{"id":"https://openalex.org/W4385059244","doi":"https://doi.org/10.1145/3596871.3596875","title":"Conditional proxy pool re-encryption scheme against collusion attacks","display_name":"Conditional proxy pool re-encryption scheme against collusion attacks","publication_year":2023,"publication_date":"2023-02-24","ids":{"openalex":"https://openalex.org/W4385059244","doi":"https://doi.org/10.1145/3596871.3596875"},"language":"en","primary_location":{"id":"doi:10.1145/3596871.3596875","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3596871.3596875","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 11th International Conference on Communications and Broadband Networking","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000550887","display_name":"\u6b63\u5e78 \u8a18\u864e","orcid":"https://orcid.org/0000-0002-9475-7797"},"institutions":[{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zheng Hu","raw_affiliation_strings":["School of Artificial Intelligence, Guangxi Minzu University, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Guangxi Minzu University, China","institution_ids":["https://openalex.org/I145897649"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064694591","display_name":"Lina Ge","orcid":"https://orcid.org/0000-0001-6872-7933"},"institutions":[{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lina Ge","raw_affiliation_strings":["School of Artificial Intelligence, Guangxi Minzu University, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Guangxi Minzu University, China","institution_ids":["https://openalex.org/I145897649"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039341294","display_name":"Jie Wang","orcid":"https://orcid.org/0000-0002-7528-1180"},"institutions":[{"id":"https://openalex.org/I145897649","display_name":"Minzu University of China","ror":"https://ror.org/0044e2g62","country_code":"CN","type":"education","lineage":["https://openalex.org/I145897649"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Wang","raw_affiliation_strings":["School of Artificial Intelligence, Guangxi Minzu University, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Guangxi Minzu University, China","institution_ids":["https://openalex.org/I145897649"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5000550887"],"corresponding_institution_ids":["https://openalex.org/I145897649"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07021612,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"18","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9610999822616577,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9435999989509583,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.8582011461257935},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.7565453052520752},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.666998565196991},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.6388251185417175},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5575491189956665},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5054659843444824},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.45109790563583374},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44197404384613037},{"id":"https://openalex.org/keywords/pooling","display_name":"Pooling","score":0.41493427753448486},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.39076051115989685},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.10789340734481812}],"concepts":[{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.8582011461257935},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.7565453052520752},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.666998565196991},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.6388251185417175},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5575491189956665},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5054659843444824},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.45109790563583374},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44197404384613037},{"id":"https://openalex.org/C70437156","wikidata":"https://www.wikidata.org/wiki/Q7228652","display_name":"Pooling","level":2,"score":0.41493427753448486},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.39076051115989685},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.10789340734481812},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C40700","wikidata":"https://www.wikidata.org/wiki/Q1411783","display_name":"Industrial organization","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3596871.3596875","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3596871.3596875","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 11th International Conference on Communications and Broadband Networking","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G3758549282","display_name":null,"funder_award_id":"No.61862007","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1517738348","https://openalex.org/W1590823599","https://openalex.org/W1890078278","https://openalex.org/W1992259749","https://openalex.org/W2043533815","https://openalex.org/W2050109441","https://openalex.org/W2097638666","https://openalex.org/W2110356978","https://openalex.org/W2114428623","https://openalex.org/W2141064669","https://openalex.org/W2141776264","https://openalex.org/W2156318122","https://openalex.org/W2164101323","https://openalex.org/W2396215754","https://openalex.org/W2593870026","https://openalex.org/W2738245872","https://openalex.org/W3165413382","https://openalex.org/W3216333093","https://openalex.org/W4312371643","https://openalex.org/W4313183617"],"related_works":["https://openalex.org/W2792978874","https://openalex.org/W2370868004","https://openalex.org/W2396704985","https://openalex.org/W1972631883","https://openalex.org/W2068013785","https://openalex.org/W2997442751","https://openalex.org/W2516093999","https://openalex.org/W2035692780","https://openalex.org/W1500253167","https://openalex.org/W2156318122"],"abstract_inverted_index":{"Proxy":[0],"re-encryption":[1,15,43,67,155],"is":[2,128],"an":[3],"encryption":[4,53],"scheme":[5,54,68,132,158],"used":[6],"to":[7,79,102,191],"authorize":[8],"the":[9,13,34,47,52,56,70,119,131,134,141,145,148,160,167,174,180,193],"decryption":[10],"authority.":[11],"For":[12],"proxy":[14,20,41,65,73,77,100,105,154,163,181],"algorithm":[16],"using":[17,69],"a":[18,39,61,81,93,104,108],"single":[19,30],"node,":[21],"there":[22],"are":[23],"security":[24,48,57,135,146],"problems":[25],"of":[26,33,51,55,83,121,136,162,195],"collusion":[27,94,126],"attack":[28,95,127],"and":[29,59,114,144,170,177],"point":[31],"failure":[32],"proxy.":[35],"This":[36],"paper":[37],"proposes":[38],"conditional":[40,64],"pool":[42,66],"scheme,":[44],"which":[45],"uses":[46],"model":[49,143],"definition":[50],"identity,":[58],"designs":[60],"unidirectional,":[62],"single-hop":[63],"randomly":[71],"selected":[72,137],"method.":[74],"Using":[75],"multiple":[76],"nodes":[78,101],"form":[80],"group":[82],"proxies":[84,122],"(proxy":[85],"pool)":[86],"that":[87],"do":[88],"not":[89],"trust":[90],"each":[91],"other,":[92],"becomes":[96],"difficult.":[97],"By":[98],"pooling":[99],"construct":[103],"pool,":[106],"plus":[107],"strong":[109],"signature":[110],"function,":[111,118],"random":[112],"filling,":[113],"one-way,":[115],"collision-resistant":[116],"hash":[117],"threat":[120],"being":[123],"attacked":[124],"by":[125],"reduced.":[129],"Theoretically,":[130],"satisfies":[133],"ciphertext":[138],"attacks":[139],"under":[140,147],"standard":[142],"application":[149],"scenario.":[150],"Compared":[151],"with":[152,188],"other":[153],"schemes,":[156],"this":[157],"solves":[159],"problem":[161,194],"single-point":[164],"failure,":[165],"improves":[166],"operation":[168],"time":[169],"efficiency,":[171],"greatly":[172],"reduces":[173],"computational":[175],"cost,":[176],"only":[178],"increases":[179],"selection":[182],"time.":[183],"It":[184],"can":[185],"be":[186],"combined":[187],"distributed":[189],"systems":[190],"solve":[192],"multi-node":[196],"deployment.":[197]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
