{"id":"https://openalex.org/W4405718413","doi":"https://doi.org/10.1109/tifs.2024.3516542","title":"TSR-ABE: Traceable and Server-Aided Revocable Ciphertext-Policy Attribute-Based Encryption Under Static Assumptions","display_name":"TSR-ABE: Traceable and Server-Aided Revocable Ciphertext-Policy Attribute-Based Encryption Under Static Assumptions","publication_year":2024,"publication_date":"2024-12-23","ids":{"openalex":"https://openalex.org/W4405718413","doi":"https://doi.org/10.1109/tifs.2024.3516542"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3516542","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3516542","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Fei Meng","orcid":"https://orcid.org/0009-0004-6771-4195"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fei Meng","raw_affiliation_strings":["School of Cyber Science and Technology, Shandong University, Qingdao, China"],"raw_orcid":"https://orcid.org/0009-0004-6771-4195","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064067464","display_name":"Leixiao Cheng","orcid":"https://orcid.org/0000-0002-7231-0636"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Leixiao Cheng","raw_affiliation_strings":["School of Cyber Science and Technology, Shandong University, Qingdao, China"],"raw_orcid":"https://orcid.org/0000-0002-7231-0636","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, China","institution_ids":["https://openalex.org/I80143920"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I80143920"],"apc_list":null,"apc_paid":null,"fwci":5.2982,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.96247855,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"20","issue":null,"first_page":"955","last_page":"967"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9828000068664551,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8282188177108765},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.7415957450866699},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6978424191474915},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6187115907669067},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5443387627601624},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.5432776212692261},{"id":"https://openalex.org/keywords/ciphertext-indistinguishability","display_name":"Ciphertext indistinguishability","score":0.525492250919342},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.43552589416503906},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.36160141229629517},{"id":"https://openalex.org/keywords/malleability","display_name":"Malleability","score":0.36048927903175354},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35342493653297424},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.28882116079330444}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8282188177108765},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7415957450866699},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6978424191474915},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6187115907669067},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5443387627601624},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.5432776212692261},{"id":"https://openalex.org/C182776695","wikidata":"https://www.wikidata.org/wiki/Q840661","display_name":"Ciphertext indistinguishability","level":5,"score":0.525492250919342},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.43552589416503906},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36160141229629517},{"id":"https://openalex.org/C100980136","wikidata":"https://www.wikidata.org/wiki/Q4668956","display_name":"Malleability","level":4,"score":0.36048927903175354},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35342493653297424},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.28882116079330444}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2024.3516542","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3516542","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1127733697","display_name":null,"funder_award_id":"No.62272269","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2820127735","display_name":null,"funder_award_id":"No.ZR2024QF103","funder_id":"https://openalex.org/F4320324174","funder_display_name":"Natural Science Foundation of Shandong Province"},{"id":"https://openalex.org/G3205615341","display_name":null,"funder_award_id":"2023M732062","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G4569418997","display_name":null,"funder_award_id":"ZR2022QF043","funder_id":"https://openalex.org/F4320324174","funder_display_name":"Natural Science Foundation of Shandong Province"},{"id":"https://openalex.org/G4611247920","display_name":null,"funder_award_id":"62402289","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4846366593","display_name":null,"funder_award_id":"No.2023M732062","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G5893568210","display_name":null,"funder_award_id":"No.ZR2022QF043","funder_id":"https://openalex.org/F4320324174","funder_display_name":"Natural Science Foundation of Shandong Province"},{"id":"https://openalex.org/G65074842","display_name":null,"funder_award_id":"ZR2024QF103","funder_id":"https://openalex.org/F4320324174","funder_display_name":"Natural Science Foundation of Shandong Province"},{"id":"https://openalex.org/G7282183672","display_name":null,"funder_award_id":"62272269","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8622875033","display_name":null,"funder_award_id":"No.62402289","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320324174","display_name":"Natural Science Foundation of Shandong Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W123374098","https://openalex.org/W162787226","https://openalex.org/W177444027","https://openalex.org/W1556721149","https://openalex.org/W1720304360","https://openalex.org/W1896661392","https://openalex.org/W1982946433","https://openalex.org/W1990413350","https://openalex.org/W1993032872","https://openalex.org/W2058701727","https://openalex.org/W2108072891","https://openalex.org/W2117797270","https://openalex.org/W2119137917","https://openalex.org/W2132172731","https://openalex.org/W2139910984","https://openalex.org/W2168571148","https://openalex.org/W2293283622","https://openalex.org/W2295756227","https://openalex.org/W2314118214","https://openalex.org/W2482141085","https://openalex.org/W2519173433","https://openalex.org/W2520309000","https://openalex.org/W2520342609","https://openalex.org/W2621249842","https://openalex.org/W2742523794","https://openalex.org/W2744430813","https://openalex.org/W2745062479","https://openalex.org/W2764317140","https://openalex.org/W2783590514","https://openalex.org/W2790332478","https://openalex.org/W2806162386","https://openalex.org/W2885543607","https://openalex.org/W2946102956","https://openalex.org/W2981797988","https://openalex.org/W3003429431","https://openalex.org/W3007218738","https://openalex.org/W3010457411","https://openalex.org/W3045040944","https://openalex.org/W3108380369","https://openalex.org/W3202486309","https://openalex.org/W4284992543","https://openalex.org/W4376130058","https://openalex.org/W4381163664","https://openalex.org/W4386565683","https://openalex.org/W4387886077","https://openalex.org/W4390470916"],"related_works":["https://openalex.org/W2518737721","https://openalex.org/W2146985619","https://openalex.org/W1536085039","https://openalex.org/W2587915807","https://openalex.org/W165895243","https://openalex.org/W2131846073","https://openalex.org/W113132299","https://openalex.org/W2539919741","https://openalex.org/W2981554290","https://openalex.org/W2578698843"],"abstract_inverted_index":{"The":[0],"cloud":[1,57],"server":[2,26],"is":[3,27,43,93,101,134,222],"a":[4,44,126,143,240],"versatile":[5],"platform":[6],"for":[7,49,71],"data":[8,15,37,55],"storage,":[9],"with":[10,104,138,162,187],"users":[11],"increasingly":[12],"uploading":[13],"personal":[14],"to":[16,19,122,205,211,226],"public":[17],"servers":[18],"circumvent":[20],"costly":[21],"local":[22],"storage.":[23],"However,":[24],"the":[25,98,105,112,163,169,180,203,213,216,247],"not":[28],"entirely":[29],"honest,":[30],"as":[31],"it":[32],"may":[33],"potentially":[34],"compromise":[35],"user":[36],"privacy.":[38],"Ciphertext-policy":[39],"attribute-based":[40],"encryption":[41,184],"(CP-ABE)":[42],"highly":[45],"flexible":[46],"cryptographic":[47],"technique":[48],"ensuring":[50],"access":[51],"control":[52],"over":[53],"encrypted":[54],"in":[56],"storage":[58],"applications.":[59],"To":[60,136],"prevent":[61],"unauthorized":[62],"access,":[63],"traceability":[64,175,214],"and":[65,78,146,166,174,235,252],"revocability":[66],"are":[67],"two":[68],"necessary":[69],"requirements":[70],"CP-ABE":[72,80,116,149,191],"system.":[73],"Nevertheless,":[74],"existing":[75],"white-box":[76,114],"traceable":[77,115,145,190],"revocable":[79,148],"schemes":[81,117],"suffer":[82],"from":[83,246],"several":[84],"imitations:":[85],"1)":[86],"Whether":[87],"direct":[88],"revocation":[89,92,99,158,198],"or":[90,199],"indirect":[91],"applied,":[94],"neither":[95],"type":[96],"of":[97,111,176,194,215,249],"mode":[100,159],"well":[102,161],"compatible":[103],"trace":[106,164],"function.":[107],"2)":[108],"Moreover,":[109],"all":[110],"previous":[113,189],"rely":[118],"on":[119,153],"non-static":[120],"assumptions":[121,133],"prove":[123,168,212],"traceability.":[124],"Ideally,":[125],"scheme":[127,151,178,221],"provably":[128],"secure":[129],"under":[130],"static":[131,154],"complexity":[132],"preferable.":[135],"deal":[137],"these":[139],"issues,":[140],"we":[141,167,201,242],"propose":[142],"novel":[144],"server-aided":[147],"(TSR-ABE)":[150],"based":[152],"assumptions.":[155],"Specifically,":[156],"our":[157,177,220],"works":[160],"function,":[165],"adaptive":[170],"chosen-plaintext":[171],"attack":[172],"security":[173,251],"via":[179],"well-known":[181],"dual":[182],"system":[183],"methodology.":[185],"Compared":[186],"many":[188],"schemes,":[192],"regardless":[193],"whether":[195],"they":[196],"support":[197],"not,":[200],"remove":[202],"need":[204],"introduce":[206],"an":[207],"additional":[208],"l-SDH":[209],"assumption":[210],"scheme.":[217],"In":[218],"addition,":[219],"more":[223],"practical":[224],"due":[225],"its":[227],"lower":[228,232,236],"private":[229],"key":[230],"size,":[231],"decryption":[233],"costs":[234],"tracing":[237],"costs.":[238],"As":[239],"result,":[241],"strengthen":[243],"current":[244],"research":[245],"perspective":[248],"both":[250],"efficiency.":[253]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":12}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
