{"id":"https://openalex.org/W2322315143","doi":"https://doi.org/10.1109/tdsc.2015.2423669","title":"Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption","display_name":"Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption","publication_year":2015,"publication_date":"2015-04-16","ids":{"openalex":"https://openalex.org/W2322315143","doi":"https://doi.org/10.1109/tdsc.2015.2423669","mag":"2322315143"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2015.2423669","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2015.2423669","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088188169","display_name":"Xianping Mao","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xianping Mao","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022776169","display_name":"Junzuo Lai","orcid":"https://orcid.org/0000-0001-5780-8463"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junzuo Lai","raw_affiliation_strings":["Department of Computer Science, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086124131","display_name":"Qixiang Mei","orcid":null},"institutions":[{"id":"https://openalex.org/I79223203","display_name":"Guangdong Ocean University","ror":"https://ror.org/0462wa640","country_code":"CN","type":"education","lineage":["https://openalex.org/I79223203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qixiang Mei","raw_affiliation_strings":["College of Information, Guangdong Ocean University, Zhanjiang, China"],"affiliations":[{"raw_affiliation_string":"College of Information, Guangdong Ocean University, Zhanjiang, China","institution_ids":["https://openalex.org/I79223203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101672513","display_name":"Kefei Chen","orcid":"https://orcid.org/0000-0003-1961-5614"},"institutions":[{"id":"https://openalex.org/I163151501","display_name":"Hangzhou Normal University","ror":"https://ror.org/014v1mr15","country_code":"CN","type":"education","lineage":["https://openalex.org/I163151501"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kefei Chen","raw_affiliation_strings":["School of Science, Hangzhou Normal University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Science, Hangzhou Normal University, Hangzhou, China","institution_ids":["https://openalex.org/I163151501"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082041657","display_name":"Jian Weng","orcid":null},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Weng","raw_affiliation_strings":["Department of Computer Science, Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5088188169"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":13.3747,"has_fulltext":false,"cited_by_count":117,"citation_normalized_percentile":{"value":0.98767453,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"13","issue":"5","first_page":"533","last_page":"546"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.8227229118347168},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7661601901054382},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7008242607116699},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.672919511795044},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.644751250743866},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6094930171966553},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6008911728858948},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5476247072219849},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.43942126631736755},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.4308328926563263},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2781541347503662},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.10622096061706543},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.084774911403656},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.07007437944412231},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.06582880020141602}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.8227229118347168},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7661601901054382},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7008242607116699},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.672919511795044},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.644751250743866},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6094930171966553},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6008911728858948},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5476247072219849},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.43942126631736755},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.4308328926563263},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2781541347503662},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.10622096061706543},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.084774911403656},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.07007437944412231},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.06582880020141602},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2015.2423669","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2015.2423669","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1542091479","display_name":null,"funder_award_id":"61472165","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3832705095","display_name":null,"funder_award_id":"61272534","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4644403442","display_name":null,"funder_award_id":"61272413","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6997739720","display_name":null,"funder_award_id":"131066","funder_id":"https://openalex.org/F4320326297","funder_display_name":"Fok Ying Tung Education Foundation"},{"id":"https://openalex.org/G72733087","display_name":null,"funder_award_id":"S2013040014826","funder_id":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province"},{"id":"https://openalex.org/G7440830754","display_name":null,"funder_award_id":"20134401110011","funder_id":"https://openalex.org/F4320336024","funder_display_name":"Specialized Research Fund for the Doctoral Program of Higher Education of China"},{"id":"https://openalex.org/G7632103386","display_name":null,"funder_award_id":"20134401120017","funder_id":"https://openalex.org/F4320336024","funder_display_name":"Specialized Research Fund for the Doctoral Program of Higher Education of China"},{"id":"https://openalex.org/G8696139126","display_name":null,"funder_award_id":"61300226","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G971728831","display_name":null,"funder_award_id":"61133014","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G991654243","display_name":null,"funder_award_id":"NCET-12-0680","funder_id":"https://openalex.org/F4320334924","funder_display_name":"Program for New Century Excellent Talents in University"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321921","display_name":"Natural Science Foundation of Guangdong Province","ror":null},{"id":"https://openalex.org/F4320326297","display_name":"Fok Ying Tung Education Foundation","ror":null},{"id":"https://openalex.org/F4320334924","display_name":"Program for New Century Excellent Talents in University","ror":"https://ror.org/01mv9t934"},{"id":"https://openalex.org/F4320336024","display_name":"Specialized Research Fund for the Doctoral Program of Higher Education of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W17575016","https://openalex.org/W36535589","https://openalex.org/W66767074","https://openalex.org/W70096886","https://openalex.org/W86792954","https://openalex.org/W177444027","https://openalex.org/W1484539941","https://openalex.org/W1486107224","https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1557386445","https://openalex.org/W1607264302","https://openalex.org/W1682451491","https://openalex.org/W1724472458","https://openalex.org/W1763482972","https://openalex.org/W1885156594","https://openalex.org/W1956848448","https://openalex.org/W1974267799","https://openalex.org/W1976420017","https://openalex.org/W1998586673","https://openalex.org/W2002930326","https://openalex.org/W2031533839","https://openalex.org/W2034382123","https://openalex.org/W2042220809","https://openalex.org/W2044772384","https://openalex.org/W2076046175","https://openalex.org/W2078590992","https://openalex.org/W2101238246","https://openalex.org/W2108072891","https://openalex.org/W2116653107","https://openalex.org/W2138001464","https://openalex.org/W2146095252","https://openalex.org/W2161214158","https://openalex.org/W2169046918","https://openalex.org/W2186247005","https://openalex.org/W6600724108","https://openalex.org/W6602693359","https://openalex.org/W6602830368","https://openalex.org/W6607134063","https://openalex.org/W6629862473","https://openalex.org/W6637293744","https://openalex.org/W6643897999","https://openalex.org/W6686348237"],"related_works":["https://openalex.org/W2131846073","https://openalex.org/W4372269058","https://openalex.org/W114534093","https://openalex.org/W2383331906","https://openalex.org/W361351722","https://openalex.org/W4223919663","https://openalex.org/W1513098086","https://openalex.org/W2030246973","https://openalex.org/W2955754585","https://openalex.org/W2243922572"],"abstract_inverted_index":{"Attribute-based":[0],"encryption":[1],"(ABE)":[2],"provides":[3],"a":[4,50,55],"mechanism":[5],"for":[6],"complex":[7],"access":[8,32],"control":[9],"over":[10],"encrypted":[11,97],"data.":[12],"However":[13],"in":[14,38,139,176,183],"most":[15],"ABE":[16,47,76,120,128],"systems,":[17],"the":[18,22,28,31,63,72,89,96,100,103,140,158,173,177],"ciphertext":[19,167],"size":[20],"and":[21,83,99,118,143,168],"decryption":[23,45,79,105,125],"overhead,":[24],"which":[25,188],"grow":[26],"with":[27,77,122,129,157],"complexity":[29],"of":[30,46,75,102,116,148,193],"policy,":[33],"are":[34],"becoming":[35],"critical":[36],"barriers":[37],"applications":[39],"running":[40],"on":[41],"resource-limited":[42],"devices.":[43],"Outsourcing":[44],"ciphertexts":[48],"to":[49,58,69,108,191],"powerful":[51],"third":[52,64,90],"party":[53,65,91],"is":[54,66,106],"reasonable":[56],"manner":[57],"solve":[59],"this":[60,149],"problem.":[61],"Since":[62],"usually":[67],"believed":[68],"be":[70,109,181,192],"untrusted,":[71],"security":[73],"requirements":[74],"outsourced":[78,104,124,130],"should":[80,92],"include":[81],"privacy":[82],"verifiability.":[84],"Namely,":[85],"any":[86],"adversary":[87],"including":[88],"learn":[93],"nothing":[94],"about":[95],"message,":[98],"correctness":[101],"supposed":[107],"verified":[110],"efficiently.":[111],"We":[112,133],"propose":[113],"generic":[114],"constructions":[115],"CPA-secure":[117,127,137,162],"RCCA-secure":[119,178],"systems":[121],"verifiable":[123],"from":[126],"decryption,":[131],"respectively.":[132],"also":[134],"instantiate":[135],"our":[136,161],"construction":[138,163,179],"standard":[141],"model":[142],"then":[144],"show":[145,154],"an":[146],"implementation":[147],"instantiation.":[150],"The":[151],"experimental":[152],"results":[153],"that,":[155],"compared":[156],"existing":[159],"scheme,":[160],"has":[164],"more":[165],"compact":[166],"less":[169],"computational":[170],"costs.":[171],"Moreover,":[172],"techniques":[174],"involved":[175],"can":[180],"applied":[182],"generally":[184],"constructing":[185],"CCA-secure":[186],"ABE,":[187],"we":[189],"believe":[190],"independent":[194],"interest.":[195]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":14},{"year":2021,"cited_by_count":13},{"year":2020,"cited_by_count":13},{"year":2019,"cited_by_count":20},{"year":2018,"cited_by_count":15},{"year":2017,"cited_by_count":12},{"year":2016,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
