{"id":"https://openalex.org/W4252785967","doi":"https://doi.org/10.1504/ijhpcn.2016.10001332","title":"Deterministic attribute-based encryption","display_name":"Deterministic attribute-based encryption","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W4252785967","doi":"https://doi.org/10.1504/ijhpcn.2016.10001332"},"language":"en","primary_location":{"id":"doi:10.1504/ijhpcn.2016.10001332","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijhpcn.2016.10001332","pdf_url":null,"source":{"id":"https://openalex.org/S159903936","display_name":"International Journal of High Performance Computing and Networking","issn_l":"1740-0562","issn":["1740-0562","1740-0570"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of High Performance Computing and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100824330","display_name":"Zhen Han","orcid":null},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhen Han","raw_affiliation_strings":["School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101973536","display_name":"Shuo Qiu","orcid":"https://orcid.org/0000-0001-8843-6711"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuo Qiu","raw_affiliation_strings":["School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108529463","display_name":"Jiqiang Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiqiang Liu","raw_affiliation_strings":["School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045820947","display_name":"Yanfeng Shi","orcid":"https://orcid.org/0000-0002-2924-0548"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanfeng Shi","raw_affiliation_strings":["School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China","institution_ids":["https://openalex.org/I21193070"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100824330"],"corresponding_institution_ids":["https://openalex.org/I21193070"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.22707836,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"5/6","first_page":"443","last_page":"443"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8415984511375427},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.8396658897399902},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7843286991119385},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.6629445552825928},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5196232199668884},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.5131521821022034},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.48979878425598145},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.47882965207099915},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47696173191070557},{"id":"https://openalex.org/keywords/functional-encryption","display_name":"Functional encryption","score":0.46992337703704834},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.468887060880661},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.4666960537433624},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.4600844383239746},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.4465397298336029},{"id":"https://openalex.org/keywords/standard-model","display_name":"Standard Model (mathematical formulation)","score":0.43599933385849},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4317914843559265},{"id":"https://openalex.org/keywords/bilinear-interpolation","display_name":"Bilinear interpolation","score":0.4256210923194885},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3620506227016449},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.31378108263015747},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.24401313066482544},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.20250460505485535}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8415984511375427},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.8396658897399902},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7843286991119385},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.6629445552825928},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5196232199668884},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.5131521821022034},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.48979878425598145},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.47882965207099915},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47696173191070557},{"id":"https://openalex.org/C2780746774","wikidata":"https://www.wikidata.org/wiki/Q17014981","display_name":"Functional encryption","level":4,"score":0.46992337703704834},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.468887060880661},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.4666960537433624},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.4600844383239746},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.4465397298336029},{"id":"https://openalex.org/C101454708","wikidata":"https://www.wikidata.org/wiki/Q17106019","display_name":"Standard Model (mathematical formulation)","level":3,"score":0.43599933385849},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4317914843559265},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.4256210923194885},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3620506227016449},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.31378108263015747},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.24401313066482544},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.20250460505485535},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C40976572","wikidata":"https://www.wikidata.org/wiki/Q2330873","display_name":"Gauge (firearms)","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijhpcn.2016.10001332","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijhpcn.2016.10001332","pdf_url":null,"source":{"id":"https://openalex.org/S159903936","display_name":"International Journal of High Performance Computing and Networking","issn_l":"1740-0562","issn":["1740-0562","1740-0570"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of High Performance Computing and Networking","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1993945719","https://openalex.org/W1025240641","https://openalex.org/W4308784203","https://openalex.org/W2361619969","https://openalex.org/W4309584611","https://openalex.org/W2380438667","https://openalex.org/W4379801595","https://openalex.org/W3118757263","https://openalex.org/W4246652009","https://openalex.org/W2615041771"],"abstract_inverted_index":{"Attribute-based":[0],"encryption":[1,46],"enables":[2],"data":[3,18,31,51],"owners":[4],"to":[5,19,73],"share":[6],"their":[7,16],"information":[8],"by":[9],"specifying":[10],"access":[11],"control":[12],"policies":[13],"while":[14],"outsourcing":[15],"encrypted":[17,30],"the":[20,59,62,66,83,95],"cloud.":[21],"However,":[22],"there":[23],"are":[24],"no":[25],"efficient":[26],"searchable":[27],"schemes":[28],"over":[29],"in":[32,55,58,82,94],"attribute-based":[33,45],"setting.":[34],"In":[35],"this":[36],"paper,":[37],"we":[38,77],"propose":[39,78],"a":[40,79,88],"novel":[41],"primitive":[42],"called":[43],"deterministic":[44],"(DABE),":[47],"which":[48],"simultaneously":[49],"supports":[50],"sharing":[52],"and":[53,87],"retrieving":[54],"time":[56],"logarithmic":[57],"size":[60],"of":[61],"database.":[63],"We":[64],"formalise":[65],"security":[67],"properties":[68],"for":[69],"DABE":[70,93],"with":[71],"respect":[72],"auxiliary":[74],"inputs.":[75],"Furthermore,":[76],"generic":[80],"construction":[81],"random":[84],"oracle":[85],"model":[86,97],"selectively":[89],"secure":[90],"concrete":[91],"key-policy":[92],"standard":[96],"under":[98],"decisional":[99],"bilinear":[100],"Diffie-Hellman":[101],"assumption.":[102]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
