{"id":"https://openalex.org/W3184943777","doi":"https://doi.org/10.1109/jiot.2021.3099171","title":"An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Collaborative Decryption With Blockchain","display_name":"An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Collaborative Decryption With Blockchain","publication_year":2021,"publication_date":"2021-07-26","ids":{"openalex":"https://openalex.org/W3184943777","doi":"https://doi.org/10.1109/jiot.2021.3099171","mag":"3184943777"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2021.3099171","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3099171","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100693517","display_name":"Ying He","orcid":"https://orcid.org/0000-0003-1733-9791"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ying He","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102003407","display_name":"Haiyan Wang","orcid":"https://orcid.org/0000-0002-5702-9897"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haiyan Wang","raw_affiliation_strings":["Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100409787","display_name":"Yuan Li","orcid":"https://orcid.org/0000-0001-7990-8676"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Li","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088339795","display_name":"Ke Huang","orcid":"https://orcid.org/0000-0002-9095-3635"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Huang","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035919267","display_name":"Victor C. M. Leung","orcid":"https://orcid.org/0000-0003-3529-2640"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Victor C. M. Leung","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100420016","display_name":"F. Richard Yu","orcid":"https://orcid.org/0000-0003-1006-7594"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"F. Richard Yu","raw_affiliation_strings":["School of Information Technology, Carleton University, Ottawa, Canada"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Carleton University, Ottawa, Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100633973","display_name":"Zhong Ming","orcid":"https://orcid.org/0000-0001-9310-3460"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhong Ming","raw_affiliation_strings":["College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100693517"],"corresponding_institution_ids":["https://openalex.org/I180726961"],"apc_list":null,"apc_paid":null,"fwci":3.4933,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.93746694,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"9","issue":"4","first_page":"2722","last_page":"2733"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.787076473236084},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7624846696853638},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6001558303833008},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5879259705543518},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5655630826950073},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5653948187828064},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4755418300628662},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.43725576996803284},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.43413493037223816},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3426540493965149},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.31677183508872986},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1006564199924469}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.787076473236084},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7624846696853638},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6001558303833008},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5879259705543518},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5655630826950073},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5653948187828064},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4755418300628662},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.43725576996803284},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.43413493037223816},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3426540493965149},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.31677183508872986},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1006564199924469},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2021.3099171","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3099171","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.5,"display_name":"Partnerships for the goals"}],"awards":[{"id":"https://openalex.org/G2658696639","display_name":null,"funder_award_id":"2019KQNCX125","funder_id":"https://openalex.org/F4320327517","funder_display_name":"Foundation for Distinguished Young Talents in Higher Education of Guangdong"},{"id":"https://openalex.org/G3428819714","display_name":null,"funder_award_id":"PCL2021A09","funder_id":"https://openalex.org/F4320318558","funder_display_name":"Peng Cheng Laboratory"},{"id":"https://openalex.org/G375515342","display_name":null,"funder_award_id":"PCL2021A02","funder_id":"https://openalex.org/F4320318558","funder_display_name":"Peng Cheng Laboratory"},{"id":"https://openalex.org/G5053816963","display_name":null,"funder_award_id":"62002238","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7102452409","display_name":null,"funder_award_id":"62002184","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320318558","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327517","display_name":"Foundation for Distinguished Young Talents in Higher Education of Guangdong","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W175981956","https://openalex.org/W1502787543","https://openalex.org/W1526361626","https://openalex.org/W1610688607","https://openalex.org/W1682451491","https://openalex.org/W1997666951","https://openalex.org/W2044772384","https://openalex.org/W2063838657","https://openalex.org/W2101288164","https://openalex.org/W2108072891","https://openalex.org/W2118875948","https://openalex.org/W2139910984","https://openalex.org/W2152924492","https://openalex.org/W2248691201","https://openalex.org/W2602861692","https://openalex.org/W2842348042","https://openalex.org/W2932176981","https://openalex.org/W2943168707","https://openalex.org/W2945857063","https://openalex.org/W2950467135","https://openalex.org/W2963108924","https://openalex.org/W2998108276","https://openalex.org/W2999043823","https://openalex.org/W3000548332","https://openalex.org/W3002761878","https://openalex.org/W3008052621","https://openalex.org/W3014625547","https://openalex.org/W3017823869","https://openalex.org/W3020407551","https://openalex.org/W3022091783","https://openalex.org/W3080421394","https://openalex.org/W3081326254","https://openalex.org/W3086214130","https://openalex.org/W3087335979","https://openalex.org/W3094150380","https://openalex.org/W3095065406","https://openalex.org/W3104151607","https://openalex.org/W3108824576","https://openalex.org/W4248164615"],"related_works":["https://openalex.org/W2131846073","https://openalex.org/W114534093","https://openalex.org/W2383331906","https://openalex.org/W1906282778","https://openalex.org/W1939781145","https://openalex.org/W1558439324","https://openalex.org/W165895243","https://openalex.org/W4388469158","https://openalex.org/W2809908797","https://openalex.org/W2539919741"],"abstract_inverted_index":{"In":[0,35],"the":[1,40,62,68,71,78,88,91,97,104,112,123,130,136,140,151],"last":[2],"few":[3],"decades,":[4],"ciphertext-policy":[5],"attribute-based":[6],"encryption":[7],"(CP-ABE)":[8],"technology":[9,125],"has":[10],"attracted":[11],"great":[12],"interest,":[13],"since":[14],"it":[15],"can":[16,81,101],"provide":[17],"fine-grained,":[18],"flexible,":[19],"and":[20,31,106,144],"access":[21,67],"control":[22],"for":[23,84],"sensitive":[24],"data":[25,92,154],"to":[26,51,128,149],"implement":[27],"a":[28,53,116,146],"high":[29],"secure":[30],"efficient":[32,47],"data-sharing":[33],"mechanism.":[34],"this":[36],"article,":[37],"based":[38,121],"on":[39,122],"linear":[41],"secret":[42],"sharing":[43],"scheme":[44,48,95],"(LSSS),":[45],"an":[46],"is":[49,119],"proposed":[50],"realize":[52],"collaborative":[54,85],"decryption":[55,86],"function.":[56],"For":[57],"any":[58],"user":[59],"group,":[60],"when":[61,109],"user\u2019s":[63],"attribute":[64],"set":[65],"cannot":[66],"ciphertext":[69],"alone,":[70],"private":[72,147],"key":[73],"of":[74,90,139,153],"other":[75],"users":[76],"in":[77,126],"same":[79],"group":[80],"be":[82],"used":[83],"with":[87,111],"permission":[89],"owner.":[93],"Our":[94],"uses":[96],"LSSS":[98],"matrix":[99],"that":[100],"significantly":[102],"reduce":[103],"computation":[105],"storage":[107],"overhead":[108],"comparing":[110],"existing":[113],"schemes.":[114],"Then,":[115],"multiauthorization":[117],"model":[118],"created":[120],"Bohen\u2013Lynn\u2013Shacham":[124],"order":[127],"solve":[129],"key-management":[131],"issue.":[132],"Finally,":[133],"we":[134],"implemented":[135],"specific":[137],"functions":[138],"framework":[141],"through":[142],"JAVA,":[143],"built":[145],"chain":[148],"verify":[150],"feasibility":[152],"transfer":[155],"between":[156],"users.":[157]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":3}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
