{"id":"https://openalex.org/W2343459945","doi":"https://doi.org/10.1109/tcc.2015.2440247","title":"Attribute-Based Access Control with Constant-Size Ciphertext in Cloud Computing","display_name":"Attribute-Based Access Control with Constant-Size Ciphertext in Cloud Computing","publication_year":2015,"publication_date":"2015-06-03","ids":{"openalex":"https://openalex.org/W2343459945","doi":"https://doi.org/10.1109/tcc.2015.2440247","mag":"2343459945"},"language":"en","primary_location":{"id":"doi:10.1109/tcc.2015.2440247","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2015.2440247","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/Attribute-based_access_control_with_constant-size_ciphertext_in_cloud_computing/20819674","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026595267","display_name":"Wei Teng","orcid":"https://orcid.org/0000-0003-1380-9207"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]},{"id":"https://openalex.org/I4210096899","display_name":"Jiangsu University of Science and Technology","ror":"https://ror.org/00tyjp878","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210096899"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Teng","raw_affiliation_strings":["College of Computer Science Engineering, Jiangsu University of Science & Technology, Zhenjiang, China","College of Telecommunications & Information Engineering, Nanjing University of Posts & Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science Engineering, Jiangsu University of Science & Technology, Zhenjiang, China","institution_ids":["https://openalex.org/I4210096899"]},{"raw_affiliation_string":"College of Telecommunications & Information Engineering, Nanjing University of Posts & Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101848201","display_name":"Geng Yang","orcid":"https://orcid.org/0000-0001-7740-2401"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Geng Yang","raw_affiliation_strings":["Graduate School, Nanjing University of Posts Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Graduate School, Nanjing University of Posts Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100666554","display_name":"Yang Xiang","orcid":"https://orcid.org/0000-0001-5252-0831"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yang Xiang","raw_affiliation_strings":["Network Security and Computing Lab, Deakin University, 221 Burwood Highway, Burwood, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Network Security and Computing Lab, Deakin University, 221 Burwood Highway, Burwood, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100458354","display_name":"Ting Zhang","orcid":"https://orcid.org/0009-0008-8621-3598"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ting Zhang","raw_affiliation_strings":["College of Telecommunications & Information Engineering, Nanjing University of Posts & Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Telecommunications & Information Engineering, Nanjing University of Posts & Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100343182","display_name":"Dongyang Wang","orcid":"https://orcid.org/0000-0001-9468-173X"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongyang Wang","raw_affiliation_strings":["College of Telecommunications & Information Engineering, Nanjing University of Posts & Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Telecommunications & Information Engineering, Nanjing University of Posts & Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5026595267"],"corresponding_institution_ids":["https://openalex.org/I41198531","https://openalex.org/I4210096899"],"apc_list":null,"apc_paid":null,"fwci":7.1215,"has_fulltext":false,"cited_by_count":72,"citation_normalized_percentile":{"value":0.9706995,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"5","issue":"4","first_page":"617","last_page":"627"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.8241065144538879},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7535591125488281},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7447373867034912},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6891219615936279},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.6848016977310181},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.604388415813446},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.512279212474823},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.4788115620613098},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4612746238708496},{"id":"https://openalex.org/keywords/bilinear-interpolation","display_name":"Bilinear interpolation","score":0.4606575667858124},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.4341297745704651},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.39704424142837524},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.31344419717788696},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3049895763397217},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.21038898825645447},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1371745765209198}],"concepts":[{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.8241065144538879},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7535591125488281},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7447373867034912},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6891219615936279},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.6848016977310181},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.604388415813446},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.512279212474823},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.4788115620613098},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4612746238708496},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.4606575667858124},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.4341297745704651},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.39704424142837524},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.31344419717788696},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3049895763397217},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.21038898825645447},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1371745765209198},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tcc.2015.2440247","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2015.2440247","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30111997","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402457","display_name":"Deakin Research Online (Deakin University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:figshare.com:article/20819674","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Attribute-based_access_control_with_constant-size_ciphertext_in_cloud_computing/20819674","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20819674","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Attribute-based_access_control_with_constant-size_ciphertext_in_cloud_computing/20819674","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.49000000953674316,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G3082461833","display_name":null,"funder_award_id":"2011M500095","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G628348938","display_name":null,"funder_award_id":"61272084","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7381254105","display_name":null,"funder_award_id":"61202004","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W123899820","https://openalex.org/W183416985","https://openalex.org/W1496212871","https://openalex.org/W1498316612","https://openalex.org/W1513098086","https://openalex.org/W1558439324","https://openalex.org/W1569083856","https://openalex.org/W1576892942","https://openalex.org/W1763482972","https://openalex.org/W1890078278","https://openalex.org/W1904620209","https://openalex.org/W1991895580","https://openalex.org/W1993341076","https://openalex.org/W2014671777","https://openalex.org/W2021371127","https://openalex.org/W2028500276","https://openalex.org/W2050322947","https://openalex.org/W2073975994","https://openalex.org/W2076965705","https://openalex.org/W2086042811","https://openalex.org/W2088645726","https://openalex.org/W2094873755","https://openalex.org/W2108072891","https://openalex.org/W2116556172","https://openalex.org/W2116626915","https://openalex.org/W2125871822","https://openalex.org/W2134296086","https://openalex.org/W2138001464","https://openalex.org/W2139972841","https://openalex.org/W2147419555","https://openalex.org/W2152924492","https://openalex.org/W2160262242","https://openalex.org/W2166602595","https://openalex.org/W6607473853","https://openalex.org/W6629862473","https://openalex.org/W6671828919","https://openalex.org/W6680035254","https://openalex.org/W6680187243"],"related_works":["https://openalex.org/W2131846073","https://openalex.org/W114534093","https://openalex.org/W2383331906","https://openalex.org/W2015940479","https://openalex.org/W1906282778","https://openalex.org/W4388469158","https://openalex.org/W1939781145","https://openalex.org/W165895243","https://openalex.org/W1558439324","https://openalex.org/W2809908797"],"abstract_inverted_index":{"With":[0],"the":[1,17,90,95,117,125,136,143,163],"popularity":[2],"of":[3,42,92,97,121,129,139],"cloud":[4,18,70,180],"computing,":[5],"there":[6],"have":[7,27],"been":[8],"increasing":[9],"concerns":[10],"about":[11],"its":[12,157],"security":[13,141],"and":[14,23,94,111,127,155,169],"privacy.":[15],"Since":[16],"computing":[19],"environment":[20,48],"is":[21,49,61,87,114,138,166],"distributed":[22],"untrusted,":[24],"data":[25,31,44,178],"owners":[26],"to":[28,32,37,55,101],"encrypt":[29],"outsourced":[30,177],"enforce":[33],"confidentiality.":[34],"Therefore,":[35],"how":[36],"achieve":[38],"practicable":[39],"access":[40,67,79,174],"control":[41,68,80,175],"encrypted":[43],"in":[45,69,109,171,179],"an":[46,50],"untrusted":[47],"urgent":[51],"issue":[52],"that":[53],"needs":[54],"be":[56],"solved.":[57],"Attribute-based":[58],"encryption":[59,110],"(ABE)":[60],"a":[62,76,102,130],"promising":[63],"scheme":[64,81,86,123,137,154,165],"suitable":[65],"for":[66,176],"storage":[71],"systems.":[72],"This":[73],"paper":[74],"proposes":[75],"hierarchical":[77,118],"attribute-based":[78],"with":[82,173],"constant-size":[83],"ciphertext.":[84],"The":[85,159],"efficient":[88],"because":[89],"length":[91],"ciphertext":[93],"number":[96],"bilinear":[98],"pairing":[99],"evaluations":[100],"constant":[103],"are":[104],"fixed.":[105],"Its":[106],"computation":[107],"cost":[108],"decryption":[112],"algorithms":[113],"low.":[115],"Moreover,":[116],"authorization":[119],"structure":[120],"our":[122,153],"reduces":[124],"burden":[126],"risk":[128],"single":[131],"authority":[132],"scenario.":[133],"We":[134],"prove":[135],"CCA2":[140],"under":[142],"decisional":[144],"q-Bilinear":[145],"Diffie-Hellman":[146],"Exponent":[147],"assumption.":[148],"In":[149],"addition,":[150],"we":[151],"implement":[152],"analyse":[156],"performance.":[158],"analysis":[160],"results":[161],"show":[162],"proposed":[164],"efficient,":[167],"scalable,":[168],"fine-grained":[170],"dealing":[172],"computing.":[181]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":16},{"year":2019,"cited_by_count":10},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
