{"id":"https://openalex.org/W2896128974","doi":"https://doi.org/10.3390/cryptography2040033","title":"Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption","display_name":"Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption","publication_year":2018,"publication_date":"2018-10-23","ids":{"openalex":"https://openalex.org/W2896128974","doi":"https://doi.org/10.3390/cryptography2040033","mag":"2896128974"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography2040033","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2040033","pdf_url":"https://www.mdpi.com/2410-387X/2/4/33/pdf","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/2/4/33/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009615756","display_name":"Ziyuan Hu","orcid":"https://orcid.org/0000-0002-8446-2231"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziyuan Hu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101899981","display_name":"Shengli Liu","orcid":"https://orcid.org/0000-0003-1366-8256"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shengli Liu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China","Westone Cryptologic Research Center, Beijing 100070, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Westone Cryptologic Research Center, Beijing 100070, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101672513","display_name":"Kefei Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I163151501","display_name":"Hangzhou Normal University","ror":"https://ror.org/014v1mr15","country_code":"CN","type":"education","lineage":["https://openalex.org/I163151501"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kefei Chen","raw_affiliation_strings":["Department of Mathematics, Hangzhou Normal University, Hangzhou 310036, China","Westone Cryptologic Research Center, Beijing 100070, China"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Hangzhou Normal University, Hangzhou 310036, China","institution_ids":["https://openalex.org/I163151501"]},{"raw_affiliation_string":"Westone Cryptologic Research Center, Beijing 100070, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023687478","display_name":"Joseph K. Liu","orcid":"https://orcid.org/0000-0001-6656-6240"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Joseph K. Liu","raw_affiliation_strings":["Faculty of Information Technology, Monash University, Clayton VIC 3800, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Monash University, Clayton VIC 3800, Australia","institution_ids":["https://openalex.org/I56590836"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101899981"],"corresponding_institution_ids":["https://openalex.org/I183067930","https://openalex.org/I4210132990"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.3381,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.69336034,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2","issue":"4","first_page":"33","last_page":"33"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7547815442085266},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.6144326329231262},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6087480783462524},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5891975164413452},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5430291891098022},{"id":"https://openalex.org/keywords/pairing","display_name":"Pairing","score":0.45789840817451477},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4447070062160492},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.43601667881011963},{"id":"https://openalex.org/keywords/diffie\u2013hellman-key-exchange","display_name":"Diffie\u2013Hellman key exchange","score":0.42403650283813477},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.38140204548835754},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38102006912231445},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.33383867144584656},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.3175945281982422},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06559315323829651}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7547815442085266},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.6144326329231262},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6087480783462524},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5891975164413452},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5430291891098022},{"id":"https://openalex.org/C14103023","wikidata":"https://www.wikidata.org/wiki/Q11681459","display_name":"Pairing","level":3,"score":0.45789840817451477},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4447070062160492},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.43601667881011963},{"id":"https://openalex.org/C29524669","wikidata":"https://www.wikidata.org/wiki/Q623447","display_name":"Diffie\u2013Hellman key exchange","level":5,"score":0.42403650283813477},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38140204548835754},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38102006912231445},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.33383867144584656},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.3175945281982422},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06559315323829651},{"id":"https://openalex.org/C54101563","wikidata":"https://www.wikidata.org/wiki/Q124131","display_name":"Superconductivity","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.3390/cryptography2040033","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2040033","pdf_url":"https://www.mdpi.com/2410-387X/2/4/33/pdf","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:99d58099539f42f893081b30638a0841","is_oa":true,"landing_page_url":"https://doaj.org/article/99d58099539f42f893081b30638a0841","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 2, Iss 4, p 33 (2018)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2410-387X/2/4/33/","is_oa":true,"landing_page_url":"http://doi.org/10.3390/cryptography2040033","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography","raw_type":"Text"},{"id":"pmh:oai:monash.edu:openaire/608a2b7c-55e1-4806-9499-09b2acf592d8","is_oa":true,"landing_page_url":"https://research.monash.edu/en/publications/608a2b7c-55e1-4806-9499-09b2acf592d8","pdf_url":null,"source":{"id":"https://openalex.org/S4306402625","display_name":"Monash University Research Portal (Monash University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I56590836","host_organization_name":"Monash University","host_organization_lineage":["https://openalex.org/I56590836"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Hu, Z, Liu, S, Chen, K & Liu, J K 2018, 'Revocable identity-based encryption and server-aided revocable ibe from the computational diffie-hellman assumption', Cryptography, vol. 2, no. 4, 33, pp. 1-35. https://doi.org/10.3390/cryptography2040033","raw_type":"article"},{"id":"pmh:oai:monash.edu:publications/608a2b7c-55e1-4806-9499-09b2acf592d8","is_oa":true,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85076949109&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4306402625","display_name":"Monash University Research Portal (Monash University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I56590836","host_organization_name":"Monash University","host_organization_lineage":["https://openalex.org/I56590836"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Hu , Z , Liu , S , Chen , K &amp; Liu , J K 2018 , ' Revocable identity-based encryption and server-aided revocable ibe from the computational diffie-hellman assumption ' , Cryptography , vol. 2 , no. 4 , 33 , pp. 1-35 . https://doi.org/10.3390/cryptography2040033","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography2040033","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2040033","pdf_url":"https://www.mdpi.com/2410-387X/2/4/33/pdf","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7300000190734863,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G4466265899","display_name":null,"funder_award_id":"61702342","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6270289937","display_name":null,"funder_award_id":"61672346","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8755977098","display_name":null,"funder_award_id":"61472114","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2896128974.pdf","grobid_xml":"https://content.openalex.org/works/W2896128974.grobid-xml"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W1499766499","https://openalex.org/W1546774120","https://openalex.org/W1569083856","https://openalex.org/W1592092778","https://openalex.org/W1738472778","https://openalex.org/W1756601563","https://openalex.org/W1980669413","https://openalex.org/W2038761522","https://openalex.org/W2086042811","https://openalex.org/W2106116277","https://openalex.org/W2122973102","https://openalex.org/W2161214158","https://openalex.org/W2184323066","https://openalex.org/W2295776812","https://openalex.org/W2295943987","https://openalex.org/W2536385812","https://openalex.org/W2592395199","https://openalex.org/W2612344685","https://openalex.org/W2620016028","https://openalex.org/W2729240356","https://openalex.org/W2806302538","https://openalex.org/W2811025351","https://openalex.org/W6600892549","https://openalex.org/W6629862473","https://openalex.org/W6753049463"],"related_works":["https://openalex.org/W4387225086","https://openalex.org/W2149341144","https://openalex.org/W2156575820","https://openalex.org/W3000282663","https://openalex.org/W2174196465","https://openalex.org/W2796027683","https://openalex.org/W23189451","https://openalex.org/W36197628","https://openalex.org/W2894508952","https://openalex.org/W2183361456"],"abstract_inverted_index":{"An":[0],"Identity-based":[1],"encryption":[2,161],"(IBE)":[3],"simplifies":[4],"key":[5,107,237],"management":[6],"by":[7,89,94],"taking":[8],"users\u2019":[9],"identities":[10],"as":[11,193],"public":[12],"keys.":[13],"However,":[14],"how":[15],"to":[16,119,129,156,171,208,222,245],"dynamically":[17],"revoke":[18],"users":[19,143,153,251],"in":[20,98,144,186,238,252],"an":[21,126],"IBE":[22,33,39,68,85,91,104,127,181,197,221],"scheme":[23,34,69,86,92,128,191,198,207],"is":[24,87,117,182,242],"not":[25],"a":[26,66,72,110,120,130,218],"trivial":[27],"problem.":[28],"To":[29,123],"solve":[30],"this":[31,62,149],"problem,":[32],"with":[35,159],"revocation":[36],"(namely":[37],"revocable":[38,67,84,131,180,196,220],"scheme)":[40],"has":[41],"been":[42],"proposed.":[43],"Apart":[44],"from":[45,199],"those":[46],"lattice-based":[47],"IBE,":[48,132],"most":[49],"of":[50,140,227,235,248],"the":[51,90,106,135,138,141,187,194,200,224,228,233,246,253],"existing":[52],"schemes":[53],"are":[54,154,169],"based":[55,70],"on":[56,71],"decisional":[57],"assumptions":[58],"over":[59,80],"pairing-groups.":[60],"In":[61,230],"paper,":[63],"we":[64,133,204],"propose":[65,217],"weaker":[73],"assumption,":[74],"namely":[75],"Computational":[76],"Diffie-Hellman":[77],"(CDH)":[78],"assumption":[79],"non-pairing":[81],"groups.":[82],"Our":[83,190],"inspired":[88],"proposed":[93],"D\u00f6ttling":[95,101],"and":[96,102,215],"Garg":[97],"Crypto2017.":[99],"Like":[100],"Garg\u2019s":[103],"scheme,":[105],"authority":[108],"maintains":[109],"complete":[111],"binary":[112],"tree":[113],"where":[114],"every":[115],"user":[116],"assigned":[118],"leaf":[121],"node.":[122],"adapt":[124],"such":[125],"update":[134],"nodes":[136],"along":[137],"paths":[139],"revoked":[142,152,250],"each":[145,239],"time":[146,240,255],"slot.":[147,256],"Upon":[148],"updating,":[150],"all":[151],"forced":[155],"be":[157],"equipped":[158],"new":[160],"keys":[162],"but":[163],"without":[164],"decryption":[165,173,225],"keys,":[166],"thus":[167],"they":[168],"unable":[170],"perform":[172],"any":[174],"more.":[175],"We":[176],"prove":[177],"that":[178],"our":[179,206,231],"adaptive":[183],"IND-ID-CPA":[184],"secure":[185],"standard":[188],"model.":[189],"serves":[192],"first":[195],"CDH":[201],"assumption.":[202],"Moreover,":[203],"extend":[205],"support":[209],"Decryption":[210],"Key":[211],"Exposure":[212],"Resistance":[213],"(DKER)":[214],"also":[216],"server-aided":[219],"decrease":[223],"workload":[226],"receiver.":[229],"schemes,":[232],"size":[234],"updating":[236],"slot":[241],"only":[243],"related":[244],"number":[247],"newly":[249],"past":[254]},"counts_by_year":[{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
