{"id":"https://openalex.org/W4400878369","doi":"https://doi.org/10.1109/tifs.2024.3432279","title":"Key-Policy Attribute-Based Encryption With Switchable Attributes for Fine-Grained Access Control of Encrypted Data","display_name":"Key-Policy Attribute-Based Encryption With Switchable Attributes for Fine-Grained Access Control of Encrypted Data","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4400878369","doi":"https://doi.org/10.1109/tifs.2024.3432279"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3432279","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3432279","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000037502","display_name":"Fucai Luo","orcid":"https://orcid.org/0000-0001-7961-5750"},"institutions":[{"id":"https://openalex.org/I75059550","display_name":"Zhejiang Gongshang University","ror":"https://ror.org/0569mkk41","country_code":"CN","type":"education","lineage":["https://openalex.org/I75059550"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fucai Luo","raw_affiliation_strings":["School of Computer Science and Technology, Zhejiang Gongshang University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-7961-5750","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Zhejiang Gongshang University, Hangzhou, China","institution_ids":["https://openalex.org/I75059550"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102003407","display_name":"Haiyan Wang","orcid":"https://orcid.org/0000-0002-5702-9897"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haiyan Wang","raw_affiliation_strings":["Department of New Networks, Peng Cheng Laboratory, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0002-5702-9897","affiliations":[{"raw_affiliation_string":"Department of New Networks, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032278260","display_name":"Xingfu Yan","orcid":"https://orcid.org/0000-0002-3026-0976"},"institutions":[{"id":"https://openalex.org/I187400657","display_name":"South China Normal University","ror":"https://ror.org/01kq0pv72","country_code":"CN","type":"education","lineage":["https://openalex.org/I187400657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingfu Yan","raw_affiliation_strings":["School of Computer Science, South China Normal University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-3026-0976","affiliations":[{"raw_affiliation_string":"School of Computer Science, South China Normal University, Guangzhou, China","institution_ids":["https://openalex.org/I187400657"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101845076","display_name":"Jiahui Wu","orcid":"https://orcid.org/0000-0003-0121-5575"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiahui Wu","raw_affiliation_strings":["Department of New Networks, Peng Cheng Laboratory, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0003-0121-5575","affiliations":[{"raw_affiliation_string":"Department of New Networks, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5000037502"],"corresponding_institution_ids":["https://openalex.org/I75059550"],"apc_list":null,"apc_paid":null,"fwci":6.8334,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.97282136,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"19","issue":null,"first_page":"7245","last_page":"7258"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9779000282287598,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9580000042915344,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8501623868942261},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8334689140319824},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.658327579498291},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.6082216501235962},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5639694929122925},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.45903870463371277},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.44584453105926514},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.4205031394958496},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.41704750061035156},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4019491374492645},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3673640489578247}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8501623868942261},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8334689140319824},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.658327579498291},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.6082216501235962},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5639694929122925},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.45903870463371277},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44584453105926514},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.4205031394958496},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.41704750061035156},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4019491374492645},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3673640489578247}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2024.3432279","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3432279","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G277891089","display_name":null,"funder_award_id":"62302445","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6400798587","display_name":null,"funder_award_id":"2022GXNSFBA035650","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7440696079","display_name":null,"funder_award_id":"62302173","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W66767074","https://openalex.org/W74973629","https://openalex.org/W76141239","https://openalex.org/W154883872","https://openalex.org/W1498316612","https://openalex.org/W1531898543","https://openalex.org/W1590823599","https://openalex.org/W1595022482","https://openalex.org/W1993032872","https://openalex.org/W1995623136","https://openalex.org/W1997745460","https://openalex.org/W2038761522","https://openalex.org/W2039074122","https://openalex.org/W2052300417","https://openalex.org/W2058785578","https://openalex.org/W2061949491","https://openalex.org/W2067095453","https://openalex.org/W2113717903","https://openalex.org/W2114664664","https://openalex.org/W2122973102","https://openalex.org/W2138001464","https://openalex.org/W2152926062","https://openalex.org/W2168571148","https://openalex.org/W2266882507","https://openalex.org/W2296067100","https://openalex.org/W2400700555","https://openalex.org/W2461360072","https://openalex.org/W2575644869","https://openalex.org/W2585965494","https://openalex.org/W2775185027","https://openalex.org/W2789097676","https://openalex.org/W2806302538","https://openalex.org/W2901116722","https://openalex.org/W2971335344","https://openalex.org/W2976706823","https://openalex.org/W2990917802","https://openalex.org/W3013896566","https://openalex.org/W3023478445","https://openalex.org/W3134041340","https://openalex.org/W3134098021","https://openalex.org/W3159116648","https://openalex.org/W3201545989","https://openalex.org/W3201663907","https://openalex.org/W4205765479","https://openalex.org/W4285310912","https://openalex.org/W4294698924","https://openalex.org/W4299827018","https://openalex.org/W4306931981","https://openalex.org/W4312934694","https://openalex.org/W4385656525","https://openalex.org/W4386275828","https://openalex.org/W4387886077","https://openalex.org/W4388765685","https://openalex.org/W4397024213","https://openalex.org/W6732010876","https://openalex.org/W6781969423","https://openalex.org/W6872098113"],"related_works":["https://openalex.org/W4387191618","https://openalex.org/W2094124631","https://openalex.org/W4308784203","https://openalex.org/W1993945719","https://openalex.org/W4387429380","https://openalex.org/W4309584611","https://openalex.org/W3118757263","https://openalex.org/W4386393431","https://openalex.org/W2739480698","https://openalex.org/W4246652009"],"abstract_inverted_index":{"Fine-grained":[0],"access":[1,7,20,29,42],"control":[2,30,43],"systems":[3],"facilitate":[4],"granting":[5],"differential":[6],"rights":[8,21,97,146],"to":[9,39,120,129,143,147,174,199,221,243],"a":[10,151,168,181,228,249],"set":[11,55,62,202],"of":[12,22,72,83,95,137,172,253],"users":[13,58,78,135],"and":[14,87,162,218,258,271],"allow":[15],"flexibility":[16],"in":[17,158],"specifying":[18],"the":[19,60,65,68,80,93,103,131,176,193,233,259,264],"individual":[23],"users.":[24,100],"As":[25],"an":[26,53,200],"important":[27],"fine-grained":[28,41],"technique,":[31],"key-policy":[32,186],"attribute-based":[33],"encryption":[34],"(KP-ABE)":[35],"has":[36],"been":[37,111],"introduced":[38],"achieve":[40],"over":[44],"encrypted":[45],"data,":[46],"where":[47,134],"each":[48,196],"ciphertext":[49,197],"is":[50,150,240,269],"associated":[51,208],"with":[52,188,209,235],"attribute":[54,61,201,212],"such":[56,76,155],"that":[57,263],"satisfying":[59],"can":[63,203],"decrypt":[64],"ciphertext.":[66],"In":[67,192],"real-world":[69],"application":[70],"scenarios":[71],"KP-ABE,":[73],"various":[74],"situations":[75],"as":[77,156],"leaving":[79],"system,":[81,195],"compromise":[82],"users\u2019":[84],"private":[85],"keys,":[86],"business":[88,163],"requirements":[89],"frequently":[90],"occur,":[91],"necessitating":[92],"revocation":[94,217],"decryption":[96,145,160],"for":[98],"large-scale":[99],"To":[101],"address":[102,130,175],"user":[104,132,159,216],"revocation,":[105],"numerous":[106],"revocable":[107,115],"KP-ABE":[108,116],"schemes":[109,117],"have":[110],"proposed.":[112],"However,":[113],"existing":[114,126],"are":[118],"vulnerable":[119],"quantum":[121,223],"computer":[122,224],"attacks.":[123],"More":[124],"importantly,":[125],"solutions":[127],"fail":[128],"addition,":[133],"capable":[136],"decrypting":[138],"certain":[139],"ciphertexts":[140],"would":[141],"like":[142],"grant":[144],"others;":[148],"this":[149],"highly":[152],"common":[153],"requirement,":[154],"changes":[157],"permissions":[161],"needs.":[164],"This":[165],"paper":[166],"explores":[167],"potentially":[169],"new":[170],"avenue":[171],"research":[173],"above":[177],"issues":[178],"by":[179],"introducing":[180],"novel":[182],"cryptographic":[183],"primitive":[184],"called":[185],"ABE":[187],"switchable":[189],"attributes":[190],"(KP-ABE-SA).":[191],"KP-ABE-SA":[194,229,256,267],"linked":[198],"be":[204,244],"transformed":[205],"into":[206],"one":[207],"another":[210],"(distinct)":[211],"set,":[213],"enabling":[214],"both":[215],"addition.":[219],"Furthermore,":[220],"withstand":[222],"attacks,":[225],"we":[226,247],"construct":[227],"scheme":[230,268],"based":[231],"on":[232],"Learning":[234],"Errors":[236],"(LWE)":[237],"assumption,":[238],"which":[239],"widely":[241],"believed":[242],"quantum-resistant.":[245],"Finally,":[246],"conduct":[248],"comprehensive":[250],"performance":[251],"evaluation":[252],"our":[254],"LWE-based":[255,266],"scheme,":[257],"experimental":[260],"results":[261],"show":[262],"proposed":[265],"efficient":[270],"practical.":[272]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":16}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
