{"id":"https://openalex.org/W3136156468","doi":"https://doi.org/10.1109/tdsc.2021.3065999","title":"Revocable Attribute-Based Encryption With Data Integrity in Clouds","display_name":"Revocable Attribute-Based Encryption With Data Integrity in Clouds","publication_year":2021,"publication_date":"2021-03-17","ids":{"openalex":"https://openalex.org/W3136156468","doi":"https://doi.org/10.1109/tdsc.2021.3065999","mag":"3136156468"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2021.3065999","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2021.3065999","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058584916","display_name":"Chunpeng Ge","orcid":"https://orcid.org/0000-0003-2629-7220"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["AU","CN"],"is_corresponding":true,"raw_author_name":"Chunpeng Ge","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics, Nanjing, China","State Key Laboratory of Cryptology, Beijing, China","Science and Technology on Parallel and Distributed Processing Laboratory (PDL), Changsha, China","University of Wollongong, Wollongong, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"Science and Technology on Parallel and Distributed Processing Laboratory (PDL), Changsha, China","institution_ids":[]},{"raw_affiliation_string":"University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["University of Wollongong, Wollongong, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088366326","display_name":"Joonsang Baek","orcid":"https://orcid.org/0000-0003-2613-2127"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Joonsang Baek","raw_affiliation_strings":["University of Wollongong, Wollongong, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100462383","display_name":"Zhe Liu","orcid":"https://orcid.org/0000-0003-1313-8327"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhe Liu","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010507369","display_name":"Jinyue Xia","orcid":"https://orcid.org/0000-0003-0089-7033"},"institutions":[{"id":"https://openalex.org/I1341412227","display_name":"IBM (United States)","ror":"https://ror.org/05hh8d621","country_code":"US","type":"company","lineage":["https://openalex.org/I1341412227"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jinyue Xia","raw_affiliation_strings":["IBM, Armonk, NY, USA"],"affiliations":[{"raw_affiliation_string":"IBM, Armonk, NY, USA","institution_ids":["https://openalex.org/I1341412227"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025551938","display_name":"Liming Fang","orcid":"https://orcid.org/0000-0002-1420-2047"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liming Fang","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5058584916"],"corresponding_institution_ids":["https://openalex.org/I204824540","https://openalex.org/I4210132990","https://openalex.org/I9842412"],"apc_list":null,"apc_paid":null,"fwci":19.0338,"has_fulltext":false,"cited_by_count":190,"citation_normalized_percentile":{"value":0.99458504,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"19","issue":"5","first_page":"2864","last_page":"2872"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.8200118541717529},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7666319608688354},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.76044100522995},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.7359110116958618},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7061635255813599},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6504895687103271},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.59458988904953},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5769922137260437},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5020740032196045},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.48784422874450684},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.4788910448551178},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.43729352951049805},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3331804573535919},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.20429494976997375},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.10749125480651855},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.0958276093006134},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08734381198883057}],"concepts":[{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.8200118541717529},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7666319608688354},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.76044100522995},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.7359110116958618},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7061635255813599},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6504895687103271},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.59458988904953},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5769922137260437},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5020740032196045},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.48784422874450684},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.4788910448551178},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.43729352951049805},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3331804573535919},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.20429494976997375},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.10749125480651855},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.0958276093006134},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08734381198883057},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tdsc.2021.3065999","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2021.3065999","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:ro.uow.edu.au:test2021-1968","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/test2021/959","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Test Series for Scopus Harvesting 2021","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G1378608539","display_name":null,"funder_award_id":"62032025","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1384968000","display_name":null,"funder_award_id":"61872181","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2672295408","display_name":null,"funder_award_id":"61702236","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3360831768","display_name":null,"funder_award_id":"62076125","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W66767074","https://openalex.org/W154883872","https://openalex.org/W162787226","https://openalex.org/W165895243","https://openalex.org/W177444027","https://openalex.org/W1496212871","https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1513551553","https://openalex.org/W1558439324","https://openalex.org/W1682451491","https://openalex.org/W1763482972","https://openalex.org/W1904620209","https://openalex.org/W1929627097","https://openalex.org/W1976420017","https://openalex.org/W2034382123","https://openalex.org/W2042220809","https://openalex.org/W2089528989","https://openalex.org/W2100181507","https://openalex.org/W2108072891","https://openalex.org/W2117616411","https://openalex.org/W2138001464","https://openalex.org/W2160390934","https://openalex.org/W2169046918","https://openalex.org/W2186165955","https://openalex.org/W2266882507","https://openalex.org/W2293283622","https://openalex.org/W2530459946","https://openalex.org/W2742523794","https://openalex.org/W2743419166","https://openalex.org/W2789097676","https://openalex.org/W2953513028","https://openalex.org/W3003261738","https://openalex.org/W6631973373","https://openalex.org/W6773801142"],"related_works":["https://openalex.org/W2620043489","https://openalex.org/W2131846073","https://openalex.org/W1589129854","https://openalex.org/W114534093","https://openalex.org/W2383331906","https://openalex.org/W1906282778","https://openalex.org/W1939781145","https://openalex.org/W4292493860","https://openalex.org/W4235894667","https://openalex.org/W2767823571"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,15],"enables":[2],"enterprises":[3],"and":[4,8,186,206,210,223,234],"individuals":[5],"to":[6,39,42,65,73,89,92,138,141],"outsource":[7],"share":[9],"their":[10],"data.":[11],"This":[12],"way,":[13],"cloud":[14,124,152],"eliminates":[16],"the":[17,40,61,66,68,84,99,107,116,123,126,133,142,146,151,175,190,213],"heavy":[18],"workload":[19],"of":[20],"local":[21],"information":[22],"infrastructure.":[23],"Attribute-based":[24],"encryption":[25,178,193],"has":[26],"become":[27],"a":[28,50,93,112,157,170,183,202],"promising":[29],"solution":[30],"for":[31,53,174,189],"encrypted":[32,45,54,62,148],"data":[33,46,55,69,127,195],"access":[34,56,118],"control":[35,57],"in":[36],"clouds":[37],"due":[38],"ability":[41],"achieve":[43],"one-to-many":[44],"sharing.":[47],"Revocation":[48],"is":[49,97,109,120,154,161,232],"critical":[51],"requirement":[52,173],"systems.":[58],"After":[59],"outsourcing":[60],"attribute-based":[63,86,177,192],"ciphertext":[64,87,114,136],"cloud,":[67],"owner":[70],"may":[71],"want":[72],"revoke":[74],"some":[75],"recipients":[76],"that":[77,83,96,132,229],"were":[78],"authorized":[79],"previously,":[80],"which":[81,160,227],"means":[82],"outsourced":[85],"needs":[88],"be":[90,130,139],"updated":[91],"new":[94,113,171],"one":[95],"under":[98,212],"revoked":[100,117],"policy.":[101],"The":[102],"integrity":[103,196,211],"issue":[104],"arises":[105],"when":[106],"revocation":[108],"executed.":[110],"When":[111],"with":[115,194],"policy":[119],"generated":[121,135],"by":[122,156],"server,":[125],"recipient":[128],"cannot":[129],"sure":[131],"newly":[134],"guarantees":[137],"decrypted":[140],"same":[143],"plaintext":[144],"as":[145],"originally":[147],"data,":[149],"since":[150],"server":[153],"provided":[155],"third":[158],"party,":[159],"not":[162],"fully":[163],"trusted.":[164],"In":[165],"this":[166],"article,":[167],"we":[168,200,218],"consider":[169],"security":[172,187,215],"revocable":[176,191],"schemes:":[179],"integrity.":[180],"We":[181],"introduce":[182],"formal":[184],"definition":[185],"model":[188],"protection":[197],"(RABE-DI).":[198],"Then,":[199],"propose":[201],"concrete":[203],"RABE-DI":[204],"scheme":[205,231],"prove":[207],"its":[208],"confidentiality":[209],"defined":[214],"model.":[216],"Finally,":[217],"present":[219],"an":[220],"implementation":[221],"result":[222],"provide":[224],"performance":[225],"evaluation":[226],"shows":[228],"our":[230],"efficient":[233],"practical.":[235]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":50},{"year":2024,"cited_by_count":38},{"year":2023,"cited_by_count":42},{"year":2022,"cited_by_count":40},{"year":2021,"cited_by_count":16}],"updated_date":"2026-03-28T08:17:26.163206","created_date":"2025-10-10T00:00:00"}
