{"id":"https://openalex.org/W4416225264","doi":"https://doi.org/10.3390/e27111160","title":"Post-Quantum Secure Lightweight Revocable IBE with Decryption Key Exposure Resistance","display_name":"Post-Quantum Secure Lightweight Revocable IBE with Decryption Key Exposure Resistance","publication_year":2025,"publication_date":"2025-11-14","ids":{"openalex":"https://openalex.org/W4416225264","doi":"https://doi.org/10.3390/e27111160","pmid":"https://pubmed.ncbi.nlm.nih.gov/41295003"},"language":"en","primary_location":{"id":"doi:10.3390/e27111160","is_oa":true,"landing_page_url":"https://doi.org/10.3390/e27111160","pdf_url":null,"source":{"id":"https://openalex.org/S195231649","display_name":"Entropy","issn_l":"1099-4300","issn":["1099-4300"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Entropy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj","pubmed"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.3390/e27111160","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000842143","display_name":"Dandan Zhang","orcid":"https://orcid.org/0000-0002-7189-3980"},"institutions":[{"id":"https://openalex.org/I202126657","display_name":"Qufu Normal University","ror":"https://ror.org/03ceheh96","country_code":"CN","type":"education","lineage":["https://openalex.org/I202126657"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dandan Zhang","raw_affiliation_strings":["School of Computer Science, Qufu Normal University, Rizhao 276800, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Qufu Normal University, Rizhao 276800, China","institution_ids":["https://openalex.org/I202126657"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073575838","display_name":"Hongwei Ju","orcid":null},"institutions":[{"id":"https://openalex.org/I202126657","display_name":"Qufu Normal University","ror":"https://ror.org/03ceheh96","country_code":"CN","type":"education","lineage":["https://openalex.org/I202126657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongwei Ju","raw_affiliation_strings":["Experimental Teaching and Equipment Management Center, Qufu Normal University, Rizhao 276800, China"],"affiliations":[{"raw_affiliation_string":"Experimental Teaching and Equipment Management Center, Qufu Normal University, Rizhao 276800, China","institution_ids":["https://openalex.org/I202126657"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091188164","display_name":"Zhifei Yan","orcid":"https://orcid.org/0000-0003-3344-7530"},"institutions":[{"id":"https://openalex.org/I202126657","display_name":"Qufu Normal University","ror":"https://ror.org/03ceheh96","country_code":"CN","type":"education","lineage":["https://openalex.org/I202126657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zixuan Yan","raw_affiliation_strings":["School of Computer Science, Qufu Normal University, Rizhao 276800, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Qufu Normal University, Rizhao 276800, China","institution_ids":["https://openalex.org/I202126657"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060918011","display_name":"Shini Feng","orcid":"https://orcid.org/0000-0001-9225-067X"},"institutions":[{"id":"https://openalex.org/I202126657","display_name":"Qufu Normal University","ror":"https://ror.org/03ceheh96","country_code":"CN","type":"education","lineage":["https://openalex.org/I202126657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shanqiang Feng","raw_affiliation_strings":["School of Computer Science, Qufu Normal University, Rizhao 276800, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Qufu Normal University, Rizhao 276800, China","institution_ids":["https://openalex.org/I202126657"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018981098","display_name":"Fengyin Li","orcid":"https://orcid.org/0000-0002-5730-3315"},"institutions":[{"id":"https://openalex.org/I202126657","display_name":"Qufu Normal University","ror":"https://ror.org/03ceheh96","country_code":"CN","type":"education","lineage":["https://openalex.org/I202126657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fengyin Li","raw_affiliation_strings":["School of Computer Science, Qufu Normal University, Rizhao 276800, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Qufu Normal University, Rizhao 276800, China","institution_ids":["https://openalex.org/I202126657"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5000842143"],"corresponding_institution_ids":["https://openalex.org/I202126657"],"apc_list":{"value":2000,"currency":"CHF","value_usd":2165},"apc_paid":{"value":2000,"currency":"CHF","value_usd":2165},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18131273,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"27","issue":"11","first_page":"1160","last_page":"1160"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.926800012588501,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.926800012588501,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.019500000402331352,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.006599999964237213,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.6488000154495239},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6292999982833862},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5993000268936157},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5910999774932861},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.5026000142097473},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.4641999900341034},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4318000078201294},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.4287000000476837},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.41819998621940613},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.38769999146461487}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7038000226020813},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.6488000154495239},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6292999982833862},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5993000268936157},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5910999774932861},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.5026000142097473},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.4641999900341034},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4334000051021576},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4318000078201294},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.4287000000476837},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.41819998621940613},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.38769999146461487},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.3862000107765198},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38609999418258667},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.36660000681877136},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.36070001125335693},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.35350000858306885},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.34459999203681946},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.33230000734329224},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.3206000030040741},{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.31450000405311584},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.30880001187324524},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.30809998512268066},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.2888999879360199},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.28870001435279846},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.28450000286102295},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.27900001406669617},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.272599995136261},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.2606000006198883},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.2606000006198883},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2605000138282776},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.25060001015663147}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/e27111160","is_oa":true,"landing_page_url":"https://doi.org/10.3390/e27111160","pdf_url":null,"source":{"id":"https://openalex.org/S195231649","display_name":"Entropy","issn_l":"1099-4300","issn":["1099-4300"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Entropy","raw_type":"journal-article"},{"id":"pmid:41295003","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/41295003","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Entropy (Basel, Switzerland)","raw_type":null},{"id":"pmh:oai:doaj.org/article:52283e24697e49ee827985484debf25c","is_oa":true,"landing_page_url":"https://doaj.org/article/52283e24697e49ee827985484debf25c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Entropy, Vol 27, Iss 11, p 1160 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/e27111160","is_oa":true,"landing_page_url":"https://doi.org/10.3390/e27111160","pdf_url":null,"source":{"id":"https://openalex.org/S195231649","display_name":"Entropy","issn_l":"1099-4300","issn":["1099-4300"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Entropy","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6982651587","display_name":null,"funder_award_id":"62372266","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8619482805","display_name":null,"funder_award_id":"62472251","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W21280657","https://openalex.org/W198033559","https://openalex.org/W2038761522","https://openalex.org/W2061949491","https://openalex.org/W2106116277","https://openalex.org/W2152924492","https://openalex.org/W2184323066","https://openalex.org/W2470757336","https://openalex.org/W2546007168","https://openalex.org/W2612344685","https://openalex.org/W2991960977","https://openalex.org/W3130473008","https://openalex.org/W3179157130","https://openalex.org/W3201042007","https://openalex.org/W3205965448","https://openalex.org/W4285196033","https://openalex.org/W4286758963","https://openalex.org/W4312398996","https://openalex.org/W4367595562","https://openalex.org/W4390747875","https://openalex.org/W4405182938","https://openalex.org/W4406202114","https://openalex.org/W4410355698","https://openalex.org/W4412154708"],"related_works":[],"abstract_inverted_index":{"Revocable":[0],"Identity-Based":[1],"Encryption":[2],"(RIBE)":[3],"can":[4,191],"dynamically":[5],"revoke":[6],"users":[7,62,141,172],"whose":[8],"secret":[9,233],"keys":[10],"have":[11],"been":[12],"compromised,":[13],"ensuring":[14],"a":[15,83,115,153,193,207,257],"system's":[16,271],"backward":[17],"security.":[18],"An":[19],"RIBE":[20,44,96,211],"scheme":[21,97,212,255,293],"with":[22,46,98,183,213,282],"decryption":[23,39,195],"key":[24,40,182,199,224,227,234,236,240],"exposure":[25],"resistance":[26],"(DKER)":[27],"guarantees":[28],"the":[29,38,68,91,130,149,184,204,246,253,265,270,276,280,291,299],"confidentiality":[30],"of":[31,245,279],"ciphertext":[32,103,259],"during":[33,161],"any":[34],"time":[35,163,175,186,226],"period":[36],"where":[37],"remains":[41],"undisclosed.":[42],"Existing":[43],"schemes":[45],"DKER":[47,99,214],"generate":[48],"O(rlog(N/r))":[49],"ciphertexts":[50,56],"for":[51,169],"each":[52,162],"plaintext":[53,261],"message.":[54],"Redundant":[55],"impose":[57],"significant":[58],"computational":[59,267],"burdens":[60],"on":[61,67,90,148,203],"and":[63,74,105,108,136,225,235,269,285],"substantial":[64],"communication":[65,75,109,272],"overhead":[66,76],"system.":[69],"To":[70],"reduce":[71],"high":[72],"computation":[73,107],"in":[77,298],"existing":[78],"schemes,":[79],"this":[80,112],"paper":[81,113],"proposes":[82,114],"dual-key":[84,116],"combination":[85,117],"trapdoor":[86,118],"generation":[87,119],"method.":[88],"Based":[89],"proposed":[92,205,292],"method,":[93,206],"an":[94,123,250],"indirect":[95,243,251],"is":[100,158,216],"constructed,":[101],"reducing":[102,264],"redundancy":[104],"obtaining":[106],"efficiency.":[110],"Firstly,":[111],"mechanism.":[120],"By":[121,177,248],"constructing":[122],"Inhomogeneous":[124],"Small":[125],"Integer":[126],"Solution":[127],"(ISIS)":[128],"instance,":[129,152],"Key":[131],"Generation":[132],"Center":[133],"(KGC)":[134],"generates":[135,166],"distributes":[137],"short":[138,167],"bases":[139,168],"to":[140],"as":[142,173,229],"their":[143,174,180,222,230],"identity":[144,181,223,296],"keys.":[145,176],"Subsequently,":[146],"based":[147,202],"constructed":[150],"ISIS":[151,156,286],"new":[154],"inverse":[155],"instance":[157],"derived.":[159],"Furthermore,":[160],"period,":[164],"KGC":[165],"all":[170],"non-revoked":[171,189,220],"linearly":[178],"combining":[179],"corresponding":[185],"key,":[187,196],"every":[188,219],"user":[190,232],"derive":[192],"re-randomized":[194],"achieving":[197],"controlled":[198],"derivation.":[200],"Secondly,":[201],"Post-Quantum":[208],"Secure,":[209],"Lightweight":[210],"(PQS-LRIBE-DKER)":[215],"constructed.":[217],"For":[218],"user,":[221],"serve":[228],"own":[231],"update,":[237],"respectively.":[238],"Controllable":[239],"derivation":[241],"enables":[242],"revocation":[244],"scheme.":[247],"adopting":[249],"revocation,":[252],"PQS-LRIBE-DKER":[254],"achieves":[256,294],"single":[258],"per":[260],"message,":[262],"significantly":[263],"sender's":[266],"load":[268],"overhead.":[273],"Finally,":[274],"under":[275],"hardness":[277],"assumptions":[278],"Learning":[281],"Errors":[283],"(LWE)":[284],"problems,":[287],"we":[288],"prove":[289],"that":[290],"selective":[295],"security":[297],"standard":[300],"model.":[301]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-14T00:00:00"}
