{"id":"https://openalex.org/W2316967260","doi":"https://doi.org/10.1109/tpds.2015.2448095","title":"TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage","display_name":"TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage","publication_year":2015,"publication_date":"2015-06-22","ids":{"openalex":"https://openalex.org/W2316967260","doi":"https://doi.org/10.1109/tpds.2015.2448095","mag":"2316967260"},"language":"en","primary_location":{"id":"doi:10.1109/tpds.2015.2448095","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tpds.2015.2448095","pdf_url":null,"source":{"id":"https://openalex.org/S97130795","display_name":"IEEE Transactions on Parallel and Distributed Systems","issn_l":"1045-9219","issn":["1045-9219","1558-2183","2161-9883"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Parallel and Distributed Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101556570","display_name":"Wei Li","orcid":"https://orcid.org/0000-0002-2714-486X"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Li","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, University of Science and Technology of China, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100688242","display_name":"Kaiping Xue","orcid":"https://orcid.org/0000-0003-2095-7523"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kaiping Xue","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, University of Science and Technology of China, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031912520","display_name":"Yingjie Xue","orcid":"https://orcid.org/0000-0003-1421-5427"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingjie Xue","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, University of Science and Technology of China, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110562345","display_name":"Jianan Hong","orcid":"https://orcid.org/0009-0000-1452-5252"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianan Hong","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, University of Science and Technology of China, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101556570"],"corresponding_institution_ids":["https://openalex.org/I126520041"],"apc_list":null,"apc_paid":null,"fwci":17.2576,"has_fulltext":false,"cited_by_count":151,"citation_normalized_percentile":{"value":0.99184203,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"27","issue":"5","first_page":"1484","last_page":"1496"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.7762339115142822},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6581025123596191},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5552557706832886},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5229038596153259},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5225752592086792},{"id":"https://openalex.org/keywords/notation","display_name":"Notation","score":0.5094712376594543},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.4905485510826111},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.4618609845638275},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4575582444667816},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4554341733455658},{"id":"https://openalex.org/keywords/disjoint-sets","display_name":"Disjoint sets","score":0.44346556067466736},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.43768876791000366},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.42971283197402954},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.42853793501853943},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.4106544852256775},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.34383922815322876},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.24866443872451782},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.1712174415588379},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.1700545847415924},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.0813351571559906},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07603996992111206}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.7762339115142822},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6581025123596191},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5552557706832886},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5229038596153259},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5225752592086792},{"id":"https://openalex.org/C45357846","wikidata":"https://www.wikidata.org/wiki/Q2001982","display_name":"Notation","level":2,"score":0.5094712376594543},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.4905485510826111},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.4618609845638275},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4575582444667816},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4554341733455658},{"id":"https://openalex.org/C45340560","wikidata":"https://www.wikidata.org/wiki/Q215382","display_name":"Disjoint sets","level":2,"score":0.44346556067466736},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.43768876791000366},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.42971283197402954},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.42853793501853943},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.4106544852256775},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.34383922815322876},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.24866443872451782},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.1712174415588379},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.1700545847415924},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0813351571559906},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07603996992111206},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tpds.2015.2448095","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tpds.2015.2448095","pdf_url":null,"source":{"id":"https://openalex.org/S97130795","display_name":"IEEE Transactions on Parallel and Distributed Systems","issn_l":"1045-9219","issn":["1045-9219","1558-2183","2161-9883"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Parallel and Distributed Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4300000071525574,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G8151885041","display_name":null,"funder_award_id":"61379129","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8811280173","display_name":null,"funder_award_id":"61170231","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W123899820","https://openalex.org/W177444027","https://openalex.org/W187807889","https://openalex.org/W1498316612","https://openalex.org/W1510795740","https://openalex.org/W1511886987","https://openalex.org/W1513098086","https://openalex.org/W1682451491","https://openalex.org/W1763482972","https://openalex.org/W1976420017","https://openalex.org/W1983238288","https://openalex.org/W1993341076","https://openalex.org/W1994029267","https://openalex.org/W2014143000","https://openalex.org/W2015218975","https://openalex.org/W2021256553","https://openalex.org/W2039074122","https://openalex.org/W2044772384","https://openalex.org/W2048862659","https://openalex.org/W2066614063","https://openalex.org/W2076046175","https://openalex.org/W2097407854","https://openalex.org/W2101709669","https://openalex.org/W2108072891","https://openalex.org/W2113857797","https://openalex.org/W2116626915","https://openalex.org/W2117616411","https://openalex.org/W2118875948","https://openalex.org/W2123389487","https://openalex.org/W2125871822","https://openalex.org/W2138001464","https://openalex.org/W2141420453","https://openalex.org/W2168970529","https://openalex.org/W2170561193","https://openalex.org/W2275530856","https://openalex.org/W2397160726","https://openalex.org/W3099303134","https://openalex.org/W4231540666","https://openalex.org/W6694821995","https://openalex.org/W6712045813"],"related_works":["https://openalex.org/W1557783852","https://openalex.org/W1474916271","https://openalex.org/W2363629235","https://openalex.org/W2998215210","https://openalex.org/W3088939963","https://openalex.org/W2375034746","https://openalex.org/W3199385136","https://openalex.org/W1504170878","https://openalex.org/W2963202145","https://openalex.org/W2357761884"],"abstract_inverted_index":{"Attribute-based":[0],"Encryption":[1],"(ABE)":[2],"is":[3,147],"regarded":[4],"as":[5,202,204],"a":[6,41,79,98,124,189],"promising":[7],"cryptographic":[8],"conducting":[9],"tool":[10],"to":[11,32],"guarantee":[12],"data":[13,19],"owners\u2019":[14],"direct":[15],"control":[16,84],"over":[17],"their":[18],"in":[20,55,92,174],"public":[21,87],"cloud":[22,88],"storage.":[23],"The":[24],"earlier":[25],"ABE":[26],"schemes":[27,52],"involve":[28],"only":[29,149],"one":[30],"authority":[31],"maintain":[33,60],"the":[34,65,114,175,181,194],"whole":[35],"attribute":[36,62,100],"set,":[37],"which":[38,56,93,192],"can":[39,117,127],"bring":[40],"single-point":[42,66],"bottleneck":[43,67],"on":[44],"both":[45],"security":[46,206],"and":[47,123,140,207],"performance.":[48],"Subsequently,":[49],"some":[50],"multi-authority":[51,81,183],"are":[53,159,172],"proposed,":[54],"multiple":[57,94,121],"authorities":[58,95,158,171,201],"separately":[59],"disjoint":[61],"subsets.":[63],"However,":[64],"problem":[68],"remains":[69],"unsolved.":[70],"In":[71,102],"this":[72],"paper,":[73],"from":[74,199],"another":[75],"perspective,":[76],"we":[77,187],"conduct":[78],"threshold":[80,111],"CP-ABE":[82],"access":[83],"scheme":[85,184],"for":[86],"storage,":[89],"named":[90],"TMACS,":[91,103,186],"jointly":[96],"manage":[97],"uniform":[99],"set.":[101],"taking":[104],"advantage":[105],"of":[106,196],"(":[107],"<inline-formula><tex-math":[108,136],"notation=\"LaTeX\">$t,n$</tex-math></inline-formula>":[109],")":[110],"secret":[112,130],"sharing,":[113],"master":[115],"key":[116,131],"be":[118],"shared":[119],"among":[120],"authorities,":[122],"legal":[125],"user":[126],"generate":[128],"his/her":[129],"by":[132,178],"interacting":[133],"with":[134,185],"any":[135],"notation=\"LaTeX\">$t$</tex-math></inline-formula>":[137,157,170],"authorities.":[138],"Security":[139],"performance":[141],"analysis":[142],"results":[143],"show":[144],"that":[145],"TMACS":[146],"not":[148],"verifiable":[150],"secure":[151],"when":[152,164],"less":[153,166],"than":[154,167],"<inline-formula>":[155,168],"<tex-math":[156,169],"compromised,":[160],"but":[161],"also":[162],"robust":[163],"no":[165],"alive":[173],"system.":[176],"Furthermore,":[177],"efficiently":[179],"combining":[180],"traditional":[182],"construct":[188],"hybrid":[190],"one,":[191],"satisfies":[193],"scenario":[195],"attributes":[197],"coming":[198],"different":[200],"well":[203],"achieving":[205],"system-level":[208],"robustness.":[209]},"counts_by_year":[{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":18},{"year":2022,"cited_by_count":21},{"year":2021,"cited_by_count":17},{"year":2020,"cited_by_count":15},{"year":2019,"cited_by_count":21},{"year":2018,"cited_by_count":23},{"year":2017,"cited_by_count":14},{"year":2016,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
