{"id":"https://openalex.org/W4409296084","doi":"https://doi.org/10.1145/3728643","title":"An Efficient Cross-Domain Fine Grain Proxy Re-encryption Scheme for Secure Transmission in IIOT","display_name":"An Efficient Cross-Domain Fine Grain Proxy Re-encryption Scheme for Secure Transmission in IIOT","publication_year":2025,"publication_date":"2025-04-09","ids":{"openalex":"https://openalex.org/W4409296084","doi":"https://doi.org/10.1145/3728643"},"language":"en","primary_location":{"id":"doi:10.1145/3728643","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3728643","pdf_url":null,"source":{"id":"https://openalex.org/S170502224","display_name":"ACM Transactions on Sensor Networks","issn_l":"1550-4859","issn":["1550-4859","1550-4867"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Sensor Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082516368","display_name":"Yurui Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I141962983","display_name":"Shanghai University of Engineering Science","ror":"https://ror.org/0557b9y08","country_code":"CN","type":"education","lineage":["https://openalex.org/I141962983"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yurui Zhang","raw_affiliation_strings":["School of Electric and Electronic Engineering, Shanghai University of Engineering Science, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Electric and Electronic Engineering, Shanghai University of Engineering Science, Shanghai, China","institution_ids":["https://openalex.org/I141962983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100417628","display_name":"Dongmei Li","orcid":"https://orcid.org/0000-0003-3770-3554"},"institutions":[{"id":"https://openalex.org/I141962983","display_name":"Shanghai University of Engineering Science","ror":"https://ror.org/0557b9y08","country_code":"CN","type":"education","lineage":["https://openalex.org/I141962983"]},{"id":"https://openalex.org/I23632641","display_name":"Shanghai University of Electric Power","ror":"https://ror.org/02w4tny03","country_code":"CN","type":"education","lineage":["https://openalex.org/I23632641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongmei Li","raw_affiliation_strings":["School of Electric and Electronic Engineering, Shanghai University of Engineering Science, Shanghai, China and Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, Shanghai, China","School of Electric and Electronic Engineering, Shanghai University of Engineering Science, Shanghai China","Shanghai Key Laboratory of Integrated Administration Technologies for Information Security,  Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Electric and Electronic Engineering, Shanghai University of Engineering Science, Shanghai, China and Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, Shanghai, China","institution_ids":["https://openalex.org/I141962983","https://openalex.org/I23632641"]},{"raw_affiliation_string":"School of Electric and Electronic Engineering, Shanghai University of Engineering Science, Shanghai China","institution_ids":["https://openalex.org/I141962983"]},{"raw_affiliation_string":"Shanghai Key Laboratory of Integrated Administration Technologies for Information Security,  Shanghai, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005915341","display_name":"Xiaomei Zhang","orcid":"https://orcid.org/0000-0001-7767-0553"},"institutions":[{"id":"https://openalex.org/I141962983","display_name":"Shanghai University of Engineering Science","ror":"https://ror.org/0557b9y08","country_code":"CN","type":"education","lineage":["https://openalex.org/I141962983"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaomei Zhang","raw_affiliation_strings":["School of Electric and Electronic Engineering, Shanghai University of Engineering Science, Shanghai, China","School of Electric and Electronic Engineering, Shanghai University of Engineering Science, Shanghai China"],"affiliations":[{"raw_affiliation_string":"School of Electric and Electronic Engineering, Shanghai University of Engineering Science, Shanghai, China","institution_ids":["https://openalex.org/I141962983"]},{"raw_affiliation_string":"School of Electric and Electronic Engineering, Shanghai University of Engineering Science, Shanghai China","institution_ids":["https://openalex.org/I141962983"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003241897","display_name":"Wenjing Lv","orcid":"https://orcid.org/0000-0003-1243-7982"},"institutions":[{"id":"https://openalex.org/I141962983","display_name":"Shanghai University of Engineering Science","ror":"https://ror.org/0557b9y08","country_code":"CN","type":"education","lineage":["https://openalex.org/I141962983"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenjing Lv","raw_affiliation_strings":["School of Electric and Electronic Engineering, Shanghai University of Engineering Science, Shanghai, China","School of Electric and Electronic Engineering, Shanghai University of Engineering Science, Shanghai China"],"affiliations":[{"raw_affiliation_string":"School of Electric and Electronic Engineering, Shanghai University of Engineering Science, Shanghai, China","institution_ids":["https://openalex.org/I141962983"]},{"raw_affiliation_string":"School of Electric and Electronic Engineering, Shanghai University of Engineering Science, Shanghai China","institution_ids":["https://openalex.org/I141962983"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5082516368"],"corresponding_institution_ids":["https://openalex.org/I141962983"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.03151133,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":"3","first_page":"1","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7779530882835388},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.6799522638320923},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5191751718521118},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.49370822310447693},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4706639051437378},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.4506525993347168},{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.42187047004699707},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4083438217639923},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3534133732318878},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2722085118293762},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.13074752688407898},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07194182276725769}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7779530882835388},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.6799522638320923},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5191751718521118},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.49370822310447693},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4706639051437378},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.4506525993347168},{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.42187047004699707},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4083438217639923},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3534133732318878},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2722085118293762},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13074752688407898},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07194182276725769},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3728643","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3728643","pdf_url":null,"source":{"id":"https://openalex.org/S170502224","display_name":"ACM Transactions on Sensor Networks","issn_l":"1550-4859","issn":["1550-4859","1550-4867"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Sensor Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1510795740","https://openalex.org/W1590823599","https://openalex.org/W2067095453","https://openalex.org/W2108072891","https://openalex.org/W2114428623","https://openalex.org/W2138001464","https://openalex.org/W2976706823","https://openalex.org/W3081170138","https://openalex.org/W3117322934","https://openalex.org/W3143259051","https://openalex.org/W3168833844","https://openalex.org/W4210421291","https://openalex.org/W4308086263","https://openalex.org/W4313378349","https://openalex.org/W4315783030","https://openalex.org/W4318624531","https://openalex.org/W4376115810","https://openalex.org/W4387339248","https://openalex.org/W4388240306","https://openalex.org/W4392858100"],"related_works":["https://openalex.org/W2063733680","https://openalex.org/W2156318122","https://openalex.org/W2080320258","https://openalex.org/W2068013785","https://openalex.org/W2370868004","https://openalex.org/W2158897804","https://openalex.org/W2286370870","https://openalex.org/W3173222018","https://openalex.org/W995213424","https://openalex.org/W2116941336"],"abstract_inverted_index":{"As":[0],"Internet":[1],"of":[2,13,30,47,82,89,108,142,179],"Things":[3],"(IoT)":[4],"technology":[5,52,65],"continues":[6],"to":[7,68,114],"advance":[8],"swiftly,":[9],"a":[10,37,102,139],"growing":[11],"array":[12],"IoT":[14,22,33,111],"devices":[15,34],"is":[16,53],"being":[17],"assimilated":[18],"into":[19,72],"the":[20,45,97,106,123,177],"industrial":[21,48],"framework.":[23],"However,":[24,96],"ensuring":[25],"secure":[26,87],"and":[27,183],"efficient":[28],"transmission":[29,88],"data":[31,60,90,112,135,167],"from":[32],"has":[35,136],"become":[36],"key":[38],"technological":[39],"focus":[40,143],"in":[41,130,144,192],"current":[42],"research":[43],"on":[44],"development":[46,107],"IoT.":[49],"Attribute":[50],"encryption":[51,56,172],"an":[54,152],"effective":[55],"technique":[57],"that":[58],"ensures":[59],"security;":[61],"meanwhile,":[62],"proxy":[63,155],"re-encryption":[64,156],"allows":[66],"proxies":[67],"encrypt":[69],"original":[70],"ciphertext":[71,74],"new":[73],"without":[75],"accessing":[76],"any":[77],"plaintext":[78],"information.":[79],"The":[80],"combination":[81],"these":[83],"two":[84],"technologies":[85],"enables":[86],"among":[91,119],"users":[92],"with":[93],"different":[94,120,131],"attributes.":[95],"high":[98],"computational":[99],"overhead":[100],"remains":[101],"significant":[103],"factor":[104],"limiting":[105],"this":[109,148],"solution.":[110],"needs":[113],"be":[115],"shared":[116,134],"not":[117,162],"only":[118,163],"units":[121,129],"within":[122],"same":[124],"domain":[125],"but":[126,169],"also":[127,170],"across":[128],"domains.":[132],"Securing":[133],"emerged":[137],"as":[138],"pivotal":[140],"area":[141],"contemporary":[145],"research.":[146],"In":[147],"article,":[149],"we":[150],"propose":[151],"improved":[153],"fine-grained":[154],"scheme":[157],"for":[158],"cross-attribute":[159],"domains,":[160],"which":[161],"facilitates":[164],"simple":[165],"cross-domain":[166],"sharing":[168],"enhances":[171],"efficiency.":[173],"Security":[174],"proofs":[175],"demonstrate":[176],"adequacy":[178],"our":[180],"proposed":[181],"scheme,":[182],"performance":[184],"analysis":[185],"indicates":[186],"its":[187],"superiority":[188],"over":[189],"other":[190],"solutions":[191],"certain":[193],"aspects.":[194]},"counts_by_year":[],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
