{"id":"https://openalex.org/W2060583899","doi":"https://doi.org/10.1109/tifs.2014.2346023","title":"A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing","display_name":"A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing","publication_year":2014,"publication_date":"2014-08-07","ids":{"openalex":"https://openalex.org/W2060583899","doi":"https://doi.org/10.1109/tifs.2014.2346023","mag":"2060583899"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2014.2346023","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2346023","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001485404","display_name":"Kaitai Liang","orcid":"https://orcid.org/0000-0003-0262-7678"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Kaitai Liang","raw_affiliation_strings":["Department of Computer Science, City University of Hong Kong, Hong Kong","Department of Computer Science, City University of Hong Kong, Hong Kong,#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong,#TAB#","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027786039","display_name":"Man Ho Au","orcid":"https://orcid.org/0000-0003-2068-9530"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Man Ho Au","raw_affiliation_strings":["Department of Computing, Hong Kong Polytechnic University, Hong Kong","Dept. of Computing, Hong Kong Polytechnic University, Hong Kong#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Hong Kong Polytechnic University, Hong Kong","institution_ids":["https://openalex.org/I14243506"]},{"raw_affiliation_string":"Dept. of Computing, Hong Kong Polytechnic University, Hong Kong#TAB#","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023687478","display_name":"Joseph K. Liu","orcid":"https://orcid.org/0000-0001-6656-6240"},"institutions":[{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Joseph K. Liu","raw_affiliation_strings":["Department of Infocomm Security, Institute for Infocomm Research, Singapore","Dept. of Infocomm Security, Inst. for Infocomm Res., Singapore"],"affiliations":[{"raw_affiliation_string":"Department of Infocomm Security, Institute for Infocomm Research, Singapore","institution_ids":["https://openalex.org/I3005327000"]},{"raw_affiliation_string":"Dept. of Infocomm Security, Inst. for Infocomm Res., Singapore","institution_ids":["https://openalex.org/I3005327000"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia","Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia#TAB#","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113580468","display_name":"Duncan S. Wong","orcid":null},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Duncan S. Wong","raw_affiliation_strings":["Department of Computer Science, City University of Hong Kong, Hong Kong","Department of Computer Science, City University of Hong Kong, Hong Kong,#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong,#TAB#","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091475823","display_name":"Guomin Yang","orcid":"https://orcid.org/0000-0002-4949-7738"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Guomin Yang","raw_affiliation_strings":["Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia","Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia#TAB#","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048063696","display_name":"Tran Viet Xuan Phuong","orcid":"https://orcid.org/0000-0002-7745-6714"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Tran Viet Xuan Phuong","raw_affiliation_strings":["Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia","Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia#TAB#"],"affiliations":[{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]},{"raw_affiliation_string":"Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, NSW, Australia#TAB#","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022673825","display_name":"Qi Xie","orcid":"https://orcid.org/0000-0002-8808-3124"},"institutions":[{"id":"https://openalex.org/I163151501","display_name":"Hangzhou Normal University","ror":"https://ror.org/014v1mr15","country_code":"CN","type":"education","lineage":["https://openalex.org/I163151501"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Xie","raw_affiliation_strings":["Hangzhou Key Laboratory of Cryptography and Network Security, Hangzhou Normal University, Hangzhou, China","[Hangzhou Key Laboratory of Cryptography and Network Security, Hangzhou Normal University, Hangzhou, China]"],"affiliations":[{"raw_affiliation_string":"Hangzhou Key Laboratory of Cryptography and Network Security, Hangzhou Normal University, Hangzhou, China","institution_ids":["https://openalex.org/I163151501"]},{"raw_affiliation_string":"[Hangzhou Key Laboratory of Cryptography and Network Security, Hangzhou Normal University, Hangzhou, China]","institution_ids":["https://openalex.org/I163151501"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5001485404"],"corresponding_institution_ids":["https://openalex.org/I168719708"],"apc_list":null,"apc_paid":null,"fwci":15.1925,"has_fulltext":false,"cited_by_count":110,"citation_normalized_percentile":{"value":0.9904403,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":100},"biblio":{"volume":"9","issue":"10","first_page":"1667","last_page":"1680"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.8002939224243164},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7613316774368286},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6690279245376587},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5928834676742554},{"id":"https://openalex.org/keywords/delegate","display_name":"Delegate","score":0.5639075636863708},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5312233567237854},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.4726238250732422},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.4178736209869385},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.41199034452438354},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3686829209327698},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.3467324376106262},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3018777370452881},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08606240153312683}],"concepts":[{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.8002939224243164},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7613316774368286},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6690279245376587},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5928834676742554},{"id":"https://openalex.org/C143273055","wikidata":"https://www.wikidata.org/wiki/Q2382794","display_name":"Delegate","level":2,"score":0.5639075636863708},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5312233567237854},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.4726238250732422},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.4178736209869385},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.41199034452438354},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3686829209327698},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.3467324376106262},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3018777370452881},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08606240153312683},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.1109/tifs.2014.2346023","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2346023","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:ro.uow.edu.au:eispapers-4096","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/eispapers/3080","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty of Engineering and Information Sciences - Papers: Part A","raw_type":"article"},{"id":"pmh:oai:alma.44SUR_INST:11139747300002346","is_oa":false,"landing_page_url":"https://openresearch.surrey.ac.uk/esploro/outputs/journalArticle/A-DFA-Based-Functional-Proxy-Re-Encryption-Scheme/99515342802346","pdf_url":null,"source":{"id":"https://openalex.org/S4210197018","display_name":"View","issn_l":"2688-268X","issn":["2688-268X","2688-3988"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"pmh:oai:epubs.surrey.ac.uk:844716","is_oa":false,"landing_page_url":"http://epubs.surrey.ac.uk/844716/","pdf_url":null,"source":{"id":"https://openalex.org/S4306400680","display_name":"Surrey Research Insight Open Access (The University of Surrey)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I28290843","host_organization_name":"University of Surrey","host_organization_lineage":["https://openalex.org/I28290843"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"},{"id":"pmh:oai:figshare.com:article/27790266","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:ira.lib.polyu.edu.hk:10397/35904","is_oa":false,"landing_page_url":"http://hdl.handle.net/10397/35904","pdf_url":null,"source":{"id":"https://openalex.org/S4306400205","display_name":"PolyU Institutional Research Archive (Hong Kong Polytechnic University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I14243506","host_organization_name":"Hong Kong Polytechnic University","host_organization_lineage":["https://openalex.org/I14243506"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal/Magazine Article"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/27790266","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W75310505","https://openalex.org/W126735607","https://openalex.org/W139147767","https://openalex.org/W154883872","https://openalex.org/W177444027","https://openalex.org/W204567147","https://openalex.org/W1484539941","https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1513098086","https://openalex.org/W1537844681","https://openalex.org/W1571885089","https://openalex.org/W1582239555","https://openalex.org/W1590823599","https://openalex.org/W1595748100","https://openalex.org/W1755945123","https://openalex.org/W1798609567","https://openalex.org/W1890078278","https://openalex.org/W1987493859","https://openalex.org/W2034382123","https://openalex.org/W2050109441","https://openalex.org/W2067095453","https://openalex.org/W2076046175","https://openalex.org/W2089528989","https://openalex.org/W2100181507","https://openalex.org/W2101709669","https://openalex.org/W2102355710","https://openalex.org/W2108072891","https://openalex.org/W2114428623","https://openalex.org/W2138001464","https://openalex.org/W2157679418","https://openalex.org/W2164101323","https://openalex.org/W2166403741","https://openalex.org/W2238048589","https://openalex.org/W6606212940","https://openalex.org/W6607134063","https://openalex.org/W6608378827","https://openalex.org/W6629862473","https://openalex.org/W6630460208","https://openalex.org/W6630769539","https://openalex.org/W6634318582","https://openalex.org/W6635176429","https://openalex.org/W6635607948","https://openalex.org/W6662918253","https://openalex.org/W6667323178","https://openalex.org/W6669423477","https://openalex.org/W6675071672","https://openalex.org/W6675398331"],"related_works":["https://openalex.org/W2283031786","https://openalex.org/W1582239555","https://openalex.org/W4225688985","https://openalex.org/W2138038098","https://openalex.org/W4223919663","https://openalex.org/W1538523055","https://openalex.org/W4285255193","https://openalex.org/W1574326402","https://openalex.org/W3031006976","https://openalex.org/W2042220809"],"abstract_inverted_index":{"In":[0,42],"this":[1],"paper,":[2],"for":[3,12],"the":[4,29,76,79,107,113,121,141],"first":[5,30],"time,":[6],"we":[7,17,27],"define":[8],"a":[9,45,50,60,68,92,96,101],"general":[10],"notion":[11],"proxy":[13,98,108],"re-encryption":[14,102],"(PRE),":[15],"which":[16,36],"call":[18],"deterministic":[19],"finite":[20],"automata-based":[21],"functional":[22],"PRE":[23],"(DFA-based":[24],"FPRE).":[25],"Meanwhile,":[26],"propose":[28],"and":[31,59,65],"concrete":[32],"DFA-based":[33],"FPRE":[34],"system,":[35],"adapts":[37],"to":[38,84,87,99,112,125,130],"our":[39,43],"new":[40,93,117],"notion.":[41],"scheme,":[44],"message":[46],"is":[47,62,82,104],"encrypted":[48],"in":[49,140],"ciphertext":[51,89],"associated":[52,70,90],"with":[53,71,91],"an":[54],"arbitrary":[55],"length":[56],"index":[57],"string,":[58],"decryptor":[61],"legitimate":[63],"if":[64,67],"only":[66],"DFA":[69],"his/her":[72],"secret":[73],"key":[74,103],"accepts":[75],"string.":[77],"Furthermore,":[78],"above":[80],"encryption":[81],"allowed":[83],"be":[85],"transformed":[86],"another":[88],"string":[94],"by":[95],"semitrusted":[97],"whom":[100],"given.":[105],"Nevertheless,":[106],"cannot":[109],"gain":[110],"access":[111],"underlying":[114],"plaintext.":[115],"This":[116],"primitive":[118],"can":[119],"increase":[120],"flexibility":[122],"of":[123],"users":[124],"delegate":[126],"their":[127],"decryption":[128],"rights":[129],"others.":[131],"We":[132],"also":[133],"prove":[134],"it":[135],"as":[136],"fully":[137],"chosen-ciphertext":[138],"secure":[139],"standard":[142],"model.":[143]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":17},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":18},{"year":2017,"cited_by_count":10},{"year":2016,"cited_by_count":16},{"year":2015,"cited_by_count":10}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
