{"id":"https://openalex.org/W4312520007","doi":"https://doi.org/10.1109/jsyst.2022.3208149","title":"Multiauthority Attribute-Based Encryption for Assuring Data Deletion","display_name":"Multiauthority Attribute-Based Encryption for Assuring Data Deletion","publication_year":2022,"publication_date":"2022-09-30","ids":{"openalex":"https://openalex.org/W4312520007","doi":"https://doi.org/10.1109/jsyst.2022.3208149"},"language":"en","primary_location":{"id":"doi:10.1109/jsyst.2022.3208149","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2022.3208149","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074149291","display_name":"Jiguo Li","orcid":"https://orcid.org/0000-0002-6532-2081"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiguo Li","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014087086","display_name":"Ruyuan Zhang","orcid":"https://orcid.org/0000-0001-8693-969X"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruyuan Zhang","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022449287","display_name":"Yang Lu","orcid":"https://orcid.org/0000-0003-4860-8384"},"institutions":[{"id":"https://openalex.org/I152031979","display_name":"Nanjing Normal University","ror":"https://ror.org/036trcv74","country_code":"CN","type":"education","lineage":["https://openalex.org/I152031979"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Lu","raw_affiliation_strings":["School of Computer Science and Technology, Nanjing Normal University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Nanjing Normal University, Nanjing, China","institution_ids":["https://openalex.org/I152031979"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067205952","display_name":"Jinguang Han","orcid":"https://orcid.org/0000-0002-4993-9452"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinguang Han","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024771892","display_name":"Yichen Zhang","orcid":"https://orcid.org/0000-0002-0907-7827"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yichen Zhang","raw_affiliation_strings":["College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100611739","display_name":"Wenzheng Zhang","orcid":"https://orcid.org/0000-0002-6238-0729"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wenzheng Zhang","raw_affiliation_strings":["Science and Technology on Communication Security Laboratory, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory, Chengdu, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100862227","display_name":"Xinfeng Dong","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xinfeng Dong","raw_affiliation_strings":["Science and Technology on Communication Security Laboratory, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory, Chengdu, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5074149291"],"corresponding_institution_ids":["https://openalex.org/I111753288","https://openalex.org/I4210132990"],"apc_list":null,"apc_paid":null,"fwci":4.5489,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.95293981,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"17","issue":"2","first_page":"2029","last_page":"2038"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-escrow","display_name":"Key escrow","score":0.7803447246551514},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7408137321472168},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.619685709476471},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.585218071937561},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.5533317923545837},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5113541483879089},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5085324048995972},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4821071922779083},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.47805410623550415},{"id":"https://openalex.org/keywords/escrow","display_name":"Escrow","score":0.4618939161300659},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4592040181159973},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.4562458097934723},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4259759783744812},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.42502039670944214},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08414509892463684},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08338543772697449}],"concepts":[{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.7803447246551514},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7408137321472168},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.619685709476471},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.585218071937561},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.5533317923545837},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5113541483879089},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5085324048995972},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4821071922779083},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.47805410623550415},{"id":"https://openalex.org/C167254554","wikidata":"https://www.wikidata.org/wiki/Q338451","display_name":"Escrow","level":2,"score":0.4618939161300659},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4592040181159973},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.4562458097934723},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4259759783744812},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.42502039670944214},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08414509892463684},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08338543772697449},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsyst.2022.3208149","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2022.3208149","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2351304197","display_name":null,"funder_award_id":"U21A20465","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3289934160","display_name":null,"funder_award_id":"61972095","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5522573248","display_name":null,"funder_award_id":"61772009","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7244731676","display_name":null,"funder_award_id":"U1736112","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G742856897","display_name":null,"funder_award_id":"61972190","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7752715026","display_name":null,"funder_award_id":"62072104","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":56,"referenced_works":["https://openalex.org/W1411014758","https://openalex.org/W1498316612","https://openalex.org/W1569083856","https://openalex.org/W1582010081","https://openalex.org/W1763482972","https://openalex.org/W1993341076","https://openalex.org/W1998436947","https://openalex.org/W2005725110","https://openalex.org/W2009497894","https://openalex.org/W2034562114","https://openalex.org/W2062878368","https://openalex.org/W2079493184","https://openalex.org/W2090658700","https://openalex.org/W2108072891","https://openalex.org/W2138001464","https://openalex.org/W2168970529","https://openalex.org/W2314118214","https://openalex.org/W2342707649","https://openalex.org/W2343895449","https://openalex.org/W2518462489","https://openalex.org/W2535399211","https://openalex.org/W2562868812","https://openalex.org/W2565477418","https://openalex.org/W2585855180","https://openalex.org/W2593472119","https://openalex.org/W2612180083","https://openalex.org/W2621249842","https://openalex.org/W2759564290","https://openalex.org/W2782900518","https://openalex.org/W2793588429","https://openalex.org/W2888094362","https://openalex.org/W2911261396","https://openalex.org/W2913048961","https://openalex.org/W2921870161","https://openalex.org/W2934024780","https://openalex.org/W2948230089","https://openalex.org/W2961017266","https://openalex.org/W2963491455","https://openalex.org/W2967320897","https://openalex.org/W2970213526","https://openalex.org/W2977014769","https://openalex.org/W3007218738","https://openalex.org/W3011462710","https://openalex.org/W3038204796","https://openalex.org/W3042301533","https://openalex.org/W3112145447","https://openalex.org/W3112962245","https://openalex.org/W3113200243","https://openalex.org/W3127056413","https://openalex.org/W3128174515","https://openalex.org/W3170992969","https://openalex.org/W3181914005","https://openalex.org/W3195427644","https://openalex.org/W4207030218","https://openalex.org/W4220702665","https://openalex.org/W6787228846"],"related_works":["https://openalex.org/W2358705460","https://openalex.org/W2350245913","https://openalex.org/W2524274420","https://openalex.org/W1557877319","https://openalex.org/W3211091843","https://openalex.org/W2347231729","https://openalex.org/W3030100229","https://openalex.org/W2261831330","https://openalex.org/W1855090304","https://openalex.org/W2553637498"],"abstract_inverted_index":{"In":[0,24,114],"order":[1],"to":[2,122,138],"alleviate":[3],"key":[4,100],"escrow":[5,101],"issue,":[6,102],"the":[7,89,134,142,150],"notion":[8],"of":[9,45,68],"multiauthority":[10],"attribute-based":[11],"encryption":[12],"(MA-ABE)":[13],"was":[14,17],"presented,":[15],"which":[16,84],"widely":[18],"applied":[19],"in":[20,38],"cloud":[21],"storage":[22],"environment.":[23],"data":[25,29,46,51,72,82,125],"sharing":[26],"environment,":[27],"secure":[28,140],"deletion":[30,47],"is":[31,85,136,153],"very":[32],"crucial":[33],"and":[34,65,111],"challenging":[35],"issue.":[36],"Hence,":[37],"this":[39,55],"article,":[40],"we":[41,57,75],"concentrate":[42],"on":[43,128],"verification":[44],"operation,":[48],"i.e.,":[49],"assuring":[50,71,81],"deletion.":[52,73,126],"To":[53],"solve":[54],"problem,":[56],"put":[58],"forward":[59],"a":[60,77],"system":[61],"model,":[62],"formal":[63],"definition":[64],"security":[66],"model":[67],"MA-ABE":[69,78],"for":[70,80,155],"Furthermore,":[74],"design":[76],"scheme":[79,96,117,135,152],"deletion,":[83],"more":[86],"practicable":[87],"than":[88],"single":[90],"authority":[91],"ABE":[92],"scheme.":[93],"The":[94,145],"designed":[95,151],"not":[97],"only":[98],"overcomes":[99],"but":[103],"also":[104],"resists":[105],"collusion":[106],"attack":[107],"between":[108],"malicious":[109],"user":[110],"unauthorized":[112],"user.":[113],"addition,":[115],"our":[116],"utilizes":[118],"merkle":[119],"hash":[120],"tree":[121],"obtain":[123],"verifiable":[124],"Based":[127],"decisional":[129],"bilinear":[130],"Diffie-Hellman":[131],"(DBDH)":[132],"assumption,":[133],"proven":[137],"be":[139],"under":[141],"selective-policy":[143],"model.":[144],"experimental":[146],"result":[147],"indicates":[148],"that":[149],"efficient":[154],"practical":[156],"application.":[157]},"counts_by_year":[{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":15},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
