{"id":"https://openalex.org/W4414404903","doi":"https://doi.org/10.1109/tifs.2025.3613055","title":"RLP-ABE: Puncturable CP-ABE for Efficient User Revocation From Lattices in Cloud Storage","display_name":"RLP-ABE: Puncturable CP-ABE for Efficient User Revocation From Lattices in Cloud Storage","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414404903","doi":"https://doi.org/10.1109/tifs.2025.3613055"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3613055","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3613055","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100970215","display_name":"Mengxue Yang","orcid":"https://orcid.org/0009-0004-3757-307X"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mengxue Yang","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","College of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"College of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082859576","display_name":"Huaqun Wang","orcid":"https://orcid.org/0000-0001-7254-6465"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaqun Wang","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","College of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"College of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017411757","display_name":"Jiankuo Dong","orcid":"https://orcid.org/0000-0003-1693-3000"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiankuo Dong","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","College of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"College of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100970215"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":1.4196,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.86468495,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"20","issue":null,"first_page":"10219","last_page":"10230"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9790999889373779,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10203","display_name":"Recommender Systems and Techniques","score":0.9746999740600586,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.9318000078201294},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5587000250816345},{"id":"https://openalex.org/keywords/revocation-list","display_name":"Revocation list","score":0.5494999885559082},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5070000290870667},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.44440001249313354},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4194999933242798},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3878999948501587},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.38589999079704285},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.3626999855041504}],"concepts":[{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.9318000078201294},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8529999852180481},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5902000069618225},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5587000250816345},{"id":"https://openalex.org/C147296133","wikidata":"https://www.wikidata.org/wiki/Q196765","display_name":"Revocation list","level":5,"score":0.5494999885559082},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5070000290870667},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4900999963283539},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.44440001249313354},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4194999933242798},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3878999948501587},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.38589999079704285},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.3626999855041504},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3619999885559082},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3619000017642975},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.35589998960494995},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.35580000281333923},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.3246000111103058},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.3199999928474426},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.31949999928474426},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.3003999888896942},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.28349998593330383},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.27399998903274536},{"id":"https://openalex.org/C168297262","wikidata":"https://www.wikidata.org/wiki/Q6031182","display_name":"Information protection policy","level":2,"score":0.26499998569488525},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.25609999895095825},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2547000050544739}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3613055","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3613055","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1303638838","display_name":null,"funder_award_id":"62325209","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2080849955","display_name":null,"funder_award_id":"U23B2002","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4117558629","display_name":null,"funder_award_id":"U21A20466","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7876586153","display_name":null,"funder_award_id":"62272238","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1537360597","https://openalex.org/W1582733026","https://openalex.org/W1839785783","https://openalex.org/W2058785578","https://openalex.org/W2061949491","https://openalex.org/W2108072891","https://openalex.org/W2122973102","https://openalex.org/W2138001464","https://openalex.org/W2210642187","https://openalex.org/W2764317140","https://openalex.org/W2943600914","https://openalex.org/W2979952026","https://openalex.org/W3006203549","https://openalex.org/W3152886916","https://openalex.org/W3196423474","https://openalex.org/W3198147790","https://openalex.org/W3217302241","https://openalex.org/W4312934694","https://openalex.org/W4313555287","https://openalex.org/W4381742129","https://openalex.org/W4385656525"],"related_works":[],"abstract_inverted_index":{"Cloud":[0],"computing":[1],"has":[2,30],"become":[3],"the":[4,74,158],"predominant":[5],"platform":[6],"for":[7,154,160],"data":[8,28,75],"sharing":[9,29],"due":[10],"to":[11,17,21,81,89],"its":[12,180],"adaptability,":[13],"cost-effectiveness,":[14],"and":[15,26,66,84,108,112,116,123,163,173,176,187],"ability":[16],"scale":[18],"resources":[19],"according":[20],"user":[22,50,61,135,155],"demand.":[23],"Ensuring":[24],"secure":[25],"efficient":[27],"long":[31],"been":[32],"a":[33,43,82,144],"central":[34],"research":[35],"focus,":[36],"with":[37,133],"attribute-based":[38],"encryption":[39],"(ABE)":[40],"serving":[41],"as":[42],"key":[44,161],"cryptographic":[45],"primitive.":[46],"In":[47],"real-world":[48],"scenarios,":[49],"attributes":[51],"often":[52],"change,":[53],"necessitating":[54],"timely":[55],"revocation":[56,62,70,79,93,106,118],"of":[57],"access":[58,136],"rights.":[59],"Common":[60],"methods":[63,119],"include":[64],"direct":[65,115],"indirect":[67,117],"revocation.":[68],"Direct":[69],"is":[71,94],"controlled":[72],"by":[73,96],"owner,":[76],"who":[77],"adds":[78],"information":[80,107],"list":[83],"embeds":[85],"it":[86],"into":[87],"ciphertext":[88],"revoke":[90],"permissions.":[91],"Indirect":[92],"managed":[95],"an":[97],"authorized":[98],"authority":[99],"or":[100],"delegated":[101],"third":[102],"party,":[103],"dynamically":[104],"publishing":[105],"generating":[109],"new":[110],"keys":[111],"ciphertexts.":[113],"Conventional":[114],"incur":[120],"substantial":[121],"communication":[122,185],"computation":[124],"overheads,":[125],"limiting":[126],"their":[127],"practical":[128],"effectiveness,":[129],"particularly":[130],"in":[131,182],"environments":[132],"frequent":[134],"terminations.":[137],"To":[138],"address":[139],"these":[140],"challenges,":[141],"we":[142],"propose":[143],"novel":[145],"puncturable":[146],"ciphertext-policy":[147],"ABE":[148],"scheme":[149],"based":[150],"on":[151],"lattice":[152],"cryptography":[153],"revocation,":[156],"eliminating":[157],"need":[159],"regeneration":[162],"revocation-list":[164],"maintenance.":[165],"The":[166],"proposed":[167],"approach":[168],"effectively":[169],"resists":[170],"collusion,":[171],"quantum,":[172],"chosen-plaintext":[174],"attacks,":[175],"experimental":[177],"evaluations":[178],"demonstrate":[179],"advantages":[181],"storage":[183],"consumption,":[184],"cost,":[186],"computational":[188],"overhead.":[189]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
