{"id":"https://openalex.org/W7127154186","doi":"https://doi.org/10.1109/trustcom66490.2025.00221","title":"Traceable and Revocable Key-Policy Attribute-Based Encryption scheme from Lattices","display_name":"Traceable and Revocable Key-Policy Attribute-Based Encryption scheme from Lattices","publication_year":2025,"publication_date":"2025-11-14","ids":{"openalex":"https://openalex.org/W7127154186","doi":"https://doi.org/10.1109/trustcom66490.2025.00221"},"language":null,"primary_location":{"id":"doi:10.1109/trustcom66490.2025.00221","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom66490.2025.00221","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 24th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124807117","display_name":"Yanqi Ma","orcid":null},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanqi Ma","raw_affiliation_strings":["Nanjing University of Science and Technology,School of Cyber Science and Engineering,Nanjing,China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Science and Technology,School of Cyber Science and Engineering,Nanjing,China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041271626","display_name":"Yuan Liu","orcid":"https://orcid.org/0000-0003-3619-0099"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Liu","raw_affiliation_strings":["Nanjing University of Science and Technology,School of Cyber Science and Engineering,Nanjing,China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Science and Technology,School of Cyber Science and Engineering,Nanjing,China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063991302","display_name":"Yongbin Zhou","orcid":"https://orcid.org/0000-0002-1337-0655"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongbin Zhou","raw_affiliation_strings":["Nanjing University of Science and Technology,School of Cyber Science and Engineering,Nanjing,China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Science and Technology,School of Cyber Science and Engineering,Nanjing,China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5124868646","display_name":"Yiwen Gao","orcid":null},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiwen Gao","raw_affiliation_strings":["Nanjing University of Science and Technology,School of Cyber Science and Engineering,Nanjing,China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Science and Technology,School of Cyber Science and Engineering,Nanjing,China","institution_ids":["https://openalex.org/I36399199"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5124807117"],"corresponding_institution_ids":["https://openalex.org/I36399199"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.84322797,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1914","last_page":"1920"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9110000133514404,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9110000133514404,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.014100000262260437,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.008299999870359898,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/traitor-tracing","display_name":"Traitor tracing","score":0.7599999904632568},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.7562999725341797},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5501000285148621},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5367000102996826},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5263000130653381},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5015000104904175},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.41819998621940613},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4018000066280365},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.38350000977516174},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.3752000033855438}],"concepts":[{"id":"https://openalex.org/C2781411299","wikidata":"https://www.wikidata.org/wiki/Q7833043","display_name":"Traitor tracing","level":4,"score":0.7599999904632568},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.7562999725341797},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6965000033378601},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6854000091552734},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5501000285148621},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5367000102996826},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5263000130653381},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5015000104904175},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.41819998621940613},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4018000066280365},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.38350000977516174},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.3752000033855438},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3702000081539154},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.36570000648498535},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.33719998598098755},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.33309999108314514},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.3165999948978424},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.3142000138759613},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3100999891757965},{"id":"https://openalex.org/C2778281673","wikidata":"https://www.wikidata.org/wiki/Q4972106","display_name":"Broadcast encryption","level":4,"score":0.3100000023841858},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.30649998784065247},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3021000027656555},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.30169999599456787},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.3010999858379364},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.29899999499320984},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.2872999906539917},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.2612000107765198},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.2551000118255615},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.2526000142097473},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.2502000033855438}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/trustcom66490.2025.00221","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom66490.2025.00221","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 24th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6758636832237244}],"awards":[],"funders":[{"id":"https://openalex.org/F4320337495","display_name":"Technology Development","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1498316612","https://openalex.org/W1582733026","https://openalex.org/W1670326208","https://openalex.org/W2024311309","https://openalex.org/W2061949491","https://openalex.org/W2098290658","https://openalex.org/W2108072891","https://openalex.org/W2122973102","https://openalex.org/W2138001464","https://openalex.org/W2775185027","https://openalex.org/W2896390785","https://openalex.org/W3006203549","https://openalex.org/W3010457411","https://openalex.org/W3047472941","https://openalex.org/W3048323550","https://openalex.org/W4211008561","https://openalex.org/W4327892673","https://openalex.org/W4387913898","https://openalex.org/W4397024213","https://openalex.org/W4402308865"],"related_works":[],"abstract_inverted_index":{"ABE":[0,27,43],"as":[1,18,54],"a":[2,120,141],"powerful":[3],"tool":[4],"for":[5,206],"secure":[6,208],"fine-grained":[7],"access":[8,106,170],"control,":[9],"has":[10],"been":[11],"widely":[12],"adopted":[13],"in":[14,105,154,168,180],"data-sharing":[15],"scenarios":[16],"such":[17,53],"cloud":[19],"computing.":[20],"However,":[21],"most":[22],"existing":[23,81],"traceable":[24,82,121],"and":[25,34,57,83,95,122,150,172,185,196,203],"revocable":[26,68,84,123],"schemes":[28,44,70,86],"are":[29,35,71],"constructed":[30],"using":[31],"bilinear":[32],"pairings":[33],"thus":[36],"vulnerable":[37],"to":[38,63,73,89,148],"quantum":[39],"attacks.":[40],"Although":[41],"lattice-based":[42,69,85],"provide":[45],"post-quantum":[46,207],"security,":[47],"they":[48],"often":[49],"lack":[50],"critical":[51],"features":[52],"traitor":[55],"tracing":[56,143],"timely":[58],"revocation,":[59],"which":[60],"may":[61],"lead":[62],"key":[64,139,157],"abuse":[65],"problem.":[66],"Some":[67],"unable":[72],"identify":[74],"the":[75,100,114,134,138,146,169,181,191],"source":[76],"of":[77,102,156],"leaked":[78],"keys,":[79],"while":[80,198],"also":[87,160],"fail":[88],"resist":[90],"collusion":[91,174],"attacks":[92,175],"between":[93],"revoked":[94],"un-revoked":[96],"users.":[97],"In":[98],"addition,":[99],"exposure":[101],"attribute":[103,162,166],"values":[104,167],"policies":[107],"poses":[108],"serious":[109],"privacy":[110,163,197],"risks.":[111],"To":[112],"solve":[113],"above":[115],"issues,":[116],"this":[117],"paper":[118],"proposes":[119],"KP-ABE":[124],"scheme":[125,132,193],"based":[126],"on":[127],"RLWE":[128],"assumption.":[129],"The":[130],"proposed":[131,192],"embeds":[133],"user":[135],"identity":[136],"into":[137],"through":[140],"white-box":[142],"mechanism,":[144],"enabling":[145],"system":[147],"detect":[149],"revoke":[151],"malicious":[152],"users":[153],"case":[155],"leakage.":[158],"It":[159],"protects":[161],"by":[164,176],"hiding":[165],"policy":[171],"resists":[173],"embedding":[177],"random":[178],"parameters":[179],"key.":[182],"Theoretical":[183],"analysis":[184],"experimental":[186],"evaluation":[187],"results":[188],"show":[189],"that":[190],"ensures":[194],"security":[195],"maintaining":[199],"high":[200],"computational":[201],"efficiency":[202],"is":[204],"suitable":[205],"data":[209],"sharing":[210],"environments.":[211]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-02-03T00:00:00"}
