{"id":"https://openalex.org/W4232436015","doi":"https://doi.org/10.1504/ijwgs.2017.10006066","title":"New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service","display_name":"New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W4232436015","doi":"https://doi.org/10.1504/ijwgs.2017.10006066"},"language":"en","primary_location":{"id":"doi:10.1504/ijwgs.2017.10006066","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijwgs.2017.10006066","pdf_url":null,"source":{"id":"https://openalex.org/S200047447","display_name":"International Journal of Web and Grid Services","issn_l":"1741-1106","issn":["1741-1106","1741-1114"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Web and Grid Services","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077290356","display_name":"Mingwu Zhang","orcid":"https://orcid.org/0000-0001-8551-8826"},"institutions":[{"id":"https://openalex.org/I74525822","display_name":"Hubei University of Technology","ror":"https://ror.org/02d3fj342","country_code":"CN","type":"education","lineage":["https://openalex.org/I74525822"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mingwu Zhang","raw_affiliation_strings":["School of Computer Science, Hubei University of Technology, Wuhan, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Hubei University of Technology, Wuhan, P.R. China","institution_ids":["https://openalex.org/I74525822"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005934640","display_name":"Baodong Qin","orcid":"https://orcid.org/0000-0001-7617-5462"},"institutions":[{"id":"https://openalex.org/I1297991670","display_name":"Southwest University of Science and Technology","ror":"https://ror.org/04d996474","country_code":"CN","type":"education","lineage":["https://openalex.org/I1297991670"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Baodong Qin","raw_affiliation_strings":["School of Computer Science and Technology, Southwest University of Science and Technology, Mianyang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Southwest University of Science and Technology, Mianyang, China","institution_ids":["https://openalex.org/I1297991670"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007964745","display_name":"Fatos Xhafa","orcid":"https://orcid.org/0000-0001-6569-5497"},"institutions":[{"id":"https://openalex.org/I9617848","display_name":"Universitat Polit\u00e8cnica de Catalunya","ror":"https://ror.org/03mb6wj31","country_code":"ES","type":"education","lineage":["https://openalex.org/I9617848"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Fatos Xhafa","raw_affiliation_strings":["Department of Computer Science, Technical University of Catalonia, Barcelona, Spain"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Technical University of Catalonia, Barcelona, Spain","institution_ids":["https://openalex.org/I9617848"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049151787","display_name":"Xu An Wang","orcid":"https://orcid.org/0000-0003-2070-4913"},"institutions":[{"id":"https://openalex.org/I4210134428","display_name":"Chinese People's Armed Police Force Engineering University","ror":"https://ror.org/031jzbb03","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210134428"]},{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xu An Wang","raw_affiliation_strings":["School of Telecommunications Engineering, Xidian University, X\u00edan, P.R. China; Key Laboratory of Information and Network Security, Engineering University of Chinese Armed Police Force, X\u00edan, P.R. China","Key Laboratory of Information and Network Security, Engineering University of Chinese Armed Police Force, X\u00edan, P.R. China","School of Telecommunications Engineering, Xidian University, X\u00edan, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Telecommunications Engineering, Xidian University, X\u00edan, P.R. China; Key Laboratory of Information and Network Security, Engineering University of Chinese Armed Police Force, X\u00edan, P.R. China","institution_ids":["https://openalex.org/I4210134428","https://openalex.org/I149594827"]},{"raw_affiliation_string":"Key Laboratory of Information and Network Security, Engineering University of Chinese Armed Police Force, X\u00edan, P.R. China","institution_ids":["https://openalex.org/I4210134428"]},{"raw_affiliation_string":"School of Telecommunications Engineering, Xidian University, X\u00edan, P.R. China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012016098","display_name":"Jianfeng Ma","orcid":"https://orcid.org/0000-0003-4251-1143"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianfeng Ma","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, X\u00edan, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, X\u00edan, P.R. China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5077290356"],"corresponding_institution_ids":["https://openalex.org/I74525822"],"apc_list":null,"apc_paid":null,"fwci":0.195,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.67455713,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"13","issue":"3","first_page":"246","last_page":"246"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9664000272750854,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9358999729156494,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7104293704032898},{"id":"https://openalex.org/keywords/elgamal-encryption","display_name":"ElGamal encryption","score":0.6915946006774902},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6452929973602295},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.6394509077072144},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6311686038970947},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5562418699264526},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5140834450721741},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.49496787786483765},{"id":"https://openalex.org/keywords/ciphertext-indistinguishability","display_name":"Ciphertext indistinguishability","score":0.4891224503517151},{"id":"https://openalex.org/keywords/plaintext-aware-encryption","display_name":"Plaintext-aware encryption","score":0.4335467219352722},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.4146537184715271},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.34853947162628174},{"id":"https://openalex.org/keywords/malleability","display_name":"Malleability","score":0.2980780005455017}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7104293704032898},{"id":"https://openalex.org/C11045955","wikidata":"https://www.wikidata.org/wiki/Q1162410","display_name":"ElGamal encryption","level":4,"score":0.6915946006774902},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6452929973602295},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.6394509077072144},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6311686038970947},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5562418699264526},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5140834450721741},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.49496787786483765},{"id":"https://openalex.org/C182776695","wikidata":"https://www.wikidata.org/wiki/Q840661","display_name":"Ciphertext indistinguishability","level":5,"score":0.4891224503517151},{"id":"https://openalex.org/C119133118","wikidata":"https://www.wikidata.org/wiki/Q7200761","display_name":"Plaintext-aware encryption","level":5,"score":0.4335467219352722},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.4146537184715271},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.34853947162628174},{"id":"https://openalex.org/C100980136","wikidata":"https://www.wikidata.org/wiki/Q4668956","display_name":"Malleability","level":4,"score":0.2980780005455017},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijwgs.2017.10006066","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijwgs.2017.10006066","pdf_url":null,"source":{"id":"https://openalex.org/S200047447","display_name":"International Journal of Web and Grid Services","issn_l":"1741-1106","issn":["1741-1106","1741-1114"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Web and Grid Services","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2146985619","https://openalex.org/W2368943972","https://openalex.org/W1558439324","https://openalex.org/W165895243","https://openalex.org/W2015940479","https://openalex.org/W2539919741","https://openalex.org/W642810354","https://openalex.org/W2405961381","https://openalex.org/W2981554290","https://openalex.org/W1490925124"],"abstract_inverted_index":{"Nowadays":[0],"Cloud":[1,23,107,364],"computation":[2,139],"has":[3,206,253],"become":[4],"a":[5,59,148,162,189,236,249,291,307,353,372],"commonplace":[6],"information":[7],"service":[8],"paradigm":[9],"for":[10,34,115,137,156,168,228,356],"all":[11],"actors":[12],"in":[13,105,125,195,243,272,276],"ICT":[14],"field,":[15],"from":[16],"individuals":[17],"to":[18,52,61,71,95,118,132,151,278,319,362],"big":[19],"corporates.":[20],"In":[21,143],"particular,":[22],"platforms":[24],"and":[25,46,67,140,165,294,331,336,358,370],"data":[26,38,44,51,65,129,171,360],"centres":[27],"are":[28,342],"being":[29],"used":[30],"each":[31],"time":[32],"more":[33,344],"outsourcing":[35,49,116,361],"data.":[36],"However,":[37],"owners":[39,130],"often":[40,58],"worry":[41],"about":[42],"their":[43],"security":[45,98,112,155],"privacy":[47],"before":[48],"the":[50,53,64,72,82,106,119,122,128,196,201,213,229,244,259,264,302,327,332,363],"Cloud,":[54,120],"thus":[55],"it":[56,91],"is":[57,79,113,161,188,235],"practice":[60],"first":[62,185],"encrypt":[63],"sets":[66],"then":[68],"outsource":[69],"them":[70],"Cloud.":[73],"The":[74,109,184,231],"drawback":[75],"of":[76,102,375],"this":[77,144],"approach":[78],"that,":[80],"if":[81],"encryption":[83,135,158,172,192],"scheme":[84],"can":[85],"only":[86,254],"achieve":[87,96,152],"chosen":[88,110,153,178,217,282],"plaintext":[89,218],"security,":[90,304],"cannot":[92],"be":[93],"assured":[94],"strong":[97],"against":[99],"many":[100],"kinds":[101],"malicious":[103],"adversaries":[104],"setting.":[108],"ciphertext":[111,154,179,283],"essential":[114],"ciphertexts":[117],"on":[121,200,248,290,366],"other":[123],"hand,":[124],"most":[126],"cases":[127],"prefer":[131],"choose":[133],"high-efficient":[134],"schemes":[136,341,369],"saving":[138],"communication":[141],"costs.":[142],"paper,":[145],"we":[146,262,305,351],"propose":[147,175,352],"new":[149,177,250,308,340,354,368],"way":[150],"Elgamal":[157,221],"scheme,":[159,222,233],"which":[160,187,234,274],"very":[163],"basic":[164],"usual":[166],"primitive":[167],"encapsulating":[169],"block":[170],"keys.":[173],"We":[174,314],"two":[176,255,296],"attack":[180,219,284],"(CCA)":[181],"secure":[182,194,220,242,285,324,359],"schemes.":[183,349],"one,":[186],"public":[190],"key":[191,237],"proved":[193,241],"random":[197],"oracle":[198],"based":[199,247,289,365],"computational":[202],"Diffie-Hellman":[203],"(CDH)":[204],"assumption,":[205,252],"almost":[207],"no":[208],"additional":[209,225],"overhead":[210],"compared":[211],"with":[212,295],"traditional":[214],"(indistinguishable":[215],"under":[216,281],"except":[223],"one":[224],"modular":[226],"exponentiation":[227],"decryption.":[230],"second":[232],"encapsulation":[238],"mechanism":[239],"(KEM)":[240],"standard":[245],"model":[246],"non-interactive":[251,292],"group":[256,297],"elements":[257],"as":[258],"encapsulations.":[260,299],"Thus":[261],"solve":[263],"open":[265],"problem":[266],"left":[267],"by":[268],"Hanaoka":[269],"et":[270],"al.":[271],"Crypto'12,":[273],"consists":[275],"how":[277],"construct":[279],"anindistinguishable":[280],"KEM":[286,330],"without":[287],"pairings":[288],"assumption":[293,309],"element":[298],"To":[300],"prove":[301],"scheme's":[303],"develop":[306],"called":[310],"verifiable":[311],"CDH":[312],"assumption.":[313],"also":[315],"generalise":[316],"our":[317,339,367],"technique":[318],"several":[320],"existing":[321],"well-known":[322,348],"CCA":[323],"KEMs,":[325],"including":[326],"Boneh-Mei-Waters":[328],"(BMW)":[329],"Hofheinz-Kiltz":[333],"(HK)":[334],"KEM,":[335],"show":[337],"that":[338],"even":[343],"efficient":[345,357],"than":[346],"these":[347],"Finally,":[350],"framework":[355],"present":[371],"rough":[373],"analysis":[374],"its":[376],"security.":[377]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
