{"id":"https://openalex.org/W4400810251","doi":"https://doi.org/10.1109/tdsc.2024.3431035","title":"PM-ABE: Puncturable Bilateral Fine-Grained Access Control From Lattices for Secret Sharing","display_name":"PM-ABE: Puncturable Bilateral Fine-Grained Access Control From Lattices for Secret Sharing","publication_year":2024,"publication_date":"2024-07-19","ids":{"openalex":"https://openalex.org/W4400810251","doi":"https://doi.org/10.1109/tdsc.2024.3431035"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2024.3431035","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3431035","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100970215","display_name":"Mengxue Yang","orcid":"https://orcid.org/0009-0004-3757-307X"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mengxue Yang","raw_affiliation_strings":["College of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082859576","display_name":"Huaqun Wang","orcid":"https://orcid.org/0000-0001-7254-6465"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaqun Wang","raw_affiliation_strings":["College of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100970215"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":3.058,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.92336603,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"22","issue":"2","first_page":"1210","last_page":"1223"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9835000038146973,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.963699996471405,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.45490795373916626},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.45145168900489807},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.44595271348953247},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.29427042603492737},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22852635383605957},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.12725508213043213}],"concepts":[{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.45490795373916626},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.45145168900489807},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.44595271348953247},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.29427042603492737},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22852635383605957},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.12725508213043213}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2024.3431035","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3431035","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4000000059604645,"id":"https://metadata.un.org/sdg/2","display_name":"Zero hunger"}],"awards":[{"id":"https://openalex.org/G2080849955","display_name":null,"funder_award_id":"U23B2002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7876586153","display_name":null,"funder_award_id":"62272238","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1498316612","https://openalex.org/W1520227725","https://openalex.org/W1537360597","https://openalex.org/W1568885723","https://openalex.org/W1839785783","https://openalex.org/W1976157784","https://openalex.org/W2058785578","https://openalex.org/W2061949491","https://openalex.org/W2108072891","https://openalex.org/W2122973102","https://openalex.org/W2136757778","https://openalex.org/W2138001464","https://openalex.org/W2210642187","https://openalex.org/W2284387326","https://openalex.org/W2552993029","https://openalex.org/W2943600914","https://openalex.org/W2952370845","https://openalex.org/W2979952026","https://openalex.org/W3006203549","https://openalex.org/W3035024380","https://openalex.org/W4206331936","https://openalex.org/W4283078801","https://openalex.org/W4385945581","https://openalex.org/W6631784476","https://openalex.org/W6686596797"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"In":[0],"the":[1,9,14,61,78,93,104,124],"era":[2],"of":[3,11,17,60,63,107,161],"flourishing":[4],"sustainable":[5],"smart":[6],"cities,":[7],"with":[8],"accessibility":[10],"Internet":[12],"and":[13,29,66,123,141,164],"persistent":[15],"evolution":[16],"distributed":[18],"computing,":[19],"there":[20],"is":[21],"an":[22],"increasing":[23],"reliance":[24],"on":[25,86],"cloud/fog":[26],"computing":[27],"environments":[28],"online":[30],"data":[31,36],"storage":[32,165],"platforms":[33],"for":[34,69,103],"secure":[35,105],"sharing.":[37,109],"However,":[38],"existing":[39],"cryptographic":[40],"schemes":[41],"fall":[42],"short":[43],"in":[44],"simultaneously":[45],"satisfying":[46],"security":[47,68,96],"requirements":[48,97],"such":[49],"as":[50],"bilateral":[51],"fine-grained":[52],"access":[53,125],"control,":[54],"resilience":[55,132],"to":[56,113],"quantum":[57,134],"attacks,":[58,135,137],"assurance":[59,102],"authenticity":[62],"decrypted":[64],"data,":[65],"forward":[67],"historical":[70],"data.":[71],"To":[72],"tackle":[73],"these":[74],"challenges,":[75],"we":[76],"propose":[77],"innovative":[79],"puncturable":[80],"attribute-based":[81],"matchmaking":[82],"encryption":[83],"scheme":[84,129,156],"based":[85],"lattice":[87],"cryptography.":[88],"The":[89,110],"method":[90],"adeptly":[91],"satisfies":[92],"aforementioned":[94],"stringent":[95],"concurrently,":[98],"offering":[99],"a":[100,158],"triple-layered":[101],"implementation":[106],"secret":[108],"receiver,":[111],"unable":[112],"successfully":[114],"decrypt,":[115],"remains":[116],"uninformed":[117],"about":[118],"any":[119],"specifics":[120],"regarding":[121],"ciphertexts":[122],"policy.":[126],"Our":[127],"PM-ABE":[128],"has":[130],"manifested":[131],"against":[133],"collusion":[136],"chosen":[138,145],"plaintext":[139],"attacks":[140],"ensuring":[142],"unforgeability":[143],"under":[144],"message":[146],"attacks.":[147],"Furthermore,":[148],"our":[149,155],"comprehensive":[150],"efficiency":[151,163],"analysis":[152],"substantiates":[153],"that":[154],"maintains":[157],"favorable":[159],"level":[160],"computational":[162],"consumption.":[166]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-12T07:58:50.170612","created_date":"2025-10-10T00:00:00"}
