{"id":"https://openalex.org/W7125898332","doi":"https://doi.org/10.1109/smc58881.2025.11343664","title":"An efficient policy-hiding access control scheme for data sharing in mobile health applications","display_name":"An efficient policy-hiding access control scheme for data sharing in mobile health applications","publication_year":2025,"publication_date":"2025-10-05","ids":{"openalex":"https://openalex.org/W7125898332","doi":"https://doi.org/10.1109/smc58881.2025.11343664"},"language":null,"primary_location":{"id":"doi:10.1109/smc58881.2025.11343664","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343664","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123529027","display_name":"Fengling Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210088744","display_name":"Ya'an Polytechnic College","ror":"https://ror.org/00a43vs85","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210088744"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"FengLing Wang","raw_affiliation_strings":["College of Electronic Information and Engineering, Guang&#x2019;an Vocational and Technical College,Guang&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"College of Electronic Information and Engineering, Guang&#x2019;an Vocational and Technical College,Guang&#x2019;an,China","institution_ids":["https://openalex.org/I4210088744"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123534593","display_name":"Qiufa Tian","orcid":null},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"QiuFa Tian","raw_affiliation_strings":["Guangxi Normal University,College of Computer Science and Engineering,Guilin,China"],"affiliations":[{"raw_affiliation_string":"Guangxi Normal University,College of Computer Science and Engineering,Guilin,China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123476049","display_name":"Fenghua Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"FengHua Chen","raw_affiliation_strings":["Guangxi Normal University,College of Computer Science and Engineering,Guilin,China"],"affiliations":[{"raw_affiliation_string":"Guangxi Normal University,College of Computer Science and Engineering,Guilin,China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111268445","display_name":"Mingzhi Yang","orcid":"https://orcid.org/0000-0001-7017-5357"},"institutions":[{"id":"https://openalex.org/I38706770","display_name":"Guilin University of Technology","ror":"https://ror.org/03z391397","country_code":"CN","type":"education","lineage":["https://openalex.org/I38706770"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"MingZhi Yang","raw_affiliation_strings":["Guilin University of Technology,College of Computer Science and Engineering,Guilin,China"],"affiliations":[{"raw_affiliation_string":"Guilin University of Technology,College of Computer Science and Engineering,Guilin,China","institution_ids":["https://openalex.org/I38706770"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050251640","display_name":"Z. F. Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"ZhuHui Chen","raw_affiliation_strings":["Guangxi Normal University,College of Computer Science and Engineering,Guilin,China"],"affiliations":[{"raw_affiliation_string":"Guangxi Normal University,College of Computer Science and Engineering,Guilin,China","institution_ids":["https://openalex.org/I29739308"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111457862","display_name":"W.S. Song","orcid":null},"institutions":[{"id":"https://openalex.org/I38706770","display_name":"Guilin University of Technology","ror":"https://ror.org/03z391397","country_code":"CN","type":"education","lineage":["https://openalex.org/I38706770"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"WeiTong Song","raw_affiliation_strings":["Guilin University of Technology,College of Computer Science and Engineering,Guilin,China"],"affiliations":[{"raw_affiliation_string":"Guilin University of Technology,College of Computer Science and Engineering,Guilin,China","institution_ids":["https://openalex.org/I38706770"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5123529027"],"corresponding_institution_ids":["https://openalex.org/I4210088744"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.87119753,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"7679","last_page":"7684"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9194999933242798,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9194999933242798,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.0203000009059906,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.014600000344216824,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.661899983882904},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.5846999883651733},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5324000120162964},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5139999985694885},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.46070000529289246},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4140999913215637},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3862000107765198},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.38199999928474426},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.3806999921798706},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.3758000135421753}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7608000040054321},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.661899983882904},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6388000249862671},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.5846999883651733},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5324000120162964},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5139999985694885},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.46070000529289246},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.429500013589859},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4140999913215637},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3862000107765198},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.38199999928474426},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.3806999921798706},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3758000135421753},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.37470000982284546},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.374099999666214},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.37279999256134033},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.3637999892234802},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.34769999980926514},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.33889999985694885},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.3215000033378601},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3009999990463257},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.2906999886035919},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.2854999899864197},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.2851000130176544},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.27459999918937683},{"id":"https://openalex.org/C44415380","wikidata":"https://www.wikidata.org/wiki/Q17008721","display_name":"Computer access control","level":3,"score":0.2685999870300293},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.266400009393692},{"id":"https://openalex.org/C127353759","wikidata":"https://www.wikidata.org/wiki/Q6887091","display_name":"Mobile database","level":4,"score":0.26109999418258667},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.260699987411499},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2581000030040741},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2549999952316284}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smc58881.2025.11343664","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343664","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.575310230255127}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1514361308","https://openalex.org/W1977973619","https://openalex.org/W2108072891","https://openalex.org/W2141420453","https://openalex.org/W2764317140","https://openalex.org/W3192165581","https://openalex.org/W4283789173","https://openalex.org/W4306767408","https://openalex.org/W4366202483","https://openalex.org/W4390470916","https://openalex.org/W4392756837","https://openalex.org/W4395703120","https://openalex.org/W4403561165","https://openalex.org/W4406642574","https://openalex.org/W4410156072"],"related_works":[],"abstract_inverted_index":{"Ciphertext-policy":[0],"Attribute-based":[1],"Encryption":[2],"is":[3,57,112,124,161],"pivotal":[4],"to":[5,103,139],"mobile":[6,89,165],"health":[7],"security.":[8],"Research":[9],"on":[10,17,60],"traditional":[11,41,67],"CP-ABE":[12,83],"schemes":[13,42,68],"has":[14],"predominantly":[15],"concentrated":[16],"the":[18,94,127,132,135,151],"security":[19,156],"and":[20,63,143,157,160],"efficiency":[21],"of":[22,51,129],"ciphertext":[23],"data":[24,70,107,130],"sharing,":[25],"whereas":[26],"investigations":[27],"into":[28],"key":[29],"distribution":[30],"remain":[31],"insufficient.":[32],"Moreover,":[33],"access":[34,84,110],"policies":[35],"associated":[36],"with":[37,99],"user":[38,52,61,120],"attributes":[39],"in":[40,46,66],"are":[43],"typically":[44],"transmitted":[45],"plaintext,":[47],"posing":[48],"a":[49,80,100,116],"risk":[50],"privacy":[53],"leakage.":[54],"Furthermore,":[55],"there":[56],"limited":[58],"research":[59],"tracing":[62],"attribute":[64],"revocation":[65],"following":[69],"leakage":[71],"incidents.":[72],"To":[73],"address":[74],"these":[75],"issues,":[76],"this":[77],"paper":[78],"proposes":[79],"multi-secret":[81,96],"sharing":[82,97],"control":[85],"scheme":[86,92,153],"tailored":[87],"for":[88,163],"health.":[90],"The":[91,109],"integrates":[93],"CTM-SS":[95],"algorithm":[98],"multi-authority":[101],"architecture":[102],"achieve":[104],"efficient":[105],"distributed":[106],"sharing.":[108],"policy":[111],"fully":[113],"concealed":[114],"using":[115],"hash":[117],"function.":[118],"A":[119],"identity":[121,136],"mapping":[122,137],"table":[123,138],"constructed.":[125],"In":[126],"event":[128],"leakage,":[131],"regulator":[133],"uses":[134],"trace":[140],"malicious":[141],"users":[142],"revoke":[144],"their":[145],"attributes.":[146],"Simulation":[147],"results":[148],"demonstrate":[149],"that":[150],"proposed":[152],"exhibits":[154],"strong":[155],"performance":[158],"characteristics":[159],"suitable":[162],"real-world":[164],"healthcare":[166],"environments.":[167]},"counts_by_year":[],"updated_date":"2026-01-29T23:17:01.242718","created_date":"2026-01-29T00:00:00"}
