{"id":"https://openalex.org/W3011618579","doi":"https://doi.org/10.1109/gcwkshps45667.2019.9024703","title":"Fine-Grained Comparable Encryption Scheme in Multi-User Settings","display_name":"Fine-Grained Comparable Encryption Scheme in Multi-User Settings","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3011618579","doi":"https://doi.org/10.1109/gcwkshps45667.2019.9024703","mag":"3011618579"},"language":"en","primary_location":{"id":"doi:10.1109/gcwkshps45667.2019.9024703","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcwkshps45667.2019.9024703","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100382925","display_name":"Jun Ye","orcid":"https://orcid.org/0000-0003-1010-2484"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jun Ye","raw_affiliation_strings":["Key Laboratory of Internet Information Retrieval of Hainan Province, Hainan University, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Internet Information Retrieval of Hainan Province, Hainan University, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002971389","display_name":"Chunjie Cao","orcid":"https://orcid.org/0000-0001-9439-8256"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunjie Cao","raw_affiliation_strings":["Key Laboratory of Internet Information Retrieval of Hainan Province, Hainan University, China","School of Computer Science and Cyberspace Security, Hainan University, Haikou, China","State Key Laboratory of Marine Resource Utilization in the South China Sea, Haikou, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Internet Information Retrieval of Hainan Province, Hainan University, China","institution_ids":["https://openalex.org/I20942203"]},{"raw_affiliation_string":"School of Computer Science and Cyberspace Security, Hainan University, Haikou, China","institution_ids":["https://openalex.org/I20942203"]},{"raw_affiliation_string":"State Key Laboratory of Marine Resource Utilization in the South China Sea, Haikou, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102003367","display_name":"Zhen Guo","orcid":"https://orcid.org/0000-0003-3967-4304"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhen Guo","raw_affiliation_strings":["State Key Laboratory of Marine Resource Utilization in the South China Sea, Haikou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Marine Resource Utilization in the South China Sea, Haikou, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100382925"],"corresponding_institution_ids":["https://openalex.org/I20942203"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20580067,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8339542150497437},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8143438100814819},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.7481809258460999},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7442009449005127},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.6880630850791931},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6524577140808105},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5766516327857971},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5360444188117981},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.5203084945678711},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.5196551084518433},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.468542218208313},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.44551658630371094},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.35412919521331787},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34919261932373047},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.16871991753578186},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10279136896133423}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8339542150497437},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8143438100814819},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.7481809258460999},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7442009449005127},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.6880630850791931},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6524577140808105},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5766516327857971},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5360444188117981},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.5203084945678711},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.5196551084518433},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.468542218208313},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.44551658630371094},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.35412919521331787},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34919261932373047},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.16871991753578186},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10279136896133423},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/gcwkshps45667.2019.9024703","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcwkshps45667.2019.9024703","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W754106230","https://openalex.org/W901925438","https://openalex.org/W974835996","https://openalex.org/W1837982953","https://openalex.org/W1895952394","https://openalex.org/W2030888439","https://openalex.org/W2154496743","https://openalex.org/W2262179892","https://openalex.org/W2528685303","https://openalex.org/W2613612770","https://openalex.org/W2737889100","https://openalex.org/W2793530059","https://openalex.org/W2923786003","https://openalex.org/W2940675737","https://openalex.org/W4251661042"],"related_works":["https://openalex.org/W2094124631","https://openalex.org/W2437686555","https://openalex.org/W4361807487","https://openalex.org/W1994739855","https://openalex.org/W2549192755","https://openalex.org/W4386393431","https://openalex.org/W2955476130","https://openalex.org/W2995433735","https://openalex.org/W2030246973","https://openalex.org/W4246652009"],"abstract_inverted_index":{"Data":[0],"sharing":[1,19],"plays":[2],"an":[3],"increasing":[4],"important":[5],"role":[6],"in":[7,58,72,116],"cloud":[8,14,36,117],"service.":[9],"With":[10],"the":[11,17,35,62,73,89,93,98,103],"help":[12],"of":[13,50],"computing":[15],"platform,":[16],"data":[18,26,28,52,77,104,109],"becomes":[20],"easy.":[21],"In":[22,38],"order":[23],"to":[24,34,55],"ensure":[25],"confidentiality,":[27],"should":[29,82],"be":[30,83],"encrypted":[31,51,78],"before":[32,88],"uploading":[33],"servers.":[37],"this":[39],"paper,":[40],"a":[41],"new":[42],"comparable":[43,86,106],"encryption":[44,68],"scheme":[45,113],"is":[46,53,69,114],"proposed.":[47],"The":[48,76],"comparison":[49,90],"extended":[54],"multi-user":[56],"scenarios":[57],"our":[59,112],"scheme.":[60,75],"And":[61,92],"access":[63,99],"control":[64],"based":[65],"on":[66],"attribute-based":[67],"also":[70],"introduced":[71],"proposed":[74],"by":[79],"different":[80],"keys":[81],"transformed":[84],"into":[85,105],"form":[87],"operations.":[91],"user,":[94],"whose":[95],"attributes":[96],"satisfies":[97],"policy,":[100],"can":[101],"convert":[102],"form.":[107],"Experimental":[108],"shows":[110],"that":[111],"practical":[115],"computing.":[118]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
