{"id":"https://openalex.org/W7117549233","doi":"https://doi.org/10.48550/arxiv.2512.21525","title":"Enhancing Distributed Authorization With Lagrange Interpolation And Attribute-Based Encryption","display_name":"Enhancing Distributed Authorization With Lagrange Interpolation And Attribute-Based Encryption","publication_year":2025,"publication_date":"2025-12-25","ids":{"openalex":"https://openalex.org/W7117549233","doi":"https://doi.org/10.48550/arxiv.2512.21525"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2512.21525","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.21525","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2512.21525","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063962412","display_name":"Keshav Sinha","orcid":"https://orcid.org/0000-0003-1053-3911"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Sinha, Keshav","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121535622","display_name":"Sumitra","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sumitra","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057956348","display_name":"Richa Kumari","orcid":"https://orcid.org/0000-0001-7663-9132"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kumari, Richa","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121572321","display_name":"Akashdeep Bhardwaj","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bhardwaj, Akashdeep","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5121530289","display_name":"Shawon Rahman","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rahman, Shawon","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5063962412"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.8295000195503235,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.8295000195503235,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.03200000151991844,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.0203000009059906,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.583299994468689},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5360999703407288},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5221999883651733},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.4869000017642975},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.4237000048160553},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.4120999872684479},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3970000147819519},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.39320001006126404},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.38609999418258667},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.36090001463890076}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7515000104904175},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.583299994468689},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5360999703407288},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5221999883651733},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.4869000017642975},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.4237000048160553},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.4120999872684479},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3970000147819519},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.39320001006126404},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.38609999418258667},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.383899986743927},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3617999851703644},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.36090001463890076},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34599998593330383},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.34549999237060547},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.3452000021934509},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.34119999408721924},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.335099995136261},{"id":"https://openalex.org/C2778950925","wikidata":"https://www.wikidata.org/wiki/Q4672474","display_name":"Access structure","level":4,"score":0.33489999175071716},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.3310000002384186},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.32910001277923584},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.3059999942779541},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.3052999973297119},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.29170000553131104},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.2847000062465668},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.2831999957561493},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.2825999855995178},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.2815000116825104},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.2720000147819519},{"id":"https://openalex.org/C137800194","wikidata":"https://www.wikidata.org/wiki/Q11713455","display_name":"Interpolation (computer graphics)","level":3,"score":0.27079999446868896},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2630999982357025},{"id":"https://openalex.org/C184660509","wikidata":"https://www.wikidata.org/wiki/Q462624","display_name":"Shared secret","level":3,"score":0.26249998807907104},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.2603999972343445},{"id":"https://openalex.org/C131755552","wikidata":"https://www.wikidata.org/wiki/Q935125","display_name":"Shamir's Secret Sharing","level":5,"score":0.2574999928474426},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.25440001487731934},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2540000081062317},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.2529999911785126},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.2508000135421753}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2512.21525","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.21525","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2512.21525","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.21525","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6834527850151062}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0,68,161],"todays":[1],"security":[2,159],"landscape,":[3],"every":[4,113],"user":[5],"wants":[6],"to":[7,27,36,88,105,112,127,170],"access":[8,28,33],"large":[9],"amounts":[10],"of":[11],"data":[12,174],"with":[13,57],"confidentiality":[14],"and":[15,39,52,107,152,158],"authorization.":[16,41],"To":[17,55],"maintain":[18],"confidentiality,":[19],"various":[20],"researchers":[21,31],"have":[22],"proposed":[23,62,165],"several":[24,44],"techniques.":[25],"However,":[26],"secure":[29,173],"data,":[30],"use":[32],"control":[34],"lists":[35],"grant":[37],"authentication":[38],"provide":[40],"The":[42,76,93,115,136,144],"above":[43],"steps":[45],"will":[46,138,167],"increase":[47],"the":[48,66,82,90,100,109,129,133,140,150,162,164,176],"server's":[49,141],"computation":[50],"overhead":[51],"response":[53],"time.":[54],"cope":[56],"these":[58],"two":[59,73],"problems,":[60],"we":[61,71],"multiparty":[63],"execution":[64],"on":[65,149],"server.":[67],"this":[69],"paper,":[70],"introduce":[72],"different":[74],"approaches.":[75],"first":[77],"approach":[78,95],"is":[79,96],"encryption,":[80],"utilizing":[81],"Involution":[83],"Function":[84],"Based":[85],"Stream":[86],"Cipher":[87],"encrypt":[89],"file":[91],"data.":[92],"second":[94,123],"key":[97,111,119],"distribution,":[98],"using":[99],"Shamir":[101],"secret":[102,130],"sharing":[103],"scheme":[104],"divide":[106],"distribute":[108],"symmetric":[110],"user.":[114],"decryption":[116,153],"process":[117,137],"required":[118],"reconstruction,":[120],"which":[121],"used":[122,169],"order":[124],"Lagrange":[125],"interpolation":[126],"reconstruct":[128],"keys":[131],"from":[132],"hidden":[134],"points.":[135],"reduce":[139],"computational":[142,156],"overhead.":[143],"results":[145],"are":[146],"evaluated":[147],"based":[148],"encryption":[151],"time,":[154],"throughput,":[155],"overhead,":[157],"analysis.":[160],"future,":[163],"mechanism":[166],"be":[168],"share":[171],"large-scale,":[172],"within":[175],"organization.":[177]},"counts_by_year":[],"updated_date":"2025-12-30T23:12:23.022851","created_date":"2025-12-30T00:00:00"}
