{"id":"https://openalex.org/W4415706974","doi":"https://doi.org/10.1109/tdsc.2025.3627278","title":"Unified Attribute-Based Data Access Control With Hiding Attribute Value Under PINet","display_name":"Unified Attribute-Based Data Access Control With Hiding Attribute Value Under PINet","publication_year":2025,"publication_date":"2025-10-30","ids":{"openalex":"https://openalex.org/W4415706974","doi":"https://doi.org/10.1109/tdsc.2025.3627278"},"language":null,"primary_location":{"id":"doi:10.1109/tdsc.2025.3627278","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3627278","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101661388","display_name":"Wenyuan Yang","orcid":"https://orcid.org/0000-0003-0046-5994"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenyuan Yang","raw_affiliation_strings":["School of Cyber Science and Technology, Sun Yat-sen University, Shenzhen, China","School of Cyber Science and Technology, Sun Yat-sen University, Shenzhen, Guangdong, China"],"raw_orcid":"https://orcid.org/0000-0003-0046-5994","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Sun Yat-sen University, Shenzhen, China","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Sun Yat-sen University, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102514692","display_name":"Yuguo Yin","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuguo Yin","raw_affiliation_strings":["School of Electronics Engineering and Computer Science, Peking University, Beijing, China","School of Electronics Engineering and Computer Science, Peking University, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Electronics Engineering and Computer Science, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]},{"raw_affiliation_string":"School of Electronics Engineering and Computer Science, Peking University, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103234911","display_name":"Shaocong Wu","orcid":"https://orcid.org/0000-0003-4542-9719"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shaocong Wu","raw_affiliation_strings":["Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xin Yang","orcid":"https://orcid.org/0000-0001-6813-7677"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I4210162190","display_name":"China University of Petroleum, East China","ror":"https://ror.org/05gbn2817","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210162190"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Yang","raw_affiliation_strings":["Qingdao Institute of Software College of Computer Science and Technology, China University of Petroleum (East China), Qingdao, China","Qingdao Institute of Software College of Computer Science and Technology, China University of Petroleum (East China), Qingdao, Shandong, China"],"raw_orcid":"https://orcid.org/0000-0001-6813-7677","affiliations":[{"raw_affiliation_string":"Qingdao Institute of Software College of Computer Science and Technology, China University of Petroleum (East China), Qingdao, China","institution_ids":["https://openalex.org/I4210162190","https://openalex.org/I4210128818"]},{"raw_affiliation_string":"Qingdao Institute of Software College of Computer Science and Technology, China University of Petroleum (East China), Qingdao, Shandong, China","institution_ids":["https://openalex.org/I4210162190","https://openalex.org/I4210128818"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072485378","display_name":"Zhongjie Ba","orcid":"https://orcid.org/0000-0003-0921-8869"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhongjie Ba","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China","State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China"],"raw_orcid":"https://orcid.org/0000-0003-0921-8869","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105297718","display_name":"Kui Ren","orcid":"https://orcid.org/0000-0002-1969-2591"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kui Ren","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China","State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China"],"raw_orcid":"https://orcid.org/0000-0002-1969-2591","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101661388"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.32976864,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"2","first_page":"2354","last_page":"2370"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.33410000801086426,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.33410000801086426,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.2565999925136566,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.08889999985694885,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6481000185012817},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5748000144958496},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.5102999806404114},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.46709999442100525},{"id":"https://openalex.org/keywords/computer-access-control","display_name":"Computer access control","score":0.46369999647140503},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.43130001425743103},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.42750000953674316},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.37700000405311584},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.36880001425743103}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8544999957084656},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6481000185012817},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6245999932289124},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5748000144958496},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.5102999806404114},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5013999938964844},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.46709999442100525},{"id":"https://openalex.org/C44415380","wikidata":"https://www.wikidata.org/wiki/Q17008721","display_name":"Computer access control","level":3,"score":0.46369999647140503},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.43130001425743103},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.42750000953674316},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.37700000405311584},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.36880001425743103},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.3481000065803528},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.3199999928474426},{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.31869998574256897},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3158000111579895},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.31369999051094055},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.31369999051094055},{"id":"https://openalex.org/C62793504","wikidata":"https://www.wikidata.org/wiki/Q228327","display_name":"Access network","level":2,"score":0.30489999055862427},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3043999969959259},{"id":"https://openalex.org/C2778950925","wikidata":"https://www.wikidata.org/wiki/Q4672474","display_name":"Access structure","level":4,"score":0.28619998693466187},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.28220000863075256},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.2712000012397766},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.27000001072883606},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.2599000036716461},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2554999887943268},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.25380000472068787},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2529999911785126},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.2522999942302704}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3627278","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3627278","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G151971070","display_name":null,"funder_award_id":"62402535","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5539381990","display_name":null,"funder_award_id":"2024A1515011887","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"},{"id":"https://openalex.org/G7168659575","display_name":null,"funder_award_id":"231104719270153","funder_id":"https://openalex.org/F4320312071","funder_display_name":"Ministry of Education, Libya"}],"funders":[{"id":"https://openalex.org/F4320312071","display_name":"Ministry of Education, Libya","ror":"https://ror.org/02w030k33"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320337111","display_name":"Basic and Applied Basic Research Foundation of Guangdong Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W51265332","https://openalex.org/W1484751769","https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1513551553","https://openalex.org/W1974232544","https://openalex.org/W1994192343","https://openalex.org/W2040340473","https://openalex.org/W2052267638","https://openalex.org/W2108072891","https://openalex.org/W2109983959","https://openalex.org/W2110722699","https://openalex.org/W2113976134","https://openalex.org/W2114103190","https://openalex.org/W2117616411","https://openalex.org/W2118903905","https://openalex.org/W2138001464","https://openalex.org/W2141897960","https://openalex.org/W2155903900","https://openalex.org/W2164988972","https://openalex.org/W2293283622","https://openalex.org/W2328136677","https://openalex.org/W2407215383","https://openalex.org/W2598311158","https://openalex.org/W2788404774","https://openalex.org/W2913048961","https://openalex.org/W2921334412","https://openalex.org/W2941092634","https://openalex.org/W2946102956","https://openalex.org/W3038322915","https://openalex.org/W3108380369","https://openalex.org/W3131406583","https://openalex.org/W3182147107","https://openalex.org/W4212797794","https://openalex.org/W4287094557","https://openalex.org/W4308493180","https://openalex.org/W4360897402","https://openalex.org/W4377079727","https://openalex.org/W4384026613","https://openalex.org/W4384948766","https://openalex.org/W4385654454","https://openalex.org/W4388269045","https://openalex.org/W4388505035","https://openalex.org/W4392173889","https://openalex.org/W4399205525","https://openalex.org/W4400878369","https://openalex.org/W4400903658"],"related_works":[],"abstract_inverted_index":{"The":[0,89,131],"Polymorphic":[1],"Network":[2],"(PINet)":[3],"is":[4,39,135,156],"a":[5,55],"future":[6,145],"network":[7,14,146],"architecture":[8],"that":[9,104,154,172],"can":[10,140],"dynamically":[11],"load":[12],"multiple":[13],"modalities":[15],"(NM),":[16],"solving":[17],"the":[18,28,115,159,165,175,184,192],"rigidity":[19],"and":[20,32,77,96,109,139,181,183],"single":[21],"IP":[22],"bearer":[23],"problem.":[24],"However,":[25],"due":[26],"to":[27,41,122,143],"different":[29,48],"design":[30,83,90],"concepts":[31],"protocol":[33],"stacks":[34],"of":[35,91,125,178],"each":[36],"NM,":[37],"it":[38],"challenging":[40],"provide":[42],"compatible":[43],"data":[44,58],"access":[45,59,68,80,102,126],"control":[46,60,69,103],"for":[47],"NMs.":[49,130],"In":[50],"this":[51],"paper,":[52],"we":[53],"propose":[54],"unified":[56],"attribute-based":[57],"framework":[61,65],"within":[62],"PINet.":[63,150],"This":[64],"ensures":[66],"consistent":[67],"across":[70],"NMs":[71],"by":[72,188],"managing":[73],"user":[74],"attribute":[75,93,107],"identifiers":[76],"seamlessly":[78],"integrating":[79],"policies.":[81],"We":[82,112],"Span-hiding":[84],"Cipher-policy":[85],"Attribute-based":[86],"Encryption":[87],"(SHCP-ABE).":[88],"span":[92],"cuckoo":[94],"filter":[95],"two-round":[97],"encryption":[98],"in":[99,120],"SHCP-ABE":[100,121,133,155,173],"implements":[101],"supports":[105],"comparing":[106],"values":[108],"policy":[110,127],"hiding.":[111],"further":[113],"modified":[114],"linear":[116],"secret":[117],"sharing":[118],"scheme":[119,134],"achieve":[123],"isolation":[124],"information":[128],"among":[129],"proposed":[132],"unified,":[136],"fine-grained,":[137],"privacy-preserving,":[138],"effectively":[141],"adapt":[142],"heterogeneous":[144],"architectures":[147],"such":[148],"as":[149],"Security":[151],"analysis":[152],"shows":[153],"secure":[157],"against":[158],"adaptive":[160],"chosen":[161],"plaintext":[162],"attack":[163],"under":[164],"generic":[166],"group":[167],"model.":[168],"Experimental":[169],"results":[170],"show":[171],"reduces":[174],"time":[176],"overhead":[177,187],"key":[179,185],"generation":[180],"decryption":[182],"storage":[186],"about":[189],"50%":[190],"over":[191],"existing":[193],"comparable":[194],"CP-ABE":[195],"scheme,":[196],"providing":[197],"excellent":[198],"efficiency.":[199]},"counts_by_year":[],"updated_date":"2026-03-17T06:59:57.516163","created_date":"2025-10-30T00:00:00"}
