{"id":"https://openalex.org/W3159116648","doi":"https://doi.org/10.1109/tdsc.2021.3076580","title":"A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds","display_name":"A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds","publication_year":2021,"publication_date":"2021-04-29","ids":{"openalex":"https://openalex.org/W3159116648","doi":"https://doi.org/10.1109/tdsc.2021.3076580","mag":"3159116648"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2021.3076580","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2021.3076580","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058584916","display_name":"Chunpeng Ge","orcid":"https://orcid.org/0000-0003-2629-7220"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I56934997","display_name":"Changsha University of Science and Technology","ror":"https://ror.org/03yph8055","country_code":"CN","type":"education","lineage":["https://openalex.org/I56934997"]},{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["AU","CN"],"is_corresponding":true,"raw_author_name":"Chunpeng Ge","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","State Key Laboratory of Cryptology, Beijing, China","School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia","Science and Technology on Parallel and Distributed Processing Laboratory, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Science and Technology on Parallel and Distributed Processing Laboratory, Changsha, China","institution_ids":["https://openalex.org/I56934997"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088366326","display_name":"Joonsang Baek","orcid":"https://orcid.org/0000-0003-2613-2127"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Joonsang Baek","raw_affiliation_strings":["School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100462347","display_name":"Zhe Liu","orcid":"https://orcid.org/0000-0001-8578-2635"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhe Liu","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","State Key Laboratory of Cryptology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010507369","display_name":"Jinyue Xia","orcid":"https://orcid.org/0000-0003-0089-7033"},"institutions":[{"id":"https://openalex.org/I1341412227","display_name":"IBM (United States)","ror":"https://ror.org/05hh8d621","country_code":"US","type":"company","lineage":["https://openalex.org/I1341412227"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jinyue Xia","raw_affiliation_strings":["IBM, Durham, NC, USA"],"affiliations":[{"raw_affiliation_string":"IBM, Durham, NC, USA","institution_ids":["https://openalex.org/I1341412227"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025551938","display_name":"Liming Fang","orcid":"https://orcid.org/0000-0002-1420-2047"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liming Fang","raw_affiliation_strings":["College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5058584916"],"corresponding_institution_ids":["https://openalex.org/I204824540","https://openalex.org/I4210132990","https://openalex.org/I56934997","https://openalex.org/I9842412"],"apc_list":null,"apc_paid":null,"fwci":15.9114,"has_fulltext":false,"cited_by_count":161,"citation_normalized_percentile":{"value":0.99272842,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"19","issue":"5","first_page":"2907","last_page":"2919"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.8873871564865112},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.7882727384567261},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.784318208694458},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5989599823951721},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.5512991547584534},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5341882705688477},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4989168643951416},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46868306398391724},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3567882180213928},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2130274772644043},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08305159211158752},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07709851861000061}],"concepts":[{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.8873871564865112},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.7882727384567261},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.784318208694458},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5989599823951721},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.5512991547584534},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5341882705688477},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4989168643951416},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46868306398391724},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3567882180213928},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2130274772644043},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08305159211158752},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07709851861000061},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tdsc.2021.3076580","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2021.3076580","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:ro.uow.edu.au:test2021-2451","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/test2021/1442","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Test Series for Scopus Harvesting 2021","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1108545603","display_name":null,"funder_award_id":"DP180100665","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"}],"funders":[{"id":"https://openalex.org/F4320334704","display_name":"Australian Research Council","ror":"https://ror.org/05mmh0f86"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W66767074","https://openalex.org/W154883872","https://openalex.org/W165895243","https://openalex.org/W177444027","https://openalex.org/W1496212871","https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1513551553","https://openalex.org/W1533406869","https://openalex.org/W1558439324","https://openalex.org/W1590823599","https://openalex.org/W1720304360","https://openalex.org/W1904620209","https://openalex.org/W1974267799","https://openalex.org/W1993032872","https://openalex.org/W2014143000","https://openalex.org/W2034382123","https://openalex.org/W2067095453","https://openalex.org/W2093909024","https://openalex.org/W2100181507","https://openalex.org/W2108072891","https://openalex.org/W2114428623","https://openalex.org/W2117616411","https://openalex.org/W2138001464","https://openalex.org/W2165257856","https://openalex.org/W2186165955","https://openalex.org/W2211454349","https://openalex.org/W2266882507","https://openalex.org/W2293283622","https://openalex.org/W2342723683","https://openalex.org/W2530459946","https://openalex.org/W2789097676","https://openalex.org/W2981797988","https://openalex.org/W2997854921","https://openalex.org/W6631973373"],"related_works":["https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W2072918937","https://openalex.org/W2365629437","https://openalex.org/W2023935927","https://openalex.org/W2068013785","https://openalex.org/W2370868004","https://openalex.org/W2158897804","https://openalex.org/W2286370870","https://openalex.org/W3173222018"],"abstract_inverted_index":{"To":[0],"manage":[1],"outsourced":[2],"encrypted":[3],"data":[4],"sharing":[5],"in":[6],"clouds,":[7],"attribute-based":[8,105],"proxy":[9,106],"re-encryption":[10,107,152],"(ABPRE)":[11],"has":[12,148],"become":[13],"an":[14,24,48,68],"elegant":[15],"primitive.":[16],"In":[17,97],"ABPRE,":[18],"a":[19,29,33,42,58,90,100,120,139,158],"cloud":[20,44,64,81,140],"server":[21,45,65,132,141],"can":[22],"transform":[23],"original":[25],"recipient\u2019s":[26],"ciphertext":[27,51,71,128],"to":[28,52,72,74,92,112,123,161],"new":[30,169],"one":[31],"of":[32,66,78,167],"shared":[34,59,121],"user\u2019s.":[35],"As":[36],"the":[37,63,76,80,126,131,136,151,163,168],"transformation":[38],"is":[39,110,133],"computation":[40,55],"consuming,":[41],"malicious":[43,144],"may":[46,61],"return":[47],"incorrect":[49,69],"re-encrypted":[50,70,127],"save":[53],"its":[54],"resources.":[56],"Moreover,":[57],"user":[60,122],"accuse":[62],"returning":[67],"refuse":[73],"pay":[75],"cost":[77],"using":[79],"service.":[82],"However,":[83],"existing":[84],"ABPRE":[85],"schemes":[86],"do":[87],"not":[88],"support":[89,113],"mechanism":[91],"achieve":[93],"verifiability":[94,114,118],"and":[95,103,115,135,165],"fairness.":[96,116],"this":[98],"article,":[99],"novel":[101],"verifiable":[102],"fair":[104],"(VF-ABPRE)":[108],"scheme":[109],"introduced":[111],"The":[117],"enables":[119],"verify":[124],"whether":[125],"returned":[129],"by":[130],"correct":[134],"fairness":[137],"ensures":[138],"escape":[142],"from":[143],"accusation":[145],"if":[146],"it":[147],"indeed":[149],"conducted":[150],"operation":[153],"honestly.":[154],"Additionally,":[155],"we":[156],"conduct":[157],"performance":[159],"experiment":[160],"show":[162],"efficiency":[164],"practicality":[166],"VF-ABPRE":[170],"scheme.":[171]},"counts_by_year":[{"year":2026,"cited_by_count":7},{"year":2025,"cited_by_count":41},{"year":2024,"cited_by_count":36},{"year":2023,"cited_by_count":33},{"year":2022,"cited_by_count":34},{"year":2021,"cited_by_count":10}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
