{"id":"https://openalex.org/W2000732468","doi":"https://doi.org/10.1145/2714576.2714632","title":"Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data","display_name":"Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data","publication_year":2015,"publication_date":"2015-04-03","ids":{"openalex":"https://openalex.org/W2000732468","doi":"https://doi.org/10.1145/2714576.2714632","mag":"2000732468"},"language":"en","primary_location":{"id":"doi:10.1145/2714576.2714632","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2714576.2714632","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021101025","display_name":"Hua Deng","orcid":"https://orcid.org/0000-0002-0089-0870"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hua Deng","raw_affiliation_strings":["Wuhan University, Wuhan, China","Wuhan University, Wuhan China#TAB#"],"affiliations":[{"raw_affiliation_string":"Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"Wuhan University, Wuhan China#TAB#","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022955566","display_name":"Qianhong Wu","orcid":"https://orcid.org/0000-0002-6407-4194"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianhong Wu","raw_affiliation_strings":["Beihang University, Beijing, China","BeiHang University, BeiJing, China"],"affiliations":[{"raw_affiliation_string":"Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"BeiHang University, BeiJing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111808632","display_name":"Bo Qin","orcid":"https://orcid.org/0000-0001-6015-7788"},"institutions":[{"id":"https://openalex.org/I78988378","display_name":"Renmin University of China","ror":"https://ror.org/041pakw92","country_code":"CN","type":"education","lineage":["https://openalex.org/I78988378"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Qin","raw_affiliation_strings":["Renmin University of China, Beijing, China","Renmin Univ. of China, Beijing - China#TAB#"],"affiliations":[{"raw_affiliation_string":"Renmin University of China, Beijing, China","institution_ids":["https://openalex.org/I78988378"]},{"raw_affiliation_string":"Renmin Univ. of China, Beijing - China#TAB#","institution_ids":["https://openalex.org/I78988378"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["University of Wollongong, Wollongong, Australia"],"affiliations":[{"raw_affiliation_string":"University of Wollongong, Wollongong, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023687478","display_name":"Joseph K. Liu","orcid":"https://orcid.org/0000-0001-6656-6240"},"institutions":[{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Joseph Liu","raw_affiliation_strings":["Institute for Infocomm Research, Singapore, China","Institute for Infocomm Research, Singapore, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Institute for Infocomm Research, Singapore, China","institution_ids":["https://openalex.org/I3005327000"]},{"raw_affiliation_string":"Institute for Infocomm Research, Singapore, China#TAB#","institution_ids":["https://openalex.org/I3005327000"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017405627","display_name":"Wenchang Shi","orcid":"https://orcid.org/0000-0002-5160-1223"},"institutions":[{"id":"https://openalex.org/I78988378","display_name":"Renmin University of China","ror":"https://ror.org/041pakw92","country_code":"CN","type":"education","lineage":["https://openalex.org/I78988378"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenchang Shi","raw_affiliation_strings":["Renmin University of China, Beijing, China","Renmin Univ. of China, Beijing - China#TAB#"],"affiliations":[{"raw_affiliation_string":"Renmin University of China, Beijing, China","institution_ids":["https://openalex.org/I78988378"]},{"raw_affiliation_string":"Renmin Univ. of China, Beijing - China#TAB#","institution_ids":["https://openalex.org/I78988378"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5021101025"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":4.4483,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.94783495,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"393","last_page":"404"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8203078508377075},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6033351421356201},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6007385849952698},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5976911187171936},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.525276780128479},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4580255448818207},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44145268201828003},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.42867618799209595},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.20249414443969727}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8203078508377075},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6033351421356201},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6007385849952698},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5976911187171936},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.525276780128479},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4580255448818207},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44145268201828003},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.42867618799209595},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.20249414443969727}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2714576.2714632","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2714576.2714632","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:ro.uow.edu.au:eispapers-6059","is_oa":false,"landing_page_url":"https://ro.uow.edu.au/eispapers/5032","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty of Engineering and Information Sciences - Papers: Part A","raw_type":"presentation"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W6981671","https://openalex.org/W30039285","https://openalex.org/W38646293","https://openalex.org/W49582564","https://openalex.org/W70096886","https://openalex.org/W126735607","https://openalex.org/W154795652","https://openalex.org/W162787226","https://openalex.org/W1488628736","https://openalex.org/W1500253167","https://openalex.org/W1509800602","https://openalex.org/W1582239555","https://openalex.org/W1590823599","https://openalex.org/W1601035152","https://openalex.org/W1738472778","https://openalex.org/W1890078278","https://openalex.org/W1988832158","https://openalex.org/W1993032872","https://openalex.org/W2003261926","https://openalex.org/W2017907568","https://openalex.org/W2041581975","https://openalex.org/W2060583899","https://openalex.org/W2067095453","https://openalex.org/W2088645726","https://openalex.org/W2090189056","https://openalex.org/W2092335398","https://openalex.org/W2101018255","https://openalex.org/W2102355710","https://openalex.org/W2111287840","https://openalex.org/W2114428623","https://openalex.org/W2117685508","https://openalex.org/W2118439707","https://openalex.org/W2118875948","https://openalex.org/W2152924492","https://openalex.org/W2159274726","https://openalex.org/W2160912201","https://openalex.org/W2164059587","https://openalex.org/W2164101323","https://openalex.org/W2350778671","https://openalex.org/W6602830368"],"related_works":["https://openalex.org/W4386242069","https://openalex.org/W4224241849","https://openalex.org/W2949316140","https://openalex.org/W1565128838","https://openalex.org/W4375948682","https://openalex.org/W2407700239","https://openalex.org/W2910586303","https://openalex.org/W1881831204","https://openalex.org/W2951404390","https://openalex.org/W2120129724"],"abstract_inverted_index":{"With":[0],"the":[1,36,44,53,65,70,85,89,92,98,111,135,139,169,208,225,228,242],"increasing":[2],"development":[3],"of":[4,39,138,168,174,227],"pervasive":[5],"computing":[6,261],"and":[7,97,165,231,237,255],"wireless":[8],"bandwidth":[9],"communication,":[10],"more":[11],"mobile":[12,60,95,115,151,200,249,260],"devices":[13,61,96,250],"are":[14],"used":[15],"to":[16,34,62,117,127,187,199,207,224,251,258],"access":[17,50,64,116,252],"sensitive":[18,118,205],"data":[19,254],"stored":[20,55],"in":[21,114,150,163],"remote":[22],"servers.":[23],"In":[24,141],"such":[25,31],"applications,":[26],"a":[27,40,75,122,177,189,194],"practical":[28,257],"issue":[29],"emerges":[30],"as":[32,128],"how":[33],"exploit":[35],"sufficient":[37],"resource":[38,99],"server":[41,72,101],"so":[42],"that":[43,182,241],"file":[45,103,170],"owners":[46,104],"can":[47],"enforce":[48],"fine-grained":[49],"control":[51],"over":[52],"remotely":[54],"files,":[56],"while":[57,153],"enable":[58],"resource-limited":[59],"easily":[63],"protected":[66],"data,":[67,119],"especially":[68],"if":[69],"storage":[71],"maintained":[73],"by":[74,133],"third":[76],"party":[77],"is":[78,148,161,176,256],"untrusted.":[79],"This":[80],"challenge":[81],"mainly":[82],"arises":[83],"from":[84],"asymmetric":[86,129,136],"capacity":[87,93,137],"among":[88],"participants,":[90],"i.e.,":[91],"limited":[94],"abundant":[100],"(and":[102],"equipped":[105],"with":[106,219],"fixed":[107,166],"computers).":[108],"To":[109],"meet":[110],"security":[112,221,226],"requirements":[113],"we":[120,213],"propose":[121,214],"new":[123],"encryption":[124,146,159],"paradigm,":[125,212],"referred":[126],"cross-cryptosystem":[130],"re-encryption":[131],"(ACCRE)":[132],"leveraging":[134],"participants.":[140],"ACCRE,":[142],"relatively":[143],"light-weight":[144],"identity-based":[145,157],"(IBE)":[147],"deployed":[149,162],"devices,":[152,201],"resource-consuming":[154],"but":[155],"versatile":[156],"broadcast":[158],"(IBBE)":[160],"servers":[164],"computers":[167],"owners.":[171],"The":[172],"core":[173],"ACCRE":[175,217],"novel":[178],"ciphertext":[179,192,197],"conversion":[180],"mechanism":[181],"allows":[183],"an":[184,215],"authorized":[185],"proxy":[186],"convert":[188],"complicated":[190],"IBBE":[191,232],"into":[193],"simple":[195],"IBE":[196,230],"affordable":[198],"without":[202],"leaking":[203],"any":[204],"information":[206],"proxy.":[209],"Following":[210],"this":[211],"efficient":[216],"scheme":[218,243],"its":[220],"formally":[222],"reduced":[223],"underlying":[229],"schemes.":[233],"Thorough":[234],"theoretical":[235],"analyses":[236],"extensive":[238],"experiments":[239],"confirm":[240],"takes":[244],"very":[245],"small":[246],"cost":[247],"for":[248],"encrypted":[253],"secure":[259],"applications.":[262]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
