{"id":"https://openalex.org/W4200483629","doi":"https://doi.org/10.1109/iccais52680.2021.9624628","title":"Ciphertext-Policy Attribute-Based Encryption for General Circuits in Cloud Computing","display_name":"Ciphertext-Policy Attribute-Based Encryption for General Circuits in Cloud Computing","publication_year":2021,"publication_date":"2021-10-14","ids":{"openalex":"https://openalex.org/W4200483629","doi":"https://doi.org/10.1109/iccais52680.2021.9624628"},"language":"en","primary_location":{"id":"doi:10.1109/iccais52680.2021.9624628","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccais52680.2021.9624628","pdf_url":null,"source":{"id":"https://openalex.org/S4363608071","display_name":"2021 International Conference on Control, Automation and Information Sciences (ICCAIS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Conference on Control, Automation and Information Sciences (ICCAIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087152421","display_name":"Qing Wu","orcid":"https://orcid.org/0000-0002-9400-236X"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qing Wu","raw_affiliation_strings":["School of Automation, Xi'an University of Posts and Telecommunications, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Xi'an University of Posts and Telecommunications, Xi'an, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100665452","display_name":"Liangjun Li","orcid":"https://orcid.org/0000-0001-7058-2235"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liangjun Li","raw_affiliation_strings":["School of Automation, Xi'an University of Posts and Telecommunications, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Xi'an University of Posts and Telecommunications, Xi'an, China","institution_ids":["https://openalex.org/I4210136859"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5087152421"],"corresponding_institution_ids":["https://openalex.org/I4210136859"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16582539,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"620","last_page":"625"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7654728293418884},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.7323417663574219},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.7170143723487854},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6951210498809814},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6630622148513794},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5290913581848145},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4678543210029602},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4541971981525421},{"id":"https://openalex.org/keywords/access-structure","display_name":"Access structure","score":0.4220311939716339},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3292737603187561},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.28302258253097534},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.27309972047805786},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.192482590675354},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08605912327766418}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7654728293418884},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7323417663574219},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.7170143723487854},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6951210498809814},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6630622148513794},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5290913581848145},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4678543210029602},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4541971981525421},{"id":"https://openalex.org/C2778950925","wikidata":"https://www.wikidata.org/wiki/Q4672474","display_name":"Access structure","level":4,"score":0.4220311939716339},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3292737603187561},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.28302258253097534},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.27309972047805786},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.192482590675354},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08605912327766418}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccais52680.2021.9624628","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccais52680.2021.9624628","pdf_url":null,"source":{"id":"https://openalex.org/S4363608071","display_name":"2021 International Conference on Control, Automation and Information Sciences (ICCAIS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Conference on Control, Automation and Information Sciences (ICCAIS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6569819481","display_name":null,"funder_award_id":"2020KJRC0109","funder_id":"https://openalex.org/F4320325079","funder_display_name":"Xi'an Municipal Bureau of Science and Technology"},{"id":"https://openalex.org/G6759678082","display_name":null,"funder_award_id":"51875457","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7623743200","display_name":null,"funder_award_id":"2021JQ-701","funder_id":"https://openalex.org/F4320324173","funder_display_name":"Natural Science Foundation of Shaanxi Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324173","display_name":"Natural Science Foundation of Shaanxi Province","ror":null},{"id":"https://openalex.org/F4320325079","display_name":"Xi'an Municipal Bureau of Science and Technology","ror":"https://ror.org/02rn5dn49"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2092044754","https://openalex.org/W2108072891","https://openalex.org/W2118715353","https://openalex.org/W2138001464","https://openalex.org/W2290755432","https://openalex.org/W2345277316","https://openalex.org/W2565477418","https://openalex.org/W2593700272","https://openalex.org/W2620868656","https://openalex.org/W2796172907","https://openalex.org/W2796994201","https://openalex.org/W2797246528","https://openalex.org/W3003284455","https://openalex.org/W3006217687","https://openalex.org/W3095402424"],"related_works":["https://openalex.org/W2788225348","https://openalex.org/W2553096087","https://openalex.org/W2530459946","https://openalex.org/W2125192202","https://openalex.org/W2282054813","https://openalex.org/W1663161527","https://openalex.org/W2147871863","https://openalex.org/W4206042844","https://openalex.org/W1516622814","https://openalex.org/W2893074209"],"abstract_inverted_index":{"Driven":[0],"by":[1,17,55,129,167],"the":[2,18,22,37,46,83,95,115,130,142,150,163,179,197,202,211,220],"development":[3],"of":[4,24,36,40,45,49],"Internet":[5],"and":[6,15,26,125,185,189],"information":[7,28],"technology,":[8],"cloud":[9,30,41],"computing":[10,171,180],"has":[11,32,87,214],"been":[12],"widely":[13],"recognized":[14],"accepted":[16],"public.":[19],"However,":[20,82],"with":[21,77,91],"occurrence":[23],"more":[25,27,101],"leakage,":[29],"security":[31],"also":[33],"become":[34],"one":[35,44],"core":[38],"problem":[39],"computing.":[42],"As":[43],"resolve":[47],"methods":[48],"it,":[50],"ciphertext-policy":[51],"attribute-based":[52],"encryption":[53],"(CP-ABE)":[54],"embedding":[56],"access":[57,70,80,85,93,97,103,118,135,155],"policy":[58,86,98,119,136],"into":[59],"ciphertext":[60],"can":[61,69],"make":[62],"data":[63,75,183],"owner":[64],"to":[65,105,161,174],"decide":[66],"which":[67,177],"attributes":[68],"ciphertext.":[71],"It":[72],"achieves":[73],"ensuring":[74],"confidentiality":[76],"realizing":[78],"fine-grained":[79],"control.":[81],"traditional":[84],"some":[88],"limitations.":[89],"Compared":[90],"other":[92,221],"policies,":[94],"circuit-based":[96,117,134,222],"ABE":[99,137],"supports":[100],"flexible":[102],"control":[104],"encrypted":[106],"data.":[107],"But":[108],"there":[109],"are":[110],"still":[111],"many":[112],"challenges":[113],"in":[114,147,153],"existing":[116],"ABE,":[120],"such":[121],"as":[122],"privacy":[123],"leakage":[124],"low":[126,164],"efficiency.":[127],"Motivated":[128],"above,":[131],"a":[132,215],"new":[133],"is":[138,157,172,199],"proposed.":[139],"By":[140],"converting":[141],"multi":[143],"output":[144],"OR":[145],"gates":[146],"monotonic":[148],"circuit,":[149],"backtracking":[151],"attacks":[152],"circuit":[154,168],"structure":[156],"avoided.":[158],"In":[159],"order":[160],"overcome":[162],"efficiency":[165,218],"issued":[166],"conversion,":[169],"outsourcing":[170],"adopted":[173],"Encryption/Decryption":[175],"algorithms,":[176],"makes":[178],"overhead":[181],"for":[182],"owners":[184],"users":[186],"be":[187],"decreased":[188],"achieve":[190],"constant":[191],"level.":[192],"Security":[193],"analysis":[194],"shows":[195],"that":[196],"scheme":[198,213],"secure":[200],"under":[201],"decision":[203],"bilinear":[204],"Diffie-Hellman":[205],"(DBDH)":[206],"assumption.":[207],"Numerical":[208],"results":[209],"show":[210],"proposed":[212],"higher":[216],"computation":[217],"than":[219],"schemes.":[223]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
