{"id":"https://openalex.org/W4225775401","doi":"https://doi.org/10.1109/jiot.2022.3165576","title":"A Lightweight and Verifiable Access Control Scheme With Constant Size Ciphertext in Edge-Computing-Assisted IoT","display_name":"A Lightweight and Verifiable Access Control Scheme With Constant Size Ciphertext in Edge-Computing-Assisted IoT","publication_year":2022,"publication_date":"2022-04-07","ids":{"openalex":"https://openalex.org/W4225775401","doi":"https://doi.org/10.1109/jiot.2022.3165576"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2022.3165576","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2022.3165576","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100335132","display_name":"Xiong Li","orcid":"https://orcid.org/0000-0001-6619-554X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiong Li","raw_affiliation_strings":["Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100365651","display_name":"Tian Liu","orcid":"https://orcid.org/0000-0002-4587-4399"},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tian Liu","raw_affiliation_strings":["School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China","institution_ids":["https://openalex.org/I121296143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100630346","display_name":"Chaoyang Chen","orcid":"https://orcid.org/0000-0002-8095-399X"},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chaoyang Chen","raw_affiliation_strings":["School of Information Science and Engineering, Hunan University of Science and Technology, Xiangtan, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Hunan University of Science and Technology, Xiangtan, China","institution_ids":["https://openalex.org/I121296143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071194455","display_name":"Qingfeng Cheng","orcid":"https://orcid.org/0000-0001-6149-4807"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qingfeng Cheng","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100780268","display_name":"Xiaosong Zhang","orcid":"https://orcid.org/0000-0001-9886-1412"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaosong Zhang","raw_affiliation_strings":["Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Institute for Cyber Security, School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100409306","display_name":"Neeraj Kumar","orcid":"https://orcid.org/0000-0002-3020-3947"},"institutions":[{"id":"https://openalex.org/I143578492","display_name":"Asia University","ror":"https://ror.org/038a1tp19","country_code":"TW","type":"education","lineage":["https://openalex.org/I143578492"]},{"id":"https://openalex.org/I5847235","display_name":"University of Petroleum and Energy Studies","ror":"https://ror.org/04q2jes40","country_code":"IN","type":"education","lineage":["https://openalex.org/I5847235"]}],"countries":["IN","TW"],"is_corresponding":false,"raw_author_name":"Neeraj Kumar","raw_affiliation_strings":["Department of Computer Science and Information Engineering, Asia University, Taichung, Taiwan","School of Computer Science, University of Petroleum and Energy Studies, Dehradun, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, Asia University, Taichung, Taiwan","institution_ids":["https://openalex.org/I143578492"]},{"raw_affiliation_string":"School of Computer Science, University of Petroleum and Energy Studies, Dehradun, India","institution_ids":["https://openalex.org/I5847235"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100335132"],"corresponding_institution_ids":["https://openalex.org/I149594827","https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":3.1716,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.92653068,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"9","issue":"19","first_page":"19227","last_page":"19237"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8219053745269775},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.7024736404418945},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5913785099983215},{"id":"https://openalex.org/keywords/key-escrow","display_name":"Key escrow","score":0.5729005932807922},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5169388651847839},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5081686973571777},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4888004958629608},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.4735768735408783},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.4695330858230591},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.42685675621032715},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4168870449066162},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41648605465888977},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3130677342414856},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0966772735118866}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8219053745269775},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7024736404418945},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5913785099983215},{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.5729005932807922},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5169388651847839},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5081686973571777},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4888004958629608},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.4735768735408783},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.4695330858230591},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.42685675621032715},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4168870449066162},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41648605465888977},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3130677342414856},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0966772735118866}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2022.3165576","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2022.3165576","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy","score":0.8500000238418579}],"awards":[{"id":"https://openalex.org/G1525844701","display_name":null,"funder_award_id":"62072078","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4310334844","display_name":null,"funder_award_id":"2021JJ10030","funder_id":"https://openalex.org/F4320330215","funder_display_name":"Natural Science Foundation for Distinguished Young Scholars of Hunan Province"},{"id":"https://openalex.org/G4316613645","display_name":null,"funder_award_id":"61973110","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6965009412","display_name":null,"funder_award_id":"61872449","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7165659192","display_name":null,"funder_award_id":"DMETKF2022023","funder_id":"https://openalex.org/F4320326834","funder_display_name":"State Key Lab of Digital Manufacturing Equipment and Technology"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320326834","display_name":"State Key Lab of Digital Manufacturing Equipment and Technology","ror":null},{"id":"https://openalex.org/F4320330215","display_name":"Natural Science Foundation for Distinguished Young Scholars of Hunan Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1510795740","https://openalex.org/W1588309063","https://openalex.org/W1588981743","https://openalex.org/W2010302109","https://openalex.org/W2108072891","https://openalex.org/W2114296561","https://openalex.org/W2114623221","https://openalex.org/W2138001464","https://openalex.org/W2166602595","https://openalex.org/W2169046918","https://openalex.org/W2307601096","https://openalex.org/W2416799949","https://openalex.org/W2565477418","https://openalex.org/W2736247572","https://openalex.org/W2738135234","https://openalex.org/W2751904527","https://openalex.org/W2796994201","https://openalex.org/W2906834146","https://openalex.org/W2916562780","https://openalex.org/W2933122424","https://openalex.org/W2981797988","https://openalex.org/W3023514294","https://openalex.org/W3035757183","https://openalex.org/W3037856732","https://openalex.org/W3045886792","https://openalex.org/W3151418790"],"related_works":["https://openalex.org/W2131846073","https://openalex.org/W114534093","https://openalex.org/W2383331906","https://openalex.org/W1906282778","https://openalex.org/W1939781145","https://openalex.org/W1558439324","https://openalex.org/W4388469158","https://openalex.org/W1554299772","https://openalex.org/W2809908797","https://openalex.org/W165895243"],"abstract_inverted_index":{"As":[0],"an":[1],"extension":[2],"of":[3,12,17,20,49,67,92,99,107,120,126,137,213],"cloud":[4],"computing,":[5],"edge":[6,40,89,221],"computing":[7,41,222],"has":[8],"attracted":[9],"the":[10,39,68,97,104,118,124,127,135,153,162,167,172,194,211],"attention":[11],"academia":[13],"and":[14,25,35,52,78,123,193,204],"industry":[15],"because":[16],"its":[18],"characteristics":[19],"low":[21,26],"latency,":[22],"high":[23],"bandwidth,":[24],"energy":[27],"consumption.":[28],"However,":[29],"due":[30],"to":[31,58,62,102,133],"limited":[32,111],"terminal":[33],"resources":[34],"insufficient":[36],"security":[37,51],"design,":[38],"environment":[42],"still":[43],"faces":[44],"many":[45],"challenges":[46],"in":[47,166,191,202],"terms":[48],"data":[50,64,108,147,214],"privacy":[53],"protection.":[54],"Among":[55],"them,":[56],"how":[57],"effectively":[59],"control":[60,86],"access":[61,85],"outsourced":[63],"is":[65,159,200,217],"one":[66],"main":[69],"issues.":[70],"In":[71,113],"this":[72],"article,":[73],"we":[74,183],"propose":[75],"a":[76],"lightweight":[77],"verifiable":[79],"ciphertext-policy":[80],"attribute-based":[81],"encryption":[82],"(CP-ABE)-based":[83],"multiauthority":[84,128],"scheme":[87,116,132,143,158,186,199,208],"for":[88,220],"computing-assisted":[90],"Internet":[91],"Things":[93],"(IoT),":[94],"which":[95],"adopts":[96],"method":[98],"outsourcing":[100],"decryption":[101],"mitigate":[103],"computational":[105],"cost":[106],"users":[109],"with":[110,187,226],"resources.":[112,229],"addition,":[114],"our":[115,131,141,157,185,198,207],"realizes":[117],"feature":[119],"attribute":[121],"revocation,":[122],"design":[125],"mechanism":[129],"enables":[130],"avoid":[134],"problem":[136],"key":[138],"escrow.":[139],"Therefore,":[140],"proposed":[142],"not":[144],"only":[145],"ensures":[146],"confidentiality":[148],"but":[149],"also":[150],"can":[151],"resist":[152],"collusion":[154],"attack.":[155],"Besides,":[156],"secure":[160],"against":[161],"chosen":[163],"plaintext":[164],"attack":[165],"random":[168],"oracle":[169],"model":[170],"under":[171],"decision":[173],"<inline-formula":[174],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[175],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[176],"<tex-math":[177],"notation=\"LaTeX\">$q$":[178],"</tex-math></inline-formula>":[179],"-BDHE":[180],"assumption.":[181],"Finally,":[182],"compared":[184],"some":[188],"related":[189],"work":[190],"performance,":[192],"results":[195],"demonstrate":[196],"that":[197],"efficient":[201],"computation":[203,228],"communication.":[205],"Because":[206],"greatly":[209],"mitigates":[210],"overhead":[212],"users,":[215],"it":[216],"very":[218],"suitable":[219],"supported":[223],"IoT":[224],"applications":[225],"restricted":[227]},"counts_by_year":[{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
