{"id":"https://openalex.org/W3101533331","doi":"https://doi.org/10.1109/iccc49849.2020.9238987","title":"HABEm: Hierarchical Attribute Based Encryption with Multi-Authority for the Mobile Cloud Service","display_name":"HABEm: Hierarchical Attribute Based Encryption with Multi-Authority for the Mobile Cloud Service","publication_year":2020,"publication_date":"2020-08-09","ids":{"openalex":"https://openalex.org/W3101533331","doi":"https://doi.org/10.1109/iccc49849.2020.9238987","mag":"3101533331"},"language":"en","primary_location":{"id":"doi:10.1109/iccc49849.2020.9238987","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccc49849.2020.9238987","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE/CIC International Conference on Communications in China (ICCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100746961","display_name":"Qian He","orcid":"https://orcid.org/0000-0003-3020-2896"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"He Qian","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptograph and Information Security, Guilin University of Electronic Technology, Guilin, China","Key Laboratory of Cloud Computing and Complex System, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptograph and Information Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"Key Laboratory of Cloud Computing and Complex System, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102201746","display_name":"Song Jing","orcid":null},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Song Jing","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptograph and Information Security, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptograph and Information Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069322836","display_name":"Xu Hong","orcid":"https://orcid.org/0000-0002-1121-101X"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xu Hong","raw_affiliation_strings":["Key Laboratory of Cloud Computing and Complex System, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cloud Computing and Complex System, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100751600","display_name":"Yong Wang","orcid":"https://orcid.org/0000-0002-5383-5736"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wang Yong","raw_affiliation_strings":["Key Laboratory of Cloud Computing and Complex System, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cloud Computing and Complex System, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100746961"],"corresponding_institution_ids":["https://openalex.org/I5343935"],"apc_list":null,"apc_paid":null,"fwci":0.2651,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.64279983,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"524","last_page":"529"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8086224794387817},{"id":"https://openalex.org/keywords/delegate","display_name":"Delegate","score":0.654879629611969},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.6512794494628906},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6380116939544678},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.5867800116539001},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5609630346298218},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5592632293701172},{"id":"https://openalex.org/keywords/mobile-cloud-computing","display_name":"Mobile cloud computing","score":0.5518864989280701},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5352492928504944},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.43641138076782227},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34167665243148804},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2547140419483185},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09294214844703674}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8086224794387817},{"id":"https://openalex.org/C143273055","wikidata":"https://www.wikidata.org/wiki/Q2382794","display_name":"Delegate","level":2,"score":0.654879629611969},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.6512794494628906},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6380116939544678},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.5867800116539001},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5609630346298218},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5592632293701172},{"id":"https://openalex.org/C2779191767","wikidata":"https://www.wikidata.org/wiki/Q6887075","display_name":"Mobile cloud computing","level":3,"score":0.5518864989280701},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5352492928504944},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.43641138076782227},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34167665243148804},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2547140419483185},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09294214844703674},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccc49849.2020.9238987","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccc49849.2020.9238987","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE/CIC International Conference on Communications in China (ICCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6198552350","display_name":null,"funder_award_id":"61661015,61967005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1498316612","https://openalex.org/W1569083856","https://openalex.org/W1993341076","https://openalex.org/W2074358318","https://openalex.org/W2086042811","https://openalex.org/W2108072891","https://openalex.org/W2138001464","https://openalex.org/W2152924492","https://openalex.org/W2334760274","https://openalex.org/W2594560857","https://openalex.org/W2788404774","https://openalex.org/W2790705217","https://openalex.org/W2915813934","https://openalex.org/W3021990601","https://openalex.org/W3106445841","https://openalex.org/W6634010886"],"related_works":["https://openalex.org/W2988471324","https://openalex.org/W4281385823","https://openalex.org/W3036801109","https://openalex.org/W2907749574","https://openalex.org/W2130050975","https://openalex.org/W2626598749","https://openalex.org/W2368465272","https://openalex.org/W2059315043","https://openalex.org/W2030808639","https://openalex.org/W3101533331"],"abstract_inverted_index":{"For":[0],"the":[1,5,11,17,22,25,34,61,94,101,105,115,119,122,129,133,159],"mobile":[2,12,62,86,106,109,123,160],"cloud":[3,63,161],"service,":[4],"computation":[6,45],"and":[7,39,46,154],"power":[8],"resources":[9],"of":[10,24,36,44,80,85,104,121,132],"terminal":[13,110,124],"are":[14],"limited.":[15],"And":[16],"attribute-based":[18,56],"encryption":[19,57],"algorithm":[20,98],"has":[21,150],"uncertainty":[23],"attribute":[26,112],"expiration":[27],"time,":[28],"which":[29],"highly":[30],"likely":[31],"results":[32,146],"in":[33,68,142],"leakage":[35],"user":[37],"privacy,":[38],"causes":[40],"a":[41,54],"huge":[42],"waste":[43],"bandwidth":[47],"resources.":[48],"To":[49],"deal":[50],"with":[51,58],"these":[52],"problems,":[53],"hierarchical":[55,72],"multi-authority":[59],"for":[60,158],"service":[64,162],"(HABEm)":[65],"is":[66,90,125,137,155],"proposed":[67],"this":[69],"paper.":[70],"A":[71,88],"multi-level":[73],"authorization":[74,116],"mechanism,":[75],"referring":[76],"to":[77,92,99,139],"different":[78,83],"levels":[79],"authorities,":[81],"manages":[82],"attributes":[84],"terminal.":[87,107],"proxy":[89],"introduced":[91],"delegate":[93],"high":[95],"complexity":[96],"decryption":[97,102,152],"improve":[100],"efficiency":[103],"The":[108,144],"performs":[111],"revocation":[113],"through":[114],"authority":[117],"when":[118],"rank":[120],"changed.":[126],"Based":[127],"on":[128],"deterministic":[130],"assumption":[131],"standard":[134],"model,":[135],"HABEm":[136,149],"proved":[138],"be":[140],"CPA-safe":[141],"theory.":[143],"experiment":[145],"show":[147],"that":[148],"higher":[151],"performance":[153],"very":[156],"suitable":[157],"environment.":[163]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
