{"id":"https://openalex.org/W4285256539","doi":"https://doi.org/10.1109/tifs.2022.3173412","title":"Attribute-Based Hierarchical Access Control With Extendable Policy","display_name":"Attribute-Based Hierarchical Access Control With Extendable Policy","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4285256539","doi":"https://doi.org/10.1109/tifs.2022.3173412"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3173412","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3173412","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076987757","display_name":"Meiyan Xiao","orcid":"https://orcid.org/0000-0001-9590-9820"},"institutions":[{"id":"https://openalex.org/I101479585","display_name":"South China Agricultural University","ror":"https://ror.org/05v9jqt67","country_code":"CN","type":"education","lineage":["https://openalex.org/I101479585"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Meiyan Xiao","raw_affiliation_strings":["College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China","institution_ids":["https://openalex.org/I101479585"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100402167","display_name":"Hongbo Li","orcid":"https://orcid.org/0000-0002-6990-4855"},"institutions":[{"id":"https://openalex.org/I101479585","display_name":"South China Agricultural University","ror":"https://ror.org/05v9jqt67","country_code":"CN","type":"education","lineage":["https://openalex.org/I101479585"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongbo Li","raw_affiliation_strings":["College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China","institution_ids":["https://openalex.org/I101479585"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011282586","display_name":"Qiong Huang","orcid":"https://orcid.org/0000-0002-7666-8985"},"institutions":[{"id":"https://openalex.org/I101479585","display_name":"South China Agricultural University","ror":"https://ror.org/05v9jqt67","country_code":"CN","type":"education","lineage":["https://openalex.org/I101479585"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiong Huang","raw_affiliation_strings":["College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China","Guangzhou Key Laboratory of Intelligent Agriculture, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China","institution_ids":["https://openalex.org/I101479585"]},{"raw_affiliation_string":"Guangzhou Key Laboratory of Intelligent Agriculture, Guangzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005228053","display_name":"Shui Yu","orcid":"https://orcid.org/0000-0003-4485-6743"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shui Yu","raw_affiliation_strings":["School of Computer Science, University of Technology Sydney, Ultimo, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Technology Sydney, Ultimo, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5076987757"],"corresponding_institution_ids":["https://openalex.org/I101479585"],"apc_list":null,"apc_paid":null,"fwci":5.4374,"has_fulltext":false,"cited_by_count":42,"citation_normalized_percentile":{"value":0.96307548,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"17","issue":null,"first_page":"1868","last_page":"1883"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9833999872207642,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8341265916824341},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8274118304252625},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.6823058724403381},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6409940719604492},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.6292132139205933},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5005781650543213},{"id":"https://openalex.org/keywords/functional-encryption","display_name":"Functional encryption","score":0.46042677760124207},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4587008059024811},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.4490795135498047},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.44776517152786255},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.4450826644897461},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.43401825428009033},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.42102521657943726},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4183483123779297},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.40141233801841736},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.38088130950927734},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.28435084223747253},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1918567717075348},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08395716547966003},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.060010939836502075}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8341265916824341},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8274118304252625},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.6823058724403381},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6409940719604492},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.6292132139205933},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5005781650543213},{"id":"https://openalex.org/C2780746774","wikidata":"https://www.wikidata.org/wiki/Q17014981","display_name":"Functional encryption","level":4,"score":0.46042677760124207},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4587008059024811},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.4490795135498047},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.44776517152786255},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.4450826644897461},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.43401825428009033},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.42102521657943726},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4183483123779297},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.40141233801841736},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38088130950927734},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.28435084223747253},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1918567717075348},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08395716547966003},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.060010939836502075},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2022.3173412","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3173412","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:ro.uow.edu.au:test2021-10873","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/test2021/5326","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Test Series for Scopus Harvesting 2021","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8752293383","display_name":null,"funder_award_id":"61872152","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W177444027","https://openalex.org/W1498316612","https://openalex.org/W1993341076","https://openalex.org/W1998586673","https://openalex.org/W2108072891","https://openalex.org/W2138001464","https://openalex.org/W2145255308","https://openalex.org/W2307601096","https://openalex.org/W2322315143","https://openalex.org/W2530833777","https://openalex.org/W2742523794","https://openalex.org/W2743419166","https://openalex.org/W2783418282","https://openalex.org/W2888094362","https://openalex.org/W2893603816","https://openalex.org/W2896301949","https://openalex.org/W2911261396","https://openalex.org/W2917232482","https://openalex.org/W2922180760","https://openalex.org/W2963108924","https://openalex.org/W2972731312","https://openalex.org/W3007918540","https://openalex.org/W3014946465","https://openalex.org/W3151004293","https://openalex.org/W6602830368"],"related_works":["https://openalex.org/W1993945719","https://openalex.org/W2995433735","https://openalex.org/W2739480698","https://openalex.org/W2955476130","https://openalex.org/W4366959067","https://openalex.org/W2030246973","https://openalex.org/W2887109888","https://openalex.org/W4243888667","https://openalex.org/W2615041771","https://openalex.org/W4246652009"],"abstract_inverted_index":{"Attribute-based":[0],"encryption":[1,48,58,143],"scheme":[2,59,80,105,158,177],"is":[3,159],"a":[4,131],"promising":[5],"mechanism":[6],"to":[7,33,70,100,116,178],"realize":[8],"one-to-many":[9],"fine-grained":[10],"access":[11,40,92,114],"control":[12,93],"which":[13,140],"strengthens":[14],"the":[15,34,45,72,82,102,113,125,136,142,148,154,157,163],"security":[16,77,155],"in":[17,42,87,162],"cloud":[18],"computing.":[19],"However,":[20],"massive":[21],"amounts":[22],"of":[23,44,84,112,156],"data":[24,27,73,89,122,137],"and":[25,38,76,109,145,172,182],"various":[26],"sharing":[28,74,138],"requirements":[29],"bring":[30],"great":[31],"challenges":[32],"complex":[35],"but":[36],"isolated":[37],"fixed":[39],"structures":[41],"most":[43],"existing":[46],"attribute-based":[47,56],"schemes.":[49],"In":[50],"this":[51],"paper,":[52],"we":[53,173],"propose":[54],"an":[55],"hierarchical":[57,85,91,121],"with":[60,90,129],"extendable":[61],"policy,":[62],"called":[63],"Extendable":[64],"Hierarchical":[65],"Ciphertext-Policy":[66],"Attribute-Based":[67],"Encryption":[68],"(EH-CP-ABE),":[69],"improve":[71,101],"efficiency":[75,181],"simultaneously.":[78],"The":[79,104],"realizes":[81],"function":[83],"encryption,":[86],"which,":[88],"relationships":[94],"could":[95],"be":[96],"encrypted":[97],"together":[98],"flexibly":[99],"efficiency.":[103],"also":[106,174],"achieves":[107],"external":[108],"internal":[110],"extension":[111],"structure":[115],"further":[117],"encrypt":[118],"newly":[119],"added":[120],"without":[123],"updating":[124],"original":[126],"ciphertexts":[127],"or":[128],"only":[130],"minor":[132],"update":[133],"depending":[134],"on":[135,168],"requirements,":[139],"simplifies":[141],"process":[144],"greatly":[146],"reduces":[147],"computation":[149],"overhead.":[150],"We":[151],"formally":[152],"prove":[153],"IND-CCA":[160],"secure":[161],"random":[164],"oracle":[165],"model":[166],"based":[167],"bilinear":[169],"Diffie-Hellman":[170],"assumption,":[171],"implement":[175],"our":[176],"demonstrate":[179],"its":[180],"practicality.":[183]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":6}],"updated_date":"2026-03-01T08:55:55.761014","created_date":"2025-10-10T00:00:00"}
