{"id":"https://openalex.org/W4409955138","doi":"https://doi.org/10.32604/cmc.2025.064486","title":"Several Attacks on Attribute-Based Encryption Schemes","display_name":"Several Attacks on Attribute-Based Encryption Schemes","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4409955138","doi":"https://doi.org/10.32604/cmc.2025.064486"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.064486","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064486","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.064486","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115012051","display_name":"Phi Thuong Le","orcid":"https://orcid.org/0009-0004-0057-8707"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Phi Thuong Le","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078515449","display_name":"Huy Quoc Le","orcid":"https://orcid.org/0000-0003-4862-6048"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Huy Quoc Le","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5048916238","display_name":"Viet Cuong Trinh","orcid":"https://orcid.org/0000-0003-2076-019X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Viet Cuong Trinh","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5115012051"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.8599,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.90579015,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"83","issue":"3","first_page":"4741","last_page":"4756"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9725000262260437,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9713000059127808,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6488510370254517},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6305860280990601},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5926847457885742},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5242350697517395},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.19203811883926392}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6488510370254517},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6305860280990601},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5926847457885742},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5242350697517395},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.19203811883926392}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.064486","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064486","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.064486","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.064486","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2010109924","https://openalex.org/W2026892462","https://openalex.org/W2613367739","https://openalex.org/W2750468834","https://openalex.org/W2804197098","https://openalex.org/W3008657691","https://openalex.org/W3111423117","https://openalex.org/W3136534603","https://openalex.org/W3208130250","https://openalex.org/W4388820143","https://openalex.org/W4405054455"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Attribute-based":[0],"encryption":[1,14],"()":[2],"is":[3,19,76,117],"a":[4,104,132,137],"cryptographic":[5,36],"framework":[6],"that":[7,186,199],"provides":[8],"flexible":[9],"access":[10,64,112],"control":[11],"by":[12,58],"allowing":[13],"based":[15],"on":[16,34,100,161],"user":[17],"attributes.":[18],"widely":[20],"applied":[21],"in":[22,81,148,180,215],"cloud":[23],"storage,":[24],"file":[25],"sharing,":[26],"e-Health,":[27],"and":[28,41,50],"digital":[29],"rights":[30],"management.":[31],"schemes":[32,191,211],"rely":[33],"hard":[35],"assumptions":[37],"such":[38],"as":[39],"pairings":[40],"others":[42],"(pairing-free)":[43],"to":[44,65,89,118,194,204],"ensure":[45],"their":[46,63,154],"security":[47,67],"against":[48,125],"external":[49],"internal":[51,74,172],"attacks.":[52],"Internal":[53],"attacks":[54],"are":[55,109,192],"carried":[56],"out":[57,120],"authorized":[59],"users":[60,83,150],"who":[61],"misuse":[62],"compromise":[66],"with":[68,84,111,158],"potentially":[69],"malicious":[70],"intent.":[71],"One":[72],"common":[73],"attack":[75,124,173],"the":[77,101,121,141,146,165,181,206],"attribute":[78,86,122],"collusion":[79,123],"attack,":[80,139,144],"which":[82,149],"different":[85],"keys":[87,156],"collaborate":[88],"decrypt":[90],"data":[91],"they":[92],"could":[93,151],"not":[94,175],"individually":[95],"access.":[96],"This":[97,169],"paper":[98],"focuses":[99],"ciphertext-policy":[102],"(-),":[103],"type":[105],"of":[106,167,171],"where":[107],"ciphertexts":[108],"produced":[110],"policies.":[113],"Our":[114],"first":[115],"work":[116,201],"carry":[119],"several":[126,187],"existing":[127],"pairing-free":[128],"-":[129,190,210],"schemes.":[130],"As":[131],"main":[133],"contribution,":[134],"we":[135],"introduce":[136],"novel":[138],"termed":[140],"anonymous":[142],"key-leakage":[143],"concerning":[145],"context":[147],"anonymously":[152],"publish":[153],"secret":[155],"associated":[157],"certain":[159],"attributes":[160],"public":[162],"platforms":[163],"without":[164],"risk":[166],"detection.":[168],"kind":[170],"has":[174],"been":[176],"defined":[177],"or":[178],"investigated":[179],"literature.":[182],"We":[183,197],"then":[184],"show":[185],"prominent":[188],"pairing-based":[189],"vulnerable":[193],"this":[195,200],"attack.":[196],"believe":[198],"will":[202],"contribute":[203],"helping":[205],"community":[207],"evaluate":[208],"suitable":[209],"for":[212],"secure":[213],"deployment":[214],"real-life":[216],"applications.":[217]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
