{"id":"https://openalex.org/W1663161527","doi":"https://doi.org/10.1109/icacci.2015.7275921","title":"Ciphertext policy-hiding attribute-based encryption","display_name":"Ciphertext policy-hiding attribute-based encryption","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W1663161527","doi":"https://doi.org/10.1109/icacci.2015.7275921","mag":"1663161527"},"language":"en","primary_location":{"id":"doi:10.1109/icacci.2015.7275921","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2015.7275921","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108688490","display_name":"Umesh Chandra Yadav","orcid":null},"institutions":[{"id":"https://openalex.org/I105094715","display_name":"National Institute of Technology Kurukshetra","ror":"https://ror.org/04909p852","country_code":"IN","type":"education","lineage":["https://openalex.org/I105094715"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Umesh Chandra Yadav","raw_affiliation_strings":["Department of Computer Engineering NIT, Kurukshetra, Haryana","Department of Computer Engineering, NIT Kurukshetra, Haryana, 136119, INDIA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering NIT, Kurukshetra, Haryana","institution_ids":["https://openalex.org/I105094715"]},{"raw_affiliation_string":"Department of Computer Engineering, NIT Kurukshetra, Haryana, 136119, INDIA","institution_ids":["https://openalex.org/I105094715"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026947232","display_name":"Syed Taqi Ali","orcid":"https://orcid.org/0000-0001-7927-8643"},"institutions":[{"id":"https://openalex.org/I105094715","display_name":"National Institute of Technology Kurukshetra","ror":"https://ror.org/04909p852","country_code":"IN","type":"education","lineage":["https://openalex.org/I105094715"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Syed Taqi Ali","raw_affiliation_strings":["Department of Computer Engineering NIT, Kurukshetra, Haryana","Department of Computer Engineering, NIT Kurukshetra, Haryana, 136119, INDIA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering NIT, Kurukshetra, Haryana","institution_ids":["https://openalex.org/I105094715"]},{"raw_affiliation_string":"Department of Computer Engineering, NIT Kurukshetra, Haryana, 136119, INDIA","institution_ids":["https://openalex.org/I105094715"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5108688490"],"corresponding_institution_ids":["https://openalex.org/I105094715"],"apc_list":null,"apc_paid":null,"fwci":1.7258,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.87836133,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"2067","last_page":"2071"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.8829357624053955},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.7702407836914062},{"id":"https://openalex.org/keywords/ciphertext-indistinguishability","display_name":"Ciphertext indistinguishability","score":0.70740807056427},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6972237229347229},{"id":"https://openalex.org/keywords/access-structure","display_name":"Access structure","score":0.6924326419830322},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6665618419647217},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.606969952583313},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.5963523387908936},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5807849168777466},{"id":"https://openalex.org/keywords/plaintext-aware-encryption","display_name":"Plaintext-aware encryption","score":0.5773229002952576},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.49912428855895996},{"id":"https://openalex.org/keywords/malleability","display_name":"Malleability","score":0.46164244413375854},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.31922852993011475},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2717132270336151},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.12242257595062256}],"concepts":[{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.8829357624053955},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.7702407836914062},{"id":"https://openalex.org/C182776695","wikidata":"https://www.wikidata.org/wiki/Q840661","display_name":"Ciphertext indistinguishability","level":5,"score":0.70740807056427},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6972237229347229},{"id":"https://openalex.org/C2778950925","wikidata":"https://www.wikidata.org/wiki/Q4672474","display_name":"Access structure","level":4,"score":0.6924326419830322},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6665618419647217},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.606969952583313},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.5963523387908936},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5807849168777466},{"id":"https://openalex.org/C119133118","wikidata":"https://www.wikidata.org/wiki/Q7200761","display_name":"Plaintext-aware encryption","level":5,"score":0.5773229002952576},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.49912428855895996},{"id":"https://openalex.org/C100980136","wikidata":"https://www.wikidata.org/wiki/Q4668956","display_name":"Malleability","level":4,"score":0.46164244413375854},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.31922852993011475},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2717132270336151},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.12242257595062256}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icacci.2015.7275921","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2015.7275921","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W162787226","https://openalex.org/W177444027","https://openalex.org/W1484751769","https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1513551553","https://openalex.org/W1533406869","https://openalex.org/W1534176767","https://openalex.org/W1569083856","https://openalex.org/W1588309063","https://openalex.org/W1589843374","https://openalex.org/W1596208550","https://openalex.org/W1682451491","https://openalex.org/W1798609567","https://openalex.org/W1906282778","https://openalex.org/W1957399513","https://openalex.org/W2086042811","https://openalex.org/W2108072891","https://openalex.org/W2125871822","https://openalex.org/W2138001464","https://openalex.org/W6606608094","https://openalex.org/W6607134063","https://openalex.org/W6628785129","https://openalex.org/W6630460208","https://openalex.org/W6631973373","https://openalex.org/W6637293744","https://openalex.org/W6638407846"],"related_works":["https://openalex.org/W2518737721","https://openalex.org/W2587915807","https://openalex.org/W1536085039","https://openalex.org/W32954550","https://openalex.org/W2949100118","https://openalex.org/W2112409151","https://openalex.org/W2282389253","https://openalex.org/W2570425541","https://openalex.org/W2949725016","https://openalex.org/W2981554290"],"abstract_inverted_index":{"Ciphertext-policy":[0],"attribute":[1,45],"based":[2],"encryption":[3],"(CPABE)":[4],"is":[5,35,81,135],"becoming":[6],"very":[7],"important":[8],"in":[9,52,85,147,178],"distributed":[10],"computing":[11],"environment,":[12],"because":[13],"it":[14,116],"makes":[15],"easier":[16],"to":[17,137,143],"protect,":[18],"broadcast":[19],"and":[20,46,57,98,125],"control":[21],"the":[22,28,43,55,61,65,73,91,96,102,110,113,118,122,128,132,139,144,148],"access":[23,39,66,92,103,107,140,169,194],"of":[24,112,120,131,180],"information,":[25],"especially":[26,146],"over":[27],"cloud":[29,151],"server.":[30],"In":[31],"CP-ABE":[32,87,155,165,186],"every":[33],"plaintext":[34,159],"encrypted":[36],"under":[37],"an":[38],"structure,":[40],"defined":[41],"on":[42],"user's":[44,62],"users":[47],"have":[48],"given":[49],"private":[50,77],"keys":[51],"advance":[53],"from":[54],"trusted":[56],"reliable":[58],"authority.":[59],"If":[60],"attributes":[63],"satisfy":[64],"structure":[67,93,108,141,170],"then":[68],"only":[69,158],"user":[70],"can":[71,100],"decrypt":[72],"ciphertext":[74,97,123],"using":[75,188],"his/her":[76],"keys.":[78],"But,":[79],"there":[80],"one":[82],"privacy":[83,111],"issue":[84],"available":[86],"schemes,":[88],"owner":[89],"sends":[90],"along":[94],"with":[95],"everyone":[99],"learn":[101],"policy.":[104,195],"Sometimes":[105],"this":[106],"violates":[109],"ciphertext,":[114,145],"i.e.":[115],"reveals":[117,127],"type":[119],"information":[121],"contains":[124],"sometimes":[126],"partial":[129],"anonymity":[130],"decryptor.":[133],"It":[134],"desirable":[136],"hide":[138],"associated":[142],"medical":[149],"database":[150],"server":[152],"applications.":[153],"Previous":[154],"schemes":[156,166],"hides":[157,168,193],"through":[160],"encryption.":[161],"There":[162],"are":[163,175],"few":[164],"which":[167,192],"(policy)":[171],"as":[172],"well":[173],"but":[174],"not":[176],"efficient":[177],"terms":[179],"computations.":[181],"We":[182],"proposed":[183],"a":[184],"secure":[185],"scheme":[187],"composite-order":[189],"bilinear":[190],"groups":[191]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":6},{"year":2021,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
