{"id":"https://openalex.org/W4400975929","doi":"https://doi.org/10.1145/3664476.3670874","title":"Proxy Re-Encryption for Enhanced Data Security in Healthcare: A Practical Implementation","display_name":"Proxy Re-Encryption for Enhanced Data Security in Healthcare: A Practical Implementation","publication_year":2024,"publication_date":"2024-07-25","ids":{"openalex":"https://openalex.org/W4400975929","doi":"https://doi.org/10.1145/3664476.3670874"},"language":"en","primary_location":{"id":"doi:10.1145/3664476.3670874","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3670874","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3664476.3670874","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037701241","display_name":"Saber Mhiri","orcid":"https://orcid.org/0000-0001-7288-4659"},"institutions":[{"id":"https://openalex.org/I4210130845","display_name":"i2CAT","ror":"https://ror.org/02rkks755","country_code":"ES","type":"nonprofit","lineage":["https://openalex.org/I4210130845","https://openalex.org/I4387153040"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Saber Mhiri","raw_affiliation_strings":["i2CAT Foundation, Spain"],"affiliations":[{"raw_affiliation_string":"i2CAT Foundation, Spain","institution_ids":["https://openalex.org/I4210130845"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011767728","display_name":"Alfonso Egio","orcid":"https://orcid.org/0009-0006-3755-0139"},"institutions":[{"id":"https://openalex.org/I4210130845","display_name":"i2CAT","ror":"https://ror.org/02rkks755","country_code":"ES","type":"nonprofit","lineage":["https://openalex.org/I4210130845","https://openalex.org/I4387153040"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Alfonso Egio","raw_affiliation_strings":["i2CAT Foundation, Spain"],"affiliations":[{"raw_affiliation_string":"i2CAT Foundation, Spain","institution_ids":["https://openalex.org/I4210130845"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030263872","display_name":"Maxime Compasti\u00e9","orcid":"https://orcid.org/0000-0001-7399-709X"},"institutions":[{"id":"https://openalex.org/I4210130845","display_name":"i2CAT","ror":"https://ror.org/02rkks755","country_code":"ES","type":"nonprofit","lineage":["https://openalex.org/I4210130845","https://openalex.org/I4387153040"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Maxime Compasti\u00e9","raw_affiliation_strings":["i2CAT Foundation, Spain"],"affiliations":[{"raw_affiliation_string":"i2CAT Foundation, Spain","institution_ids":["https://openalex.org/I4210130845"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105049134","display_name":"Pablo Cosio","orcid":"https://orcid.org/0009-0000-9689-4296"},"institutions":[{"id":"https://openalex.org/I4210130845","display_name":"i2CAT","ror":"https://ror.org/02rkks755","country_code":"ES","type":"nonprofit","lineage":["https://openalex.org/I4210130845","https://openalex.org/I4387153040"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Pablo Cosio","raw_affiliation_strings":["i2CAT Foundation, Spain"],"affiliations":[{"raw_affiliation_string":"i2CAT Foundation, Spain","institution_ids":["https://openalex.org/I4210130845"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5037701241"],"corresponding_institution_ids":["https://openalex.org/I4210130845"],"apc_list":null,"apc_paid":null,"fwci":0.695,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.74571677,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.8152487277984619},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7236652374267578},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6638930439949036},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.5204461216926575},{"id":"https://openalex.org/keywords/health-care","display_name":"Health care","score":0.5134490728378296},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47767290472984314},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4456494450569153},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1394701600074768}],"concepts":[{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.8152487277984619},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7236652374267578},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6638930439949036},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.5204461216926575},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.5134490728378296},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47767290472984314},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4456494450569153},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1394701600074768},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3664476.3670874","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3670874","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3664476.3670874","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3670874","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2804537334","https://openalex.org/W3107240426","https://openalex.org/W3113538649","https://openalex.org/W3206968728","https://openalex.org/W4288391520","https://openalex.org/W4292002599","https://openalex.org/W4293083969","https://openalex.org/W4298169611","https://openalex.org/W4303709787","https://openalex.org/W4309467651","https://openalex.org/W4313523141","https://openalex.org/W4321764892","https://openalex.org/W4322772261","https://openalex.org/W4388625846"],"related_works":["https://openalex.org/W2068013785","https://openalex.org/W2370868004","https://openalex.org/W2158897804","https://openalex.org/W2286370870","https://openalex.org/W3173222018","https://openalex.org/W350349969","https://openalex.org/W3214026606","https://openalex.org/W2809887432","https://openalex.org/W3110687098","https://openalex.org/W2057612674"],"abstract_inverted_index":{"In":[0],"the":[1,7,30,38,55,69,78,102,112,130,145,150,164,185,192,198,212,250,255,303,317,336,340,344,350,357,364],"rapidly":[2],"evolving":[3,337],"digital":[4,168],"healthcare":[5,34,61,86,106,121,136,151,204,223,257,272,286,309,322,341,370],"landscape,":[6],"imperative":[8],"for":[9,40,101,227,271,328],"robust,":[10],"flexible,":[11],"and":[12,126,161,180,187,202,231,245,262,268,275,319,331,349,360],"scalable":[13],"data":[14,87,107,132,205,216,233,241,258,287,371],"protection":[15,108],"solutions":[16],"has":[17],"never":[18],"been":[19],"more":[20],"critical.":[21],"The":[22,277],"advent":[23],"of":[24,33,51,59,80,105,134,149,167,200,215,321,339,346,363],"sophisticated":[25],"cyber":[26],"threats,":[27,244],"coupled":[28],"with":[29,184,225,284],"increasing":[31],"complexity":[32],"IT":[35],"infrastructures,":[36],"underscores":[37,140],"necessity":[39],"advanced":[41],"security":[42,147,288,318],"mechanisms":[43],"that":[44,76,94,157,296,333],"can":[45],"adapt":[46],"to":[47,84,116,143,163,253,306,335,355],"a":[48,73,99,155,265,299,325],"wide":[49],"range":[50],"challenges":[52,238],"without":[53],"compromising":[54],"accessibility":[56],"or":[57],"integrity":[58],"sensitive":[60,308],"data.":[62],"Within":[63],"this":[64],"context,":[65],"our":[66,141,347],"work":[67,312],"introduces":[68],"SECANT":[70,113,193,278,365],"Privacy":[71,194,279,366],"Toolkit,":[72],"pioneering":[74],"approach":[75],"harnesses":[77],"power":[79],"Proxy":[81],"Re-Encryption":[82],"(PRE)":[83],"redefine":[85],"security.":[88],"We":[89],"present":[90],"an":[91],"implementation":[92],"prototype":[93,139,348],"not":[95,210,281],"only":[96,211,282],"serves":[97],"as":[98,240],"baseline":[100],"quantitative":[103],"evaluation":[104],"but":[109,220,290],"also":[110,221,291],"exemplifies":[111],"Toolkit\u2019s":[114],"capability":[115],"enhance":[117],"interoperability":[118],"across":[119,217],"disparate":[120],"systems,":[122],"strengthen":[123],"authentication":[124],"mechanisms,":[125],"ensure":[127],"scalability":[128,332],"amidst":[129],"growing":[131],"demands":[133],"modern":[135],"networks.":[137],"This":[138,207,311],"commitment":[142],"addressing":[144,236],"multifaceted":[146],"needs":[148,338],"sector":[152],"by":[153,190],"providing":[154,264],"solution":[156],"is":[158,259],"both":[159],"comprehensive":[160],"adaptable":[162],"dynamic":[165],"landscape":[166],"health":[169],"information":[170],"security.By":[171],"integrating":[172],"cutting-edge":[173],"cryptographic":[174],"technologies,":[175],"including":[176],"Attribute-Based":[177],"Encryption":[178,182],"(ABE)":[179],"Searchable":[181],"(SE),":[183],"flexibility":[186],"control":[188,230],"offered":[189],"PRE,":[191],"Toolkit":[195,280,367],"stands":[196],"at":[197],"forefront":[199],"secure":[201,213],"efficient":[203],"management.":[206],"integration":[208],"facilitates":[209],"exchange":[214],"decentralized":[218],"networks":[219],"empowers":[222],"providers":[224],"tools":[226],"fine-grained":[228],"access":[229],"privacy-preserving":[232],"searches,":[234],"thereby":[235],"key":[237],"such":[239],"interoperability,":[242,329],"cybersecurity":[243],"regulatory":[246],"compliance.Our":[247],"exploration":[248],"reveals":[249],"toolkit\u2019s":[251],"potential":[252,362],"revolutionize":[254],"way":[256],"protected,":[260],"shared,":[261],"accessed,":[263],"scalable,":[266],"efficient,":[267],"user-friendly":[269],"platform":[270],"providers,":[273],"patients,":[274],"stakeholders.":[276],"aligns":[283],"current":[285],"requirements":[289],"anticipates":[292],"future":[293],"challenges,":[294],"ensuring":[295],"it":[297],"remains":[298],"vital":[300],"asset":[301],"in":[302,368],"ongoing":[304],"effort":[305],"safeguard":[307],"information.":[310],"contributes":[313],"significantly":[314],"toward":[315],"enhancing":[316],"privacy":[320],"data,":[323],"offering":[324],"robust":[326],"framework":[327],"authentication,":[330],"responds":[334],"industry.":[342],"Through":[343],"deployment":[345],"subsequent":[351],"evaluation,":[352],"we":[353],"aim":[354],"demonstrate":[356],"practicality,":[358],"effectiveness,":[359],"transformative":[361],"advancing":[369],"protection.":[372]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
