{"id":"https://openalex.org/W4402897008","doi":"https://doi.org/10.1109/iwqos61813.2024.10682908","title":"Towards Key-Escrow Free Attribute-Based Encryption for Self-Sovereign Identity Systems","display_name":"Towards Key-Escrow Free Attribute-Based Encryption for Self-Sovereign Identity Systems","publication_year":2024,"publication_date":"2024-06-19","ids":{"openalex":"https://openalex.org/W4402897008","doi":"https://doi.org/10.1109/iwqos61813.2024.10682908"},"language":"en","primary_location":{"id":"doi:10.1109/iwqos61813.2024.10682908","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iwqos61813.2024.10682908","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE/ACM 32nd International Symposium on Quality of Service (IWQoS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114234935","display_name":"Zhengxi Zhong","orcid":null},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhengxi Zhong","raw_affiliation_strings":["Guangzhou University,Institute of Artificial Intelligence and Blockchain,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"Guangzhou University,Institute of Artificial Intelligence and Blockchain,Guangzhou,China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111123738","display_name":"Hongyang Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongyang Yan","raw_affiliation_strings":["Guangzhou University,Institute of Artificial Intelligence and Blockchain,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"Guangzhou University,Institute of Artificial Intelligence and Blockchain,Guangzhou,China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023098158","display_name":"Arthur Sandor Voundi Koe","orcid":"https://orcid.org/0000-0002-8737-3189"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Arthur Sandor Voundi Koe","raw_affiliation_strings":["Xidian University,State Key Laboratory of Integrated Service Networks,Xi&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"Xidian University,State Key Laboratory of Integrated Service Networks,Xi&#x2019;an,China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021176385","display_name":"Weichu Deng","orcid":"https://orcid.org/0000-0002-4623-6241"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weichu Deng","raw_affiliation_strings":["Guangzhou University,Institute of Artificial Intelligence and Blockchain,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"Guangzhou University,Institute of Artificial Intelligence and Blockchain,Guangzhou,China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101665881","display_name":"Junyang Li","orcid":"https://orcid.org/0000-0002-5080-0677"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junyang Li","raw_affiliation_strings":["Guangzhou University,Institute of Artificial Intelligence and Blockchain,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"Guangzhou University,Institute of Artificial Intelligence and Blockchain,Guangzhou,China","institution_ids":["https://openalex.org/I37987034"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5114234935"],"corresponding_institution_ids":["https://openalex.org/I37987034"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14363643,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"25","issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9498999714851379,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9325000047683716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-escrow","display_name":"Key escrow","score":0.8514091372489929},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6718152761459351},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6317039132118225},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5975794196128845},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.567118763923645},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5512465238571167},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.49957942962646484},{"id":"https://openalex.org/keywords/escrow","display_name":"Escrow","score":0.47403883934020996},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.41193076968193054}],"concepts":[{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.8514091372489929},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6718152761459351},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6317039132118225},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5975794196128845},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.567118763923645},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5512465238571167},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.49957942962646484},{"id":"https://openalex.org/C167254554","wikidata":"https://www.wikidata.org/wiki/Q338451","display_name":"Escrow","level":2,"score":0.47403883934020996},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.41193076968193054},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwqos61813.2024.10682908","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iwqos61813.2024.10682908","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE/ACM 32nd International Symposium on Quality of Service (IWQoS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.46000000834465027}],"awards":[],"funders":[{"id":"https://openalex.org/F4320337504","display_name":"Research and Development","ror":"https://ror.org/027s68j25"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1498316612","https://openalex.org/W1763482972","https://openalex.org/W1867048327","https://openalex.org/W1976420017","https://openalex.org/W2108072891","https://openalex.org/W2138001464","https://openalex.org/W2170561193","https://openalex.org/W2404846046","https://openalex.org/W2761330267","https://openalex.org/W2767507118","https://openalex.org/W2884325794","https://openalex.org/W2910358275","https://openalex.org/W2994762488","https://openalex.org/W3197312228","https://openalex.org/W4205196391","https://openalex.org/W4238869514","https://openalex.org/W4240886159","https://openalex.org/W4243100117","https://openalex.org/W4285718364","https://openalex.org/W4293477869","https://openalex.org/W4297420522","https://openalex.org/W4313561545","https://openalex.org/W4365807184","https://openalex.org/W6631622351","https://openalex.org/W6677358406","https://openalex.org/W6702723596","https://openalex.org/W6704494429","https://openalex.org/W6713385318","https://openalex.org/W6745365488","https://openalex.org/W6746823094","https://openalex.org/W6768480206","https://openalex.org/W6769077420","https://openalex.org/W6779668273","https://openalex.org/W6784877137","https://openalex.org/W6787668950","https://openalex.org/W6792699905","https://openalex.org/W6804168543","https://openalex.org/W6809138108","https://openalex.org/W6852728292"],"related_works":["https://openalex.org/W2358705460","https://openalex.org/W2350245913","https://openalex.org/W2019160124","https://openalex.org/W1859964688","https://openalex.org/W2261831330","https://openalex.org/W1552851303","https://openalex.org/W2553637498","https://openalex.org/W2370270697","https://openalex.org/W2249341036","https://openalex.org/W3151844025"],"abstract_inverted_index":{"In":[0],"recent":[1],"years,":[2],"the":[3,35,61,65,157],"exponential":[4],"advances":[5],"in":[6,57,139,156],"cloud":[7,11,39,100],"computing":[8],"have":[9],"upheld":[10],"data":[12,40,101,153],"sharing":[13,154],"as":[14,48],"a":[15,49,84,109,117],"prominent":[16],"service":[17],"of":[18,27,38],"interest":[19],"to":[20,76,95,107,151],"practitioners.":[21],"Data":[22],"leakage":[23],"risks":[24],"and":[25,74,98,119,124,129,144],"lack":[26],"fine-grained":[28],"access":[29],"control":[30],"remain":[31],"significant":[32],"challenges":[33],"limiting":[34],"wide":[36],"adoption":[37],"sharing.":[41,102],"Ciphertext":[42],"policy":[43],"attribute-based":[44],"encryption":[45],"(CP-ABE)":[46],"stands":[47],"promising":[50],"solution":[51],"for":[52],"these":[53],"issues.":[54],"Current":[55],"research":[56,147],"CP-ABE":[58,88,123,140],"suffers":[59],"from":[60],"key-escrow":[62],"problem":[63],"on":[64],"trusted":[66],"key":[67,86,112],"generation":[68,113],"center,":[69],"overlooks":[70],"user":[71,78,111],"identity":[72,94],"sovereignty,":[73],"fails":[75],"guarantee":[77],"attributes\u2019":[79],"privacy.":[80],"This":[81,146],"paper":[82],"proposes":[83],"novel":[85,110],"escrow-free":[87],"scheme":[89,135],"that":[90,133],"builds":[91],"upon":[92],"self-sovereign":[93,125],"enable":[96],"secure":[97,120,152],"privacy-preserving":[99],"We":[103,115],"leverage":[104],"multi-party":[105],"computation":[106],"develop":[108],"protocol.":[114],"design":[116],"seamless":[118],"integration":[121],"between":[122],"identity.":[126],"The":[127],"experimental":[128],"security":[130,143],"analyses":[131],"show":[132],"our":[134],"solves":[136],"existing":[137],"issues":[138],"while":[141],"preserving":[142],"flexibility.":[145],"provides":[148],"new":[149],"insights":[150],"solutions":[155],"cloud.":[158]},"counts_by_year":[],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
