{"id":"https://openalex.org/W4415821404","doi":"https://doi.org/10.1109/tifs.2025.3628480","title":"Heimdall: A Decentralized Access Control Scheme With Time-Based Secret Management and Private Access Policies","display_name":"Heimdall: A Decentralized Access Control Scheme With Time-Based Secret Management and Private Access Policies","publication_year":2025,"publication_date":"2025-11-03","ids":{"openalex":"https://openalex.org/W4415821404","doi":"https://doi.org/10.1109/tifs.2025.3628480"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2025.3628480","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3628480","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075114061","display_name":"L. Xia","orcid":"https://orcid.org/0009-0001-1374-2519"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Libin Xia","raw_affiliation_strings":["School of Computer Science, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yue Li","orcid":"https://orcid.org/0009-0001-1688-1987"},"institutions":[{"id":"https://openalex.org/I9086337","display_name":"Taiyuan University of Technology","ror":"https://ror.org/03kv08d37","country_code":"CN","type":"education","lineage":["https://openalex.org/I9086337"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Li","raw_affiliation_strings":["College of Computer Science and Technology, Taiyuan University of Technology, Taiyuan, Shanxi, China","College of Computer Science and Technology, Taiyuan University of Technology, Shanxi, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Taiyuan University of Technology, Taiyuan, Shanxi, China","institution_ids":["https://openalex.org/I9086337"]},{"raw_affiliation_string":"College of Computer Science and Technology, Taiyuan University of Technology, Shanxi, China","institution_ids":["https://openalex.org/I9086337"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026151248","display_name":"Jiashuo Zhang","orcid":"https://orcid.org/0000-0002-8140-9208"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiashuo Zhang","raw_affiliation_strings":["School of Computer Science, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089030314","display_name":"Jianbo Gao","orcid":"https://orcid.org/0000-0002-6760-5552"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianbo Gao","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005225068","display_name":"Zhi Guan","orcid":"https://orcid.org/0000-0002-6144-4815"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhi Guan","raw_affiliation_strings":["National Engineering Research Center for Software Engineering, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center for Software Engineering, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5107170492","display_name":"Zhong Chen","orcid":"https://orcid.org/0000-0002-5785-2912"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhong Chen","raw_affiliation_strings":["School of Computer Science, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5075114061"],"corresponding_institution_ids":["https://openalex.org/I20231570"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.41349939,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"212","last_page":"225"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.49129998683929443,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.49129998683929443,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.4578000009059906,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.01549999974668026,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.7336999773979187},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.7134000062942505},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.6291999816894531},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.5870000123977661},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4986000061035156},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.47110000252723694},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.45809999108314514},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.4498000144958496},{"id":"https://openalex.org/keywords/computer-access-control","display_name":"Computer access control","score":0.44440001249313354},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4424000084400177}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7954000234603882},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.7336999773979187},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.7134000062942505},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.6291999816894531},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.5870000123977661},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.558899998664856},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4986000061035156},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4722999930381775},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.47110000252723694},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.45809999108314514},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.4498000144958496},{"id":"https://openalex.org/C44415380","wikidata":"https://www.wikidata.org/wiki/Q17008721","display_name":"Computer access control","level":3,"score":0.44440001249313354},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4424000084400177},{"id":"https://openalex.org/C2778950925","wikidata":"https://www.wikidata.org/wiki/Q4672474","display_name":"Access structure","level":4,"score":0.39559999108314514},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.3887999951839447},{"id":"https://openalex.org/C2778002324","wikidata":"https://www.wikidata.org/wiki/Q4488810","display_name":"Access management","level":2,"score":0.3846000134944916},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.34290000796318054},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.33570000529289246},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.3303000032901764},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.32409998774528503},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.32350000739097595},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.31529998779296875},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.2976999878883362},{"id":"https://openalex.org/C168297262","wikidata":"https://www.wikidata.org/wiki/Q6031182","display_name":"Information protection policy","level":2,"score":0.28200000524520874},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.28110000491142273},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2793000042438507},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.27630001306533813},{"id":"https://openalex.org/C1304207","wikidata":"https://www.wikidata.org/wiki/Q7189582","display_name":"Physical access","level":3,"score":0.27379998564720154},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2655999958515167},{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.25619998574256897}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3628480","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3628480","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3616018988","display_name":null,"funder_award_id":"62202011","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4449585094","display_name":null,"funder_award_id":"62172010","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8357085242","display_name":null,"funder_award_id":"2023YFB2703901","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W123420056","https://openalex.org/W1597151159","https://openalex.org/W2034562114","https://openalex.org/W2059315043","https://openalex.org/W2131725908","https://openalex.org/W2141420453","https://openalex.org/W2170696315","https://openalex.org/W2489793163","https://openalex.org/W2496543269","https://openalex.org/W2552640487","https://openalex.org/W2596298465","https://openalex.org/W2753005465","https://openalex.org/W2760477892","https://openalex.org/W2794685135","https://openalex.org/W2811094379","https://openalex.org/W2963350742","https://openalex.org/W2967051452","https://openalex.org/W2969140724","https://openalex.org/W3041566224","https://openalex.org/W3097199134","https://openalex.org/W3111550222","https://openalex.org/W3132290809","https://openalex.org/W3141585064","https://openalex.org/W3198185738","https://openalex.org/W3204983216","https://openalex.org/W4362686174","https://openalex.org/W4366382535","https://openalex.org/W4385080297","https://openalex.org/W4385412238","https://openalex.org/W4389279206","https://openalex.org/W4389844062","https://openalex.org/W4405144491","https://openalex.org/W4411337264"],"related_works":[],"abstract_inverted_index":{"Decentralized":[0],"Access":[1],"Control":[2],"(DAC)":[3],"manages":[4],"access":[5,17,47,86,97,106],"through":[6,153],"multiple":[7],"entities,":[8],"consisting":[9],"of":[10,82,110,127,150],"two":[11],"modules:":[12],"decentralized":[13,96],"secret":[14,34,102,145,151],"management":[15,103],"and":[16,71,104,138,177],"policies.":[18,87,107],"However,":[19],"existing":[20],"DAC":[21,64],"schemes":[22,65],"lack":[23,72],"support":[24,73],"for":[25,74,123],"managing":[26],"secrets":[27],"with":[28,100],"time-based":[29,101,144],"conditions,":[30],"such":[31],"as":[32],"triggering":[33],"release":[35],"after":[36],"a":[37,95],"certain":[38],"time":[39,128],"bound.":[40],"In":[41],"this":[42,135],"case,":[43],"users":[44],"may":[45,78],"gain":[46],"to":[48,80,142,165,186],"information":[49,84],"before":[50],"the":[51,114,124,148,160,187],"designated":[52],"time,":[53],"which":[54,77],"is":[55,113],"undesirable":[56],"in":[57,85],"scenarios":[58],"involving":[59],"time-sensitive":[60],"data.":[61],"Moreover,":[62],"current":[63],"mainly":[66],"focus":[67],"on":[68],"identity":[69,171],"confidentiality":[70,168],"policy":[75,167],"confidentiality,":[76],"lead":[79],"leakage":[81],"sensitive":[83],"To":[88],"address":[89],"these":[90],"challenges,":[91],"we":[92,158,174],"propose":[93],"Heimdall,":[94],"control":[98],"scheme":[99],"private":[105],"The":[108],"core":[109],"our":[111],"solution":[112],"dhNIZK":[115,136],"protocol,":[116],"an":[117],"efficient":[118],"non-interactive":[119],"zero-knowledge":[120],"protocol":[121,137],"designed":[122],"verifiable":[125],"incorporation":[126],"conditions":[129],"into":[130],"threshold":[131],"cryptosystems.":[132],"We":[133],"utilize":[134],"homomorphic":[139],"time-lock":[140],"puzzles":[141],"enable":[143],"management,":[146],"improving":[147],"efficiency":[149],"reconstruction":[152],"batch":[154],"puzzle-solving":[155],"techniques.":[156],"Furthermore,":[157],"enhance":[159],"garbling":[161],"scheme\u2019s":[162],"encoding":[163],"algorithm":[164],"ensure":[166],"while":[169],"maintaining":[170],"confidentiality.":[172],"Finally,":[173],"implement":[175],"Heimdall":[176],"present":[178],"experimental":[179],"results":[180],"demonstrating":[181],"its":[182],"superior":[183],"performance":[184],"compared":[185],"state-of-the-art":[188],"solutions.":[189]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-03T00:00:00"}
