{"id":"https://openalex.org/W2895865389","doi":"https://doi.org/10.1145/3264437.3264480","title":"Efficient Strong Key Indistinguishable Access Control in Dynamic Hierarchies with Constant Decryption Cost","display_name":"Efficient Strong Key Indistinguishable Access Control in Dynamic Hierarchies with Constant Decryption Cost","publication_year":2018,"publication_date":"2018-09-10","ids":{"openalex":"https://openalex.org/W2895865389","doi":"https://doi.org/10.1145/3264437.3264480","mag":"2895865389"},"language":"en","primary_location":{"id":"doi:10.1145/3264437.3264480","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3264437.3264480","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security of Information and Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084238791","display_name":"Gaurav Pareek","orcid":"https://orcid.org/0000-0001-7241-7778"},"institutions":[{"id":"https://openalex.org/I4210109276","display_name":"National Institute of Technology Goa","ror":"https://ror.org/01vmfpj79","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210109276"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Gaurav Pareek","raw_affiliation_strings":["National Institute of Technology Goa, Ponda, Goa"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology Goa, Ponda, Goa","institution_ids":["https://openalex.org/I4210109276"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061982583","display_name":"B. Purushothama","orcid":"https://orcid.org/0000-0002-6252-2416"},"institutions":[{"id":"https://openalex.org/I4210109276","display_name":"National Institute of Technology Goa","ror":"https://ror.org/01vmfpj79","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210109276"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"B. R. Purushothama","raw_affiliation_strings":["National Institute of Technology Goa, Ponda, Goa"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology Goa, Ponda, Goa","institution_ids":["https://openalex.org/I4210109276"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5084238791"],"corresponding_institution_ids":["https://openalex.org/I4210109276"],"apc_list":null,"apc_paid":null,"fwci":0.3258,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.67907696,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7755855321884155},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7614964246749878},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.7273879051208496},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6349788904190063},{"id":"https://openalex.org/keywords/constant","display_name":"Constant (computer programming)","score":0.5936955213546753},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.589417040348053},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5536417365074158},{"id":"https://openalex.org/keywords/bilinear-interpolation","display_name":"Bilinear interpolation","score":0.5150003433227539},{"id":"https://openalex.org/keywords/hierarchy","display_name":"Hierarchy","score":0.4883565604686737},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.44312500953674316},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.37821438908576965},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3762208819389343},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3384731411933899},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24904054403305054},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.24011224508285522},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15954196453094482}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7755855321884155},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7614964246749878},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.7273879051208496},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6349788904190063},{"id":"https://openalex.org/C2777027219","wikidata":"https://www.wikidata.org/wiki/Q1284190","display_name":"Constant (computer programming)","level":2,"score":0.5936955213546753},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.589417040348053},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5536417365074158},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.5150003433227539},{"id":"https://openalex.org/C31170391","wikidata":"https://www.wikidata.org/wiki/Q188619","display_name":"Hierarchy","level":2,"score":0.4883565604686737},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.44312500953674316},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.37821438908576965},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3762208819389343},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3384731411933899},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24904054403305054},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.24011224508285522},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15954196453094482},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C34447519","wikidata":"https://www.wikidata.org/wiki/Q179522","display_name":"Market economy","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3264437.3264480","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3264437.3264480","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security of Information and Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4099999964237213,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W25322359","https://openalex.org/W1570685538","https://openalex.org/W1584548721","https://openalex.org/W1701228794","https://openalex.org/W1840081982","https://openalex.org/W2001230942","https://openalex.org/W2008917386","https://openalex.org/W2019267322","https://openalex.org/W2021328268","https://openalex.org/W2031338211","https://openalex.org/W2037291165","https://openalex.org/W2038169089","https://openalex.org/W2051078227","https://openalex.org/W2118933964","https://openalex.org/W2125871822","https://openalex.org/W2159945615","https://openalex.org/W2165482045","https://openalex.org/W2263376124","https://openalex.org/W2343608747","https://openalex.org/W2508901898","https://openalex.org/W2672111951","https://openalex.org/W2743306942","https://openalex.org/W2745283800","https://openalex.org/W3174484826","https://openalex.org/W4230494971","https://openalex.org/W4252215110","https://openalex.org/W4291238879"],"related_works":["https://openalex.org/W2493929861","https://openalex.org/W2016567611","https://openalex.org/W2475541339","https://openalex.org/W565335793","https://openalex.org/W4285207525","https://openalex.org/W1600454606","https://openalex.org/W2390655757","https://openalex.org/W2368283757","https://openalex.org/W2792016146","https://openalex.org/W163757011"],"abstract_inverted_index":{"Hierarchical":[0],"access":[1,10],"control":[2],"is":[3,51,88,113,130],"for":[4,27,75],"scenarios":[5],"where":[6],"some":[7],"users":[8,96],"have":[9,97],"to":[11,98,101],"more":[12],"organization":[13],"data":[14],"than":[15],"others.":[16],"In":[17],"this":[18],"paper,":[19],"we":[20],"propose":[21],"an":[22],"efficient":[23,73],"key":[24,48,55,118,122,134],"assignment":[25,49,119],"scheme":[26,50,87,120],"dynamic":[28,61,110,116],"hierarchies":[29],"that":[30,89],"features":[31],"constant":[32,126],"decryption":[33],"cost":[34,128],"and":[35,65,78,104,129],"does":[36],"not":[37],"require":[38],"any":[39],"expensive":[40],"operations":[41],"like":[42,63],"bilinear":[43],"pairing.":[44],"The":[45],"proposed":[46,86],"hierarchical":[47,117],"secure":[52],"against":[53],"strong":[54,133],"distinguishability":[56],"attacks.":[57],"It":[58],"also":[59],"supports":[60],"updates":[62],"addition":[64],"deletion":[66],"of":[67,84,92,94,109],"classes":[68],"in":[69,107],"the":[70,85,95,114],"hierarchy":[71],"with":[72,132],"procedures":[74],"preserving":[76],"forward":[77,103],"backward":[79,105],"secrecy.":[80],"Another":[81],"important":[82],"highlight":[83],"secret":[90],"keys":[91],"none":[93],"be":[99],"updated":[100],"preserve":[102],"secrecy":[106],"case":[108],"updates.":[111],"Proposed":[112],"first":[115],"whose":[121],"derivation":[123],"procedure":[124],"has":[125],"computation":[127],"pairing-free":[131],"indistinguishability.":[135]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
