{"id":"https://openalex.org/W2085733527","doi":"https://doi.org/10.1145/1030083.1030130","title":"ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption","display_name":"ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption","publication_year":2004,"publication_date":"2004-10-25","ids":{"openalex":"https://openalex.org/W2085733527","doi":"https://doi.org/10.1145/1030083.1030130","mag":"2085733527"},"language":"en","primary_location":{"id":"doi:10.1145/1030083.1030130","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1030083.1030130","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th ACM conference on Computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034366344","display_name":"Danfeng Yao","orcid":"https://orcid.org/0000-0001-8969-2792"},"institutions":[{"id":"https://openalex.org/I27804330","display_name":"Brown University","ror":"https://ror.org/05gq02987","country_code":"US","type":"education","lineage":["https://openalex.org/I27804330"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Danfeng Yao","raw_affiliation_strings":["Brown University, Providence, RI","Brown University, Providence, RI,"],"affiliations":[{"raw_affiliation_string":"Brown University, Providence, RI","institution_ids":["https://openalex.org/I27804330"]},{"raw_affiliation_string":"Brown University, Providence, RI,","institution_ids":["https://openalex.org/I27804330"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028509574","display_name":"Nelly Fazio","orcid":"https://orcid.org/0009-0000-8690-4112"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nelly Fazio","raw_affiliation_strings":["New York University, New York, NY"],"affiliations":[{"raw_affiliation_string":"New York University, New York, NY","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012298614","display_name":"Yevgeniy Dodis","orcid":"https://orcid.org/0000-0003-1013-6318"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yevgeniy Dodis","raw_affiliation_strings":["New York University, New York, NY"],"affiliations":[{"raw_affiliation_string":"New York University, New York, NY","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009958147","display_name":"Anna Lysyanskaya","orcid":"https://orcid.org/0000-0002-3567-3550"},"institutions":[{"id":"https://openalex.org/I27804330","display_name":"Brown University","ror":"https://ror.org/05gq02987","country_code":"US","type":"education","lineage":["https://openalex.org/I27804330"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anna Lysyanskaya","raw_affiliation_strings":["Brown University, Providence, RI","Brown University, Providence, RI,"],"affiliations":[{"raw_affiliation_string":"Brown University, Providence, RI","institution_ids":["https://openalex.org/I27804330"]},{"raw_affiliation_string":"Brown University, Providence, RI,","institution_ids":["https://openalex.org/I27804330"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5034366344"],"corresponding_institution_ids":["https://openalex.org/I27804330"],"apc_list":null,"apc_paid":null,"fwci":14.3906,"has_fulltext":false,"cited_by_count":155,"citation_normalized_percentile":{"value":0.98880267,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"354","last_page":"363"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9876000285148621,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7573390007019043},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.726458728313446},{"id":"https://openalex.org/keywords/broadcast-encryption","display_name":"Broadcast encryption","score":0.6330744624137878},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.5236737132072449},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.4764402508735657},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.47340306639671326},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.44352155923843384},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.4112558662891388},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4023003876209259},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39719516038894653},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2031177282333374}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7573390007019043},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.726458728313446},{"id":"https://openalex.org/C2778281673","wikidata":"https://www.wikidata.org/wiki/Q4972106","display_name":"Broadcast encryption","level":4,"score":0.6330744624137878},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.5236737132072449},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.4764402508735657},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.47340306639671326},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.44352155923843384},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.4112558662891388},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4023003876209259},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39719516038894653},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2031177282333374}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1030083.1030130","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1030083.1030130","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th ACM conference on Computer and communications security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7300000190734863,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1493284097","https://openalex.org/W1496346989","https://openalex.org/W1498063506","https://openalex.org/W1500493851","https://openalex.org/W1508689723","https://openalex.org/W1512186075","https://openalex.org/W1521410492","https://openalex.org/W1522268755","https://openalex.org/W1571147132","https://openalex.org/W1576892942","https://openalex.org/W1585977625","https://openalex.org/W1587391206","https://openalex.org/W1588301088","https://openalex.org/W1592092778","https://openalex.org/W1596144702","https://openalex.org/W1599446772","https://openalex.org/W1603068992","https://openalex.org/W1994386233","https://openalex.org/W1995261385","https://openalex.org/W2052267638","https://openalex.org/W2074963925","https://openalex.org/W2086042811","https://openalex.org/W2114296987","https://openalex.org/W2117685508","https://openalex.org/W2129876196","https://openalex.org/W2143545186","https://openalex.org/W2145255308","https://openalex.org/W2164052311","https://openalex.org/W2166602595","https://openalex.org/W2168571148","https://openalex.org/W2227653143","https://openalex.org/W2293059766","https://openalex.org/W2397835572","https://openalex.org/W2914756988","https://openalex.org/W2950645667","https://openalex.org/W3022078572","https://openalex.org/W4311219689","https://openalex.org/W6629973413","https://openalex.org/W6679458432","https://openalex.org/W6712573911"],"related_works":["https://openalex.org/W2361619969","https://openalex.org/W2144246620","https://openalex.org/W2188276378","https://openalex.org/W2389178160","https://openalex.org/W2396533199","https://openalex.org/W2111426419","https://openalex.org/W2387840805","https://openalex.org/W3181603331","https://openalex.org/W1571437658","https://openalex.org/W2000142885"],"abstract_inverted_index":{"A":[0],"forward-secure":[1,44,65],"encryption":[2,24,32,68,80,92],"scheme":[3,47,58],"protects":[4,71],"secret":[5,38],"keys":[6,12,39],"from":[7],"exposure":[8],"by":[9],"evolving":[10],"the":[11,49,72,78,118,123],"with":[13,101],"time.":[14],"Forward":[15],"security":[16,111],"has":[17],"several":[18],"unique":[19],"requirements":[20],"in":[21,77,106,122],"hierarchical":[22,90],"identity-based":[23],"(HIBE)":[25],"scheme:":[26],"(1)":[27],"users":[28,36],"join":[29],"dynamically;":[30],"(2)":[31],"is":[33,115],"joining-time-oblivious;":[34],"(3)":[35],"evolve":[37],"autonomously.We":[40],"present":[41],"a":[42,64,87],"scalable":[43],"HIBE":[45],"(fs-HIBE)":[46],"satisfying":[48],"above":[50],"properties.":[51],"We":[52,82],"also":[53],"show":[54],"how":[55],"our":[56,113],"fs-HIBE":[57,85],"can":[59,95],"be":[60,96],"used":[61,97],"to":[62],"construct":[63],"public-key":[66],"broadcast":[67,79],"scheme,":[69,93],"which":[70,94],"secrecy":[73],"of":[74,112],"prior":[75],"transmissions":[76],"setting.":[81],"further":[83],"generalize":[84],"into":[86],"collusion-resistant":[88],"multiple":[89,104],"ID-based":[91],"for":[98],"secure":[99],"communications":[100],"entities":[102],"having":[103],"roles":[105],"role-based":[107],"access":[108],"control.":[109],"The":[110],"schemes":[114],"based":[116],"on":[117],"bilinear":[119],"Diffie-Hellman":[120],"assumption":[121],"random":[124],"oracle":[125],"model.":[126]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":9},{"year":2013,"cited_by_count":6},{"year":2012,"cited_by_count":13}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
