{"id":"https://openalex.org/W2775185027","doi":"https://doi.org/10.1109/tifs.2017.2779427","title":"Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme","display_name":"Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme","publication_year":2017,"publication_date":"2017-12-04","ids":{"openalex":"https://openalex.org/W2775185027","doi":"https://doi.org/10.1109/tifs.2017.2779427","mag":"2775185027"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2017.2779427","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2779427","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101595453","display_name":"Wei Dai","orcid":"https://orcid.org/0000-0002-3542-8889"},"institutions":[{"id":"https://openalex.org/I107077323","display_name":"Worcester Polytechnic Institute","ror":"https://ror.org/05ejpqr48","country_code":"US","type":"education","lineage":["https://openalex.org/I107077323"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Wei Dai","raw_affiliation_strings":["Worcester Polytechnic Institute, Worcester, MA, USA"],"affiliations":[{"raw_affiliation_string":"Worcester Polytechnic Institute, Worcester, MA, USA","institution_ids":["https://openalex.org/I107077323"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086897887","display_name":"Yark\u0131n Dor\u00f6z","orcid":"https://orcid.org/0000-0001-6755-6239"},"institutions":[{"id":"https://openalex.org/I107077323","display_name":"Worcester Polytechnic Institute","ror":"https://ror.org/05ejpqr48","country_code":"US","type":"education","lineage":["https://openalex.org/I107077323"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yarkin Doroz","raw_affiliation_strings":["Worcester Polytechnic Institute, Worcester, MA, USA"],"affiliations":[{"raw_affiliation_string":"Worcester Polytechnic Institute, Worcester, MA, USA","institution_ids":["https://openalex.org/I107077323"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051232717","display_name":"Yuriy Polyakov","orcid":"https://orcid.org/0000-0002-5566-3763"},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yuriy Polyakov","raw_affiliation_strings":["NJIT Cybersecurity Research Center, New Jersey Institute of Technology, Newark, NJ, USA"],"affiliations":[{"raw_affiliation_string":"NJIT Cybersecurity Research Center, New Jersey Institute of Technology, Newark, NJ, USA","institution_ids":["https://openalex.org/I118118575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034274465","display_name":"Kurt Rohloff","orcid":"https://orcid.org/0000-0003-0389-5092"},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kurt Rohloff","raw_affiliation_strings":["NJIT Cybersecurity Research Center, New Jersey Institute of Technology, Newark, NJ, USA"],"affiliations":[{"raw_affiliation_string":"NJIT Cybersecurity Research Center, New Jersey Institute of Technology, Newark, NJ, USA","institution_ids":["https://openalex.org/I118118575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060179072","display_name":"Hadi Sajjadpour","orcid":"https://orcid.org/0000-0002-3881-3352"},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hadi Sajjadpour","raw_affiliation_strings":["NJIT Cybersecurity Research Center, New Jersey Institute of Technology, Newark, NJ, USA"],"affiliations":[{"raw_affiliation_string":"NJIT Cybersecurity Research Center, New Jersey Institute of Technology, Newark, NJ, USA","institution_ids":["https://openalex.org/I118118575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064835031","display_name":"Erkay Sava\u015f","orcid":"https://orcid.org/0000-0002-4869-5556"},"institutions":[{"id":"https://openalex.org/I134235054","display_name":"Sabanc\u0131 \u00dcniversitesi","ror":"https://ror.org/049asqa32","country_code":"TR","type":"education","lineage":["https://openalex.org/I134235054"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Erkay Savas","raw_affiliation_strings":["Sabanc\u0131 University, Istanbul, Turkey"],"affiliations":[{"raw_affiliation_string":"Sabanc\u0131 University, Istanbul, Turkey","institution_ids":["https://openalex.org/I134235054"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066592325","display_name":"Berk Sunar","orcid":"https://orcid.org/0000-0001-5404-5368"},"institutions":[{"id":"https://openalex.org/I107077323","display_name":"Worcester Polytechnic Institute","ror":"https://ror.org/05ejpqr48","country_code":"US","type":"education","lineage":["https://openalex.org/I107077323"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Berk Sunar","raw_affiliation_strings":["Worcester Polytechnic Institute, Worcester, MA, USA"],"affiliations":[{"raw_affiliation_string":"Worcester Polytechnic Institute, Worcester, MA, USA","institution_ids":["https://openalex.org/I107077323"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5101595453"],"corresponding_institution_ids":["https://openalex.org/I107077323"],"apc_list":null,"apc_paid":null,"fwci":3.5104,"has_fulltext":false,"cited_by_count":70,"citation_normalized_percentile":{"value":0.9436458,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"13","issue":"5","first_page":"1169","last_page":"1184"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9843999743461609,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8560061454772949},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6780659556388855},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6596250534057617},{"id":"https://openalex.org/keywords/learning-with-errors","display_name":"Learning with errors","score":0.6433038711547852},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.6077179312705994},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.5289340615272522},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5165466666221619},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5046781301498413},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.49439454078674316},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4853421747684479},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4185428023338318},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3030892610549927},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24093744158744812},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09954655170440674}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8560061454772949},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6780659556388855},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6596250534057617},{"id":"https://openalex.org/C2779014939","wikidata":"https://www.wikidata.org/wiki/Q6510239","display_name":"Learning with errors","level":3,"score":0.6433038711547852},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.6077179312705994},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.5289340615272522},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5165466666221619},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5046781301498413},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.49439454078674316},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4853421747684479},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4185428023338318},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3030892610549927},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24093744158744812},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09954655170440674},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2017.2779427","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2779427","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4300000071525574,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G3253398055","display_name":null,"funder_award_id":"W911NF-15-C-0226","funder_id":"https://openalex.org/F4320338295","funder_display_name":"Army Research Laboratory"},{"id":"https://openalex.org/G3588106390","display_name":null,"funder_award_id":"#1561536","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"},{"id":"https://openalex.org/G4471043764","display_name":null,"funder_award_id":"W911NF-15-C-0233","funder_id":"https://openalex.org/F4320338295","funder_display_name":"Army Research Laboratory"}],"funders":[{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"},{"id":"https://openalex.org/F4320338295","display_name":"Army Research Laboratory","ror":"https://ror.org/011hc8f90"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":62,"referenced_works":["https://openalex.org/W31130112","https://openalex.org/W62680702","https://openalex.org/W65891367","https://openalex.org/W74973629","https://openalex.org/W80562455","https://openalex.org/W149470655","https://openalex.org/W177444027","https://openalex.org/W1495150862","https://openalex.org/W1498316612","https://openalex.org/W1504384386","https://openalex.org/W1510795740","https://openalex.org/W1513098086","https://openalex.org/W1564449568","https://openalex.org/W1566015562","https://openalex.org/W1582733026","https://openalex.org/W1682451491","https://openalex.org/W1839785783","https://openalex.org/W1886646278","https://openalex.org/W1942572371","https://openalex.org/W2007466965","https://openalex.org/W2008701790","https://openalex.org/W2023755091","https://openalex.org/W2038761522","https://openalex.org/W2061139471","https://openalex.org/W2061171222","https://openalex.org/W2069285815","https://openalex.org/W2076046175","https://openalex.org/W2086042811","https://openalex.org/W2088645726","https://openalex.org/W2095363965","https://openalex.org/W2098290658","https://openalex.org/W2100213926","https://openalex.org/W2106970188","https://openalex.org/W2108072891","https://openalex.org/W2113717903","https://openalex.org/W2117582073","https://openalex.org/W2138001464","https://openalex.org/W2161508639","https://openalex.org/W2196732887","https://openalex.org/W2238904460","https://openalex.org/W2245734289","https://openalex.org/W2293350147","https://openalex.org/W2296067100","https://openalex.org/W2309997581","https://openalex.org/W2397835572","https://openalex.org/W2401959250","https://openalex.org/W2533504424","https://openalex.org/W2579350965","https://openalex.org/W2605284921","https://openalex.org/W2614076031","https://openalex.org/W2756242929","https://openalex.org/W2769171744","https://openalex.org/W2775185027","https://openalex.org/W6605963903","https://openalex.org/W6629862473","https://openalex.org/W6634957723","https://openalex.org/W6665500737","https://openalex.org/W6675090356","https://openalex.org/W6698270547","https://openalex.org/W6712573911","https://openalex.org/W6736143093","https://openalex.org/W6747376023"],"related_works":["https://openalex.org/W2947510282","https://openalex.org/W2363701519","https://openalex.org/W2963103512","https://openalex.org/W2601739120","https://openalex.org/W3029045823","https://openalex.org/W2400565204","https://openalex.org/W2885113919","https://openalex.org/W3003331030","https://openalex.org/W2537419609","https://openalex.org/W2238904460"],"abstract_inverted_index":{"In":[0],"this":[1,156,178],"paper,":[2],"we":[3],"report":[4],"on":[5,68,81,103],"our":[6,154],"implementation":[7,92,102,161],"of":[8,122,134,148,153],"a":[9,37,62,76,130,144],"lattice-based":[10],"key-policy":[11],"attribute-based":[12,30],"encryption":[13],"(KP-ABE)":[14],"scheme,":[15,125],"which":[16,117],"uses":[17],"short":[18,132],"secret":[19],"keys.":[20],"The":[21],"particular":[22],"KP-ABE":[23,65,124,160],"scheme":[24,66,79],"can":[25,94,126],"be":[26,95,127],"used":[27,96],"directly":[28],"for":[29],"access":[31],"control":[32],"applications,":[33],"as":[34,36,48],"well":[35],"building":[38],"block":[39],"in":[40,97,129,177],"more":[41,77],"involved":[42],"applications":[43],"and":[44,57,89,113,166,170],"cryptographic":[45],"schemes,":[46],"such":[47],"audit":[49],"log":[50],"encryption,":[51,54,56],"targeted":[52],"broadcast":[53],"functional":[55],"program":[58],"obfuscation.":[59],"We":[60],"adapt":[61],"recently":[63],"proposed":[64],"based":[67,80],"the":[69,82,109,119,123,151,158,171],"learning":[70,84],"with":[71,85],"errors":[72,86],"(LWE)":[73],"problem":[74],"to":[75,143],"efficient":[78],"ring":[83],"(RLWE)":[87],"problem,":[88],"demonstrate":[90],"an":[91],"that":[93,108,162],"practical":[98],"applications.":[99],"Our":[100,136],"state-of-the-art":[101],"graphics":[104],"processing":[105],"units":[106],"shows":[107],"homomorphic":[110],"public":[111,167],"key":[112,168],"ciphertext":[114,165],"evaluation":[115],"operations,":[116],"dominate":[118],"execution":[120],"time":[121],"performed":[128],"reasonably":[131],"amount":[133],"time.":[135],"practicality":[137,174],"results":[138,175],"also":[139],"hold":[140],"when":[141],"scaled":[142],"relatively":[145],"large":[146],"number":[147],"attributes.":[149],"To":[150],"best":[152],"knowledge,":[155],"is":[157],"first":[159],"supports":[163],"both":[164],"homomorphism,":[169],"only":[172],"experimental":[173],"reported":[176],"paper.":[179]},"counts_by_year":[{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":13},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
