iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.openalex.org/works/doi:10.1109/TIFS.2017.2779427
{"id":"https://openalex.org/W2775185027","doi":"https://doi.org/10.1109/tifs.2017.2779427","title":"Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme","display_name":"Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme","publication_year":2017,"publication_date":"2017-12-04","ids":{"openalex":"https://openalex.org/W2775185027","doi":"https://doi.org/10.1109/tifs.2017.2779427","mag":"2775185027"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2779427","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"acceptedVersion","is_accepted":true,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://doi.org/10.1109/tifs.2017.2779427","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101595453","display_name":"Wei Dai","orcid":"https://orcid.org/0000-0002-3542-8889"},"institutions":[{"id":"https://openalex.org/I107077323","display_name":"Worcester Polytechnic Institute","ror":"https://ror.org/05ejpqr48","country_code":"US","type":"education","lineage":["https://openalex.org/I107077323"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wei Dai","raw_affiliation_strings":["Worcester Polytechnic Institute, Worcester, MA, USA"],"affiliations":[{"raw_affiliation_string":"Worcester Polytechnic Institute, Worcester, MA, USA","institution_ids":["https://openalex.org/I107077323"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086897887","display_name":"Yark\u0131n Dor\u00f6z","orcid":"https://orcid.org/0000-0001-6755-6239"},"institutions":[{"id":"https://openalex.org/I107077323","display_name":"Worcester Polytechnic Institute","ror":"https://ror.org/05ejpqr48","country_code":"US","type":"education","lineage":["https://openalex.org/I107077323"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yarkin Doroz","raw_affiliation_strings":["Worcester Polytechnic Institute, Worcester, MA, USA"],"affiliations":[{"raw_affiliation_string":"Worcester Polytechnic Institute, Worcester, MA, USA","institution_ids":["https://openalex.org/I107077323"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051232717","display_name":"Yuriy Polyakov","orcid":"https://orcid.org/0000-0002-5566-3763"},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yuriy Polyakov","raw_affiliation_strings":["NJIT Cybersecurity Research Center, New Jersey Institute of Technology, Newark, NJ, USA"],"affiliations":[{"raw_affiliation_string":"NJIT Cybersecurity Research Center, New Jersey Institute of Technology, Newark, NJ, USA","institution_ids":["https://openalex.org/I118118575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034274465","display_name":"Kurt Rohloff","orcid":"https://orcid.org/0000-0003-0389-5092"},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kurt Rohloff","raw_affiliation_strings":["NJIT Cybersecurity Research Center, New Jersey Institute of Technology, Newark, NJ, USA"],"affiliations":[{"raw_affiliation_string":"NJIT Cybersecurity Research Center, New Jersey Institute of Technology, Newark, NJ, USA","institution_ids":["https://openalex.org/I118118575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060179072","display_name":"Hadi Sajjadpour","orcid":"https://orcid.org/0000-0002-3881-3352"},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hadi Sajjadpour","raw_affiliation_strings":["NJIT Cybersecurity Research Center, New Jersey Institute of Technology, Newark, NJ, USA"],"affiliations":[{"raw_affiliation_string":"NJIT Cybersecurity Research Center, New Jersey Institute of Technology, Newark, NJ, USA","institution_ids":["https://openalex.org/I118118575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064835031","display_name":"Erkay Sava\u015f","orcid":"https://orcid.org/0000-0002-4869-5556"},"institutions":[{"id":"https://openalex.org/I134235054","display_name":"Sabanc\u0131 \u00dcniversitesi","ror":"https://ror.org/049asqa32","country_code":"TR","type":"education","lineage":["https://openalex.org/I134235054"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Erkay Savas","raw_affiliation_strings":["Sabanc\u0131 University, Istanbul, Turkey"],"affiliations":[{"raw_affiliation_string":"Sabanc\u0131 University, Istanbul, Turkey","institution_ids":["https://openalex.org/I134235054"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066592325","display_name":"Berk Sunar","orcid":"https://orcid.org/0000-0001-5404-5368"},"institutions":[{"id":"https://openalex.org/I107077323","display_name":"Worcester Polytechnic Institute","ror":"https://ror.org/05ejpqr48","country_code":"US","type":"education","lineage":["https://openalex.org/I107077323"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Berk Sunar","raw_affiliation_strings":["Worcester Polytechnic Institute, Worcester, MA, USA"],"affiliations":[{"raw_affiliation_string":"Worcester Polytechnic Institute, Worcester, MA, USA","institution_ids":["https://openalex.org/I107077323"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.438,"has_fulltext":false,"cited_by_count":57,"citation_normalized_percentile":{"value":0.999968,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"13","issue":"5","first_page":"1169","last_page":"1184"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Combinatorial Optimization and Complexity Theory","score":0.992,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Techniques for Data Analysis and Machine Learning","score":0.9844,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/learning-with-errors","display_name":"Learning with errors","score":0.6433039},{"id":"https://openalex.org/keywords/lattice-based-cryptography","display_name":"Lattice-based Cryptography","score":0.602134},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-Based Encryption","score":0.549951},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic Encryption","score":0.526263}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.85600615},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.67806596},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.65962505},{"id":"https://openalex.org/C2779014939","wikidata":"https://www.wikidata.org/wiki/Q6510239","display_name":"Learning with errors","level":3,"score":0.6433039},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.60771793},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.52893406},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.51654667},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.50467813},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.49439454},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.48534217},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4185428},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.30308926},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24093744},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09954655},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2779427","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"acceptedVersion","is_accepted":true,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2779427","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"acceptedVersion","is_accepted":true,"is_published":false},"sustainable_development_goals":[{"score":0.43,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[{"funder":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency","award_id":null},{"funder":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems","award_id":"#1561536"},{"funder":"https://openalex.org/F4320338295","funder_display_name":"Army Research Laboratory","award_id":"W911NF-15-C-0233"},{"funder":"https://openalex.org/F4320338295","funder_display_name":"Army Research Laboratory","award_id":"W911NF-15-C-0226"}],"datasets":[],"versions":[],"referenced_works_count":53,"referenced_works":["https://openalex.org/W149470655","https://openalex.org/W1495150862","https://openalex.org/W1498316612","https://openalex.org/W1504384386","https://openalex.org/W1510795740","https://openalex.org/W1513098086","https://openalex.org/W1564449568","https://openalex.org/W1566015562","https://openalex.org/W1582733026","https://openalex.org/W1682451491","https://openalex.org/W177444027","https://openalex.org/W1839785783","https://openalex.org/W1886646278","https://openalex.org/W1942572371","https://openalex.org/W2007466965","https://openalex.org/W2008701790","https://openalex.org/W2023755091","https://openalex.org/W2038761522","https://openalex.org/W2061139471","https://openalex.org/W2061171222","https://openalex.org/W2069285815","https://openalex.org/W2076046175","https://openalex.org/W2086042811","https://openalex.org/W2088645726","https://openalex.org/W2095363965","https://openalex.org/W2098290658","https://openalex.org/W2100213926","https://openalex.org/W2106970188","https://openalex.org/W2108072891","https://openalex.org/W2113717903","https://openalex.org/W2117582073","https://openalex.org/W2138001464","https://openalex.org/W2161508639","https://openalex.org/W2196732887","https://openalex.org/W2238904460","https://openalex.org/W2245734289","https://openalex.org/W2293350147","https://openalex.org/W2296067100","https://openalex.org/W2309997581","https://openalex.org/W2397835572","https://openalex.org/W2401959250","https://openalex.org/W2533504424","https://openalex.org/W2579350965","https://openalex.org/W2605284921","https://openalex.org/W2614076031","https://openalex.org/W2756242929","https://openalex.org/W2769171744","https://openalex.org/W2775185027","https://openalex.org/W31130112","https://openalex.org/W62680702","https://openalex.org/W65891367","https://openalex.org/W74973629","https://openalex.org/W80562455"],"related_works":["https://openalex.org/W3029045823","https://openalex.org/W3003331030","https://openalex.org/W2963103512","https://openalex.org/W2947510282","https://openalex.org/W2885113919","https://openalex.org/W2601739120","https://openalex.org/W2537419609","https://openalex.org/W2400565204","https://openalex.org/W2363701519","https://openalex.org/W2238904460"],"abstract_inverted_index":{"In":[0],"this":[1,156,178],"paper,":[2],"we":[3],"report":[4],"on":[5,68,81,103],"our":[6,154],"implementation":[7,92,102,161],"of":[8,122,134,148,153],"a":[9,37,62,76,130,144],"lattice-based":[10],"key-policy":[11],"attribute-based":[12,30],"encryption":[13],"(KP-ABE)":[14],"scheme,":[15,125],"which":[16,117],"uses":[17],"short":[18,132],"secret":[19],"keys.":[20],"The":[21],"particular":[22],"KP-ABE":[23,65,124,160],"scheme":[24,66,79],"can":[25,94,126],"be":[26,95,127],"used":[27,96],"directly":[28],"for":[29],"access":[31],"control":[32],"applications,":[33],"as":[34,36,48],"well":[35],"building":[38],"block":[39],"in":[40,97,129,177],"more":[41,77],"involved":[42],"applications":[43],"and":[44,57,89,113,166,170],"cryptographic":[45],"schemes,":[46],"such":[47],"audit":[49],"log":[50],"encryption,":[51,54,56],"targeted":[52],"broadcast":[53],"functional":[55],"program":[58],"obfuscation.":[59],"We":[60],"adapt":[61],"recently":[63],"proposed":[64],"based":[67,80],"the":[69,82,109,119,123,151,158,171],"learning":[70,84],"with":[71,85],"errors":[72,86],"(LWE)":[73],"problem":[74],"to":[75,143],"efficient":[78],"ring":[83],"(RLWE)":[87],"problem,":[88],"demonstrate":[90],"an":[91],"that":[93,108,162],"practical":[98],"applications.":[99],"Our":[100,136],"state-of-the-art":[101],"graphics":[104],"processing":[105],"units":[106],"shows":[107],"homomorphic":[110],"public":[111,167],"key":[112,168],"ciphertext":[114,165],"evaluation":[115],"operations,":[116],"dominate":[118],"execution":[120],"time":[121],"performed":[128],"reasonably":[131],"amount":[133],"time.":[135],"practicality":[137,174],"results":[138,175],"also":[139],"hold":[140],"when":[141],"scaled":[142],"relatively":[145],"large":[146],"number":[147],"attributes.":[149],"To":[150],"best":[152],"knowledge,":[155],"is":[157],"first":[159],"supports":[163],"both":[164],"homomorphism,":[169],"only":[172],"experimental":[173],"reported":[176],"paper.":[179]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2775185027","counts_by_year":[{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":13},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":1}],"updated_date":"2024-12-04T16:39:54.822729","created_date":"2017-12-22"}