{"id":"https://openalex.org/W2092044754","doi":"https://doi.org/10.1109/tpds.2015.2392752","title":"Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing","display_name":"Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing","publication_year":2015,"publication_date":"2015-01-15","ids":{"openalex":"https://openalex.org/W2092044754","doi":"https://doi.org/10.1109/tpds.2015.2392752","mag":"2092044754"},"language":"en","primary_location":{"id":"doi:10.1109/tpds.2015.2392752","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tpds.2015.2392752","pdf_url":null,"source":{"id":"https://openalex.org/S97130795","display_name":"IEEE Transactions on Parallel and Distributed Systems","issn_l":"1045-9219","issn":["1045-9219","1558-2183","2161-9883"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Parallel and Distributed Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101704074","display_name":"Jie Xu","orcid":"https://orcid.org/0000-0002-9924-4157"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jie Xu","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","State Key Laboratory of Networking & Switching technology, Beijing University of Posts and telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"State Key Laboratory of Networking & Switching technology, Beijing University of Posts and telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071607720","display_name":"Qiaoyan Wen","orcid":"https://orcid.org/0000-0001-7142-9726"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiaoyan Wen","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","State Key Laboratory of Networking & Switching technology, Beijing University of Posts and telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"State Key Laboratory of Networking & Switching technology, Beijing University of Posts and telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003153613","display_name":"Wenmin Li","orcid":"https://orcid.org/0000-0002-1278-1735"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenmin Li","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","State Key Laboratory of Networking & Switching technology, Beijing University of Posts and telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"State Key Laboratory of Networking & Switching technology, Beijing University of Posts and telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000464600","display_name":"Zhengping Jin","orcid":"https://orcid.org/0000-0002-1468-4701"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengping Jin","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","State Key Laboratory of Networking & Switching technology, Beijing University of Posts and telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"State Key Laboratory of Networking & Switching technology, Beijing University of Posts and telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101704074"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":12.9521,"has_fulltext":false,"cited_by_count":55,"citation_normalized_percentile":{"value":0.98655866,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":100},"biblio":{"volume":"27","issue":"1","first_page":"119","last_page":"129"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8113157153129578},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7552509307861328},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.648269772529602},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6412444114685059},{"id":"https://openalex.org/keywords/delegation","display_name":"Delegation","score":0.6054942607879639},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6038535833358765},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5907270908355713},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5624083876609802},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.4686417281627655},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3695659041404724},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.34729325771331787},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32907792925834656},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.19053584337234497},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.10887521505355835}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8113157153129578},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7552509307861328},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.648269772529602},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6412444114685059},{"id":"https://openalex.org/C86532276","wikidata":"https://www.wikidata.org/wiki/Q1184065","display_name":"Delegation","level":2,"score":0.6054942607879639},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6038535833358765},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5907270908355713},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5624083876609802},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.4686417281627655},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3695659041404724},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.34729325771331787},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32907792925834656},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19053584337234497},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10887521505355835},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tpds.2015.2392752","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tpds.2015.2392752","pdf_url":null,"source":{"id":"https://openalex.org/S97130795","display_name":"IEEE Transactions on Parallel and Distributed Systems","issn_l":"1045-9219","issn":["1045-9219","1558-2183","2161-9883"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Parallel and Distributed Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2001116396","display_name":null,"funder_award_id":"61100203","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2511172026","display_name":null,"funder_award_id":"61202434","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2750390525","display_name":null,"funder_award_id":"61272057","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3672490186","display_name":null,"funder_award_id":"61121061","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4558239745","display_name":null,"funder_award_id":"61300181","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5589471761","display_name":null,"funder_award_id":"2012RC0612","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G6494198124","display_name":null,"funder_award_id":"61170270","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G658215392","display_name":null,"funder_award_id":"2011YB01","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W99440539","https://openalex.org/W1564449568","https://openalex.org/W1974267799","https://openalex.org/W2008701790","https://openalex.org/W2034562114","https://openalex.org/W2044772384","https://openalex.org/W2125712803","https://openalex.org/W2138001464","https://openalex.org/W2146907493","https://openalex.org/W2157679418","https://openalex.org/W2169046918","https://openalex.org/W6602830368","https://openalex.org/W6606793380","https://openalex.org/W6629862473","https://openalex.org/W6630460208","https://openalex.org/W6637173333","https://openalex.org/W6637293744","https://openalex.org/W6638141237","https://openalex.org/W6665399786","https://openalex.org/W6675760616"],"related_works":["https://openalex.org/W4292493860","https://openalex.org/W2610824016","https://openalex.org/W1926412711","https://openalex.org/W2900495477","https://openalex.org/W4281710429","https://openalex.org/W2088645726","https://openalex.org/W3083611550","https://openalex.org/W2342926708","https://openalex.org/W2950231904","https://openalex.org/W2320472084"],"abstract_inverted_index":{"In":[0,159],"the":[1,11,20,34,37,41,46,65,72,74,81,97,108,115,117,135,170,173,178,181,189,201,212,217],"cloud,":[2],"for":[3,107,129,143],"achieving":[4],"access":[5,118,139,175],"control":[6,176],"and":[7,61,84,167,177,214],"keeping":[8],"data":[9,12,171],"confidential,":[10],"owners":[13],"could":[14,77],"adopt":[15],"attribute-based":[16,52,147],"encryption":[17,53,149],"to":[18,32,40,44,133],"encrypt":[19],"stored":[21],"data.":[22],"Users":[23],"with":[24,54,90,150,164],"limited":[25],"computing":[26,47,88,183],"power":[27],"are":[28,59,105,185],"however":[29],"more":[30],"likely":[31],"delegate":[33],"mask":[35],"of":[36,110,138,180,216],"decryption":[38],"task":[39],"cloud":[42,75],"servers":[43,76],"reduce":[45],"cost.":[48],"As":[49],"a":[50,86,141,161],"result,":[51],"delegation":[55,152],"emerges.":[56],"Still,":[57],"there":[58],"caveats":[60],"questions":[62],"remaining":[63],"in":[64,156],"previous":[66],"relevant":[67],"works.":[68],"For":[69],"instance,":[70],"during":[71,114],"delegation,":[73],"tamper":[78],"or":[79],"replace":[80],"delegated":[82,182],"ciphertext":[83],"respond":[85],"forged":[87],"result":[89],"malicious":[91],"intent.":[92],"They":[93],"may":[94,120],"also":[95],"cheat":[96],"eligible":[98],"users":[99],"by":[100],"responding":[101],"them":[102],"that":[103],"they":[104],"ineligible":[106],"purpose":[109],"cost":[111],"saving.":[112],"Furthermore,":[113],"encryption,":[116],"policies":[119],"not":[121],"be":[122],"flexible":[123],"enough":[124],"as":[125],"well.":[126],"Since":[127],"policy":[128],"general":[130],"circuits":[131],"enables":[132],"achieve":[134],"strongest":[136],"form":[137],"control,":[140],"construction":[142],"realizing":[144],"circuit":[145],"ciphertext-policy":[146],"hybrid":[148],"verifiable":[151,165],"has":[153],"been":[154],"considered":[155],"our":[157,193],"work.":[158],"such":[160],"system,":[162],"combined":[163],"computation":[166],"encrypt-then-mac":[168],"mechanism,":[169],"confidentiality,":[172],"fine-grained":[174],"correctness":[179],"results":[184],"well":[186],"guaranteed":[187],"at":[188],"same":[190],"time.":[191],"Besides,":[192],"scheme":[194],"achieves":[195],"security":[196],"against":[197],"chosen-plaintext":[198],"attacks":[199],"under":[200],"k-multilinear":[202],"Decisional":[203],"Diffie-Hellman":[204],"assumption.":[205],"Moreover,":[206],"an":[207],"extensive":[208],"simulation":[209],"campaign":[210],"confirms":[211],"feasibility":[213],"efficiency":[215],"proposed":[218],"solution.":[219]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":10},{"year":2017,"cited_by_count":13},{"year":2016,"cited_by_count":6}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
