{"id":"https://openalex.org/W4386737269","doi":"https://doi.org/10.1109/jsyst.2023.3309282","title":"A Verifiable and Efficient Secure Sharing Scheme in Multiowner Multiuser Settings","display_name":"A Verifiable and Efficient Secure Sharing Scheme in Multiowner Multiuser Settings","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4386737269","doi":"https://doi.org/10.1109/jsyst.2023.3309282"},"language":"en","primary_location":{"id":"doi:10.1109/jsyst.2023.3309282","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2023.3309282","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061198148","display_name":"Xingchen Liu","orcid":"https://orcid.org/0000-0002-0756-5114"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xingchen Liu","raw_affiliation_strings":["School of Computer Science and Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012839363","display_name":"S.B. Zhang","orcid":"https://orcid.org/0009-0005-5021-591X"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shaohui Zhang","raw_affiliation_strings":["School of Computer Science and Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088237102","display_name":"Haiping Huang","orcid":"https://orcid.org/0000-0002-4392-3599"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haiping Huang","raw_affiliation_strings":["School of Computer Science and Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005355107","display_name":"Wenming Wang","orcid":"https://orcid.org/0000-0002-5674-5699"},"institutions":[{"id":"https://openalex.org/I46482218","display_name":"Anqing Normal University","ror":"https://ror.org/0127ytz78","country_code":"CN","type":"education","lineage":["https://openalex.org/I46482218"]},{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenming Wang","raw_affiliation_strings":["School of Computer and Information, Anqing Normal University, Anqing, China","State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information, Anqing Normal University, Anqing, China","institution_ids":["https://openalex.org/I46482218"]},{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001248508","display_name":"Reza Malekian","orcid":"https://orcid.org/0000-0002-2763-8085"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Reza Malekian","raw_affiliation_strings":["Department of Computer Science and Media Technology, Malm&#x00F6; University, Malm&#x00F6;, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Media Technology, Malm&#x00F6; University, Malm&#x00F6;, Sweden","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5061198148"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":0.5219,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.71958046,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.7986940145492554},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7465180158615112},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.6012556552886963},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5598240494728088},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5557509660720825},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5149648785591125},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5039545893669128},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.49598512053489685},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.47030800580978394},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.46546223759651184},{"id":"https://openalex.org/keywords/index","display_name":"Index (typography)","score":0.42779821157455444},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.4178371727466583},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3790205419063568},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.36053457856178284},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32718443870544434},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13103395700454712},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11213776469230652}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.7986940145492554},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7465180158615112},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.6012556552886963},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5598240494728088},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5557509660720825},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5149648785591125},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5039545893669128},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.49598512053489685},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.47030800580978394},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.46546223759651184},{"id":"https://openalex.org/C2777382242","wikidata":"https://www.wikidata.org/wiki/Q6017816","display_name":"Index (typography)","level":2,"score":0.42779821157455444},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.4178371727466583},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3790205419063568},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36053457856178284},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32718443870544434},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13103395700454712},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11213776469230652},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsyst.2023.3309282","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2023.3309282","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G1704215286","display_name":null,"funder_award_id":"62072252","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6661664905","display_name":null,"funder_award_id":"JZNY202114","funder_id":"https://openalex.org/F4320312071","funder_display_name":"Ministry of Education, Libya"}],"funders":[{"id":"https://openalex.org/F4320312071","display_name":"Ministry of Education, Libya","ror":"https://ror.org/02w030k33"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320323268","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W39299451","https://openalex.org/W177444027","https://openalex.org/W1504167826","https://openalex.org/W1511886987","https://openalex.org/W1571926107","https://openalex.org/W1979493600","https://openalex.org/W2012753837","https://openalex.org/W2054701320","https://openalex.org/W2144754501","https://openalex.org/W2147929033","https://openalex.org/W2161214567","https://openalex.org/W2169691038","https://openalex.org/W2344811709","https://openalex.org/W2405356014","https://openalex.org/W2461759357","https://openalex.org/W2611311161","https://openalex.org/W2898082692","https://openalex.org/W2910369831","https://openalex.org/W2945967818","https://openalex.org/W2957369234","https://openalex.org/W2972535651","https://openalex.org/W3023514294","https://openalex.org/W3082431408","https://openalex.org/W3088377478","https://openalex.org/W3089656219","https://openalex.org/W3094509012","https://openalex.org/W3133567477","https://openalex.org/W3198560242","https://openalex.org/W3211645747","https://openalex.org/W4200592337","https://openalex.org/W4205547493","https://openalex.org/W4205762045","https://openalex.org/W4285295442","https://openalex.org/W4301697284","https://openalex.org/W4310054767"],"related_works":["https://openalex.org/W2997530193","https://openalex.org/W4310649982","https://openalex.org/W2942137924","https://openalex.org/W4236344152","https://openalex.org/W4395066784","https://openalex.org/W2011667854","https://openalex.org/W2802117553","https://openalex.org/W2939324531","https://openalex.org/W1589129854","https://openalex.org/W4294104609"],"abstract_inverted_index":{"Data":[0],"security":[1],"has":[2,32],"remained":[3],"a":[4,73,111],"challenging":[5],"problem":[6],"in":[7,11,46,60,80,122,131,186],"cloud":[8],"storage,":[9],"especially":[10],"multiowner":[12,47,81],"data":[13,25,48,56,117,139],"sharing":[14,78],"scenarios.":[15],"As":[16],"one":[17],"of":[18,38,65,167,176,195,204],"the":[19,39,85,91,98,106,116,126,137,144,147,164,173,192,201],"most":[20,37],"effective":[21],"solutions":[22],"for":[23],"secure":[24,77,130],"sharing,":[26,49],"multikeyword":[27],"ranked":[28],"searchable":[29],"encryption":[30],"(MRSE)":[31],"been":[33],"widely":[34],"used.":[35],"However,":[36],"existing":[40],"MRSE":[41],"schemes":[42],"have":[43],"some":[44],"shortcomings":[45],"such":[50],"as":[51],"index":[52,86,150,168,196],"trees":[53],"generated":[54,89],"by":[55,90,170,178,198,206],"owners,":[57],"relevance":[58],"scores":[59],"plaintext":[61],"form,":[62,124],"and":[63,75,119,125,146,172,200],"lack":[64],"verification":[66],"function.":[67],"In":[68],"this":[69],"article,":[70],"we":[71],"propose":[72],"verifiable":[74,96],"efficient":[76],"scheme":[79],"multiuser":[82],"settings,":[83],"where":[84],"tree":[87,151],"is":[88,102,152,184],"trusted":[92],"authority.":[93],"To":[94],"achieve":[95],"functionality,":[97],"blockchain-based":[99],"smart":[100],"contract":[101],"adopted":[103],"to":[104,143,158],"execute":[105],"search":[107,177,205],"algorithm.":[108],"Based":[109],"on":[110],"distributed":[112],"two-trapdoor":[113],"public-key":[114],"cryptosystem,":[115],"uploaded":[118],"used":[120],"are":[121,129,140,156],"ciphertext":[123],"proposed":[127],"algorithms":[128],"our":[132,187],"scheme.":[133],"For":[134],"improving":[135],"efficiency,":[136],"encrypted":[138],"aggregated":[141],"according":[142],"category":[145],"Category":[148],"ID-based":[149],"generated.":[153],"Extensive":[154],"experiments":[155],"conducted":[157],"demonstrate":[159],"that":[160],"it":[161],"can":[162,190],"reduce":[163,191],"time":[165,174,193,202],"cost":[166,175,194,203],"construction":[169,197],"75%":[171],"53%,":[179],"approximately.":[180],"Moreover,":[181],"multithreaded":[182],"optimization":[183],"introduced":[185],"scheme,":[188],"which":[189],"76%":[199],"67%,":[207],"approximately":[208],"(with":[209],"16":[210],"threads).":[211]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
