{"id":"https://openalex.org/W3011731370","doi":"https://doi.org/10.1142/s0129054120500021","title":"CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution","display_name":"CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution","publication_year":2020,"publication_date":"2020-02-01","ids":{"openalex":"https://openalex.org/W3011731370","doi":"https://doi.org/10.1142/s0129054120500021","mag":"3011731370"},"language":"en","primary_location":{"id":"doi:10.1142/s0129054120500021","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0129054120500021","pdf_url":null,"source":{"id":"https://openalex.org/S68047077","display_name":"International Journal of Foundations of Computer Science","issn_l":"0129-0541","issn":["0129-0541","1793-6373"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Foundations of Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087052346","display_name":"Yinxia Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I152031979","display_name":"Nanjing Normal University","ror":"https://ror.org/036trcv74","country_code":"CN","type":"education","lineage":["https://openalex.org/I152031979"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yinxia Sun","raw_affiliation_strings":["School of Computer Science and Technology, Nanjing Normal University, Nanjing, 210023, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Nanjing Normal University, Nanjing, 210023, China","institution_ids":["https://openalex.org/I152031979"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027615941","display_name":"Futai Zhang","orcid":"https://orcid.org/0000-0001-8984-1030"},"institutions":[{"id":"https://openalex.org/I152031979","display_name":"Nanjing Normal University","ror":"https://ror.org/036trcv74","country_code":"CN","type":"education","lineage":["https://openalex.org/I152031979"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Futai Zhang","raw_affiliation_strings":["School of Computer Science and Technology, Nanjing Normal University, Nanjing, 210023, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Nanjing Normal University, Nanjing, 210023, China","institution_ids":["https://openalex.org/I152031979"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048592388","display_name":"Anmin Fu","orcid":"https://orcid.org/0000-0002-1632-5737"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Anmin Fu","raw_affiliation_strings":["School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083800827","display_name":"Zhe Xia","orcid":"https://orcid.org/0000-0003-4397-1248"},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhe Xia","raw_affiliation_strings":["School of Computer Science, Wuhan University of Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Wuhan University of Technology, Wuhan, China","institution_ids":["https://openalex.org/I196699116"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5087052346"],"corresponding_institution_ids":["https://openalex.org/I152031979"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.02588811,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":"31","issue":"02","first_page":"175","last_page":"191"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.7709263563156128},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7422714233398438},{"id":"https://openalex.org/keywords/key-escrow","display_name":"Key escrow","score":0.7298551797866821},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.7001587152481079},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6287820935249329},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.6118529438972473},{"id":"https://openalex.org/keywords/revocation-list","display_name":"Revocation list","score":0.5956466794013977},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.589747965335846},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.54787677526474},{"id":"https://openalex.org/keywords/ciphertext-indistinguishability","display_name":"Ciphertext indistinguishability","score":0.45769837498664856},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4391515851020813},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.43585652112960815},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.4243668019771576},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.33738815784454346},{"id":"https://openalex.org/keywords/malleability","display_name":"Malleability","score":0.28065216541290283}],"concepts":[{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7709263563156128},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7422714233398438},{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.7298551797866821},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.7001587152481079},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6287820935249329},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.6118529438972473},{"id":"https://openalex.org/C147296133","wikidata":"https://www.wikidata.org/wiki/Q196765","display_name":"Revocation list","level":5,"score":0.5956466794013977},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.589747965335846},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.54787677526474},{"id":"https://openalex.org/C182776695","wikidata":"https://www.wikidata.org/wiki/Q840661","display_name":"Ciphertext indistinguishability","level":5,"score":0.45769837498664856},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4391515851020813},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.43585652112960815},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.4243668019771576},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.33738815784454346},{"id":"https://openalex.org/C100980136","wikidata":"https://www.wikidata.org/wiki/Q4668956","display_name":"Malleability","level":4,"score":0.28065216541290283},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0129054120500021","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0129054120500021","pdf_url":null,"source":{"id":"https://openalex.org/S68047077","display_name":"International Journal of Foundations of Computer Science","issn_l":"0129-0541","issn":["0129-0541","1793-6373"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Foundations of Computer Science","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5799999833106995,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1574563481","https://openalex.org/W1591524234","https://openalex.org/W1756601563","https://openalex.org/W1971361579","https://openalex.org/W2046793054","https://openalex.org/W2068741342","https://openalex.org/W2106116277","https://openalex.org/W2132021741","https://openalex.org/W2137807850","https://openalex.org/W2146149890","https://openalex.org/W2152924492","https://openalex.org/W2184323066","https://openalex.org/W2295943987","https://openalex.org/W2464507173","https://openalex.org/W2546007168","https://openalex.org/W2734535740","https://openalex.org/W2808619793"],"related_works":["https://openalex.org/W1532067216","https://openalex.org/W4244357787","https://openalex.org/W2019016802","https://openalex.org/W18157873","https://openalex.org/W3134299866","https://openalex.org/W1494030766","https://openalex.org/W3118037924","https://openalex.org/W4287547098","https://openalex.org/W2910761843","https://openalex.org/W3104200139"],"abstract_inverted_index":{"Certificateless":[0],"cryptosystems":[1,18],"have":[2],"attracted":[3],"great":[4],"interests":[5],"in":[6,67,120,176],"cryptographic":[7],"research":[8],"since":[9],"its":[10],"invention.":[11],"Because":[12],"compared":[13],"with":[14,133],"traditional":[15],"public":[16,59],"key":[17,34,57],"or":[19],"identity-based":[20],"cryptosystems,":[21,39],"they":[22],"could":[23],"not":[24],"only":[25,156],"simplify":[26],"the":[27,33,56,64,74,79,90,93,99,105,108,154,177,180],"certificate":[28],"management,":[29],"but":[30,89],"also":[31],"alleviate":[32],"escrow":[35],"problem.":[36],"In":[37,150],"certificateless":[38,131],"user":[40,80,101,155,166],"revocation":[41],"is":[42,53,116,167,184],"a":[43,84,117,138,165],"challenging":[44],"issue.":[45],"To":[46,123],"address":[47],"this":[48,68,115,127],"issue,":[49],"one":[50,160],"popular":[51],"method":[52],"to":[54,82,112,158,197],"update":[55],"via":[58],"channels.":[60],"However,":[61],"most":[62],"of":[63,73,86,92,107,189],"existing":[65],"schemes":[66,193],"approach":[69],"are":[70,194],"impractical":[71],"because":[72],"following":[75],"two":[76],"shortcomings.":[77],"Firstly,":[78],"needs":[81,157],"maintain":[83],"list":[85,94],"decryption":[87,161],"keys,":[88],"size":[91],"will":[95],"keep":[96,159],"increasing.":[97],"Secondly,":[98],"revoked":[100],"can":[102,146,170],"still":[103],"recover":[104],"plaintexts":[106],"encrypted":[109],"data":[110],"prior":[111],"revocation,":[113],"and":[114,141,163],"particular":[118],"threat":[119],"some":[121],"applications.":[122],"solve":[124],"these":[125,199],"problems,":[126],"paper":[128],"presents":[129],"revocable":[130],"encryption":[132],"ciphertext":[134,175],"evolution.":[135],"We":[136],"give":[137],"generic":[139],"construction":[140],"then":[142],"describe":[143],"how":[144],"it":[145,169],"be":[147],"initialized":[148],"concretely.":[149],"our":[151,192],"proposed":[152],"scheme,":[153],"key,":[162],"once":[164],"revoked,":[168],"no":[171],"longer":[172],"decrypt":[173],"any":[174],"server.":[178],"Moreover,":[179],"IND-CCA":[181],"security":[182,200],"model":[183],"defined":[185],"against":[186],"three":[187],"types":[188],"attacks.":[190],"And":[191],"formally":[195],"proved":[196],"satisfy":[198],"requirements.":[201]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
