{"id":"https://openalex.org/W2030246973","doi":"https://doi.org/10.1109/waina.2015.11","title":"Server Aided Ciphertext-Policy Attribute-Based Encryption","display_name":"Server Aided Ciphertext-Policy Attribute-Based Encryption","publication_year":2015,"publication_date":"2015-03-01","ids":{"openalex":"https://openalex.org/W2030246973","doi":"https://doi.org/10.1109/waina.2015.11","mag":"2030246973"},"language":"en","primary_location":{"id":"doi:10.1109/waina.2015.11","is_oa":false,"landing_page_url":"https://doi.org/10.1109/waina.2015.11","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100446064","display_name":"Hao Wang","orcid":"https://orcid.org/0000-0001-9301-5989"},"institutions":[{"id":"https://openalex.org/I28006308","display_name":"Shandong Normal University","ror":"https://ror.org/01wy3h363","country_code":"CN","type":"education","lineage":["https://openalex.org/I28006308"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hao Wang","raw_affiliation_strings":["School of Information Science and Engineering, Shandong Normal University, Jinan, China","School of Information Science and Engineering Shandong Normal University Jinan China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Shandong Normal University, Jinan, China","institution_ids":["https://openalex.org/I28006308"]},{"raw_affiliation_string":"School of Information Science and Engineering Shandong Normal University Jinan China","institution_ids":["https://openalex.org/I28006308"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065763579","display_name":"Bo Yang","orcid":"https://orcid.org/0009-0008-1798-4268"},"institutions":[{"id":"https://openalex.org/I4210102741","display_name":"Jiangsu Vocational College of Medicine","ror":"https://ror.org/01jzst437","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210102741"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Yang","raw_affiliation_strings":["Department of Electronic Engineering, Yantai Vocational College, Yantai, China","Dept. of Electron. Eng., Yantai Vocational Coll., Yantai, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, Yantai Vocational College, Yantai, China","institution_ids":[]},{"raw_affiliation_string":"Dept. of Electron. Eng., Yantai Vocational Coll., Yantai, China","institution_ids":["https://openalex.org/I4210102741"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100781536","display_name":"Yilei Wang","orcid":"https://orcid.org/0000-0002-7856-2527"},"institutions":[{"id":"https://openalex.org/I182707071","display_name":"Ludong University","ror":"https://ror.org/028h95t32","country_code":"CN","type":"education","lineage":["https://openalex.org/I182707071"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yilei Wang","raw_affiliation_strings":["School of Information Science and Engineering, Ludong University, Yantai, China","Sch. of Inf. Sci. & Eng., Ludong Univ., Yantai, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Ludong University, Yantai, China","institution_ids":["https://openalex.org/I182707071"]},{"raw_affiliation_string":"Sch. of Inf. Sci. & Eng., Ludong Univ., Yantai, China","institution_ids":["https://openalex.org/I182707071"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100446064"],"corresponding_institution_ids":["https://openalex.org/I28006308"],"apc_list":null,"apc_paid":null,"fwci":2.1572,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.90001347,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.8308482766151428},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.7945705652236938},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7930698394775391},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7453697919845581},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.7052022814750671},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.572942852973938},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.5493530631065369},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.5298879742622375},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.5179111361503601},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5060071349143982},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.4667504131793976},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.4417492151260376},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.4136732816696167},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.32185372710227966},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.09444966912269592}],"concepts":[{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.8308482766151428},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.7945705652236938},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7930698394775391},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7453697919845581},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.7052022814750671},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.572942852973938},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.5493530631065369},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.5298879742622375},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.5179111361503601},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5060071349143982},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.4667504131793976},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.4417492151260376},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.4136732816696167},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.32185372710227966},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.09444966912269592}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/waina.2015.11","is_oa":false,"landing_page_url":"https://doi.org/10.1109/waina.2015.11","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.4300000071525574}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324174","display_name":"Natural Science Foundation of Shandong Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W70096886","https://openalex.org/W154883872","https://openalex.org/W177444027","https://openalex.org/W1498316612","https://openalex.org/W1522101599","https://openalex.org/W1798609567","https://openalex.org/W1898753656","https://openalex.org/W2108072891","https://openalex.org/W2138001464","https://openalex.org/W2160608575","https://openalex.org/W3128663643","https://openalex.org/W6602830368","https://openalex.org/W6606212940","https://openalex.org/W6631341469","https://openalex.org/W6638407846"],"related_works":["https://openalex.org/W2624091145","https://openalex.org/W4308784203","https://openalex.org/W4309584611","https://openalex.org/W1025240641","https://openalex.org/W2361619969","https://openalex.org/W3118757263","https://openalex.org/W2380438667","https://openalex.org/W3022099831","https://openalex.org/W4296240640","https://openalex.org/W4360994575"],"abstract_inverted_index":{"Attribute-based":[0],"encryption":[1,9,26,47,90],"(ABE)":[2],"is":[3,24,119],"a":[4,50],"type":[5],"of":[6,35,41],"public":[7],"key":[8],"that":[10,25],"allows":[11],"users":[12,81],"to":[13,61,91,109,113,124],"encrypt":[14],"and":[15,27,48,94,129,138],"decrypt":[16],"messages":[17],"based":[18],"on":[19,97],"user":[20,103],"attributes.":[21,42],"One":[22],"drawback":[23],"decryption":[28,49],"computational":[29,130],"costs":[30],"scale":[31],"with":[32],"the":[33,36,72,111,114,143],"complexity":[34],"access":[37],"policy":[38],"or":[39],"number":[40],"In":[43,56,78],"practice,":[44],"this":[45,57,63,79],"makes":[46],"possible":[51],"bottleneck":[52],"for":[53,65,121],"some":[54],"applications.":[55],"work,":[58],"we":[59,133],"aim":[60],"mitigate":[62],"problem":[64],"cipher":[66,86],"text-policy":[67],"ABE":[68],"(CP-ABE).":[69],"We":[70],"introduce":[71],"serve":[73],"raided":[74],"CP-ABE":[75],"(SA-CP-ABE)":[76],"system.":[77],"system,":[80],"can":[82,104],"precompute":[83],"an":[84,135],"intermediate":[85],"text":[87],"before":[88],"actual":[89],"improve":[92],"efficiency,":[93],"stores":[95],"it":[96],"its":[98,106,140],"storage":[99,127],"server.":[100],"Before":[101],"decryption,":[102],"call":[105],"computing":[107],"server":[108],"transform":[110],"ciphertext":[112],"partially":[115],"decrypted":[116],"ciphertext.":[117],"This":[118],"significant":[120],"mobile":[122],"devices":[123],"save":[125],"local":[126],"resources":[128],"resources.":[131],"Then,":[132],"propose":[134],"SA-CP-ABE":[136],"scheme,":[137],"prove":[139],"security":[141],"in":[142],"standard":[144],"model.":[145]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
