{"id":"https://openalex.org/W2887109888","doi":"https://doi.org/10.1504/ijhpsa.2018.10015199","title":"Functional encryption with efficient verifiable outsourced decryption for secure data access control in social network","display_name":"Functional encryption with efficient verifiable outsourced decryption for secure data access control in social network","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2887109888","doi":"https://doi.org/10.1504/ijhpsa.2018.10015199","mag":"2887109888"},"language":"en","primary_location":{"id":"doi:10.1504/ijhpsa.2018.10015199","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijhpsa.2018.10015199","pdf_url":null,"source":{"id":"https://openalex.org/S174117138","display_name":"International Journal of High Performance Systems Architecture","issn_l":"1751-6528","issn":["1751-6528","1751-6536"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of High Performance Systems Architecture","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004165008","display_name":"Yunfei Cao","orcid":"https://orcid.org/0000-0002-3469-9660"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yunfei Cao","raw_affiliation_strings":["Science and Technology on Communication, Security Laboratory (CETC 30), Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Science and Technology on Communication, Security Laboratory (CETC 30), Chengdu, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100331540","display_name":"Cong Li","orcid":"https://orcid.org/0000-0001-6604-0708"},"institutions":[{"id":"https://openalex.org/I4210134428","display_name":"Chinese People's Armed Police Force Engineering University","ror":"https://ror.org/031jzbb03","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210134428"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cong Li","raw_affiliation_strings":["Electronic Technique Department, Engineering College of PAP, Xi'an Shaanxi, China; Key Laboratory of Network and Information, Security of the Chinese Armed Police Force, Xi'an Shaanxi, China","Electronic Technique Department, Engineering College of PAP, Xi'an Shaanxi, China","Key Laboratory of Network and Information, Security of the Chinese Armed Police Force, Xi'an Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"Electronic Technique Department, Engineering College of PAP, Xi'an Shaanxi, China; Key Laboratory of Network and Information, Security of the Chinese Armed Police Force, Xi'an Shaanxi, China","institution_ids":["https://openalex.org/I4210134428"]},{"raw_affiliation_string":"Electronic Technique Department, Engineering College of PAP, Xi'an Shaanxi, China","institution_ids":[]},{"raw_affiliation_string":"Key Laboratory of Network and Information, Security of the Chinese Armed Police Force, Xi'an Shaanxi, China","institution_ids":["https://openalex.org/I4210134428"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107248181","display_name":"Yudong Liu","orcid":"https://orcid.org/0000-0002-2099-6090"},"institutions":[{"id":"https://openalex.org/I4210134428","display_name":"Chinese People's Armed Police Force Engineering University","ror":"https://ror.org/031jzbb03","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210134428"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yudong Liu","raw_affiliation_strings":["Electronic Technique Department, Engineering College of PAP, Xi'an Shaanxi, China; Key Laboratory of Network and Information, Security of the Chinese Armed Police Force, Xi'an Shaanxi, China","Electronic Technique Department, Engineering College of PAP, Xi'an Shaanxi, China","Key Laboratory of Network and Information, Security of the Chinese Armed Police Force, Xi'an Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"Electronic Technique Department, Engineering College of PAP, Xi'an Shaanxi, China; Key Laboratory of Network and Information, Security of the Chinese Armed Police Force, Xi'an Shaanxi, China","institution_ids":["https://openalex.org/I4210134428"]},{"raw_affiliation_string":"Electronic Technique Department, Engineering College of PAP, Xi'an Shaanxi, China","institution_ids":[]},{"raw_affiliation_string":"Key Laboratory of Network and Information, Security of the Chinese Armed Police Force, Xi'an Shaanxi, China","institution_ids":["https://openalex.org/I4210134428"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050934064","display_name":"Xiaoyuan Yang","orcid":"https://orcid.org/0000-0003-4095-3837"},"institutions":[{"id":"https://openalex.org/I4210134428","display_name":"Chinese People's Armed Police Force Engineering University","ror":"https://ror.org/031jzbb03","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210134428"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyuan Yang","raw_affiliation_strings":["Electronic Technique Department, Engineering College of PAP, Xi'an Shaanxi, China; Key Laboratory of Network and Information, Security of the Chinese Armed Police Force, Xi'an Shaanxi, China","Electronic Technique Department, Engineering College of PAP, Xi'an Shaanxi, China","Key Laboratory of Network and Information, Security of the Chinese Armed Police Force, Xi'an Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"Electronic Technique Department, Engineering College of PAP, Xi'an Shaanxi, China; Key Laboratory of Network and Information, Security of the Chinese Armed Police Force, Xi'an Shaanxi, China","institution_ids":["https://openalex.org/I4210134428"]},{"raw_affiliation_string":"Electronic Technique Department, Engineering College of PAP, Xi'an Shaanxi, China","institution_ids":[]},{"raw_affiliation_string":"Key Laboratory of Network and Information, Security of the Chinese Armed Police Force, Xi'an Shaanxi, China","institution_ids":["https://openalex.org/I4210134428"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5004165008"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08612025,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"1/2","first_page":"59","last_page":"59"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8408135175704956},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.720622181892395},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.7059020400047302},{"id":"https://openalex.org/keywords/functional-encryption","display_name":"Functional encryption","score":0.6997796297073364},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6669555902481079},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.5903661847114563},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.5513029098510742},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.5360740423202515},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.47532179951667786},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.4734218716621399},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.46095991134643555},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4486796259880066},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.4413447380065918},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.4323433041572571},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4131471514701843},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34543707966804504},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.274813175201416},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1088699996471405},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.10355302691459656}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8408135175704956},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.720622181892395},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.7059020400047302},{"id":"https://openalex.org/C2780746774","wikidata":"https://www.wikidata.org/wiki/Q17014981","display_name":"Functional encryption","level":4,"score":0.6997796297073364},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6669555902481079},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.5903661847114563},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.5513029098510742},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.5360740423202515},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.47532179951667786},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.4734218716621399},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.46095991134643555},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4486796259880066},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.4413447380065918},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.4323433041572571},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4131471514701843},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34543707966804504},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.274813175201416},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1088699996471405},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.10355302691459656}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijhpsa.2018.10015199","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijhpsa.2018.10015199","pdf_url":null,"source":{"id":"https://openalex.org/S174117138","display_name":"International Journal of High Performance Systems Architecture","issn_l":"1751-6528","issn":["1751-6528","1751-6536"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of High Performance Systems Architecture","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1993945719","https://openalex.org/W4308784203","https://openalex.org/W4309584611","https://openalex.org/W3022099831","https://openalex.org/W3118757263","https://openalex.org/W2380438667","https://openalex.org/W2361619969","https://openalex.org/W1025240641","https://openalex.org/W4246652009","https://openalex.org/W2615041771"],"abstract_inverted_index":{"For":[0],"social":[1,65],"network,":[2],"the":[3,69,73,79,85,89,92,99,110,135,139,152,156,161,164,180],"user's":[4],"data":[5,22,57,184],"streams":[6],"needs":[7],"to":[8,97,108,115,134,141,159],"be":[9],"securely":[10],"shared.":[11],"Attribute-based":[12,33],"functional":[13,26,34,75,113],"encryption":[14,27,41,76,114],"(ABFE)":[15],"implements":[16,24],"fine-grained":[17,61],"access":[18,31,62,93],"control":[19,63],"for":[20,56,103,176],"sensitive":[21],"and":[23,47,60,81,173],"different":[25],"systems":[28],"with":[29,51],"multiple":[30],"policies.":[32],"encryption,":[35],"as":[36],"a":[37,120,126,130,147,169],"new":[38],"type":[39],"of":[40,72,84,91,101,112,163,171,182],"scheme,":[42],"whose":[43],"user":[44,127],"private":[45],"key":[46,133],"ciphertext":[48,86,145],"are":[49,77],"associated":[50],"attributes,":[52],"is":[53],"very":[54],"suitable":[55],"security":[58],"sharing":[59],"in":[64,88],"network":[66],"environments.":[67],"However,":[68],"main":[70],"disadvantages":[71],"attribute-based":[74],"that":[78],"size":[80],"decryption":[82,102,174],"time":[83,154,175],"increase":[87],"complexity":[90],"formula.":[94],"In":[95],"order":[96],"reduce":[98],"burden":[100],"users,":[104],"this":[105],"paper":[106],"proposed":[107],"outsource":[109],"computation":[111],"cloud":[116,140],"server,":[117],"by":[118],"providing":[119],"transformation":[121,132],"key,":[122],"we":[123],"show":[124],"how":[125],"can":[128],"provide":[129],"single":[131],"cloud,":[136],"which":[137],"enables":[138],"convert":[142],"any":[143],"ABE":[144],"into":[146],"(constant-size)":[148],"ElGamal-style":[149],"ciphertext,":[150],"at":[151],"same":[153],"through":[155],"efficient":[157],"verification":[158],"ensure":[160],"correctness":[162],"outsourcing":[165],"computing.":[166],"It":[167],"saves":[168],"lot":[170],"bandwidth":[172],"users":[177],"without":[178],"increasing":[179],"number":[181],"transfers":[183],"streams.":[185]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
