{"id":"https://openalex.org/W2086642346","doi":"https://doi.org/10.1145/1966913.1966964","title":"Multi-authority ciphertext-policy attribute-based encryption with accountability","display_name":"Multi-authority ciphertext-policy attribute-based encryption with accountability","publication_year":2011,"publication_date":"2011-03-22","ids":{"openalex":"https://openalex.org/W2086642346","doi":"https://doi.org/10.1145/1966913.1966964","mag":"2086642346"},"language":"en","primary_location":{"id":"doi:10.1145/1966913.1966964","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1966913.1966964","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5117779816","display_name":"Jin Li","orcid":"https://orcid.org/0000-0001-8422-1115"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jin Li","raw_affiliation_strings":["Guangzhou University, Guangzhou, P.R. China"],"affiliations":[{"raw_affiliation_string":"Guangzhou University, Guangzhou, P.R. China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011282586","display_name":"Qiong Huang","orcid":"https://orcid.org/0000-0002-7666-8985"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Qiong Huang","raw_affiliation_strings":["City University of Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"City University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047378133","display_name":"Xiaofeng Chen","orcid":"https://orcid.org/0000-0001-5858-5070"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofeng Chen","raw_affiliation_strings":["Xidian University"],"affiliations":[{"raw_affiliation_string":"Xidian University","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067752906","display_name":"Sherman S. M. Chow","orcid":"https://orcid.org/0000-0001-7306-453X"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Sherman S. M. Chow","raw_affiliation_strings":["University of Waterloo, Waterloo, Ontario, Canada","University of Waterloo, Waterloo, Ontario, CANADA"],"affiliations":[{"raw_affiliation_string":"University of Waterloo, Waterloo, Ontario, Canada","institution_ids":["https://openalex.org/I151746483"]},{"raw_affiliation_string":"University of Waterloo, Waterloo, Ontario, CANADA","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113580468","display_name":"Duncan S. Wong","orcid":null},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Duncan S. Wong","raw_affiliation_strings":["City University of Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"City University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088488171","display_name":"Dongqing Xie","orcid":"https://orcid.org/0000-0003-2084-3075"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongqing Xie","raw_affiliation_strings":["Guangzhou University, P.R. China","Guangzhou University, P. R. China"],"affiliations":[{"raw_affiliation_string":"Guangzhou University, P.R. China","institution_ids":["https://openalex.org/I37987034"]},{"raw_affiliation_string":"Guangzhou University, P. R. China","institution_ids":["https://openalex.org/I37987034"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5117779816"],"corresponding_institution_ids":["https://openalex.org/I37987034"],"apc_list":null,"apc_paid":null,"fwci":16.4284,"has_fulltext":false,"cited_by_count":172,"citation_normalized_percentile":{"value":0.99137173,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"386","last_page":"390"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.7713755965232849},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.711165189743042},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6604752540588379},{"id":"https://openalex.org/keywords/accountability","display_name":"Accountability","score":0.645164430141449},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6309601068496704},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5798581838607788},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.5755558609962463},{"id":"https://openalex.org/keywords/plaintext-aware-encryption","display_name":"Plaintext-aware encryption","score":0.4888765215873718},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.2745925784111023},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.19980397820472717},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.15361005067825317}],"concepts":[{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.7713755965232849},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.711165189743042},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6604752540588379},{"id":"https://openalex.org/C2776007630","wikidata":"https://www.wikidata.org/wiki/Q2798912","display_name":"Accountability","level":2,"score":0.645164430141449},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6309601068496704},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5798581838607788},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.5755558609962463},{"id":"https://openalex.org/C119133118","wikidata":"https://www.wikidata.org/wiki/Q7200761","display_name":"Plaintext-aware encryption","level":5,"score":0.4888765215873718},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.2745925784111023},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.19980397820472717},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.15361005067825317}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1966913.1966964","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1966913.1966964","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7699999809265137,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G531018933","display_name":null,"funder_award_id":"60970144","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W36205663","https://openalex.org/W1498316612","https://openalex.org/W1513551553","https://openalex.org/W1655672343","https://openalex.org/W1763482972","https://openalex.org/W1976420017","https://openalex.org/W2101709669","https://openalex.org/W2104939601","https://openalex.org/W2108072891","https://openalex.org/W2125974812","https://openalex.org/W2138001464","https://openalex.org/W2171440248","https://openalex.org/W2241131553","https://openalex.org/W2405210915","https://openalex.org/W6637979471"],"related_works":["https://openalex.org/W2146985619","https://openalex.org/W2368943972","https://openalex.org/W2530833777","https://openalex.org/W2015940479","https://openalex.org/W2809908797","https://openalex.org/W165895243","https://openalex.org/W3108380369","https://openalex.org/W2754273116","https://openalex.org/W2539919741","https://openalex.org/W4362709186"],"abstract_inverted_index":{"Attribute-based":[0],"encryption":[1,55],"(ABE)":[2],"is":[3,149,155],"a":[4,30,37,73,77,104,121],"promising":[5],"tool":[6],"for":[7,56],"implementing":[8],"fine-grained":[9],"cryptographic":[10],"access":[11],"control.":[12],"Very":[13],"recently,":[14],"motivated":[15],"by":[16,45,87],"reducing":[17],"the":[18,22,26,62,85,89,118,126,134,140,144,159,162],"trust":[19,135],"assumption":[20],"on":[21,139],"authority,":[23],"and":[24,47,131,151],"enhancing":[25],"privacy":[27],"of":[28,96,120,161],"users,":[29],"multiple-authority":[31],"key-policy":[32],"ABE":[33,53,111],"system,":[34],"together":[35],"with":[36,59,109,113],"semi-generic":[38],"anonymous":[39],"key-issuing":[40],"protocol,":[41],"have":[42],"been":[43],"proposed":[44],"Chase":[46],"Chow":[48],"in":[49],"CCS":[50],"2009.":[51],"Since":[52],"allows":[54,116],"multiple":[57],"users":[58],"attributes":[60],"satisfying":[61],"same":[63],"policy,":[64],"it":[65],"may":[66],"not":[67,137],"be":[68],"always":[69],"possible":[70],"to":[71,76,91,129,158],"associate":[72],"decryption":[74,127],"key":[75,90,128],"particular":[78],"individual.":[79],"A":[80],"misbehaving":[81,122],"user":[82,123],"could":[83],"abuse":[84],"anonymity":[86],"leaking":[88],"someone":[92],"else,":[93],"without":[94],"worrying":[95],"being":[97],"traced.":[98],"In":[99],"this":[100],"paper,":[101],"we":[102],"propose":[103],"multi-authority":[105],"ciphertext-policy":[106],"(AND":[107],"gates":[108],"wildcard)":[110],"scheme":[112],"accountability,":[114],"which":[115],"tracing":[117,147],"identity":[119],"who":[124],"leaked":[125],"others,":[130],"thus":[132],"reduces":[133],"assumptions":[136],"only":[138,156],"authorities":[141],"but":[142],"also":[143],"users.":[145],"The":[146],"process":[148],"efficient":[150],"its":[152],"computational":[153],"overhead":[154],"proportional":[157],"length":[160],"identity.":[163]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":18},{"year":2020,"cited_by_count":17},{"year":2019,"cited_by_count":15},{"year":2018,"cited_by_count":17},{"year":2017,"cited_by_count":17},{"year":2016,"cited_by_count":16},{"year":2015,"cited_by_count":14},{"year":2014,"cited_by_count":17},{"year":2013,"cited_by_count":10},{"year":2012,"cited_by_count":9}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
