664604187},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5705070495605469},{"id":"https://openalex.org/keywords/modular-exponentiation","display_name":"Modular exponentiation","score":0.5503123998641968},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5440454483032227},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5373284816741943},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4615033268928528},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4570990800857544},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.42859792709350586},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3803724944591522},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3776760697364807},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3278837203979492},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1626245677471161}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8713499903678894},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8022162318229675},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.7495108842849731},{"id":"https://openalex.org/C143273055","wikidata":"https://www.wikidata.org/wiki/Q2382794","display_name":"Delegate","level":2,"score":0.7379181981086731},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5848962664604187},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5705070495605469},{"id":"https://openalex.org/C152763109","wikidata":"https://www.wikidata.org/wiki/Q1228841","display_name":"Modular exponentiation","level":4,"score":0.5503123998641968},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5440454483032227},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5373284816741943},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4615033268928528},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4570990800857544},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.42859792709350586},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3803724944591522},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3776760697364807},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3278837203979492},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1626245677471161},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cloudcom.2012.6427608","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cloudcom.2012.6427608","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"4th IEEE International Conference on Cloud Computing Technology and Science Proceedings","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41999998688697815,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W104209573","https://openalex.org/W1485800369","https://openalex.org/W1530355549","https://openalex.org/W1557386445","https://openalex.org/W1575598731","https://openalex.org/W1825176194","https://openalex.org/W1990707123","https://openalex.org/W2012882416","https://openalex.org/W2031533839","https://openalex.org/W2122718825","https://openalex.org/W2156030242","https://openalex.org/W2156186849","https://openalex.org/W6631751386","https://openalex.org/W6634280684"],"related_works":["https://openalex.org/W2170171009","https://openalex.org/W1504501810","https://openalex.org/W2117623867","https://openalex.org/W2039465140","https://openalex.org/W4254816090","https://openalex.org/W2610264794","https://openalex.org/W2055766186","https://openalex.org/W2414747139","https://openalex.org/W2111965281","https://openalex.org/W1592097729"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,5],"is":[2,47,131],"an":[3],"emerging":[4],"paradigm":[6],"in":[7],"which":[8],"IT":[9],"resources":[10],"and":[11],"capacities":[12],"are":[13,63,83],"provided":[14],"as":[15],"services":[16],"over":[17],"the":[18,34,39],"Internet.":[19],"It":[20],"also":[21],"brings":[22],"forth":[23],"new":[24],"challenges":[25],"for":[26,57,78,103,124],"security":[27],"when":[28],"clients":[29,56,62,71,106,119],"want":[30],"to":[31,38,49,73,75,111],"securely":[32],"outsource":[33],"computation":[35],"of":[36,52],"operations":[37],"untrusted":[40,84],"cloud":[41,44,76,81,109,129],"servers.":[42],"In":[43,93,115],"computing,":[45],"it":[46],"difficult":[48],"implement":[50],"most":[51],"cryptographic":[53,87],"protocols":[54,88],"among":[55],"this":[58,94],"reason":[59],"that":[60,86,128],"all":[61],"possibly":[64],"weaker":[65,105],"than":[66],"computationally":[67],"powerful":[68],"players.":[69],"Hence,":[70],"have":[72],"appeal":[74],"servers":[77,82],"assistance.":[79],"However,":[80],"so":[85],"cannot":[89],"be":[90],"realized":[91],"securely.":[92],"paper,":[95],"we":[96],"design":[97],"a":[98],"secure":[99],"key":[100,123],"agreement":[101],"scheme":[102],"two":[104,118],"who":[107],"delegate":[108],"server":[110,130],"compute":[112],"modular":[113],"exponentiation.":[114],"our":[116],"scheme,":[117],"can":[120],"get":[121],"same":[122],"symmetric":[125],"cryptosystem":[126],"even":[127],"untrusted.":[132]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
