{"id":"https://openalex.org/W2762172972","doi":"https://doi.org/10.1504/ijhpcn.2017.10008238","title":"Ciphertext policy attribute-based encryption with hierarchical domain authorities and users in cloud","display_name":"Ciphertext policy attribute-based encryption with hierarchical domain authorities and users in cloud","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2762172972","doi":"https://doi.org/10.1504/ijhpcn.2017.10008238","mag":"2762172972"},"language":"en","primary_location":{"id":"doi:10.1504/ijhpcn.2017.10008238","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijhpcn.2017.10008238","pdf_url":null,"source":{"id":"https://openalex.org/S159903936","display_name":"International Journal of High Performance Computing and Networking","issn_l":"1740-0562","issn":["1740-0562","1740-0570"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of High Performance Computing and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100659086","display_name":"Jing Wei","orcid":"https://orcid.org/0000-0002-8803-7056"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jing Wei","raw_affiliation_strings":["School of Mathematics and Statistics, Xidian University, Xi'an, 710126, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Statistics, Xidian University, Xi'an, 710126, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004849545","display_name":"Leyou Zhang","orcid":"https://orcid.org/0000-0003-4950-1140"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Leyou Zhang","raw_affiliation_strings":["School of Mathematics and Statistics, Xidian University, Xi'an, 710126, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Statistics, Xidian University, Xi'an, 710126, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100659086"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13467004,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"10","issue":"6","first_page":"524","last_page":"524"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9677000045776367,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9617999792098999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.859033465385437},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8171399831771851},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8013571500778198},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6977545022964478},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.5725192427635193},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5686289072036743},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5386568903923035},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5200554728507996},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.5130726099014282},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4916394352912903},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4817104935646057},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.4525175094604492},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.437117338180542},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.42504534125328064},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.42112353444099426},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.37901538610458374},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.18663981556892395},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1440345048904419},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07339441776275635},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.04650777578353882}],"concepts":[{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.859033465385437},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8171399831771851},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8013571500778198},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6977545022964478},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.5725192427635193},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5686289072036743},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5386568903923035},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5200554728507996},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.5130726099014282},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4916394352912903},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4817104935646057},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.4525175094604492},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.437117338180542},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.42504534125328064},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.42112353444099426},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.37901538610458374},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.18663981556892395},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1440345048904419},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07339441776275635},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.04650777578353882},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijhpcn.2017.10008238","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijhpcn.2017.10008238","pdf_url":null,"source":{"id":"https://openalex.org/S159903936","display_name":"International Journal of High Performance Computing and Networking","issn_l":"1740-0562","issn":["1740-0562","1740-0570"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of High Performance Computing and Networking","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7400000095367432,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4387191618","https://openalex.org/W1993945719","https://openalex.org/W4387429380","https://openalex.org/W2624091145","https://openalex.org/W2094124631","https://openalex.org/W3118757263","https://openalex.org/W4309584611","https://openalex.org/W1025240641","https://openalex.org/W2361619969","https://openalex.org/W4386393431"],"abstract_inverted_index":{"Attribute-based":[0],"encryption":[1,75,81,89,100],"(ABE)":[2],"can":[3],"propose":[4],"the":[5,18,21,31,34,42,72,92,102,108,134],"fine-grained":[6,103],"access":[7,104],"control":[8],"policy":[9],"for":[10,53],"encrypted":[11],"data":[12],"in":[13,20,30,41,65,133],"cloud.":[14],"The":[15,68],"characteristics":[16],"of":[17,124],"attributes":[19,35],"existing":[22],"works":[23],"are":[24,39],"treated":[25],"as":[26],"same":[27],"level":[28],"but":[29],"real":[32],"life":[33],"and":[36,50,96,113],"domain":[37,94],"authorities":[38],"always":[40],"different":[43],"levels.":[44],"It":[45],"produces":[46],"additional":[47],"computation":[48],"costs":[49,52],"storage":[51],"users.":[54],"To":[55],"overcome":[56],"these":[57],"shortcomings,":[58],"a":[59,85],"new":[60],"ABE":[61],"scheme":[62,70,77,110],"is":[63],"proposed":[64,69,109],"this":[66],"paper.":[67],"combines":[71],"ciphertext-policy":[73,86],"attribute-based":[74,88],"(CP-ABE)":[76],"with":[78,116],"hierarchical":[79,87,99],"identity-based":[80],"(HIBE)":[82],"which":[83],"issues":[84],"(CP-HABE).":[90],"Both":[91],"main":[93],"authorisations":[95],"users":[97],"achieve":[98],"under":[101],"control.":[105],"In":[106],"addition,":[107],"inherits":[111],"flexibility":[112],"achieves":[114,130],"scalability":[115],"short":[117],"ciphertexts.":[118],"Under":[119],"three":[120],"static":[121],"assumptions":[122],"instead":[123],"other":[125],"strong":[126],"assumptions,":[127],"it":[128],"also":[129],"full":[131],"security":[132],"standard":[135],"model.":[136]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
